Local Area Networks NETW 901
|
|
- Edward Alexander Knight
- 5 years ago
- Views:
Transcription
1 Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C
2 Contents Why Multiple Access Random Access Aloha Slotted Aloha CSMA Performance of Random Access MAC schemes 2
3 Why Multiple Access? A number of senders and receivers are connected to the same shared medium All stations can listen to and transmit on the same medium If two or more stations transmit at the same time collision will occur and the transmitted signal will not be received correctly There is a need to control how stations can gain access to the medium to transmit their data 3
4 Types of Multiple Access Time Division Multiple Access (TDMA) Frequency Division Multiple Access (FDMA) Code Division Multiple Access (CDMA) More common in Mobile Networks Random Access More common in Local Area Networks 4
5 Random Access How does it work? When a node has a packet to send: It transmits at full channel data rate No a priori coordination among nodes What if two nodes transmit at the same time? Collision Random Access MAC Protocols are required for specifying: 1. How to detect collisions 2. How to recover from collisions 5
6 Random Access Protocol: Aloha Aloha means love, peace,. (used as a greeting) University of Hawaii developed a low cost radio data network and named it Aloha The system is based on random access Proved useful communication can be achieved without a central manager Paved the way to Ethernet and then WiFi 6
7 Aloha Operation Each station transmits anytime it has data ready to be transmitted If two stations transmit at the same time: collision will occur In case of collision each station waits a random time then retransmits again (Back-off Algorithm) 7
8 Aloha Performance But a more accurate calculation method is required 8
9 Aloha Performance Due to the random access transmissions numerous packets are lost due to collisions For evaluating protocol s performance, number of lost packets need to be estimated, i.e.: Probability of Collision Rethinking Probability of Collision: Collision occurs when a packet or more are generated while another is being transmitted Required: What is the probability that one or more packets will be generated within another packet s transmission time? Or better: What is the probability that one or more packets will be generated within another packet s Vulnerable Period? 9
10 Aloha Performance Calculation using Transmission Time vs. Vulnerable Period Transmission Time=T t Vulnerable Period T v = 2T x t But a frame could have been already transmitted Now we need to figure how to calculate the probability of having a defined number of frames during vulnerability period 10
11 Aloha Performance Assumption: Packet Inter-Arrival Times for any user i are Exponentially distributed Exponential CDF: Mean: 11
12 Aloha Performance But we typically have more than one user i trying to access the shared medium Packet Inter-Arrival Distribution 12
13 Aloha Performance Exponential Packet Inter-Arrivals implies Poisson Arrivals Average number of arrivals during time T for Poisson distribution E = λt 13
14 Aloha Performance Probability of Collision Is the probability of having one or more frames transmitted during the vulnerability period of the transmitted frame Probability of a Successful Transmission Is the probability of having zero frames transmitted during the vulnerability period of the transmitted frame P Successful Transmission = P 0, T v Throughput Is the average number of successfully transmitted bits (during T transmission ) S = λt t P(0, T v ) = λt t P 0,2T = λt t e 2λT t Average number of bits during time T transmission for Poisson distribution Probability of a successful transmission 14
15 Slotted Aloha An enhancement for Aloha protocol Allow frames to be transmitted only at the beginning of a periodic time slot Results in a shorter Vulnerable Period T v = T t Slotted Aloha Throughput: S = λt t P(0, T v ) = λt t P 0, T t = λt t e λt t 15
16 Maximum Throughput What is the Maximum Throughput that can be achieved by both protocols: (maximize throughput w.r.t number of arrivals) 1. Aloha λt t = Maximum Throughput S = λt t e 2λT t = e
17 Maximum Throughput What is the Maximum Throughput that can be achieved by both protocols: (maximize throughput w.r.t number of arrivals) 2. Slotted Aloha ds dλt t = d dλt t λt t e λt t = e λt t λt t e 2λT t = 0 λt t = 1 Maximum Throughput S = λt t e λt t = e 1 17
18 Average Number of Frame Transmissions Think of it as follows: - Average of any variable is calculated as follows: E x = x. p(x) all x - What are the possible values of our variable (Average number of transmissions)? 1,2,3, - To calculate the average, we need to find the probability of each possible value.. 18
19 Average Number of Frame Transmissions Think of it as follows: - What is the probability of 1 transmission? When the frame is successfully transmitted from the first time p x = 1 = P No Collision = P 0, T v = e λt v - What is the probability of 2 transmissions? When the frame has collided once then retransmitted successfully p x = 2 = P No collision P one collision = e λt v(1 e λt v) - What is the probability of 3 transmissions? When the frame has collided twice then retransmitted successfully p x = 3 = P No collision P two collisions = e λt v(1 e λt v) 2 Can you see the pattern? 19
20 Average Number of Frame Transmissions - What is the probability of n transmissions? When the frame is collided n-1 times then retransmitted successfully p x = n = P No collision P n 1 collisions = e λt v(1 e λt v) n 1 Average number of frame transmissions E n = n. p(n) n=1 = ne λt v(1 e λt v) n 1 n=1 = e λt v 20
21 Average Delay Frame delay is the duration took by the frame to be successfully delivered to its destination, including any retransmission delays E d T + d prop + (e λt v 1)(T + d prop + B) 21
