Synchronization and Beaconing in IEEE s Mesh Networks

Size: px
Start display at page:

Download "Synchronization and Beaconing in IEEE s Mesh Networks"

Transcription

1 Synchronization and Beaconing in IEEE 80.s Mesh etworks Alexander Safonov and Andrey Lyakhov Institute for Information Transmission Problems s: {safa, Stanislav Sharov Moscow Institute for Physics and Technology Abstract Synchronization and beaconing attract much attention with the appearance of IEEE 80.s Amendment draft specifying mesh networking based on IEEE 80. concepts. This paper discusses the drawbacks of using unsynchronized beaconing and focuses on beaconing of synchronized mesh points which adopt beaconing algorithm for IBSS networks with some modifications. We provide an analytical model of the beaconing process and prove its accuracy with simulation results.. Introduction The original IEEE 80. standard [] supposes that one of the main purposes of beacon frames is exchanging timing information between stations (STAs). In an infrastructure network, the access point is the only STA responsible for broadcasting beacons. In an ad-hoc network, all STAs transmit beacons. Anyway, beacons carry information which is used by Timing Synchronization Function (TSF) [] maintaining STAs clock synchronization. By means of TSF the global, or in other words network-wide, synchronization is provided, i.e. all STAs use common time reference points. The global synchronization and beaconing concepts, which remained unchanged for a decade of IEEE 80. standard life, attract much attention with the appearance of IEEE 80.s Amendment draft specifying mesh networking. Compared with legacy IEEE 80., a mesh network provides additional services, and beacons are responsible to support them. In the first mesh networks standard draft [3], mesh- STAs, called Mesh Points (MPs), may choose either to support global synchronization or not. Unsynchronized MPs send beacons as in infrastructure networks, while synchronized MPs adopt ad hoc networks beaconing with some modifications. In the current IEEE 80.s interim draft [4], another step is made towards unsynchronized mesh networking. Per-neighbor based synchronization is used instead of global synchronization. MPs tend to send beacons as access points which radio ranges overlap, taking no steps to prevent their beacons from collisions with data transmissions from hidden MPs. It is impossible to ignore the presence of hidden nodes in a mesh network, so beaconing without global synchronization in a mesh network is very much unreliable. If no common time is maintained, it is difficult to educate hidden nodes to respect beacons from one another and suspend data transmissions for the time of beacon transmissions. With the appearance of mesh networks, it is clear that beaconing requires much attention and accurate analysis. Synchronized MPs may support mesh-wide QoS and efficient power saving which are widely believed to be absolutely necessary for modern Consumer Electronics devices. In this paper, we study the beaconing of synchronized MPs in a network operating according to the mesh standard draft [3]. The rest of the paper is organized as follows. In the next sectio we summarize the evolution of beaconing in IEEE 80. networks and overview the investigation in this field. Section III provides analytical model of beaconing process in mesh networks [3]. We show numerical results obtained with the analytical model and validate their accuracy with simulation results in section IV. Finally, section V concludes the paper.

