CS434/534: Topics in Networked (Networking) Systems
|
|
- Britney Evans
- 5 years ago
- Views:
Transcription
1 CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson
2 Outline Recap Wireless background Frequency domain Modulation and demodulation Wireless channels Wireless PHY design Wireless MAC design (one hop) wireless access problem and taxonomy wireless resource partitioning dimensions media access protocols From single-hop MAC to multi-hop mesh wireless mesh network capacity maximize mesh capacity
3 Admin. PS questions Project first check point Due Thursday after break 3
4 Recap: The Hidden Terminal Problem E D A A is sending to B, but C cannot detect the transmission Therefore C sends to B In summary, A is hidden from C B C 4
5 Recap: 80. RTS-CTS-data-ACK sender DIFS RTS data 0 usec receiver SIFS CTS SIFS SIFS ACK other stations NAV (RTS) NAV (CTS) defer access DIFS new contention data t 5
6 Recap: 80. CSMA/CA busy B = 5 wait B = 5 data B = 0 busy data B = 5 wait B = 0 cw = 3 B and B are backoff intervals at nodes and 6
7 Recap: PIFS point coordinator polled wireless stations NAV medium busy PIFS D SIFS SIFS U NAV contention free period D contention period t D: downstream poll, or data from point coordinator U: data from polled wireless station 7
8 Recap: Wireless Link Access Control Problem: single shared medium, hence if two transmissions overlap on all dimensions [time, space, frequency, and code], then it is a collision +CS+CD+EB Slotted ALOHA Zigzag decoding Ethernet +CA +ACK + RTS/CTS Hidden-terminal Collision detection/ prevention 8
9 Recap: ZigZag Decoding Exploits 80. s behavior Retransmissions àsame packets collide again Senders use random jitters à Collisions start with interference-free bits P a P a P b P b Interference-free Bits
10 ZigZag Algorithm while (exists a chunk that is interference-free in one collision and has interference in the other) { } decode and subtract from the other collision
11 How Does ZigZag Work? while (exists a chunk that is interference-free in one collision and has interference in the other) { } decode and subtract from the other collision
12 How Does ZigZag Work? 3 while (exists a chunk that is interference-free in one collision and has interference in the other) { } decode and subtract from the other collision
13 How Does ZigZag Work? while (exists a chunk that is interference-free in one collision and has interference in the other) { } decode and subtract from the other collision
14 How Does ZigZag Work? while (exists a chunk that is interference-free in one collision and has interference in the other) { } decode and subtract from the other collision
15 How Does ZigZag Work? while (exists a chunk that is interference-free in one collision and has interference in the other) { } decode and subtract from the other collision
16 How Does ZigZag Work? while (exists a chunk that is interference-free in one collision and has interference in the other) { } decode and subtract from the other collision
17 How Does ZigZag Work? while (exists a chunk that is interference-free in one collision and has interference in the other) { } decode and subtract from the other collision Delivered packets in timeslots As efficient as if the packets did not collide
18 Outline Admin. and recap Media access control Slotted Aloha Hidden terminal Example: 80. Hidden terminal with 80. revisited Overall idea Technical issues Collision detection 8
19 Collision Detection: How does the AP know it is a Collision and Where the Second Packet Starts? Time 9
20 Detecting Collisions and the Value of AP received signal Correlate Packets start with known preamble Time AP correlates known preamble with signal Correlation Time
21 Matching Collision P a P b P a P b Question to think offline: Given (P + P(D)) and (P, P (D )), how to determine that P = P and P = P
22 Outline Admin. and recap Media access control Slotted Aloha Hidden terminal Example: 80. Hidden terminal with 80. revisited Overall idea Technical issues Collision detection Subtracting chunks
23 How Does the AP Subtract the Signal? Channel s attenuation or phase may change between collisions Can t simply subtract a chunk across collisions Alice s signal in first collision Alice s signal in second collision
24 Subtracting a Chunk Decode chunk into bits Removes effects of channel during first collision Re-modulate bits to get channel-free signal Apply effect of channel during second collision Use correlation to estimate channel despite interference