22 Carrier Sense Multiple Access (CSMA) A different approach than Aloha/Slotted Aloha! A station wishing to transmit first listens to the medium to determine if another transmission is in progress (Carrier Sensing) - If the medium is busy: The station must wait - If the medium is idle: The station may transmit So do collisions still occur? Yes! If Two stations sense the medium at the same time to find it idle and start transmission, their frames will collide After collision stations wait a random time (Back-off period) before sensing the medium again 22
23 Carrier Sense Multiple Access (CSMA) CSMA Operation Start No Station has Tx data Yes Listen to the channel Channel Idle No Wait Random Time Yes Transmit No Collision Yes 23
24 Time Carrier Sense Multiple Access (CSMA) Sensing Time & Collisions A B C D 24
25 Carrier Sense Multiple Access (CSMA) CSMA Variations With CSMA, an algorithm is needed to specify what a station should do if the medium is found busy. 3 approaches exist: 1. Non-Persistent CSMA Persistent CSMA 3. P-Persistent CSMA 25
26 Carrier Sense Multiple Access (CSMA) 1. Non- Persistent CSMA A station wishing to transmit listens to the medium and obeys the following rules: i. If the medium is idle: transmit ii. If the medium is busy: wait an amount of time drawn from a probability distribution and re-sense medium again Random delays reduce the probability of collisions - If two stations back-off for he same duration they will collide again However; capacity is wasted because medium remains idle during back-off although stations has data ready to be sent 26
27 Carrier Sense Multiple Access (CSMA) 2. 1-Persistent CSMA A station wishing to transmit listens to the medium and obeys the following rules: i. If the medium is idle: transmit ii. If the medium is busy: continue to listen until the channel is sensed idle then transmit immediately Avoids medium idle time compared to non-persistent CSMA 1-persistent is an aggressive algorithm, stations with data will definitely collide, things get sorted out only after the collision 27
28 Carrier Sense Multiple Access (CSMA) 2. 1-Persistent CSMA Start No Station has Tx data Yes Listen to the channel Channel Idle No Wait Random Time Yes Transmit with Probability 1 No Collision Yes 28
29 Carrier Sense Multiple Access (CSMA) 3. P-Persistent CSMA A station wishing to transmit listens to the medium and obeys the following rules: i. If the medium is idle: transmit with probability p, and delay one time unit with probability (1-p) (Time unit is typically equal to the maximum propagation delay) ii. iii. If the medium is busy: continue to listen until the channel is sensed idle and repeat step i If transmission is delayed one time unit, repeat step i 29
30 Carrier Sense Multiple Access (CSMA) 3. P-Persistent CSMA Start No Station has Tx data Yes 1-P Listen to the channel Channel Idle Probability No Wait Random Time No P Collision Yes 30
31 Carrier Sense Multiple Access (CSMA) 3. P-Persistent CSMA Problem: How to choose P value? High P: allows more stations transmitting data and thus more probable collisions Low P: stations must wait longer to attempt transmission So what is a good balance? According to system load: At High loads: np must be smaller than one to avoid excessive collisions (where np is the number of stations that will transmit their data) At Low loads: P must not be of a very small value to avoid excessive delays 31
32 Carrier Sense Multiple Access (CSMA) Back-off Duration Different back-off distributions can be used to introduce priority - Stations with low average waiting time will have a high probability of accessing the medium - Stations with high average waiting time will have a low probability of accessing the medium Back-off duration typically follows an exponential distribution where the back-off time increases with the increased number of collisions Imagine the case of fixed back-off time? 32
6.1 Multiple Access Communications
Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding
More informationLecture 8: Media Access Control
Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing
More informationDOPPLER SHIFT. Thus, the frequency of the received signal is
DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving
More informationECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III
ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted
More informationMedium Access Methods. Lecture 9
Medium Access Methods Lecture 9 Medium Access Control Medium Access Control (MAC) is the method that defines a procedure a station should follow when it needs to send a frame or frames. The use of regulated
More informationLecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage
Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based
More informationLecture on Sensor Networks
Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU
More informationTSIN01 Information Networks Lecture 9
TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information
More informationCellular systems 02/10/06
Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from
More informationMedium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller
Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods
More informationLecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren
Lecture 23: Media Access Control CSE 123: Computer Networks Alex C. Snoeren Overview Finish encoding schemes Manchester, 4B/5B, etc. Methods to share physical media: multiple access Fixed partitioning
More informationMultiple Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol
More informationChapter 2 Overview. Duplexing, Multiple Access - 1 -
Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3
More informationDepartment of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.
Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name
More informationMobile Communications
COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access
More informationChapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA
Mobile Communications Chapter 3 : Media Access Motivation Collision avoidance, MACA SDMA, FDMA, TDMA Polling Aloha CDMA Reservation schemes SAMA Comparison Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/
More information1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux
1. Introduction 1.2 Medium Access Control Prof. JP Hubaux 1 Modulation and demodulation (reminder) analog baseband digital signal data digital analog 101101001 modulation modulation radio transmitter radio
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationMedium Access Control
CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example
More information06/02/2006. Sharing the Medium. Peter Rounce Room Notes Courtesy of Graham Knight P.A.
Sharing the Medium Peter Rounce (P.Rounce@cs.ucl.ac.uk) Room 6.18 Notes Courtesy of Graham Knight 2011-05 P.A.Rounce 2011-05-1 Sharing a link Introduction TDM, FDM - fixed allocations Statistical multiplexing
More informationMultiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, 6.4.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Medium Sharing Techniques Static Channelization FDMA TDMA Attempt to produce an orderly access
More informationMobile Computing. Chapter 3: Medium Access Control
Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access
More informationCOSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B
MAC: Scheduled Approaches 1. Reservation Systems 2. Polling Systems 3. Token Passing Systems Static Channelization: TDMA and FDMA COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of
More informationICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa
ICT 5305 Mobile Communications Lecture - 4 April 2016 Dr. Hossen Asiful Mustafa Media Access Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access
More informationOutline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review
EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example
More informationMultiple access techniques
Multiple access techniques Narrowband and wideband systems FDMA TDMA CDMA /FHMA SDMA Random-access techniques Summary Wireless Systems 2015 Narrowband and wideband systems Coherence BW B coh 1/σ τ σ τ
More informationFine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012
Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel
More informationFPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL
U.P.B. Sci. Bull., Series C, Vol. 79, Iss. 4, 2017 ISSN 2286-3540 FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL Xu ZHI 1, Ding HONGWEI 2, Liu LONGJUN 3, Bao LIYONG 4,
More informationPULSE: A MAC Protocol for RFID Networks
PULSE: A MAC Protocol for RFID Networks Shailesh M. Birari and Sridhar Iyer K. R. School of Information Technology Indian Institute of Technology, Powai, Mumbai, India 400 076. (e-mail: shailesh,sri@it.iitb.ac.in)
More informationCooperation in Random Access Wireless Networks
Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department
More informationMultiple Access CHAPTER 12. Solutions to Review Questions and Exercises. Review Questions
CHAPTER 12 Multiple Access Solutions to Review Questions and Exercises Review Questions 1. The three categies of multiple access protocols discussed in this chapter are random access, controlled access,
More informationDiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers
DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,
More informationA random access protocol assisted by retransmission diversity and energy reuse capabilities
A random access protocol assisted by retransmission diversity and energy reuse capabilities Ramiro Sámano Robles Congresso Portugues da URSI 2014. 28-Nov-2014 Instituto de telecomunicações, Aveiro, Portugal
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer
Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,
More informationWireless Communications Lecture 4: Multiple Access Technologies
Wireless Communications Lecture 4: Multiple Access Technologies Module Representive: Prof. Dr.-Ing. Hans D. Schotten schotten@eit.uni-kl.de Lecturer: Dr. Vincenzo Sciancalepore vincenzo.sciancalepore@neclab.eu
More informationImproving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques
1 Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques Ju-Yen Hung and Venkatesh Sarangan *, MSCS 219, Computer Science Department, Oklahoma State University, Stillwater,
More informationLecture 8 Mul+user Systems
Wireless Communications Lecture 8 Mul+user Systems Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 Outline Multiuser Systems (Chapter 14 of Goldsmith
More informationWireless Intro : Computer Networking. Wireless Challenges. Overview
Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional
More informationCOM-405 Mobile Networks. Module A (Part A2) Introduction
COM-405 Mobile Networks Module A (Part A2) Introduction Prof. JP Hubaux http://mobnet.epfl.ch Note: some of the slides of this and other modules and derived from Schiller s book 1 Modulation and demodulation
More informationDepartment of Computer Science and Engineering. CSE 3213: Communication Networks (Fall 2015) Instructor: N. Vlajic Date: Dec 13, 2015
Department of Computer Science and Engineering CSE 3213: Communication Networks (Fall 2015) Instructor: N. Vlajic Date: Dec 13, 2015 Final Examination Instructions: Examination time: 180 min. Print your
More informationKybernetika. Ioannis E. Pountourakis Performance of multichannel multiaccess protocols with receiver collisions
Kybernetika Ioannis E. Pountourakis Performance of multichannel multiaccess protocols with receiver collisions Kybernetika, Vol. 33 (1997), No. 5, 547--555 Persistent URL: http://dml.cz/dmlcz/125392 Terms
More informationDynamic Framed Slotted ALOHA Algorithms using Fast Tag Estimation Method for RFID System
Dynamic Framed Slotted AOHA Algorithms using Fast Tag Estimation Method for RFID System Jae-Ryong Cha School of Electrical and Computer Engineering Ajou Univ., Suwon, Korea builder@ajou.ac.kr Jae-Hyun
More informationMedium Access Schemes
Medium Access Schemes Winter Semester 2010/11 Integrated Communication Systems Group Ilmenau University of Technology Media Access: Motivation The problem: multiple users compete for a common, shared resource
More informationPreamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks
Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks Abdelmalik Bachir, Martin Heusse, and Andrzej Duda Grenoble Informatics Laboratory, Grenoble, France Abstract. In preamble
More informationThe Long Range Wide Area Network - LoraWAN
Politecnico di Milano Advanced Network Technologies Laboratory The Long Range Wide Area Network - LoraWAN https://www.lora-alliance.org/ 1 Lang Range Communication Technologies Wi-Fi HaLow 2 Cellular IoT
More informationBlock diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E
Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY Srihari Adireddy, Student Member, IEEE, and Lang Tong, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY 2005 537 Exploiting Decentralized Channel State Information for Random Access Srihari Adireddy, Student Member, IEEE, and Lang Tong, Fellow,
More informationAnalyzing Split Channel Medium Access Control Schemes
IEEE TRANS. ON WIRELESS COMMNICATIONS, TO APPEAR Analyzing Split Channel Medium Access Control Schemes Jing Deng, Member, IEEE, Yunghsiang S. Han, Member, IEEE, and Zygmunt J. Haas, Senior Member, IEEE
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY
More information3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011
3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla
More informationNovel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor
2615 PAPER Special Section on Wide Band Systems Novel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor Wataru HORIE a) and Yukitoshi SANADA b), Members SUMMARY In this paper, a novel
More informationPerformance of ALOHA and CSMA in Spatially Distributed Wireless Networks
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More informationTransmission Scheduling in Capture-Based Wireless Networks
ransmission Scheduling in Capture-Based Wireless Networks Gam D. Nguyen and Sastry Kompella Information echnology Division, Naval Research Laboratory, Washington DC 375 Jeffrey E. Wieselthier Wieselthier
More informationMultiple Access Schemes
Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many
More informationComputational Complexity of Multiuser. Receivers in DS-CDMA Systems. Syed Rizvi. Department of Electrical & Computer Engineering
Computational Complexity of Multiuser Receivers in DS-CDMA Systems Digital Signal Processing (DSP)-I Fall 2004 By Syed Rizvi Department of Electrical & Computer Engineering Old Dominion University Outline
More informationStructure of the Lecture
Structure of the Lecture Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Channels in a frequency band Static medium access methods Flexible medium access methods Chapter 3 Wireless
More informationMultiple MAC Protocols Selection Strategies. Presented by Chen-Hsiang Feng
Multiple MAC Protocols Selection Strategies Presented by Chen-Hsiang Feng Outline Motivation and Goal Simulation Environment MAC Selection Strategies Conclusions Motivation Today's devices have multiple
More informationA Common Control Channel Transmission Based on Contention and Reservation for Signaling and Data in W- CDMA System
A Common Control Channel Transmission Based on Contention and Reservation for Signaling and Data in W- CDMA System ttt Seong-Soo Parkt, Dong-Ho Chott, Young-Jae Songttt t Dept. of Mobile Network, ETR,