2 . Overview of beaconing in IEEE 80. This section summarizes evolution and investigation of synchronization and beaconing mechanisms in IEEE 80. networks, starting from the original IEEE 80. standard [] published in 999. Special attention is paid to the first draft of IEEE 80.s Amendment [3] specifying the operation of mesh networks based on the concepts of recently published IEEE []. In the original IEEE 80. standard [], beacon frames are used to provide STAs clock synchronization and advertise STAs capabilities. Clock synchronization is important for both PHY and MAC layers, e.g. for frequency hopping spread spectrum technology to ensure that all STAs hop at the same time, or for performing power management. IEEE 80. standard [] supports infrastructure and ad hoc modes, called BSS and IBSS, respectively. In a BSS network, beacons are only sent by the access point. In an IBSS network, beacon generation is distributed, i.e. all members of the IBSS participate in beacon generation. The STA which instantiates the IBSS defines a series of Target Beacon Transmission Times (TBTTs) exactly Beacon Interval time units apart. At each TBTT, every STA suspends decrementing its backoff counter for any non-beacon and non-atim traffic and schedules a beacon transmission by setting a timer to a randomly chosen number of slots uniformly distributed between zero and acwmin. STAs decrement their timers using the same algorithm as for backoff. If STAs sense the medium idle during a slot they decrement their timers by. If a STA starts a beacon transmissio other STAs freeze their timers until the medium is sensed idle for DIFS. If a collision happe timers are frozen until the medium is sensed idle for EIFS. If the timer expires, the STA starts its beacon transmission. If a beacon arrives before the timer expiratio the STA cancels its own pending beacon transmissions. At each TBTT, an ATIM Window starts where beacons and ATIM frames may only be sent. To decrease the probability of collisio other transmissions are prohibited within ATIM Window. ATIM frames are used for power save management and are out of scope of this paper. We assume that no STA is in power save mode. Upon receiving a beaco a STA adjusts its TSF timer based on the timestamp indicated in the beaco synchronizing its clock to the beacon. Some TSF problems are well-known. So, TSF is not scalable, as shown in [5]. The beacon collision probability increases with the number of STAs in IBSS. If no beacon is transmitted successfully several consecutive Beacon Intervals STAs may get out of synchronization. Another problem is that the TSF timer can be adjusted forward only, but not backward. More specifically, upon receiving a beaco a STA adjusts its TSF timer based on the beacon timestamp if the value of the timestamp is later than the STA s TSF timer. As a result, fast STAs cannot adjust their timers even if a beacon generated by a slow STA is received. The effect is called the Fastest-station asynchronism and studied in depth [6]. With the appearance of the first completed mesh networks standard draft 80.s/D.00 [3], the synchronization and beaconing rules evolved. An MP may choose to be either synchronized or unsynchronized. Unsynchronized MPs transmit their beacons as access points in BSS networks, each maintaining independent TSF timer and TBTTs. In contrast, synchronized MPs attempt to maintain a common TSF time called the Mesh TSF time and schedule their beacon transmissions at the same TBTTs. In [3], Synchronized MPs adopt IBSS beaconing rules, except for the following aspect. If an MP s beacon is received in a Beacon Interval, other MPs may cancel their own pending beacon transmissions, but they do not have to. It may be inappropriate for an MP to cancel its own beacon transmission. A mesh network may need more than one beacon appeared in a Beacon Interval from an arbitrary MP. Compared with an IBSS, a mesh network provides additional services and beacons are responsible to support them. So, Mesh Deterministic Access (MDA) [3] is a channel reservation method designed for isochronous delay-sensitive traffic. Potentially it is the best method to ensure mesh-wide QoS for multimedia applications. Both MDA transmitter and receiver maintain their MDA reservations by including MDAOP Advertisements information element into beacons, otherwise MDA reservation lifetime expires. This additional information makes beacons from two MPs sufficiently different, compared with beacons in the legacy IBSS, where the only timestamp field value is updated for each STA, while other fields represent STAs capabilities and are not changed during the IBSS existence. So, each MP may need to send its beacon more frequently than STAs in IBSS. In addition to BSS and IBSS beaconing, 80.s/D.00 draft introduces the Beacon Broadcaster (BB) concept. For power saving purpose, MPs may choose one MP to serve as the BB for some time.

3 When the BB is elected, other MPs generate no beacons. MPs hand over the responsibility for serving as the BB periodically. However, in a mesh network some MPs are hidden from each other, so multiple BBs may appear and the BB rotation problem appeared very complicated. In later versions of the mesh network draft, e.g. in [4], the usage of BB is excluded. In the current interim version of the 80.s draft [4], MPs synchronization is per-neighbor based. o mesh-wide synchronization is provided. With independent TSF timers and TBTTs, the BSS and IBSS beaconing seems to have little difference. In both cases, MPs send their beacons independently, without any coordination with neighbor MPs, except the attempts to escape repeated beacon collisions. The work on the 80.s draft is not finished yet. It is not clear which beaconing rules will be finally adopted as mesh beaconing. We believe that meshwide synchronization and IBSS beaconing make available such important features as mesh-wide QoS and efficient power saving which are core Consumer Electronics requirements. In contrast, in a network without global synchronizatio it seems to be more difficult, if not impossible, to provide QoS. So, in this paper, we focus on beaconing of synchronized MPs in the only completed version of IEEE 80.s mesh draft [3]. 3. Analytical study In this sectio we show the analytical study of synchronized MPs beaconing in an IEEE 80.s mesh network [3]. To estimate the beaconing performance, we calculate the average number of beacons transmitted successfully per a Beacon Interval and the probability for an MP to transmit its beacon in a Beacon Interval. Transmission range of a STA depends on the transmission rate, and it is wider at low rate. Beacons are always sent at the lowest basic rate, while data may be sent at much higher rates. For OFDM technology which is considered in this paper, beacons are sent at 6Mbps, while data may be sent at up to 54Mbps. So, even if MPs are within one another s transmission range at the lowest basic rate, in order to exchange data, the MPs may have to transmit over several hops. Let us consider a network consisting of MPs. To simplify the analysis we assume that every MP can receive beacons sent by all other MPs. Pending a beacon transmission in the beginning of a Beacon Interval, every MP sets a timer to a random number of slots chosen from the interval of K slots. STAs decrement their timers using the same algorithm as for backoff described in section II. The slot equal to aslottime is used as the basic time unit in our model. We represent the beaconing process as the sequence of virtual slots which starts at each TBTT. If no beacon transmission was started in a virtual slot then its length is equal to the length of slot. If one MP starts a beacon transmission in a virtual slot then its length ts is equal to the time needed to transmit a beacon plus DIFS. If several MPs start beacon transmissions in a virtual slot then a collision happens and its length t с is equal to the time needed to transmit a beacon plus EIFS. Both times, t s and t с, are rounded to the integer number of slots in our model, to simplify the analysis. In the next sectio we show that this approximation is accurate enough by comparing numerical results obtained by analytical and simulation models. To increase the frequency of beacons sent by self, an MP does not cancel its pending beacon transmission even if it receives a beacon sent by another MP, but it tries to send its own beacon unless the end of ATIM Window is reached. All pending beacon transmissions which start out of ATIM Window are cancelled. In the analysis, we calculate the average number of beacons transmitted successfully per a Beacon Interval, B(, K, M), where M is the ATIM Window size. Obviously, B (, K, M ) = for every M K, and B (,, M ) = 0 if > and M. As all MPs compete for beacon transmission using common rules, the probability that an MP transmits its beacon in a Beacon Interval is equal among all MPs and may B (, K, M ) simply be calculated as. We consider beaconing process in ATIM Window, proceeding from virtual slot to virtual slot. At the current virtual slot, n MPs have not transmitted their beacons, k virtual slots remain unconsidered, and m slots remain in ATIM Window. The probability that exactly j of n MPs schedule their beacon transmissions in the current virtual slot is j n j n p( j, k) = C j, k k where n! C n j = is the number of ways to j!( n j)! choose j MPs among MPs. A beacon is sent successfully in the current virtual slot, if and only if an MP is the only one scheduled its beacon transmission in the slot, which happens with the probability p(, k). The probability that no MP