25 What if AP Makes a Mistake?
26 What if AP Makes a Mistake? Bad News: Errors can propagate 3 Can we deal with these errors?
27 What if AP Makes a Mistake? Good News: Temporal Diversity A bit is unlikely to be affected by noise in both collisions Get two independent decodings
28 AP Decodes Backwards as well as Forwards 3 Errors propagate differently in the two decodings Which decoded value should the AP pick? For each bit, AP picks the decoding that has a higher PHY confidence
29 Outline Admin. and recap Media access control Slotted Aloha Hidden terminal Example: 80. Hidden terminal with 80. revisited Overall idea Technical issues Collision detection Subtracting chunks Deployment 9
30 Acknowledgement Use as much synchronous acknowledgement as possible for backward compatibility
31 Implementation USRP Hardware GNURadio software Carrier Freq:.4-.48GHz BPSK modulation
32 Testbed USRPs 80.a 0% HT, 0% partial HT, 80% perfectly sense each other
33 Throughput Comparison CDF of concurrent flow pairs Perfectly Sense Partial Hidden Hidden Terminals Terminals Throughput
34 Throughput Comparison CDF of concurrent flow pairs Hidden Terminals get high throughput Throughput ZigZag ZigZag Exploits Capture Effect
35 Capture Effect Subtract Alice and combine Bob s packet across collisions to correct errors P a P b P a P b 3 packets in time slots à better than no collisions
36 Summary Basic lesson: Traditional thinking was on avoiding collisions Zigzag changed the way of thinking: decoding collisions Many extensions of the Zigzag idea: decoding collisions, instead of avoiding collisions See Remap in Backup Slides A good area for creative thinking 36
37 Infrastructure Mode Wireless 80. by default operates in infrastructure mode. AP: Access Point AP wired network AP AP Problems of infrastructure mode wireless networks? 37
38 Mesh Networks AP: Access Point AP wired network AP ad-hoc (mesh) mode AP Benefits fast and low-cost deployment no central point of failure no APs overhead for users who can reach each other Issues? 38
39 Outline Recap Wireless background Frequency domain Modulation and demodulation Wireless channels Wireless PHY design Wireless MAC design (one hop) From single-hop MAC to multi-hop mesh understanding: wireless mesh network capacity
40 Capacity of Mesh Networks The question we study: how much traffic can a mesh wireless network carry, assuming an oracle to avoid the potential overhead of distributed synchronization (MAC)? Why study capacity? learn the fundamental limits of mesh wireless networks separate the spatial reuse perspective and system design perspective gain insight for designing effective wireless protocols 40
41 Mesh Transmission Constraints Interference constraint transmission successful if there are no other transmitters within a distance (+D)r of the receiver (+D)r receiver r Radio interface constraint a single half-duplex transceiver at each node: either transmits or receives transmits to only one receiver receives from only one sender sender 4
42 Model Domain is a disk of unit area There are n nodes in the domain The transmission rate is W bits/sec 4
43 Capacity of Mesh Wireless Network Consider two types of networks arbitrary networks: place nodes optimally to derive overall upper bound random network: nodes are placed randomly 43
44 Outline Recap Wireless background Frequency domain Modulation and demodulation Wireless channels Wireless PHY design Wireless MAC design (one hop) From single-hop MAC to multi-hop mesh understanding: wireless mesh network capacity setting arbitrary networks: place nodes optimally to derive overall upper bound
45 Transmission Model: Bit-time Perspective Chop time into a total of WT bit-times in T seconds The transmission decision is made for each bit bit time bit time bit time t bit time WT 45
46 Transmission Model: End-to-end Perspective Assume the network sends a total of lt end-to-end bits in T seconds Assume the b-th bit makes a total of h(b) hops from the sender to the receiver Let r bh denote the hop-length of the h-th hop of the b-th bit lt 46
47 Hop-Count Constraint Since there are a total of WT bit-times, and during each bit-time there are at most n/ simultaneous transmissions, we have lt å h( b) WTn b= 47
48 Area Constraint Consider two simultaneous transmissions at a bit-time (+D)r ½ Dr j r (+D)r m ½ Dr r k D jm + r >= D im >= (+D)r D jm + r >= D jk >= (+D)r Þ D jm >= (r+r ) D / i 48