More informationNetwork Management System for Telecommunication and Internet Application
Network Management System for Telecommunication and Internet Application Gerd Bumiller GmbH Unterschlauersbacher-Hauptstr. 10, D-906 13 Groahabersdorf, Germany Phone: +49 9105 9960-51, Fax: +49 9105 9960-19,
More informationMAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical
Standby Energy [digitalstrom.org] MAC Theory Chapter 7 0 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy lost Make electricity smart cheap networking (over
More informationMAC Theory. Chapter 7
MAC Theory Chapter 7 Ad Hoc and Sensor Networks Roger Wattenhofer 7/1 Standby Energy [digitalstrom.org] 10 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification
Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,
More informationCalculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme
Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme Chin Keong Ho Eindhoven University of Technology Elect. Eng. Depart., SPS Group PO Box 513, 56 MB Eindhoven The Netherlands
More informationTIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS
TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering
More informationA Cross-Layer Cooperative Schema for Collision Resolution in Data Networks
A Cross-Layer Cooperative Schema for Collision Resolution in Data Networks Bharat Sharma, Shashidhar Ram Joshi, Udaya Raj Dhungana Department of Electronics and Computer Engineering, IOE, Central Campus,
More informationWi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering
Wi-Fi Wireless Fidelity Spread Spectrum CSMA Ad-hoc Networks Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Outline for Today We learned how to setup a WiFi network. This
More informationAlert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks
Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks Vinod Namboodiri Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA vnambood@ecs.umass.edu
More informationStochastic Modelling for Wireless Communication Networks-Multiple Access Methods.
Stochastic Modelling for Wireless Communication etworks-multiple Access Methods. By Hassan KHALIL U.U.D.M. Project Report 2003: **** Examensarbete i matematisk statistik 20 poäng Handledare och examinator:
More informationEnergy-Efficient Communication Protocol for Wireless Microsensor Networks
Energy-Efficient Communication Protocol for Wireless Microsensor Networks Wendi Rabiner Heinzelman Anatha Chandrasakan Hari Balakrishnan Massachusetts Institute of Technology Presented by Rick Skowyra
More informationUltra-Low Duty Cycle MAC with Scheduled Channel Polling
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation
More informationMultiple Access System
Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same
More informationLower Layers PART1: IEEE and the ZOLERTIA Z1 Radio
Slide 1 Lower Layers PART1: IEEE 802.15.4 and the ZOLERTIA Z1 Radio Jacques Tiberghien Kris Steenhaut Remark: all numerical data refer to the parameters defined in IEEE802.15.4 for 32.5 Kbytes/s transmission
More informationAnnouncements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm
Announcements Reading Today: 4.1 & 4.2 (skip 4.2.4 and 4.2.5) Second Midterm: Tuesday Apri 15 covers materia from chapters: 1-3, 5-6 emphasis on materia since ast midterm CMSC 417 - S97 (ect 18) copyright
More informationAnalysis of Random Access Protocol and Channel Allocation Schemes for Service Differentiation in Cellular Networks
Eleventh LACCEI Latin American and Cariean Conference for Engineering and Technology (LACCEI 2013) Innovation in Engineering, Technology and Education for Competitiveness and Prosperity August 14-16, 2013
More informationPolitecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Physical layer. Fundamentals of Communication Networks
Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione Physical layer Fundamentals of Communication Networks 1 Disclaimer o The basics of signal characterization (in time and frequency
More informationReliable and Efficient RFID Networks
Reliable and Efficient RFID Networks Jue Wang with Haitham Hassanieh, Dina Katabi, Piotr Indyk Machine Generated Data RFID will be a major source of such traffic In Oil & Gas about 30% annual growth rate
More informationCoordination-free Repeater Groups in Wireless Sensor Networks Andreas Willig
Technical University Berlin Telecommunication Networks Group Coordination-free Repeater Groups in Wireless Sensor Networks Andreas Willig awillig@tkn.tu-berlin.de Berlin, August 2006 TKN Technical Report
More informationOn the Effects of Node Density and Duty Cycle on Energy Efficiency in Underwater Networks
On the Effects of Node Density and Duty Cycle on Energy Efficiency in Underwater Networks Francesco Zorzi, Milica Stojanovic and Michele Zorzi Dipartimento di Ingegneria dell Informazione, Università degli