4 schedules its beacon transmission in the current virtual slot is p(0, k). Following along the sequence of K virtual slots, slot by slot, we calculate B(, K, M) recursively: B( k, m) = p(0, k)( k > & m > ) B( k, m ) + + p(, k) + n j= { + ( m > t & k > ) B( n, k, m t )} s p( j, k) [ ( m > t & k > ) B( n j, k, m t )], where (condition) means a Boolean indicator that the condition within the brackets is held. In the recursio the first of three components describes the case when the current virtual slot is empty. If there is at least one more virtual slot to consider (k >) and at least one more slot in the rest of ATIM Window (m >), we add to the current B( ) the average number of successful beacon transmissions in the rest of ATIM Window, with the probability p(0, k). The second component describes the case when exactly one MP transmits its beacon in the current virtual slot, which happens with the probability p(, k). We add one more successful beacon to the current B( ), check that the end of ATIM Window is not reached ( m > ts ) and at least one virtual slot remains unconsidered (k > ), decrease the number n of MPs by and the ATIM Window remainder by t s, and proceed to the next virtual slot. The last component of the recursion describes the case of beacon collision when exactly j = {,, n} MPs transmit their beacons in the current virtual slot, which happens with the probability p(j, k). We check that the end of ATIM Window is not reached ( m > tс ) and at least one virtual slot remains unconsidered (k > ), decrease the number n of MPs by j and the ATIM Window remainder by t с, and proceed to the next virtual slot. We continue calculating B( ) recursively until the end of ATIM Window is reached or all K virtual slots in the current Beacon Interval are considered. This is the end of our analytical investigation. In the next sectio we show the numerical results of the investigation. 4. umerical results c s c + varying the ATIM Window size, M, and the number of MPs in the network,. For OFDM PHY which we consider in our numerical analysis, values of parameters which are important in our analysis are listed in Table. The beacon frame length is the same for all MPs. We calculate the minimal reasonable beacon length, including into the beacon all mandatory fields, but no optional fields, as in [3]. In the scenario we consider, one of MPs in the network maintains a Broadcast MDA reservation [4, 7] for a video stream by including an MDAOP Advertisements informational element into its beacon. Other MPs receive the stream, so they include similar elements into their beacons. The total length of a successful beacon transmission or a beacon collision is approximately 7 or 34 slots, correspondingly. We discuss the accuracy of this approximation in the end of this section. TABLE UMERICAL VALUES Slot = aslottime, us 9us acwmi slots 5 K = +*acwmin 3 Lowest basic rate, Mbps 6 Beacon payload length, bytes 07 DIFS, us 34 EIFS, us 94 t s, us 47 t c, us 307 t s, rounded to the integer number of 7 slots t c, rounded to the integer number of 34 slots ATIM Window size, slots umber of MPs 60 Figure shows the average number of successful beacon transmissions in an ATIM Window vs. the number of MPs in the mesh network. B(,M) increases with the number of MPs until the number of beacon collisions is not too big and almost all MPs transmit their beacons successfully. After some point which depends on the ATIM Window size, B(,M) goes down as the beacon collision probability increases sharply. In the numerical analysis, we calculate the average number of beacons transmitted successfully per a Beacon Interval, B(, M) = B(, +*acwmi M),

