Analysis and Implementation of Scalable Clock Synchronization Protocols in IEEE Ad Hoc Networks

Size: px
Start display at page:

Download "Analysis and Implementation of Scalable Clock Synchronization Protocols in IEEE Ad Hoc Networks"

Transcription

1 Analysis and Implementation of Scalable Clock Synchronization Protocols in IEEE Ad Hoc Networks Dong Zhou Ten-Hwang Lai Department of Computing and Information Science The Ohio State University {zhoudo, Abstract This paper studies a fundamental problem, clock synchronization, in IEEE ad hoc networks. Clock synchronization is important for frequent hopping spread spectrum (FHSS) to ensure that all stations hop at the same time; it is also necessary for FHSS, direct sequence spread spectrum (DSSS) and Orthogonal Frequency-Division Multiplexing (OFDM) to perform power management. The synchronization mechanism specified in the IEEE standards has severe scalability problem. Remedies have been proposed to solve the scalability problem, but these solutions either can not handle mobility very well or the protocol is too experimental without solid analysis. In this paper, we analyze the root cause of the scalability problem and propose two protocols with analytical guidance for implementation. The new solutions are distributed, scalable and very adaptive to station mobility. The maximum clock drift is improved from over 4000 µs to under 125µs and 50µs respectively for our new protocols. Keywords: IEEE , ad hoc networks, scalability, clock synchronization 1 Introduction The IEEE standards support the peer-topeer mode Independent Basic Service Set (IBSS), which is an ad hoc network with all its stations within each other s transmission range. An ad hoc network can be constructed quickly without much planning and any infrastructure support. Clock synchronization is important for frequent hopping and power management. IEEE standards [1, 2, 3, 4] specify a Timing Synchronization Function (TSF) for the ad hoc mode in the MAC layer s MAC protocol has been extensively studied [5, 6, 7] TSF scalability problems and solutions have been presented only recently [8],[9]. The TSF works well if there are only a couple of stations in an IBSS. With the availability of a and g, an IEEE IBSS can easily support a few hundred nodes as far as bandwidth is concerned (54 Mbps). Huang and Lai [8] show that TSF can be out of synchronization frequently when the number of stations is not very small. The problem is more severe the larger the size of an IBSS. A distributed algorithm called adaptive timing synchronization procedure (ATSP) was proposed in [8] to address the scalability problem. It scales very well compared with TSF. But the protocol is slow to be stabilized. It could be out of synchronization before the protocol is stabilized and it is also slow to be re-stabilized after the fastest station leaves the IBSS. Station mobility handling is another drawback for ATSP. An improved time synchronization procedure was proposed in [9] to better handle station mobility. However, it is too experimental and does not give guidance on how to set the values of various parameters. In this paper, we will analyze the root cause of the scalability problem in detail and propose two new protocols with analytical guidance for implementation. The new solutions are fully distributed, scalable and very adaptive to station mobility. The maximum clock drift can be controlled within 50 to 125 µs. It is a huge improvement compared with over 4000 µs for TSF and over 500 µs for ATSP. The rest of the paper is organized as follows. Section 2 reviews TSF and ATSP. Root causes /04/$20.00 '2004 IEEE 255

2 of the scalability problem are analyzed. Section 3 proposed two solutions to solve the problem. Simulation results are discussed in section 4. Section 5 concludes the paper. 2 Overview This section reviews the TSF and ATSP. The root cause of the scalability problem is also analyzed. The analysis results of the severity of the asynchronism are summarized here to help the analysis of our new protocols in the next section. 2.1 IEEE TSF and ATSP In TSF, clock synchronization is achieved by stations periodically exchanging timing information through beacon frames, which contains a timestamp among other parameters. All stations in the IBSS competes for beacon transmission every abeaconperiod second. The typical value is 0.1s. This time period is called a beacon period (BP). At the beginning of each beacon period, there is a beacon generation window consisting of w + 1 slots each of length aslottime, where w = 2 acwmin. The value of acwmin is 15 for FHSS and OFDM, while the value of acwmin is 31 for DSSS. Each station calculates a random delay uniformly distributed in [0, w] and is scheduled to transmit a beacon when the delay timer expires. If a beacon arrives before the random delay timer has expired, the station cancels the pending beacon transmission and the remaining random delay. Upon receiving a beacon, a station sets its TSF timer to the timestamp of the beacon if the value of the timestamp is later than the station s TSF timer. (It is important to note that clocks only move forward and never backward) The number of slots needed to send a beacon is called beacon length. It differs from 4 to 34 for various standards and bit-rates. ATSP was proposed in [8] to solve the scalability problem. The basic idea is to let the fastest station to compete for beacon transmission every beacon period and let other stations to compete only occasionally. Each station i keeps a variable I(i), which means how many BPs it waits before competing for beacon contension. It is initialized to a random number between 1 and I max. Whenever station i receives a beacon with a timing value later than its own, the station sets its timer to this value, increases I(i) by 1. If station i does not receive any beacon frame with a timing value later than its own for I max consecutive BPs, it decrements I(i) by 1 In ATSP, the fastest station will not receive a timing value greater than its own; its I-value will gradually decrease to 1 and stay there. The other stations will gradually increase their I-values until they reach I max. So the fastest station will compete every beacon period while other stations competes every I max beacon periods. 2.2 Metrics for asynchronism Before we start the root cause analysis on the TSF scalability problem, let s define the metrics of asynchronism. If the clocks of two stations differ so much that either power management or frequency hopping can not work properly, the two stations are said to be out of synchronization. Let be the maximum clock difference tolerable by power management and FHSS. Assume that the clocks in an IBSS are all different in speed (or accuracy), which is typically the case in real systems. Thus, there is a unique fastest station, whose clock is fastest in the system. We are particularly interested in three situations: Fastest-station asynchronism This refers to a situation where the fastest station s clock is ahead of all other stations clocks by more than. Global asynchronism Given a value k between 1 and 100, k percent global asynchronism (or simply k percent asynchronism) refers to the situation that at least k percent of the n(n 1)/2 pairs of stations are out of synchronization. Simple asynchronism This refers to a situation where the fastest station s clock is ahead of the slowest station s clock by more than. The difference of the fastest and slowest clock is called maximum clock drift. 2.3 Root Causes of Asynchronism and Some Possible Remedies All three types of Asynchronism are due to the fact that the fastest or all the faster stations repeatedly 256