49 Area Constraint For each transmission with distance r from sender to receiver, we draw a circle with radius ½ D r These circles do not overlap 49
50 Area Constraint: Global Picture 50
51 Area Constraint: Global Picture sum over all circles, since each circle has at least ¼ of its area in the unit disk, 5
52 Summary: Two Constraints Radio interface constraint a single half-duplex transceiver at each node Interference constraint transmission successful if there are no other transmitters within a distance (+D)r of the receiver (+D)r receiver r lt å h( b) WT n b= 6WT lt h( b) h ( rb ) b= h= pd åå sender 5
53 53 Capacity Bound å å = = ø ö ç è æ n i i n i i x n x Note: Let L be the average (direct-line) distance for all lt end-to-end bits. åå = = T b b h h h r b TL l l ) ( åå å åå = = = = = T b b h h h b T b T b b h h h b r b h r TL l l l l ) ( ) ( ) ( ) ( n WT WT WTn TL D = D p p l 8 6 n W L D p l 8 Discussion: what does the result mean? å = T b n WT b h l ) ( ) ( 6 ) ( D åå = = p l WT r T b b h h h b
54 Discussion L depends on traffic pattern (who needs to talk to whom) and positions of the end-to-end (application-level) senders and (application-level) receivers If end-to-end senders and receivers are spread out throughout the network, L is large per node capacity Otherwise, L will be small as network becomes denser µ n 54
55 Achieving Capacity: Example n/ senders and receivers: ll= 55
56 Results: Arbitrary Networks Protocol Model 56
57 Outline Recap Wireless background Frequency domain Modulation and demodulation Wireless channels Wireless PHY design Wireless MAC design (one hop) From single-hop MAC to multi-hop mesh understanding: wireless mesh network capacity setting arbitrary networks: place nodes optimally to derive overall upper bound random networks: uniform distribution of nodes and senders/receivers
58 Uniform Random Networks Uniform distribution of n nodes n origin-destination (OD) pairs Each node chooses same power level P, and thus equal radius r(n) Equal throughput l(n) bits/sec for all OD pairs 58
59 Random Networks: Required Bits Assume: average length of each OD pair is L Average number of hops: L r(n) Total required bit transmissions per second to support l(n) : nl( n) L r( n) 59
60 Random Networks: Offered Bits Required bit transmissions per second: nl( n) L r( n) What is the maximum number of transmissions (of bits) in one second? space used per transmission (interference limited): at least ¼ p [Dr(n)/] = pd r (n)/6 number of simultaneous transmissions at most (interference limited): total bits per second = pd r( n) /6 pd 6W pd r( n) 6 r( n) 60
61 Random Networks: Capacity Required offered Þ Þ L nl( n) r( n) 6W pd r( n) 6W l( n) L pd nr( n) 6
62 Connectivity Constraint Need routes between origin-destination pairs - places a lower bound on transmit range r(n) A D A D Not connected Connected To maintain connectivity with a high probability, requires r(n) on the order: logn n 6
63 Random Networks: Capacity Required offered Þ L nl( n) r( n) 6W pd r( n) 6W Þ l( n) L pd nr( n) log n r( n) µ n Þ l( n) L µ nlog n 63
64 Measurement Measured scaling law: throughput declines worse with n than theoretically predicted: /n.68 Remaining story line wireless mesh networks may have low scalability, and need techniques to increase capacity 64
65 Improving Wireless Mesh Capacity Multiple transceivers Radio interface constraint a single half-duplex transceiver at each node lt å Reduce L h( b) WT n b= rate*distance capacity: Approx. optimal l L Reduce interf. area Interference constraint transmission successful if there are no other transmitters within a distance (+D)r of the receiver 6WT lt h( b) h ( rb ) b= h= pd åå 8 W p D n Increase W 65
Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale
Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Improve Wireless Capacity; Programmable Wireless Networks Yang (Richard) Yang Computer Science Department Yale University 208A Watson Email: yry@cs.yale.edu
More informationFine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012
Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense
More informationCognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks
Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY
More information% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.