5 6 B(,M) 6 B(,M) M = 50 M = 70 M = 00 M = 50 M = 00 Figure The average number of successful beacon transmissions in ATIM Window vs. number of MPs Figure shows the average number of successful beacon transmissions in an ATIM Window vs. the ATIM Window size. The increase of the curves is periodic and one can see that the period is approximately equal to the beacon transmission length. Arbitrary increase of the ATIM Window may give no increase in the number of successful beacon transmissions. Figure 3 shows the probability of successful beacon transmission for an MP vs. the number of MPs. To some point the probability B(,M)/ decreases slowly because the number of beacon collisions is small. For a given number of MPs, the probability of beacon collision depends on the number of virtual slots which increases with the ATIM Window size. However, the number of virtual slots cannot be more than K=+ acwmin aslottime, so after some point the probability B(,M)/ sharply goes down as the number of beacon collisions increases quickly. However long ATIM Window gives high probability of successful beaconing, it also causes high overhead because data transmissions are prohibited in ATIM Window. To implement mesh services it may be needed to guarantee that beacon of an MP is successfully transmitted within some timeout. For example, MDA mechanism [4] requires that each MP having MDA active to advertise its MDA reservations periodically. Otherwise, the reservations become unprotected from collisions or cancelled = 0 = 0 = 35 = 45 = 60 Figure The average number of successful beacon transmissions in ATIM Window vs. the ATIM Window size In other words, to support MDA, it is needed to guarantee that the probability of successful beacon transmission is not less than some threshold. Results shown in Figure 3 allow adjusting the ATIM Window size depending on the number of neighboring MPs. For example, if the MDA timeout is set to five Beacon Intervals, the probability of successful beacon transmission shall be greater than 0%. Figure 3 shows that in case of 30 MPs in the neighborhood, it is needed to set the ATIM Window size to about 50 slots or.3ms. If the number of MPs is 0, then ATIM Window may be two times shorter, i.e. only 70 slots or 0.6ms. Adjusting ATIM Window with the number of neighboring MPs is an effective method to guarantee successful beaconing and maintain overhead reasonable B(,M)/ M = 50 M = 70 M = 00 M = 50 M = 00 Figure 3 The probability that a beacon transmission from an MP is successful vs. number of MPs M

6 Figure 4 compares analytical and simulation results. The simulation model is build with General Purpose Simulation System (GPSS) [8] with continuous time, i.e. the length of beacon transmission plus DIFS or EIFS is 47 or 307 microseconds, correspondingly. Figure 4 shows that the inaccuracy caused by approximation of these values to the integer number of slots, 7 and 34 slots, correspondingly, is very low. This is not surprising and may be simply explained by the fact that the beacon length is much bigger than the maximal inaccuracy of the approximation which is equal to 0.5 slots. 5 4,5 4 3,5 3,5 B(,M), Theory, M = 50 (Ts=7, Tc=34) Simulatio M = 50 Figure 4 Comparing simulation and analytical results where values are rounded to the integer number of slots which performance is heavily affected by non-beacon transmissions. 0. References [] IEEE Std 80., 999 Editio Wireless LA Medium Access Control (MAC) and Physical Layer (PHY) specificatio August 999 [] IEEE Std , Revision of IEEE Std , Wireless LA Medium Access Control (MAC) and Physical Layer (PHY) specificatio June 007 [3] IEEE P80.s/D.00, Draft Amendment to Standard, ESS Mesh etworking, ovember 006 [4] IEEE P80.s/D.08, Draft Amendment to Standard, Mesh etworking, January 008 [5] L. Huang and T.H. Lai, On the scalability of IEEE 80. ad hoc networks, In Proceedings of ACM MobiHoc, 00 [6] D. Zhou, T.H. Lai, Analysis and Implementation of Scalable Clock Synchronization Protocols in IEEE 80. Ad Hoc etworks, In Proceedings of MASS, 004 [7] Yongho Seok, Alexander Safonov, Dee Denteneer, doc.: IEEE /73r MDA Extension for Multicast/Broadcast Transmission, ovember 007 [8] [9] IEEE LA/MA Standardization Committee, 5. Conclusions In this paper, we discuss the synchronization aspects and study the beaconing algorithm of synchronized MPs in IEEE 80.s mesh networks standard draft [3]. The probability of successful beacon transmission is calculated depending on the number of MPs in the network and the ATIM Window size. On the one hand, within ATIM Window beacons are protected from collisions with data transmissions. On the other hand, ATIM Window causes overhead and should be as short as it is possible. The results of our analysis show the method of optimal adjusting the ATIM Window size depending on the number of MPs in the network. Common ATIM Window usage is an effective method to protect beacons of synchronized MPs. However, the current situation in the IEEE LA/MA Standardization Committee [9] is that 80.s draft tends to provide no mesh-wide synchronization. Authors strongly believe that mesh-wide QoS would be difficult to achieve with unsynchronized beaconing

Analysis and Implementation of Scalable Clock Synchronization Protocols in IEEE Ad Hoc Networks

Analysis and Implementation of Scalable Clock Synchronization Protocols in IEEE Ad Hoc Networks Analysis and Implementation of Scalable Clock Synchronization Protocols in IEEE 802.11 Ad Hoc Networks Dong Zhou Ten-Hwang Lai Department of Computing and Information Science The Ohio State University

More information

A Scalable and Adaptive Clock Synchronization Protocol for IEEE Based Multihop Ad Hoc Networks