3 lose beacon contentions. How can stations repeatedly lose beacon contentions? There are several reasons due to s design of the TSF. Beacon collision: Stations contend with one another for beacon generation. Equal opportunity: All stations are equal in their opportunity to win a beacon contention. There is at most one successful beacon transmission in each beacon period. Unidirectional clocks: The ad-hoc-mode TSF let clocks move only forward and never backward. A station adjusts its clock only if the clock s time is behind (smaller than) the timestamp on an arriving beacon. In order to fix the TSF s scalability problem, we need to remove one or more of its causes. There may be various ways to get around each of the above causes, but, unfortunately, not all of them work well. Before describing our proposed solution, we wish to outline several unsatisfactory solutions, which would help the reader understand why we have designed the proposed protocols as they are. Reducing the beacon contention rate. Instead of contending every BP, a random delay is introduced. It only contends for beacon transmission when the delay timer is up. This scheme does not work well because the fastest station may delay its contention for long time and cause the fastest clock to drift further away from the pack. Let the fastest clock to contend every BP and other stations contend not frequently (i.e. ATSP). It takes long time for ATSP to figure out who is the fastest station, which may result in large maximum clock drift. This scheme does not react well when the fastest station leaves the IBSS. It will take IBSS quite a while to recognize the departure of the fastest station and select the next fastest station. Allowing multiple beacon transmission in the same BP. This can help in the situation that a slow station sends the beacon first and blocks a potential fast station from sending out beacon. But this solution alone can not solve the beacon collision problem when the number of stations is large. Allow stations to set their timers forward or backward as appropriate; i.e., no matter which station wins the beacon contention, let all other stations synchronize their timers with the beacon s timing. This approach is undesirable for two reasons. First, the collisions still happen quite often with large number of stations. We will show in simulation that the improvement is limited. It still suffers the scalability problem. Second, it is incompatible with the current TSF. To see this, suppose the fastest station in the IBSS happen to implement the current TSF, while the rest of the IBSS happen to implement the modified TSF. Also, suppose the fastest station and the slowest station are currently out of synchronization, and the slowest station happens to win the beacon contention, then the fastest station s timer will stay intact, while the others all synchronize with the slowest station. This would result in more out-of-sync links. 2.4 Analysis of Beacon Contention We will only summarize the results of the analysis due to the space limitation. Please refer to [10] for detail. Suppose there are n stations, and denote the beacon generation window by [0, w], which consists of w + 1 slots numbered 0 through w. Let b be the beacon length. Let p(n, w) be the probability of the event E that at least one of the n stations succeeds in beacon transmission in window [0, w]. + ( ) n W p(n, W ) = p(n, W 1) W + 1 ( ) ( ) n 1 1 W + n W + 1 W + 1 { n n i ( ) i ( ) j 1 b 1 Ci n C n i j W + 1 W + 1 i=2 j=0 ( ) n i j W b + 1 p(n i j, W b)} W + 1 (1) The boundary condition for p(n, w) is p(0, w) = p(n, 0) = 0, provided n > 1. Let p (n, w) be the probability that a particular station, say A, successfully sends a beacon in a given BP. 257

4 p (n, w) = 1 w + 1 w p (n, w, k) (2) k=0 C n 1 x π(i, x, y) = Cx n 1 y ( ) x ( ) y ( ) n 1 x y 1 b 1 w i b + 1 (3) w + 1 w + 1 w + 1 For n 3 and k b, the function p (n, w, k) satisfies the following recurrence: p (n, w, k) = ( ) n 1 w k + w + 1 k b n 1 i=0 x=2 n 1 x y=0 {π(i, x, y) p (n x y, w i b, k i b)} (4) The boundary condition for p (n, w, k) is p (0, w, k) = 0 and p (n, 0, k) = 0. Let E(L ) be the expected length of time between two consecutive incidents of fastest-node asynchronism. d is the difference in clock accuracy between the fastest station and the second fastest station. T is the length of each beacon period. τ = /(d T ). E(L ) = 1 p (n, w)(1 p (n, w)) τ 1 p (n, w) 3 Our Solutions 3.1 Adaptive bi-directional TSF (5) If we do not need to consider the compatibility issue and design the TSF from scratch, the bi-directional TSF can become a very good scheme with minor changes. We call the new protocol ABTSF. From our simulation, we can see collision is the major reason for the clock drift. We need to reduce the collision by controlling the frequency of beacon contention. Each station competes for beacon transmission every I max BPs. If I max is large enough, the possibility of collision is very slim. But a large I max increase the chances of idle when no station is competing for beacon transmission. So we introduce the concept of token. The token is assigned to the initiator of the IBSS first and the token is rotated among the stations periodically. The token holder will compete for beacon transmission every beacon period and other stations competes for beacon transmission every I max BPs. The token a Beacon Frame Extension Time Stamp Beacon Interval... ~ 550 bits Token Bits 2 bits Figure 1: Beacon Frame Format for ABTSF token bits role 00 none token holder 10 token holder 11 token holder releasing token 01 starting token contention Table 1: Token bits explanation holder consumes more power due to its frequency of beacon contention, rotation of token holder will distribute the power consumption. Each station maintains a list of station IDs of the IBSS. These IDs are collected by deriving the source address of the beacon. When the token holder wants to release the token to another station, it randomly picks one station from the list and announces the new token holder. To implement the token, we extend the beacon frame format, adding two token bits. Fig. 1 shows the frame format. The token holder will set the token-bit to 10 and other stations set the token-bit to 00. The token holder will set it to 11 when it starts the token rotation and the ID of the new token holder is also added in the beacon frame. When the old token holder sees a new beacon with token-bit 10, it resets the token-bit back to 00. When a station sees an idle beacon period, it implies the beacon holder leaves the IBSS or crashes, each station sets its token-bit to 01 and contends to be the beacon holder. The station of the first successful beacon transmission with token-bit 01 will become the new beacon holder. Other stations will reset their token-bit to 00 after receiving a beacon with token-bit 01. There is only one parameter to pick for ABTSF, I max. Eq. 6 is used to select I max. p(m, w) 0.95, m = 1 + n/i max (6) Eq. 1 can be used to calculate the value of p(m, w), combing Eq. 6, the value of I max can be 258