! " % - % 2 % % 4 % % & % ) % * %, % -. % -- % -2 % - % -4 % - 0 "" 1 $ (1 $ $ (1 $ $ ( # $ 5 # $$ # $ ' ( (( +'! $ /0 (1 % +' ( % +' ((!1 3 0 ( 6 ' infrastructure network AP AP: Access Point AP wired
More informationWireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN
Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic
More informationWireless Intro : Computer Networking. Wireless Challenges. Overview
Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional
More informationLiving with Interference in Unmanaged Wireless. Environments. Intel Research & University of Washington
Living with Interference in Unmanaged Wireless Environments David Wetherall, Daniel Halperin and Tom Anderson Intel Research & University of Washington This talk 1. The problem: inefficient spectrum scheduling
More informationWireless Networks (PHY): Design for Diversity
Wireless Networks (PHY): Design for Diversity Y. Richard Yang 9/20/2012 Outline Admin and recap Design for diversity 2 Admin Assignment 1 questions Assignment 1 office hours Thursday 3-4 @ AKW 307A 3 Recap:
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationIlenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello
Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative
More informationDOPPLER SHIFT. Thus, the frequency of the received signal is
DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving
More informationStarvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks
Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop
More informationChapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University
Chapter 4: Directional and Smart Antennas Prof. Yuh-Shyan Chen Department of CSIE National Taipei University 1 Outline Antennas background Directional antennas MAC and communication problems Using Directional
More informationCIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum
CIS 632 / EEC 687 Mobile Computing Mobile Communications (for Dummies) Chansu Yu Contents Modulation Propagation Spread spectrum 2 1 Digital Communication 1 0 digital signal t Want to transform to since
More informationFiber Distributed Data Interface
Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses
More informationA new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks
A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,
More informationPartial overlapping channels are not damaging
Journal of Networking and Telecomunications (2018) Original Research Article Partial overlapping channels are not damaging Jing Fu,Dongsheng Chen,Jiafeng Gong Electronic Information Engineering College,
More informationCooperation in Random Access Wireless Networks
Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department
More informationM2M massive wireless access: challenges, research issues, and ways forward
M2M massive wireless access: challenges, research issues, and ways forward Petar Popovski Aalborg University Andrea Zanella, Michele Zorzi André D. F. Santos Uni Padova Alcatel Lucent Nuno Pratas, Cedomir
More informationWireless in the Real World. Principles
Wireless in the Real World Principles Make every transmission count E.g., reduce the # of collisions E.g., drop packets early, not late Control errors Fundamental problem in wless Maximize spatial reuse
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More informationAdapting to the Wireless Channel: SampleRate
Adapting to the Wireless Channel: SampleRate Brad Karp (with slides contributed by Kyle Jamieson) UCL Computer Science CS M38 / GZ6 27 th January 216 Today 1. Background: digital communications Modulation
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Diversity Design for Flat fading Yang (Richard) Yang Computer Science Department Yale University 208A Watson Email: yry@cs.yale.edu
More informationMedium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller
Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods
More informationChapter 2 Overview. Duplexing, Multiple Access - 1 -
Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3
More informationIN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes
IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:
More information1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux
1. Introduction 1.2 Medium Access Control Prof. JP Hubaux 1 Modulation and demodulation (reminder) analog baseband digital signal data digital analog 101101001 modulation modulation radio transmitter radio
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 14: Full-Duplex Communications Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Outline What s full-duplex Self-Interference Cancellation Full-duplex and Half-duplex
More informationOutline / Wireless Networks and Applications Lecture 14: Wireless LANs * IEEE Family. Some IEEE Standards.
Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 14: Wireless LANs 802.11* Peter Steenkiste Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/ Brief history 802 protocol
More informationAEROHIVE NETWORKS ax DAVID SIMON, SENIOR SYSTEMS ENGINEER Aerohive Networks. All Rights Reserved.