More informationIN wireless communication networks, Medium Access Control
IEEE TRANSACTIONS ON WIRELESS COMMNICATIONS, VOL. 5, NO. 5, MAY 6 967 Analyzing Split Channel Medium Access Control Schemes Jing Deng, Member, IEEE, Yunghsiang S. Han, Member, IEEE, and Zygmunt J. Haas,
More informationJinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li. Heilongjiang University Georgia State University
Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li Heilongjiang University Georgia State University Outline Introduction Protocols Design Theoretical Analysis Performance Evaluation Conclusions
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationSC - Single carrier systems One carrier carries data stream
Digital modulation SC - Single carrier systems One carrier carries data stream MC - Multi-carrier systems Many carriers are used for data transmission. Data stream is divided into sub-streams and each
More informationThe Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks
The Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks Jon Even Corneliussen Master of Science in Electronics Submission date: June 2009 Supervisor: Geir Egil Øien, IET Co-supervisor:
More informationWireless Transmission & Media Access
Wireless Transmission & Media Access Signals and Signal Propagation Multiplexing Modulation Media Access 1 Significant parts of slides are based on original material by Prof. Dr.-Ing. Jochen Schiller,
More informationChannel Sensing Order in Multi-user Cognitive Radio Networks
2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering
More informationCRMA: Collision-Resistant Multiple Access
CRMA: Collision-Resistant Multiple Access Tianji Li 1,2 Mi Kyung Han 1 Apurv Bhartia 1 Lili Qiu 1 Eric Rozner 1 Yin Zhang 1 Brad Zarikoff 2 The University of Texas at Austin 1, National University of Ireland
More informationT325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.
T305 T325 B BLOCK 3 4 PART III T325 Summary Session 11 Block III Part 3 Access & Modulation [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Prepared by:
More informationLecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday
Lecture 7: Centralized MAC protocols Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday Centralized MAC protocols Previous lecture contention based MAC protocols, users decide who transmits when in a decentralized
More informationLTE in Unlicensed Spectrum
LTE in Unlicensed Spectrum Prof. Geoffrey Ye Li School of ECE, Georgia Tech. Email: liye@ece.gatech.edu Website: http://users.ece.gatech.edu/liye/ Contributors: Q.-M. Chen, G.-D. Yu, and A. Maaref Outline
More informationCarrier Sensing based Multiple Access Protocols for Cognitive Radio Networks
Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks Shao-Yu Lien, Chih-Cheng Tseng, and Kwang-Cheng Chen Abstract Cognitive radio (CR) dynamically accessing inactive radio spectrum
More informationIntroduction to Mobile Computing The rapidly expanding technology of cellular communication, wireless LANs, and satellite services will make information accessible anywhere and at any time. Regardless
More informationCross Layer Design for Localization in Large-Scale Underwater Sensor Networks
Sensors & Transducers, Vol. 64, Issue 2, February 204, pp. 49-54 Sensors & Transducers 204 by IFSA Publishing, S. L. http://www.sensorsportal.com Cross Layer Design for Localization in Large-Scale Underwater
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense
More informationIlenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello
Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative
More informationThroughput-optimal number of relays in delaybounded multi-hop ALOHA networks
Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless
More informationModule 3: Physical Layer
Module 3: Physical Layer Dr. Associate Professor of Computer Science Jackson State University Jackson, MS 39217 Phone: 601-979-3661 E-mail: natarajan.meghanathan@jsums.edu 1 Topics 3.1 Signal Levels: Baud
More informationUltra-Low Duty Cycle MAC with Scheduled Channel Polling
USC/ISI Technical Report ISI-TR-64, July 25. This report is superseded by a later version published at ACM SenSys 6. 1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann
More informationCompressed Sensing for Multiple Access
Compressed Sensing for Multiple Access Xiaodai Dong Wireless Signal Processing & Networking Workshop: Emerging Wireless Technologies, Tohoku University, Sendai, Japan Oct. 28, 2013 Outline Background Existing
More informationExercise Data Networks
(due till January 19, 2009) Exercise 9.1: IEEE 802.11 (WLAN) a) In which mode of operation is this network in? b) Why is the start of the back-off timers delayed until the DIFS contention phase? c) How
More information