5 p(n,w) Analysis w=30 b=4 Analysis w=30 b=13 generation? We now propose a three-tier protocol called TATSF 1 to utilize this capability and handle station mobility more gracefully. TATSF: Tiered Adaptive Timing Synchronization Function Number of Stations Figure 2: p(n, w) determined. This solution is very scalable and adaptive to station mobility. The overhead is only 2-bit plus the new token ID at rotation time. The 2-bit addition can be considered free since this addition does not increase beacon length. The rotation happens once in a while. The overhead is also minor. We will show later in the simulation that the maximum clock drift can be controlled to be less than 50µs for number of stations from 100 to 600. The movement of token holder has very slim impact since the new token holder can be selected very fast. With ATSP, it may take up to Imax 2 BPs before the new leader is selected. For ABTSF, the first successful beacon transmission with token bit 10 marks the end of leader election. The average BPs to elect a new initiator is: E(leader) = 1/p(n 1, w) (7) From Fig. 2 we can see, E(leader) < 2 if 2 n 70 for b (w = 30, b = 4) and E(leader) < 2 if 2 n 115 for a (w = 30, b = 13). Remember that there is no need to elect a leader unless the token holder crashes. Even when the token holder does crash, it only takes a few beacon periods to elect a new leader. 3.2 Tiered Adaptive Timing Synchronization Function Now, suppose we must keep the IEEE TSF s provision of moving forward only. Since faster stations can synchronize slower stations but not the other way around, why not give faster stations a higher priority in the process of beacon 1. At the beginning of each BP, if C(i) I(i) then resets C(i) to zero and let station i participate in beacon contention. 2. [Initialization] If station i initiates a new IBSS, let I(i) := 1; otherwise, when it joins the (existing) IBSS, let I(i) := I max2. In any case, let C(i) := random(0..i(i)). 3. Each station keeps an observation counter, its initial value is 0 when it joins the IBSS. The counter is incremented by one for each BP. When the counter reaches a pre-set value, the station is at the end of observation period and the counter is reset to At the end of each observation period, update I(i) as follows. 1 if est rank(i) = 1 I(i) := I max2 if 1 < est rank(i) THD if est rank(i) > THD I max4 If there is an actual change in the value of I(i), let C(i) := random(0..i(i)). 5. At the end of each beacon contention window, update I(i) as follows: I max4 if est rank(i) > THD I(i) 2 I(i) := if there are collisions min{i max3, I(i)/2 } if the medium was idle In any case, let C(i) := random(0..i(i)). 6. At the end of each BP, increment C(i) by 1. In order to classify the stations into different tiers, envision that the stations are ranked according to their frequencies, with the fastest station ranked 1 The time synchronization procedure proposed in [9] is a two-tier protocol, mobility handling is more refined by adding a tier. 259

6 number 1, the second fastest station ranked number 2, and so on. With such ranks, we can put those stations with rank 1 in S 1, and those with ranks between 1 and some threshold in S 2, and put the rest in S 3. Unfortunately, precise ranks are not easy to obtain, and so we satisfy ourselves with an estimate. Each station divides the time line into observation periods each consisting of OBS BPs, where OBS is a pre-specified integer. In each observation period, each station counts the number of stations different stations from which it has received at least one beacon with a timing later than its own timer, and uses this number as an estimate of its rank. More precisely, at the end of each contention window, station i estimates/updates its rank as: est rank(i) = 1 + the number of different stations with faster beacons received by i (8) I(i) is an integer that indicates how often station i will participate in beacon contention. Its values is increased if collision happens or decreased if the medium is idle. Analysis of TATSF There are 5 prameters in the TATSF protocol: THD, OBS, I max2, I max3, I max4. The protocol s performance hinges on the values of these parameters. Should THD = OBS, I max2 = 1, I max3 = 1, and I max4 = 1, the protocol degenerates to the current TSF. This section discusses how to set these parameters. Lemma 1 The fastest station is always in S 1 except possibly for the first several BPs after it joins or initiates the IBSS. Proof. Let f be the fastest station in the IBSS. When f joined the IBSS, it synchronized with some station, from which it heard a beacon. At that moment, f s timer might or might not be the largest (latest). Let δ be the difference between f s timer and the largest (latest) timer in the IBSS, and let d be the difference in accuracy between f s timer and the second fastest timer in the IBSS. Then, at most a number δ/(d T ) of BPs after f joined the IBSS, f s timer would be the latest and est rank(f) would always be 1. Thus, As long as f stays in the IBSS, it will stay in S 1 until a new fastest station joins the IBSS. The case where f initiated the IBSS is similar. In normal situation, tier 1 stations contend for beacon generation in every BP, and on average there are S 2 /I max2 tier 2 stations participating in each contention. The number of beacon contenders from tier 3 can be ignored if I max4 is set large enough. On average, there are m = S 1 + S 2 /I max2 contending stations in each BP. From Eq. 1, the probability that at least one of the m stations wins the contention is more than 0.95 if m 20. Whenever a station wins the contention, its beacon synchronizes all timers with a smaller timing value. Let be the desired accuracy of timing synchronization for the IBSS and L be the time interval between two consecutive events of simple asynchronism. Then E(L ), the expected length of L (in terms of the number of BPs), can be approximated using Eq. 5, E(L ) 1 p (m, w)(1 p (m, w)) τ 1 p (m, w) (9) where τ = /(d T ) and d is the difference in accuracy between the fastest and the slowest stations in S 1 S 2. Note that E(L ) approaches infinity as p approaches 1. In order to have a sufficiently large E(L ), it s important that p be as large as possible. For instance, if = 100µs, w = 30, and d = 0.01%, then E(L ) 352 years, 141 days, 3 days, for p = 0.9, 0.8, 0.7, respectively. The p (m, w) in the above formula is the fastest station s probability of winning a contention where m = S 1 + S 2 /I max2, and w is the size of the beacon generation window. From Eq. 2, in order to obtain a value as large as 0.7 for p (m, w), m must be less than 2. That is, S 1 + S 2 /I max2 < 2, which implies S 2 /I max2 < 1 (since S 1 1 by Lemma 1). On the other hand, it is desired that S 2 /I max2 0. To see this, suppose S 2 /I max2 = 0. Then, S 2 = 0 or I max2 =. If I max2 =, then S 3 = ; should all stations in S 1 leave the IBSS, all stations in S 2 (i.e., all stations in the IBSS) will enter beacon contention and force many collisions. If S 2 = 0, then should all stations in S 1 leave the IBSS, all stations in S 3 will enter beacon contention, which is too slow. Thus, we wish S 2 and I max2 to statisfy 0 < S 2 /I max2 < 1. I max2 should be small enough so that I(i) will reduce to 1 quickly in case the medium was idle. Desirably, log I max2 4. I max3 should be bigger than I max2 but small enough so that I(i) will reduce to 1 quickly in case 260