AEROHIVE NETWORKS 802.11ax DAVID SIMON, SENIOR SYSTEMS ENGINEER 1 2018 Aerohive Networks. All Rights Reserved. 2 2018 Aerohive Networks. All Rights Reserved. 8802.11ax 802.11n and 802.11ac 802.11n and
More informationUNDERSTANDING AND MITIGATING
UNDERSTANDING AND MITIGATING THE IMPACT OF RF INTERFERENCE ON 802.11 NETWORKS RAMAKRISHNA GUMMADI UCS DAVID WETHERALL INTEL RESEARCH BEN GREENSTEIN UNIVERSITY OF WASHINGTON SRINIVASAN SESHAN CMU 1 Presented
More informationOutline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt.
Wireless Networks (PHY): Design or Diversity Admin and recap Design or diversity Y. Richard Yang 9/2/212 2 Admin Assignment 1 questions Assignment 1 oice hours Thursday 3-4 @ AKW 37A Channel characteristics
More informationAdvanced Computer Networks. Wireless Networks Fundamentals
Advanced Computer Networks 263 3501 00 Wireless Networks Fundamentals Patrick Stuedi Spring Semester 2014 Oriana Riva, ETH Zürich Course Outline 1. General principles of network design Review of basic
More informationExercise Data Networks
(due till January 19, 2009) Exercise 9.1: IEEE 802.11 (WLAN) a) In which mode of operation is this network in? b) Why is the start of the back-off timers delayed until the DIFS contention phase? c) How
More informationPerformance of ALOHA and CSMA in Spatially Distributed Wireless Networks
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,
More informationMultiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks
Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)
More informationIEEE ax / OFDMA
#WLPC 2018 PRAGUE CZECH REPUBLIC IEEE 802.11ax / OFDMA WFA CERTIFIED Wi-Fi 6 PERRY CORRELL DIR. PRODUCT MANAGEMENT 1 2018 Aerohive Networks. All Rights Reserved. IEEE 802.11ax Timeline IEEE 802.11ax Passed
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer
Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,
More informationD3.2 MAC layer mechanisms and adaptations for Hybrid Terrestrial-Satellite Backhauling
MAC layer mechanisms and adaptations for Hybrid Terrestrial-Satellite Backhauling Grant Agreement nº: 645047 Project Acronym: SANSA Project Title: Shared Access Terrestrial-Satellite Backhaul Network enabled
More informationRate Adaptation for Multiuser MIMO Networks
Rate Adaptation for 82.11 Multiuser MIMO Networks paper #86 12 pages ABSTRACT In multiuser MIMO (MU-MIMO) networks, the optimal bit rate of a user is highly dynamic and changes from one packet to the next.
More informationPower-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks
Power-Controlled Medium Access Control 1 Protocol for Full-Duplex WiFi Networks Wooyeol Choi, Hyuk Lim, and Ashutosh Sabharwal Abstract Recent advances in signal processing have demonstrated in-band full-duplex
More informationCellular systems 02/10/06
Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from
More informationLecture on Sensor Networks
Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU
More informationT. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University
Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer
More informationDistance-Aware Virtual Carrier Sensing for Improved Spatial Reuse in Wireless Networks
Distance-Aware Virtual Carrier Sensing for mproved Spatial Reuse in Wireless Networks Fengji Ye and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic nstitute Troy, New York 8 Abstract n this paper
More informationMesh Networks with Two-Radio Access Points
802.11 Mesh Networks with Two-Radio Access Points Jing Zhu Sumit Roy jing.z.zhu@intel.com roy@ee.washington.edu Communications Technology Lab Dept. of Electrical Engineering Intel Corporation, 2111 NE
More informationMobile Communications
COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access
More informationOutline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review
EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example
More informationThroughput-optimal number of relays in delaybounded multi-hop ALOHA networks
Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless
More informationTransmission Scheduling in Capture-Based Wireless Networks
ransmission Scheduling in Capture-Based Wireless Networks Gam D. Nguyen and Sastry Kompella Information echnology Division, Naval Research Laboratory, Washington DC 375 Jeffrey E. Wieselthier Wieselthier
More informationA Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks
1 A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in 82.11ac Networks Seowoo Jang, Student Member, Saewoong Bahk, Senior Member Abstract The major goal of IEEE 82.11ac
More informationMedium Access Control
CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example
More informationAchieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationA MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks
A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks Thanasis Korakis Gentian Jakllari Leandros Tassiulas Computer Engineering and Telecommunications Department University
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted
More informationAnalysis of CSAT performance in Wi-Fi and LTE-U Coexistence
Analysis of CSAT performance in Wi-Fi and LTE-U Coexistence Vanlin Sathya, Morteza Mehrnoush, Monisha Ghosh, and Sumit Roy University of Chicago, Illinois, USA. University of Washington, Seattle, USA.