A Scalable and Adaptive Clock Synchronization Protocol for IEEE Based Multihop Ad Hoc Networks A Scalable and Adaptive Clock Synchronization Protocol for IEEE 802.11-Based Multihop Ad Hoc Networks Dong Zhou Ten H. Lai Department of Computer Science and Engineering The Ohio State University {zhoudo,

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

IEEE P Wireless LANs IEEE802.11h Dynamic Frequency Selection (DFS) in an Independent BSS (IBSS) Abstract

IEEE P Wireless LANs IEEE802.11h Dynamic Frequency Selection (DFS) in an Independent BSS (IBSS) Abstract IEEE P802.11 Wireless LANs IEEE802.11h Dynamic Frequency Selection (DFS) in an Independent BSS (IBSS) Date: September 21, 2001 Author: S. Black 1, S. Choi 2, S. Gray 1, A. Soomro 2 Nokia Research Center

More information

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

-52 - FLASH-58. (12) Patent Application Publication (10) Pub. No.: US 2007/ A1 H- SRAM EEPROM-62. (19) United States / BASEBAND

-52 - FLASH-58. (12) Patent Application Publication (10) Pub. No.: US 2007/ A1 H- SRAM EEPROM-62. (19) United States / BASEBAND (19) United States US 20070014269A1 (12) Patent Application Publication (10) Pub. No.: US 2007/0014269 A1 Sherman et al. (43) Pub. Date: (54) APPARATUS FOR AND METHOD OF SYNCHRONIZATION AND BEACONING IN

More information

On the Coexistence of Overlapping BSSs in WLANs

On the Coexistence of Overlapping BSSs in WLANs On the Coexistence of Overlapping BSSs in WLANs Ariton E. Xhafa, Anuj Batra Texas Instruments, Inc. 12500 TI Boulevard Dallas, TX 75243, USA Email:{axhafa, batra}@ti.com Artur Zaks Texas Instruments, Inc.

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense

More information

% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.

% 4 (1 $ $ !  ( # $ 5 # $ % - % +' ( % +' (( % -. ! " % - % 2 % % 4 % % & % ) % * %, % -. % -- % -2 % - % -4 % - 0 "" 1 $ (1 $ $ (1 $ $ ( # $ 5 # $$ # $ ' ( (( +'! $ /0 (1 % +' ( % +' ((!1 3 0 ( 6 ' infrastructure network AP AP: Access Point AP wired

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY

More information

IEEE ax / OFDMA

IEEE ax / OFDMA #WLPC 2018 PRAGUE CZECH REPUBLIC IEEE 802.11ax / OFDMA WFA CERTIFIED Wi-Fi 6 PERRY CORRELL DIR. PRODUCT MANAGEMENT 1 2018 Aerohive Networks. All Rights Reserved. IEEE 802.11ax Timeline IEEE 802.11ax Passed

More information

Performance Evaluation of Adaptive EY-NPMA with Variable Yield

Performance Evaluation of Adaptive EY-NPMA with Variable Yield Performance Evaluation of Adaptive EY-PA with Variable Yield G. Dimitriadis, O. Tsigkas and F.-. Pavlidou Aristotle University of Thessaloniki Thessaloniki, Greece Email: gedimitr@auth.gr Abstract: Wireless

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Performance Analysis of Transmissions Opportunity Limit in e WLANs

Performance Analysis of Transmissions Opportunity Limit in e WLANs Performance Analysis of Transmissions Opportunity Limit in 82.11e WLANs Fei Peng and Matei Ripeanu Electrical & Computer Engineering, University of British Columbia Vancouver, BC V6T 1Z4, canada {feip,

More information

Wireless Internet Routing. IEEE s

Wireless Internet Routing. IEEE s Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,

More information

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop

More information

Exercise Data Networks

Exercise Data Networks (due till January 19, 2009) Exercise 9.1: IEEE 802.11 (WLAN) a) In which mode of operation is this network in? b) Why is the start of the back-off timers delayed until the DIFS contention phase? c) How

More information

Mathematical Problems in Networked Embedded Systems

Mathematical Problems in Networked Embedded Systems Mathematical Problems in Networked Embedded Systems Miklós Maróti Institute for Software Integrated Systems Vanderbilt University Outline Acoustic ranging TDMA in globally asynchronous locally synchronous

More information

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks 1 An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University {b989117,

More information

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Proposal for a coordinated un-restricted contention-based protocol in 3.65GHz 2007-07-10 Source(s)

More information

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks.