7 the all the stations in S 1 and S 2 leave the IBSS. Desirably, log I max3 5. If all stations in S 1 leave the IBSS, we want to quickly identify the new members of S 1. In the worst case this process may take OBS BPs. Thus, OBS should not be too large, enen though the larger the value of OBS, the more accurate is est rank(i). Tha value of I max4 is more flexible than the other parameters as long as it is sufficiently large. Idealy, I max4 > 2n. We intended to let the fastest station to win the contention with a probability no less than 0.7. With such an odd for the fastest station, the stations in S 2 would win no more than 0.3 OBS contentions in an observation period. Therefore, THD should be no more than 0.3 OBS. 4 Simulation Study on Maximum Clock Drift of TSF, bi-directional TSF and TATSF In the simulation, we let the clock speed uniformly distributed in the range of [ d, d]. We pick d = 0.01%. This is a very inaccurate clock. It is the worst clock accuracy allowed by the standard. Due to the low cost nature of devices, inaccurate clock with d = 0.01% is often used in these devices. We also study the impact of packet transmission error and mobility of stations. We run the simulation for OFDM system: w = 30, b = 4. The desired accuracy of timing synchronization ( ) is 100µs. We use the result of our analysis as the guideline to pick the parameters of TATSF: T HD = 3, OBS = 10, I max2 = 16, I max3 = 32 and I max4 = For ABTSF, we set I max = 16 when n 200; 32 otherwise according to Eq. 6. We set up our simulation as follows: We run the simulation for beacon periods. We set the packet error rate to be 0.01%. The accuracy of receive timestamp is to within ±5µs of the reported clock time. The local clock is updated only when receiving a faster timestamp that is more than 5µs. binum max drift average max drift µs 1770 µs µs 1470 µs µs 2047 µs µs 2053 µs µs 226 µs Table 2: Maximum clock drift of bi-directional TSF for n = 200 We let 5% of the fastest stations leave at beacon period k 2000 ( k > 1 ). They return after 500 beacon periods. We measure the performance by the largest clock drift between the fastest clock and slowest clock in the IBSS during the whole simulation period. The performance metric we use is simple asynchronism. The reason is that fastest-station asynchronism and global asynchronism rarely happen for all the proposed protocols except TSF, only simple asynchronism can distinguish the best protocols among the improved schemes TSF/ bi-directional TSF Fig. 4 shows the maximum clock drift for TSF when n = 200. We can see the maximum is more than 4000µs. For ATSP, it is difficult to pick the value of I max. If I max is small, then it is not scalable. If the I max is large, it takes long time to find the fastest station. Either way, the maximum clock drift can be over 500 µs. Due to space limitation, please refer to [9] for simulation details. Bi-directional TSF is the same as TSF except that the clock will reset its value whenever a beacon is received regardless which clock is faster. We compare the maximum clock drift in a IBSS where some stations run TSF and some run bi-directional TSF. Let binum be the number stations running the bi-directional TSF. When binum = 0, it becomes TSF. When binum = n, then all the stations run bi-directional TSF. It is a mixed mode when binum takes other value. Table 2 shows the maximum and average clock drift for bi-directional TSF when n = 200. The maximum drift is still over 1500µs when running in complete bi-directional mode. It is a good improvement from the TSF where the maximum drift is over 4000µs, but still not good enough. When n = 300, the max- 261