More informationPerformance of b/g in the Interference Limited Regime
Performance of 82.11b/g in the Interference Limited Regime Vinay Sridhara Hweechul Shin Stephan Bohacek vsridhar@udel.edu shin@eecis.udel.edu bohacek@udel.edu University of Delaware Department of Electrical
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 12: Soft Information Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 PPR: Partial Packet Recovery for Wireless Networks ACM SIGOCMM, 2017 Kyle Jamieson and Hari
More informationLecture 8: Media Access Control
Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing
More informationWi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering
Wi-Fi Wireless Fidelity Spread Spectrum CSMA Ad-hoc Networks Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Outline for Today We learned how to setup a WiFi network. This
More informationNext Generation Wireless LANs
Next Generation Wireless LANs 802.11n and 802.11ac ELDAD PERAHIA Intel Corporation ROBERTSTACEY Apple Inc. и CAMBRIDGE UNIVERSITY PRESS Contents Foreword by Dr. Andrew Myles Preface to the first edition
More informationUnderstanding the Real-World Performance of Carrier Sense
Understanding the Real-World Performance of Carrier Sense Kyle Jamieson, Bret Hull, Allen Miu, Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laboratory The Stata Center, 32 Vassar
More informationLecture 8 Mul+user Systems
Wireless Communications Lecture 8 Mul+user Systems Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 Outline Multiuser Systems (Chapter 14 of Goldsmith
More informationWireless Transmission & Media Access
Wireless Transmission & Media Access Signals and Signal Propagation Multiplexing Modulation Media Access 1 Significant parts of slides are based on original material by Prof. Dr.-Ing. Jochen Schiller,
More informationTaking the Sting out of Carrier Sense: Interference Cancellation for Wireless LANs
Taking the Sting out of Carrier Sense: Interference Cancellation for Wireless LANs Daniel Halperin University of Washington Thomas Anderson University of Washington David Wetherall University of Washington
More informationMobile Computing. Chapter 3: Medium Access Control
Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access
More informationUltra-Low Duty Cycle MAC with Scheduled Channel Polling
USC/ISI Technical Report ISI-TR-64, July 25. This report is superseded by a later version published at ACM SenSys 6. 1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann
More informationMultiple Access Schemes
Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many
More informationUnderstanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø
Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification
More informationA Concurrent Acknowledgement Scheme for Broadcast Messages in Wireless Networks
A Concurrent Acknowledgement Scheme for Broadcast Messages in Wireless Networks Aveek Dutta, Dola Saha, Dirk Grunwald, and Douglas Sicker CU-CS-1046-08 September 2008 University of Colorado at Boulder
More informationICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa
ICT 5305 Mobile Communications Lecture - 4 April 2016 Dr. Hossen Asiful Mustafa Media Access Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access
More informationTIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS
TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Modulation and Demodulation Yang (Richard) Yang Computer Science Department Yale University 208A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More informationChapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA
Mobile Communications Chapter 3 : Media Access Motivation Collision avoidance, MACA SDMA, FDMA, TDMA Polling Aloha CDMA Reservation schemes SAMA Comparison Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/
More informationStructure of the Lecture
Structure of the Lecture Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Channels in a frequency band Static medium access methods Flexible medium access methods Chapter 3 Wireless
More informationNetworking Devices over White Spaces
Networking Devices over White Spaces Ranveer Chandra Collaborators: Thomas Moscibroda, Rohan Murty, Victor Bahl Goal: Deploy Wireless Network Base Station (BS) Good throughput for all nodes Avoid interfering
More informationReal-time Distributed MIMO Systems. Hariharan Rahul Ezzeldin Hamed, Mohammed A. Abdelghany, Dina Katabi
Real-time Distributed MIMO Systems Hariharan Rahul Ezzeldin Hamed, Mohammed A. Abdelghany, Dina Katabi Dense Wireless Networks Stadiums Concerts Airports Malls Interference Limits Wireless Throughput APs
More informationConsiderations about Wideband Data Transmission at 4.9 GHz for an hypothetical city wide deployment
Considerations about Wideband Data Transmission at 4.9 GHz for an hypothetical city wide deployment Leonhard Korowajczuk CEO, CelPlan Technologies, Inc. WCA Public Safety Task Force 11/18/2004 Copyright
More information1 Interference Cancellation
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.
