Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Size: px
Start display at page:

Download "Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks"

Transcription

1 Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

2 Building An Internet of Things System Assumptions Sensor Networks and The Internet of Things The Internet of Things envisions a world where everyday items have radios items communicate information this information makes our devices smart Our world has a lot of things in it If everything has a radio, could we hear anything over the noise? Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

3 Building An Internet of Things System Assumptions What Will These Networks Look Like? A warehouse is an example of a very dense deployment. 100s of item palettes. 1000s of individual items. Transmitters must be small inexpensive long lifetime Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

4 Building An Internet of Things System Assumptions Realistic Network Assumptions One-hop many-to-one topology is most practical Periodic packets Data streams vital, not single packets Energy constrained Short packets, ID + sensor data Control packets costly As many packets per second as possible (throughput) Not 100% delivery success All sensors must be heard within a time window Splitting a network into groups of clusters and cluster heads is practical. Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

5 Wireless Communication Protocols Let s Rethink Our Communication Protocol CSMA Uses receiver, reduces lifetimes Works poorly with small packets TDMA Control packet overhead reduces lifetimes No-Receiver Protocols Long lifetimes High throughput with short packets Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

6 Using Multiple Receivers Strategies Further Improving Scalability We have Power-efficient hardware Power-efficient protocols We need more capacity Even 100% efficient channel usage might not be enough We can add more channels This seems natural - use more receivers, increase capacity Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

7 Using Multiple Receivers Strategies We Know That Multiple Channels Increase Packet Throughput Regardless of the protocol Requires multiple receivers simultaneously operating on different frequencies Cellular networks Y-MAC Multichannel L-MAC Are multiple channels the most effective use of multiple receivers? Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

8 Using Multiple Receivers Strategies Multiple Receivers Can Increase Throughput in Several Ways On multiple channels (spectral diversity) Reduces contention and collisions On a single channel Packet combining is error correcting Only helps with errors from noise Increasing the capture effect (spatial diversity) Packets are received despite collisions Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

9 Using Multiple Receivers The Capture Effect Capturing Packets in a Collision Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

10 Using Multiple Receivers The Capture Effect Capturing Packets in a Collision Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

11 Using Multiple Receivers The Capture Effect Capturing Packets in a Collision Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

12 Using Multiple Receivers The Capture Effect Capturing Packets in a Collision Spatial diversity increases capture gains! Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

13 Using Multiple Receivers The Capture Effect Capture is not Solely Dependent Upon Relative RSS Reception also depends upon the relative timing of packets. A clean packet is split into three segments: Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

14 Using Multiple Receivers The Capture Effect Capture is not Solely Dependent Upon Relative RSS Interference in the data segment causes bit errors Same as on a noisy channel Error correction techniques can be used Will be received correctly if interference is weak Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

15 Using Multiple Receivers The Capture Effect Capture is not Solely Dependent Upon Relative RSS Interference during the sync word can cause receivers to miss the packet Error correction techniques still work on the data segment Interference must be weaker so that the sync can be properly decoded Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

16 Using Multiple Receivers The Capture Effect Capture is not Solely Dependent Upon Relative RSS With the preamble corrupted the receiver will have trouble distinguishing one packet from the other Otherwise this is similar to when the sync and data have interference. Will only be decoded if interfering packet is much weaker Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

17 Using Multiple Receivers The Capture Effect Capture is not Solely Dependent Upon Relative RSS If the interfering packet began transmitting first different problems occur The interfering packet has the receiver s attention Our packet will be ignored regardless of its relative signal strength A technique known as Message in Message (MiM) can improve this slightly Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

18 Testing the Capture Effect Tests to Quantify Capture Effect Gains Hardware Two wire-synchronized transmitters Two receivers for MiM Radio MHz 10 byte packet lasting 300 microseconds One transmitter varies its power over time Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

19 Testing the Capture Effect Observed Capture Rates (1-3) Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

20 Testing the Capture Effect MiM Helps Some Collision Types (4-5) Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

21 Testing the Capture Effect Combined Capture Probability Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

22 Testing the Capture Effect Predicting the Capture Effect How Often Does Capture Occur in Real Situations? We have the capture probability given relative signal strength Need the probability of different relative signal strengths Assume that transmitters are uniformly distributed Assume attenuation is a constant 1/r α Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

23 Testing the Capture Effect Capture with Two Transmitters Predicting the Capture Effect P capture with two transmitters can be described in terms of Transmitter to receiver distances L 1 and L 2 The attenuation over the distance between L 1 and L 1, = L 1 L 2 The relative distance for capture to occur, c Conversion from db to relative distance for c is: c = 10 /10α P capture = P (L 1 L 2 c) Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

24 Testing the Capture Effect Predicting the Capture Effect Capture with Many Transmitters We are assuming a uniform distribution for transmitters a is the minimum distance from the receiver to the transmitters If the receiver is mixed in with the transmitters then a = 0 b is the maximum distance from the receiver to the transmitters Integrate over the uniform pdf in the interval [a, b] to find the probability of the distance ratio c. Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