8 max clock drift(us) TATSF n= 600 n TATSF max drift ABTSF max drift µs 39 µs µs 41 µs µs 41 µs µs 42 µs µs 41 µs µs 41 µs Table 3: ABTSF Maximum clock drift of TATSF and Number of BP Figure 3: Maximum clock drift for TATSF imum drift will be over 20000µs. In mixed mode, the performance is more or less at the level of TSF. The scalability issue is still not resolved. TATSF/ ABTSF Table 3 shows the maximum clock drift for TATSF and ABTSF with n ranging from 100 to 600. Fig. 3 shows the maximum clock drift during each beacon period for TATSF when n = 600. The improvement over TSF is quite large for both TATSF and ABTSF. We can see the maximum drift does not increase with the number of stations. It is very scalable. To our surprise, the maximum drift cross the 100µs mark. When we rerun the same simulation with I max2 = 4, the maximum drift drop to 82 for 100 stations and 99 for 400 stations. It seems not consistent with the analysis. According to the analysis, S 1 should be close to 1 with a larger I max2. The fastest station is in contention every beacon period, the clock should be very synchronized. That is true when the timestamp can be trusted at face value and the air interface is error-free. In the simulation, when a station receives a timestamp that is faster than its local clock but less than 5µs faster, the receiving station will not increase est rank. So it is possible, there are multiple stations in S 1. The average size of S 1 is 6.2 and the average size of S 2 is When all the stations in S 1 leave the IBSS, the stations in S 2 can quickly become member of S 1 with a small I max2. We can avoid multiple rounds of idle under these situation. Packet errors and movement of satiations have bad impact in term of maximum clock drift. The impact is much limited due to the adaptive nature of TATSF. For example, the maximum drift for 400, 600 stations can be reduce to 72,74 µs with stationary IBSS and error-free radio channels. Our assumptions are very conservative. In the real life, maybe only one station in S 1 leaves during one beacon period. We let all the stations leave at the same beacon period and the impact is still very limited. 5 Conclusion In this paper, we analyze the root cause of the scalability problem and propose new protocols with analytical guidance for implementation. The maximum clock drift can be higher than 4000 µs for TSF. ATSP can reduce the maximum clock drift to around 500 µs but it does not handle mobility well. For the two protocols we proposed in this paper, TATSF is compatible with the TSF and can control the maximum clock drift under 125µs. ABTSF is deigned from scratch and it can achieve even better synchronization (the maximum clock drift is under 50µs). The new solutions are fully distributed, scalable and very adaptive to station mobility. References [1] IEEE Std Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specification, 1999 edition. [2] IEEE Std a. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specification, 1999 edition. 262

9 TSP n= 200 [10] Ten-Hwang Lai, Dong Zhou, L. Huang On the Scalability of IEEE Ad-Hoc-Mode Timing Synchronization Function. In preparation for journal submission max clock drift(us) Number of BPs Figure 4: Maximum clock drift for TSP [3] IEEE Std b. Higher-Speed Physical Layer Extension in the 2.4 GHz Band, 1999 edition. [4] IEEE Std g. Amendment 4: Further Higher Data Rate Extension in the 2.4 GHz Band, 2003 edition. [5] G. Bianchi, L. Fratta, and M. Oliveri. Performance evaluation and enhancement of the CSNA/CA MAC protocol for wireless LANs. In Proc. PIMRC 1996, pp [6] G. Bianchi. Performance analysis of the IEEE distributed coordination function. IEEE Journal on Selected Areas in Communications, 18(3): , [7] Y. C. Tay and K. C. Chua. A capacity analysis for the IEEE MAC protocol. ACM/Baltzer Wireless Networks, 7(2): , [8] Lifei Huang, Ten-Hwang Lai. On the Scalability of IEEE Ad Hoc Networks In Proceedings of MobiHoc 2002, pp [9] Ten-Hwang Lai, Dong Zhou, Efficient and scalable IEEE ad-hoc-mode timing synchronization function, 17th International Conference on Advanced Information Networking and Applications, 2003, pp

A Scalable and Adaptive Clock Synchronization Protocol for IEEE Based Multihop Ad Hoc Networks

A Scalable and Adaptive Clock Synchronization Protocol for IEEE Based Multihop Ad Hoc Networks A Scalable and Adaptive Clock Synchronization Protocol for IEEE 802.11-Based Multihop Ad Hoc Networks Dong Zhou Ten H. Lai Department of Computer Science and Engineering The Ohio State University {zhoudo,

More information

Synchronization and Beaconing in IEEE s Mesh Networks

Synchronization and Beaconing in IEEE s Mesh Networks Synchronization and Beaconing in IEEE 80.s Mesh etworks Alexander Safonov and Andrey Lyakhov Institute for Information Transmission Problems E-mails: {safa, lyakhov}@iitp.ru Stanislav Sharov Moscow Institute

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

Inter-Device Synchronous Control Technology for IoT Systems Using Wireless LAN Modules

Inter-Device Synchronous Control Technology for IoT Systems Using Wireless LAN Modules Inter-Device Synchronous Control Technology for IoT Systems Using Wireless LAN Modules TOHZAKA Yuji SAKAMOTO Takafumi DOI Yusuke Accompanying the expansion of the Internet of Things (IoT), interconnections

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-

More information

OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE NETWORKS. Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE

OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE NETWORKS. Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE 802.11 NETWORKS Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2004 APPROVED: Robert

More information

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques 1 Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques Ju-Yen Hung and Venkatesh Sarangan *, MSCS 219, Computer Science Department, Oklahoma State University, Stillwater,

More information

IEEE P Wireless LANs IEEE802.11h Dynamic Frequency Selection (DFS) in an Independent BSS (IBSS) Abstract

IEEE P Wireless LANs IEEE802.11h Dynamic Frequency Selection (DFS) in an Independent BSS (IBSS) Abstract IEEE P802.11 Wireless LANs IEEE802.11h Dynamic Frequency Selection (DFS) in an Independent BSS (IBSS) Date: September 21, 2001 Author: S. Black 1, S. Choi 2, S. Gray 1, A. Soomro 2 Nokia Research Center

More information

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)

More information

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings

More information

Department of Computer Science and Engineering. CSE 3213: Communication Networks (Fall 2015) Instructor: N. Vlajic Date: Dec 13, 2015