More informationCRMA: Collision-Resistant Multiple Access
CRMA: Collision-Resistant Multiple Access Tianji Li 1,2 Mi Kyung Han 1 Apurv Bhartia 1 Lili Qiu 1 Eric Rozner 1 Yin Zhang 1 Brad Zarikoff 2 The University of Texas at Austin 1, National University of Ireland
More informationReceiver Designs for the Radio Channel
Receiver Designs for the Radio Channel COS 463: Wireless Networks Lecture 15 Kyle Jamieson [Parts adapted from C. Sodini, W. Ozan, J. Tan] Today 1. Delay Spread and Frequency-Selective Fading 2. Time-Domain
More informationProject = An Adventure : Wireless Networks. Lecture 4: More Physical Layer. What is an Antenna? Outline. Page 1
Project = An Adventure 18-759: Wireless Networks Checkpoint 2 Checkpoint 1 Lecture 4: More Physical Layer You are here Done! Peter Steenkiste Departments of Computer Science and Electrical and Computer
More informationWireless Networks Do Not Disturb My Circles
Wireless Networks Do Not Disturb My Circles Roger Wattenhofer ETH Zurich Distributed Computing www.disco.ethz.ch Wireless Networks Geometry Zwei Seelen wohnen, ach! in meiner Brust OSDI Multimedia SenSys
More informationSuperimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks
Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University
More informationLecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage
Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based
More informationExploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage
Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage Arunesh Mishra α, Eric Rozner β, Suman Banerjee β, William Arbaugh α α University of Maryland, College
More informationChapter 10. User Cooperative Communications
Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a
More informationUltra-Wideband Impulse Radio for Tactical Ad Hoc Communication Networks
Ultra-Wideband Impulse Radio for Tactical Ad Hoc Communication Networks J. Keith Townsend William M. Lovelace, Jon R. Ward, Robert J. Ulman N.C. State University, Raleigh, NC N.C. A&T State University,
More informationolsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra
olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work
More informationSpatial Reuse through Adaptive Interference Cancellation in Multi-Antenna Wireless Networks
Spatial Reuse through Adaptive Interference Cancellation in Multi-Antenna Wireless Networks A. Singh, P. Ramanathan and B. Van Veen Department of Electrical and Computer Engineering University of Wisconsin-Madison
More informationPerformance Modeling of Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability
Performance Modeling of 802. Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability Jin Sheng and Kenneth S. Vastola Department of Electrical, Computer and Systems Engineering,
More informationMaximizing Spatial Reuse In Indoor Environments
Maximizing Spatial Reuse In Indoor Environments Xi Liu Thesis Committee: Srinivasan Seshan (co-chair) Peter Steenkiste (co-chair) David Anderson Konstantina Papagiannaki Carnegie Mellon University Intel
More informationMedium Access Schemes
Medium Access Schemes Winter Semester 2010/11 Integrated Communication Systems Group Ilmenau University of Technology Media Access: Motivation The problem: multiple users compete for a common, shared resource
More informationOPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE NETWORKS. Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE
OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE 802.11 NETWORKS Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2004 APPROVED: Robert
More informationChutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.
Network Design for Quality of Services in Wireless Local Area Networks: a Cross-layer Approach for Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka ESS
More informationEnergy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks
Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer
More information