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. Sanjit Kaul and Marco Gruteser WINLAB, Rutgers University. Ryokichi Onishi and Rama Vuyyuru Toyota InfoTechnology Center. ICVES 08 Sep 24 th

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Error Detection Mohamed Khedr http://webmail.aast.edu/~khedr Syllabus Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12

More information

OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE NETWORKS. Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE

OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE NETWORKS. Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE 802.11 NETWORKS Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2004 APPROVED: Robert

More information

An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (M2M) Networks

An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (M2M) Networks An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University Intel-NTU

More information

Inter-Device Synchronous Control Technology for IoT Systems Using Wireless LAN Modules

Inter-Device Synchronous Control Technology for IoT Systems Using Wireless LAN Modules Inter-Device Synchronous Control Technology for IoT Systems Using Wireless LAN Modules TOHZAKA Yuji SAKAMOTO Takafumi DOI Yusuke Accompanying the expansion of the Internet of Things (IoT), interconnections

More information

arxiv: v1 [cs.ni] 30 Jan 2016

arxiv: v1 [cs.ni] 30 Jan 2016 Skolem Sequence Based Self-adaptive Broadcast Protocol in Cognitive Radio Networks arxiv:1602.00066v1 [cs.ni] 30 Jan 2016 Lin Chen 1,2, Zhiping Xiao 2, Kaigui Bian 2, Shuyu Shi 3, Rui Li 1, and Yusheng

More information

Automatic power/channel management in Wi-Fi networks

Automatic power/channel management in Wi-Fi networks Automatic power/channel management in Wi-Fi networks Jan Kruys Februari, 2016 This paper was sponsored by Lumiad BV Executive Summary The holy grail of Wi-Fi network management is to assure maximum performance

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses

More information

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer

More information

Outline / Wireless Networks and Applications Lecture 14: Wireless LANs * IEEE Family. Some IEEE Standards.

Outline / Wireless Networks and Applications Lecture 14: Wireless LANs * IEEE Family. Some IEEE Standards. Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 14: Wireless LANs 802.11* Peter Steenkiste Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/ Brief history 802 protocol

More information

IEEE Broadband Wireless Access Working Group <http://ieee802.org/16> Initial rangin clarifications for OFDMA PHY

IEEE Broadband Wireless Access Working Group <http://ieee802.org/16> Initial rangin clarifications for OFDMA PHY Project Title Date Submitted 2004-04-22 IEEE 802.16 Broadband Wireless Access Working Group Initial rangin clarifications for OFDMA PHY Source(s) Itzik Kitroser Voice: +972-3-9528440

More information

Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS

Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS NCC 2009, January 6-8, IIT Guwahati 204 Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS Baiju Alexander, R. David Koilpillai Department of Electrical Engineering Indian Institute of

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

VEHICULAR ad hoc networks (VANETs) are becoming

VEHICULAR ad hoc networks (VANETs) are becoming Repetition-based Broadcast in Vehicular Ad Hoc Networks in Rician Channel with Capture Farzad Farnoud, Shahrokh Valaee Abstract In this paper we study the performance of different vehicular wireless broadcast

More information

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren Lecture 23: Media Access Control CSE 123: Computer Networks Alex C. Snoeren Overview Finish encoding schemes Manchester, 4B/5B, etc. Methods to share physical media: multiple access Fixed partitioning

More information

Safety Message Power Transmission Control for Vehicular Ad hoc Networks

Safety Message Power Transmission Control for Vehicular Ad hoc Networks Journal of Computer Science 6 (10): 1056-1061, 2010 ISSN 1549-3636 2010 Science Publications Safety Message Power Transmission Control for Vehicular Ad hoc Networks 1 Ghassan Samara, 1 Sureswaran Ramadas

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks

Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks Non-saturated and Saturated Throughput Analysis for IEEE 80.e EDCA Multi-hop Networks Yuta Shimoyamada, Kosuke Sanada, and Hiroo Sekiya Graduate School of Advanced Integration Science, Chiba University,

More information

Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks

Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks 1 Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks Guobao Sun, Student Member, IEEE, Fan Wu, Member, IEEE, Xiaofeng Gao, Member, IEEE, Guihai Chen, Member, IEEE, and Wei Wang,

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

PULSE: A MAC Protocol for RFID Networks

PULSE: A MAC Protocol for RFID Networks PULSE: A MAC Protocol for RFID Networks Shailesh M. Birari and Sridhar Iyer K. R. School of Information Technology Indian Institute of Technology, Powai, Mumbai, India 400 076. (e-mail: shailesh,sri@it.iitb.ac.in)

More information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu

More information

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-

More information

Chalmers Publication Library

Chalmers Publication Library Chalmers Publication Library Distributed clock synchronization with application of DD communication without infrastructure This document has been downloaded from Chalmers Publication Library CPL. It is

More information

With the rise of portable computing. New h Mechanisms Can Reduce Power Consumption. Inside

With the rise of portable computing. New h Mechanisms Can Reduce Power Consumption. Inside Originally developed to let WLANs share spectrum with radar and satellite systems, 802.11h defines mechanisms that can reduce both interference and power consumption. Daji Qiao and Sunghyun Choi New 802.11h

More information

A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks

A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks Thanasis Korakis Gentian Jakllari Leandros Tassiulas Computer Engineering and Telecommunications Department University

More information

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space Overview A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications Tevfik Yucek and Huseyin Arslan Cognitive Radio Multidimensional Spectrum Awareness Challenges Spectrum Sensing Methods