Department of Computer Science and Engineering. CSE 3213: Communication Networks (Fall 2015) Instructor: N. Vlajic Date: Dec 13, 2015 Department of Computer Science and Engineering CSE 3213: Communication Networks (Fall 2015) Instructor: N. Vlajic Date: Dec 13, 2015 Final Examination Instructions: Examination time: 180 min. Print your

More information

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa ICT 5305 Mobile Communications Lecture - 4 April 2016 Dr. Hossen Asiful Mustafa Media Access Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access

More information

Clock Synchronization

Clock Synchronization Clock Synchronization Chapter 9 d Hoc and Sensor Networks Roger Wattenhofer 9/1 coustic Detection (Shooter Detection) Sound travels much slower than radio signal (331 m/s) This allows for quite accurate

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses

More information

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA Mobile Communications Chapter 3 : Media Access Motivation Collision avoidance, MACA SDMA, FDMA, TDMA Polling Aloha CDMA Reservation schemes SAMA Comparison Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative

More information

Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks

Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks Min Song, Trent Allison Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529, USA Abstract

More information

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop

More information

Performance Analysis of Transmissions Opportunity Limit in e WLANs

Performance Analysis of Transmissions Opportunity Limit in e WLANs Performance Analysis of Transmissions Opportunity Limit in 82.11e WLANs Fei Peng and Matei Ripeanu Electrical & Computer Engineering, University of British Columbia Vancouver, BC V6T 1Z4, canada {feip,

More information

LeCroy UWBSpekChek WiMedia Compliance Test Suite User Guide. Introduction

LeCroy UWBSpekChek WiMedia Compliance Test Suite User Guide. Introduction LeCroy UWBSpekChek WiMedia Compliance Test Suite User Guide Version 3.10 March, 2008 Introduction LeCroy UWBSpekChek Application The UWBSpekChek application operates in conjunction with the UWBTracer/Trainer

More information

Mobile Computing. Chapter 3: Medium Access Control

Mobile Computing. Chapter 3: Medium Access Control Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access

More information

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,

More information

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL U.P.B. Sci. Bull., Series C, Vol. 79, Iss. 4, 2017 ISSN 2286-3540 FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL Xu ZHI 1, Ding HONGWEI 2, Liu LONGJUN 3, Bao LIYONG 4,

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation

More information

UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER

UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER Dr. Cheng Lu, Chief Communications System Engineer John Roach, Vice President, Network Products Division Dr. George Sasvari,

More information

Channel selection for IEEE based wireless LANs using 2.4 GHz band

Channel selection for IEEE based wireless LANs using 2.4 GHz band Channel selection for IEEE 802.11 based wireless LANs using 2.4 GHz band Jihoon Choi 1a),KyubumLee 1, Sae Rom Lee 1, and Jay (Jongtae) Ihm 2 1 School of Electronics, Telecommunication, and Computer Engineering,

More information

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical

More information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu

More information

Data Dissemination in Wireless Sensor Networks

Data Dissemination in Wireless Sensor Networks Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks

More information

Chapter- 5. Performance Evaluation of Conventional Handoff

Chapter- 5. Performance Evaluation of Conventional Handoff Chapter- 5 Performance Evaluation of Conventional Handoff Chapter Overview This chapter immensely compares the different mobile phone technologies (GSM, UMTS and CDMA). It also presents the related results

More information

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

arxiv: v1 [cs.ni] 30 Jan 2016

arxiv: v1 [cs.ni] 30 Jan 2016 Skolem Sequence Based Self-adaptive Broadcast Protocol in Cognitive Radio Networks arxiv:1602.00066v1 [cs.ni] 30 Jan 2016 Lin Chen 1,2, Zhiping Xiao 2, Kaigui Bian 2, Shuyu Shi 3, Rui Li 1, and Yusheng

More information

6.1 Multiple Access Communications

6.1 Multiple Access Communications Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding

More information

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks 1 An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks Yeh-Cheng Chang, Cheng-Shang Chang and Jang-Ping Sheu Department of Computer Science and Institute of Communications

More information

Exercise Data Networks

Exercise Data Networks (due till January 19, 2009) Exercise 9.1: IEEE 802.11 (WLAN) a) In which mode of operation is this network in? b) Why is the start of the back-off timers delayed until the DIFS contention phase? c) How

More information

Empirical Probability Based QoS Routing

Empirical Probability Based QoS Routing Empirical Probability Based QoS Routing Xin Yuan Guang Yang Department of Computer Science, Florida State University, Tallahassee, FL 3230 {xyuan,guanyang}@cs.fsu.edu Abstract We study Quality-of-Service

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Error Detection Mohamed Khedr http://webmail.aast.edu/~khedr Syllabus Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12

More information

SPLASH: a Simple Multi-Channel Migration Scheme for IEEE Networks

SPLASH: a Simple Multi-Channel Migration Scheme for IEEE Networks SPLASH: a Simple Multi-Channel Migration Scheme for IEEE 82.11 Networks Seungnam Yang, Kyungsoo Lee, Hyundoc Seo and Hyogon Kim Korea University Abstract Simultaneously utilizing multiple channels can

More information

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization. 18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/

More information

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday Lecture 7: Centralized MAC protocols Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday Centralized MAC protocols Previous lecture contention based MAC protocols, users decide who transmits when in a decentralized

More information

Medium Access Control

Medium Access Control CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example

More information

Medium Access Schemes

Medium Access Schemes Medium Access Schemes Winter Semester 2010/11 Integrated Communication Systems Group Ilmenau University of Technology Media Access: Motivation The problem: multiple users compete for a common, shared resource

More information

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

Chapter 2 Overview. Duplexing, Multiple Access - 1 - Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3

More information

Millimeter Wave Communications:

Millimeter Wave Communications: Millimeter Wave Communications: From Point-to-Point Links to Agile Network Connections Haitham Hassanieh Omid Abari, Michael Rodriguez, Dina Katabi Spectrum Scarcity Huge bandwidth available at millimeter

More information

IEEE Wireless Access Method and Physical Layer Specification. Proposal For the Use of Packet Detection in Clear Channel Assessment

IEEE Wireless Access Method and Physical Layer Specification. Proposal For the Use of Packet Detection in Clear Channel Assessment IEEE 802.11 Wireless Access Method and Physical Layer Specification Title: Author: Proposal For the Use of Packet Detection in Clear Channel Assessment Jim McDonald Motorola, Inc. 50 E. Commerce Drive

More information

Performance Evaluation of Adaptive EY-NPMA with Variable Yield

Performance Evaluation of Adaptive EY-NPMA with Variable Yield Performance Evaluation of Adaptive EY-PA with Variable Yield G. Dimitriadis, O. Tsigkas and F.-. Pavlidou Aristotle University of Thessaloniki Thessaloniki, Greece Email: gedimitr@auth.gr Abstract: Wireless

More information

On the Coexistence of Overlapping BSSs in WLANs

On the Coexistence of Overlapping BSSs in WLANs On the Coexistence of Overlapping BSSs in WLANs Ariton E. Xhafa, Anuj Batra Texas Instruments, Inc. 12500 TI Boulevard Dallas, TX 75243, USA Email:{axhafa, batra}@ti.com Artur Zaks Texas Instruments, Inc.

More information

Maximizing Rendezvous Diversity in Rendezvous Protocols for Decentralized Cognitive Radio Networks

Maximizing Rendezvous Diversity in Rendezvous Protocols for Decentralized Cognitive Radio Networks IEEE TRANACTION ON MOBILE COMPUTING, VOL., NO. Maximizing Rendezvous Diversity in Rendezvous Protocols for Decentralized Cognitive Radio Networks Kaigui Bian, Member, IEEE, and Jung-Min Jerry Park, enior

More information

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Wi-Fi Wireless Fidelity Spread Spectrum CSMA Ad-hoc Networks Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Outline for Today We learned how to setup a WiFi network. This

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks 2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering

More information

IEEE Wireless Access Method and Physical Specification

IEEE Wireless Access Method and Physical Specification IEEE 802.11 Wireless Access Method and Physical Specification Title: The importance of Power Management provisions in the MAC. Presented by: Abstract: Wim Diepstraten NCR WCND-Utrecht NCR/AT&T Network

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Simulation of Optical CDMA using OOC Code

Simulation of Optical CDMA using OOC Code International Journal of Scientific and Research Publications, Volume 2, Issue 5, May 22 ISSN 225-353 Simulation of Optical CDMA using OOC Code Mrs. Anita Borude, Prof. Shobha Krishnan Department of Electronics

More information

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline

More information

FTSP Power Characterization

FTSP Power Characterization 1. Introduction FTSP Power Characterization Chris Trezzo Tyler Netherland Over the last few decades, advancements in technology have allowed for small lowpowered devices that can accomplish a multitude

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY

More information

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009. Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name

More information

CS649 Sensor Networks IP Lecture 9: Synchronization

CS649 Sensor Networks IP Lecture 9: Synchronization CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization

More information

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks 1 An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University {b989117,

More information

Frequency Hopping Spread Spectrum

Frequency Hopping Spread Spectrum Frequency Hopping Spread Spectrum 1. Bluetooth system The Equipment Under Test (EUT) is the Digital Video Camera Recorder, witch has a Bluetooth communication module internally. Bluetooth is the one of

More information

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Wenbo Zhao and Xueyan Tang School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email:

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense

More information

An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (M2M) Networks

An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (M2M) Networks An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University Intel-NTU

More information

Chalmers Publication Library

Chalmers Publication Library Chalmers Publication Library Distributed clock synchronization with application of DD communication without infrastructure This document has been downloaded from Chalmers Publication Library CPL. It is

More information

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 1 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0008 Multi-Band Spectrum Allocation

More information

An Effective Defensive Node against Jamming Attacks in Sensor Networks

An Effective Defensive Node against Jamming Attacks in Sensor Networks International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 6ǁ June. 2013 ǁ PP.41-46 An Effective Defensive Node against Jamming Attacks in Sensor

More information

Wireless LANs/data networks

Wireless LANs/data networks RADIO SYSTEMS - ETIN15 Lecture no: 12 Wireless LANs/data networks Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2015-05-13 Ove Edfors - ETIN15 1 Centralized and

More information

Safety Message Power Transmission Control for Vehicular Ad hoc Networks

Safety Message Power Transmission Control for Vehicular Ad hoc Networks Journal of Computer Science 6 (10): 1056-1061, 2010 ISSN 1549-3636 2010 Science Publications Safety Message Power Transmission Control for Vehicular Ad hoc Networks 1 Ghassan Samara, 1 Sureswaran Ramadas

More information

Energy-Efficient Data Management for Sensor Networks

Energy-Efficient Data Management for Sensor Networks Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell

More information

IEEE ax / OFDMA

IEEE ax / OFDMA #WLPC 2018 PRAGUE CZECH REPUBLIC IEEE 802.11ax / OFDMA WFA CERTIFIED Wi-Fi 6 PERRY CORRELL DIR. PRODUCT MANAGEMENT 1 2018 Aerohive Networks. All Rights Reserved. IEEE 802.11ax Timeline IEEE 802.11ax Passed

More information

CIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum

CIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum CIS 632 / EEC 687 Mobile Computing Mobile Communications (for Dummies) Chansu Yu Contents Modulation Propagation Spread spectrum 2 1 Digital Communication 1 0 digital signal t Want to transform to since

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren Lecture 23: Media Access Control CSE 123: Computer Networks Alex C. Snoeren Overview Finish encoding schemes Manchester, 4B/5B, etc. Methods to share physical media: multiple access Fixed partitioning