More information

Cognitive Radio Network Setup without a Common Control Channel

Cognitive Radio Network Setup without a Common Control Channel Cognitive Radio Network Setup without a Common Control Channel Yogesh R Kondareddy*, Prathima Agrawal* and Krishna Sivalingam *Electrical and Computer Engineering, Auburn University, E-mail: {kondayr,

More information

Medium Access Control

Medium Access Control CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example

More information

LeCroy UWBSpekChek WiMedia Compliance Test Suite User Guide. Introduction

LeCroy UWBSpekChek WiMedia Compliance Test Suite User Guide. Introduction LeCroy UWBSpekChek WiMedia Compliance Test Suite User Guide Version 3.10 March, 2008 Introduction LeCroy UWBSpekChek Application The UWBSpekChek application operates in conjunction with the UWBTracer/Trainer

More information

COMP467. Local Asynchronous Communication. Goals. Data is usually sent over a single channel one bit at a time.

COMP467. Local Asynchronous Communication. Goals. Data is usually sent over a single channel one bit at a time. COMP467 Local Asynchronous Communication Goals Understand the RS-232 transmission format Be able to compute the parity of a byte Understand the difference between baud and bits per second Be able to calculate

More information

WUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol

WUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol WUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol S. Mahlknecht, M. Spinola Durante Institute of Computer Technology Vienna University of Technology Vienna, Austria {mahlknecht,spinola}@ict.tuwien.ac.at

More information

AN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS. Benjamin W. Wah and Xiao Su

AN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS. Benjamin W. Wah and Xiao Su AN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS enjamin W. Wah and Xiao Su Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign

More information

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494

More information

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,

More information

2 Limitations of range estimation based on Received Signal Strength

2 Limitations of range estimation based on Received Signal Strength Limitations of range estimation in wireless LAN Hector Velayos, Gunnar Karlsson KTH, Royal Institute of Technology, Stockholm, Sweden, (hvelayos,gk)@imit.kth.se Abstract Limitations in the range estimation

More information

Chapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University

Chapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University Chapter 4: Directional and Smart Antennas Prof. Yuh-Shyan Chen Department of CSIE National Taipei University 1 Outline Antennas background Directional antennas MAC and communication problems Using Directional

More information

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K. Network Design for Quality of Services in Wireless Local Area Networks: a Cross-layer Approach for Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka ESS

More information

Dynamic 20/40/60/80 MHz Channel Access for 80 MHz ac

Dynamic 20/40/60/80 MHz Channel Access for 80 MHz ac Wireless Pers Commun (2014) 79:235 248 DOI 10.1007/s11277-014-1851-7 Dynamic 20/40/60/80 MHz Channel Access for 80 MHz 802.11ac Andrzej Stelter Paweł Szulakiewicz Robert Kotrys Maciej Krasicki Piotr Remlein

More information

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka Abstract This paper

More information

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based

More information

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work

More information

David Grandblaise Voice: +33 (0) Motorola Fax: +33 (0)

David Grandblaise Voice: +33 (0) Motorola Fax: +33 (0) Considerations on Connection Based Over-the-air Inter Base Station Communications: Logical Control Connection and its Application to Credit Token Based Coexistence Protocol IEEE 802.16 Presentation Submission

More information

UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER

UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER Dr. Cheng Lu, Chief Communications System Engineer John Roach, Vice President, Network Products Division Dr. George Sasvari,

More information

Intelligent Adaptation And Cognitive Networking

Intelligent Adaptation And Cognitive Networking Intelligent Adaptation And Cognitive Networking Kevin Langley MAE 298 5/14/2009 Media Wired o Can react to local conditions near speed of light o Generally reactive systems rather than predictive work

More information

WiMedia Interoperability and Beaconing Protocol

WiMedia Interoperability and Beaconing Protocol and Beaconing Protocol Mike Micheletti UWB & Wireless USB Product Manager LeCroy Protocol Solutions Group T he WiMedia Alliance s ultra wideband wireless architecture is designed to handle multiple protocols

More information

IEEE g,n Multi-Network Jamming Attacks - A Cognitive Radio Based Approach. by Sudarshan Prasad

IEEE g,n Multi-Network Jamming Attacks - A Cognitive Radio Based Approach. by Sudarshan Prasad ABSTRACT PRASAD, SUDARSHAN. IEEE 802.11g,n Multi-Network Jamming Attacks - A Cognitive Radio Based Approach. (Under the direction of Dr. David Thuente.) Wireless networks are susceptible to jamming attacks,

More information

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Qing Zhao, Lang Tong, Anathram Swami, and Yunxia Chen EE360 Presentation: Kun Yi Stanford University

More information

Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas

Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas Muhammad Irfan Rafique, Marco Porsch, Thomas Bauschert Chair for Communication Networks, TU Chemnitz irfan.rafique@etit.tu-chemnitz.de