More information

A Cross-Layer Cooperative Schema for Collision Resolution in Data Networks

A Cross-Layer Cooperative Schema for Collision Resolution in Data Networks A Cross-Layer Cooperative Schema for Collision Resolution in Data Networks Bharat Sharma, Shashidhar Ram Joshi, Udaya Raj Dhungana Department of Electronics and Computer Engineering, IOE, Central Campus,

More information

2 Polling. Politecnico di Milano Facoltà di Ingegneria dell Informazione

2 Polling. Politecnico di Milano Facoltà di Ingegneria dell Informazione Politecnico di Milano Facoltà di Ingegneria dell Informazione Polling Multiple Access in Wireless Networks: Models and echnologies Prof. Antonio Capone Assumptions and notation o In the following we drop

More information

Wireless Networks (PHY): Design for Diversity

Wireless Networks (PHY): Design for Diversity Wireless Networks (PHY): Design for Diversity Y. Richard Yang 9/20/2012 Outline Admin and recap Design for diversity 2 Admin Assignment 1 questions Assignment 1 office hours Thursday 3-4 @ AKW 307A 3 Recap:

More information

Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks

Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks A. P. Azad and A. Chockalingam Department of ECE, Indian Institute of Science, Bangalore 5612, India Abstract Increasing

More information

Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel

Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel Yi Song and Jiang Xie Abstract Cognitive radio (CR) technology is a promising solution to enhance the

More information

Channel partitioning protocols

Channel partitioning protocols Wireless Networks a.y. 2010-2011 Channel partitioning protocols Giacinto Gelli DIBET gelli@unina.it 1 Outline Introduction Duplexing techniques FDD TDD Channel partitioning techniques FDMA TDMA CDMA Hybrid

More information

Goodput Enhancement of IEEE a Wireless LAN via Link Adaptation

Goodput Enhancement of IEEE a Wireless LAN via Link Adaptation Goodput Enhancement of IEEE 8.11a Wireless AN via ink Adaptation Daji Qiao Real-Time Computing aboratory The University of Michigan Email: dqiao@eecs.umich.edu Abstract IEEE 8.11a is a new high-speed physical

More information

Mobile and Sensor Systems. Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo

Mobile and Sensor Systems. Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo Mobile and Sensor Systems Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo In this lecture We will describe techniques to reprogram a sensor network while deployed. We describe

More information

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer

More information

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen. T305 T325 B BLOCK 3 4 PART III T325 Summary Session 11 Block III Part 3 Access & Modulation [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Prepared by:

More information

Rate Adaptation for Multiuser MIMO Networks

Rate Adaptation for Multiuser MIMO Networks Rate Adaptation for 82.11 Multiuser MIMO Networks paper #86 12 pages ABSTRACT In multiuser MIMO (MU-MIMO) networks, the optimal bit rate of a user is highly dynamic and changes from one packet to the next.

More information

Outline / Wireless Networks and Applications Lecture 14: Wireless LANs * IEEE Family. Some IEEE Standards.

Outline / Wireless Networks and Applications Lecture 14: Wireless LANs * IEEE Family. Some IEEE Standards. Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 14: Wireless LANs 802.11* Peter Steenkiste Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/ Brief history 802 protocol

More information

arxiv: v1 [cs.it] 21 Feb 2015

arxiv: v1 [cs.it] 21 Feb 2015 1 Opportunistic Cooperative Channel Access in Distributed Wireless Networks with Decode-and-Forward Relays Zhou Zhang, Shuai Zhou, and Hai Jiang arxiv:1502.06085v1 [cs.it] 21 Feb 2015 Dept. of Electrical

More information

Efficient UMTS. 1 Introduction. Lodewijk T. Smit and Gerard J.M. Smit CADTES, May 9, 2003

Efficient UMTS. 1 Introduction. Lodewijk T. Smit and Gerard J.M. Smit CADTES, May 9, 2003 Efficient UMTS Lodewijk T. Smit and Gerard J.M. Smit CADTES, email:smitl@cs.utwente.nl May 9, 2003 This article gives a helicopter view of some of the techniques used in UMTS on the physical and link layer.

More information

Page 1. Outline : Wireless Networks Lecture 6: Final Physical Layer. Direct Sequence Spread Spectrum (DSSS) Spread Spectrum

Page 1. Outline : Wireless Networks Lecture 6: Final Physical Layer. Direct Sequence Spread Spectrum (DSSS) Spread Spectrum Outline 18-759 : Wireless Networks Lecture 6: Final Physical Layer Peter Steenkiste Dina Papagiannaki Spring Semester 2009 http://www.cs.cmu.edu/~prs/wireless09/ Peter A. Steenkiste 1 RF introduction Modulation

More information

An Energy Measurement Based Collision Resolution Protocol

An Energy Measurement Based Collision Resolution Protocol An Energy Measurement Based Collision Resolution Protocol Sanjeev Khanna, Saswati Sarkar, and Insik Shin Dept. of Computer and Information Science Dept. of Electrical and Systems Engineering University

More information

A Distributed Protocol For Adaptive Link Scheduling in Ad-hoc Networks 1

A Distributed Protocol For Adaptive Link Scheduling in Ad-hoc Networks 1 Distributed Protocol For daptive Link Scheduling in d-hoc Networks 1 Rui Liu, Errol L. Lloyd Department of Computer and Information Sciences University of Delaware Newark, DE 19716 bstract -- fully distributed

More information

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted

More information

VEHICULAR ad hoc networks (VANETs) are becoming

VEHICULAR ad hoc networks (VANETs) are becoming Repetition-based Broadcast in Vehicular Ad Hoc Networks in Rician Channel with Capture Farzad Farnoud, Shahrokh Valaee Abstract In this paper we study the performance of different vehicular wireless broadcast

More information