More information

Energy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas

Energy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas Energy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas Anique Akhtar Department of Electrical Engineering aakhtar13@ku.edu.tr Buket Yuksel Department

More information

Dynamic Radio Resource Allocation for Group Paging Supporting Smart Meter Communications

Dynamic Radio Resource Allocation for Group Paging Supporting Smart Meter Communications IEEE SmartGridComm 22 Workshop - Cognitive and Machine-to-Machine Communications and Networking for Smart Grids Radio Resource Allocation for Group Paging Supporting Smart Meter Communications Chia-Hung

More information

A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks

A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks 1 A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in 82.11ac Networks Seowoo Jang, Student Member, Saewoong Bahk, Senior Member Abstract The major goal of IEEE 82.11ac

More information

[Raghuwanshi*, 4.(8): August, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Raghuwanshi*, 4.(8): August, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY PERFORMANCE ANALYSIS OF INTEGRATED WIFI/WIMAX MESH NETWORK WITH DIFFERENT MODULATION SCHEMES Mr. Jogendra Raghuwanshi*, Mr. Girish

More information

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Guang Tan, Stephen A. Jarvis, James W. J. Xue, and Simon D. Hammond Department of Computer Science, University of Warwick,

More information

Next Generation Wireless LANs

Next Generation Wireless LANs Next Generation Wireless LANs 802.11n and 802.11ac ELDAD PERAHIA Intel Corporation ROBERTSTACEY Apple Inc. и CAMBRIDGE UNIVERSITY PRESS Contents Foreword by Dr. Andrew Myles Preface to the first edition

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)

More information

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline

More information

Goodput Enhancement of IEEE a Wireless LAN via Link Adaptation

Goodput Enhancement of IEEE a Wireless LAN via Link Adaptation Goodput Enhancement of IEEE 8.11a Wireless AN via ink Adaptation Daji Qiao Real-Time Computing aboratory The University of Michigan Email: dqiao@eecs.umich.edu Abstract IEEE 8.11a is a new high-speed physical

More information

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa ICT 5305 Mobile Communications Lecture - 4 April 2016 Dr. Hossen Asiful Mustafa Media Access Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access

More information

(12) Patent Application Publication (10) Pub. No.: US 2013/ A1. Chu et al. (43) Pub. Date: Jun. 20, 2013

(12) Patent Application Publication (10) Pub. No.: US 2013/ A1. Chu et al. (43) Pub. Date: Jun. 20, 2013 US 2013 O155930A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2013/0155930 A1 Chu et al. (43) Pub. Date: (54) SUB-1GHZ GROUP POWER SAVE Publication Classification (71) Applicant:

More information

SIGNAL PROCESSING CHALLENGES IN THE DESIGN OF THE HOMEPLUG AV POWERLINE STANDARD TO ENSURE CO-EXISTENCE WITH HOMEPLUG 1.0.1

SIGNAL PROCESSING CHALLENGES IN THE DESIGN OF THE HOMEPLUG AV POWERLINE STANDARD TO ENSURE CO-EXISTENCE WITH HOMEPLUG 1.0.1 SIGNAL PROCESSING CHALLENGES IN THE DESIGN OF THE HOMEPLUG POWERLINE STANDARD TO ENSURE CO-EXISTENCE WITH HOMEPLUG 1.0.1 Brent Mashburn 1, Haniph Latchman 2, Tim VanderMey 3, Larry Yonge 1 and Kartikeya

More information

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made

More information

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey

More information

for Vehicular Ad Hoc Networks

for Vehicular Ad Hoc Networks Distributed Fair Transmit Power Adjustment for Vehicular Ad Hoc Networks Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 06) Reston, VA,

More information

USB 3.1 ENGINEERING CHANGE NOTICE

USB 3.1 ENGINEERING CHANGE NOTICE Title: USB3.1 SKP Ordered Set Definition Applied to: USB_3_1r1.0_07_31_2013 Brief description of the functional changes: Section 6.4.3.2 contains the SKP Order Set Rules for Gen2 operation. The current

More information

DV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK

DV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK DV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK CHUAN CAI, LIANG YUAN School of Information Engineering, Chongqing City Management College, Chongqing, China E-mail: 1 caichuan75@163.com,

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Consolidation of Coexistence Control Channel 2007-07-09 Source(s) Re: Abstract Purpose Mariana Goldhamer

More information

Proposals for facilitating co-channel and adjacent channel coexistence in LE

Proposals for facilitating co-channel and adjacent channel coexistence in LE Proposals for facilitating co-channel and adjacent channel coexistence in 802.16 LE IEEE 802.16 Presentation Submission Template (Rev. 8.3) Document Number: IEEE C802.16h-05/006 Date Submitted: 2005-03-10

More information

Chapter 1 Basic concepts of wireless data networks (cont d.)

Chapter 1 Basic concepts of wireless data networks (cont d.) Chapter 1 Basic concepts of wireless data networks (cont d.) Part 4: Wireless network operations Oct 6 2004 1 Mobility management Consists of location management and handoff management Location management

More information