25 Testing the Capture Effect Predicting the Capture Effect Capture with Many Transmitters Integrating we get: b 1 1 b a a b a ( 1 cb 2 = (b a) 2 2 a = c 2 cx dy dx ab ca2 2 + a2 if a = 0. (1) Now we can evaluate how this impacts system performance. ) Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

26 Reaping the Benefits Collisions How Often do Collisions Occur? Sensors are transmit only Packet duration is δ seconds Periodic transmission every τ seconds Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

27 Reaping the Benefits Collisions How Often do Collisions Occur? Sensors are transmit only Packet duration is δ seconds Periodic transmission every τ seconds P 2 way collision = 2δ τ (2) P (collision N transmitters) = 1 P (no collision) N 1 = 1 (1 2δ τ )N 1 (3) Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

28 Reaping the Benefits Spatial Vs. Spectral Diversity Comparing Spectral and Spatial Diversity N transmitters C channels M receivers per channel With a single channel we have P no capture = (1 P capture ) M If transmitters are evenly divided between channels then P collision loss = 1 (1 P no capture (2δ/τ)) N/C 1 Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

29 Reaping the Benefits Spatial Vs. Spectral Diversity Comparing Spectral and Spatial Diversity Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

30 Reaping the Benefits Experimental Validation Experimental Validation 7 meter square testing area 100 transmitters in a uniform random distribution 8 receivers, each with a redundant receiver µsecond packets per second per sensor Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

31 Reaping the Benefits Experiment and Theory Agree Experimental Validation Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

32 Reaping the Benefits Experimental Validation Spatial Diversity Wins, Even Without MiM Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

33 Conclusions Reaping the Benefits Experimental Validation Multiple receivers on a single channel can outperform a system with the same number of receivers on multiple channels Once a certain number of receivers are used Especially in high attenuation environments Especially when packets are short Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

34 References Reaping the Benefits Experimental Validation Firner, B.; Xu, C.; Howard, R; Zhang, Y. Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks. MobiHoc 10, pp , September 20-24, Firner, B.; Jadhav, P.; Zhang, Y.; Howard, R.; Trappe, W.; Fenson, E. Towards Continuous Asset Tracking: Low-Power Communication and Fail-Safe Presence Assurance. Sensor, Mesh and Ad Hoc Communications and Networks, SECON 09. 6th Annual IEEE Communications Society Conference on, vol., no., pp.1-9, June 2009 Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

35 Reaping the Benefits Message In Message Brief Introduction to Message in Message Picture two transmitters and a receiver. Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

36 Reaping the Benefits Message In Message Brief Introduction to Message in Message Transmitter A begins sending a packet and the receiver starts decoding it. Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

37 Reaping the Benefits Message In Message Brief Introduction to Message in Message Without MiM: 1 Transmitter B begins transmitting a packet 2 A s packet (currently being decoded) is corrupted 3 B s packet is missed - the receiver was busy with A s packet. Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

38 Reaping the Benefits Message In Message Brief Introduction to Message in Message With MiM: 1 Transmitter B begins transmitting a packet 2 A s packet is corrupted. Simultaneously, the receiver begins decoding B s packet. 3 B s packet is decoded normally. Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

39 Reaping the Benefits Message In Message We Can Emulate Message in Message MiM is only found in some Wi-Fi devices. We can emulate it in sensor networks with the CC1100 Wire two radios together Switch to the redundant receiver when the first begins receiving a packet The redundant receiver decodes previously missed packets Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

40 Reaping the Benefits Spatial Vs. Spectral Diversity Comparing Spectral and Spatial Diversity Bernhard Firner (Winlab) Multiple Receiver Strategies May 10, / 29

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Loss in Dense Sensor Networks Bernhard Firner, Chenren Xu, Richard Howard, and Yanyong Zhang Dept. of Electrical and Computer Engineering, Rutgers, the State

More information

TRANSMIT ONLY FOR DENSE WIRELESS NETWORKS

TRANSMIT ONLY FOR DENSE WIRELESS NETWORKS TRANSMIT ONLY FOR DENSE WIRELESS NETWORKS by BERNHARD FIRNER A dissertation submitted to the Graduate School New Brunswick Rutgers, The State University of New Jersey in partial fulfillment of the requirements

More information

Detecting Intra-Room Mobility with Signal Strength Descriptors

Detecting Intra-Room Mobility with Signal Strength Descriptors Detecting Intra-Room Mobility with Signal Strength Descriptors Authors: Konstantinos Kleisouris Bernhard Firner Richard Howard Yanyong Zhang Richard Martin WINLAB Background: Internet of Things (Iot) Attaching

More information

SCPL: Indoor Device-Free Multi-Subject Counting and Localization Using Radio Signal Strength

SCPL: Indoor Device-Free Multi-Subject Counting and Localization Using Radio Signal Strength SCPL: Indoor Device-Free Multi-Subject Counting and Localization Using Radio Signal Strength Rutgers University Chenren Xu Joint work with Bernhard Firner, Robert S. Moore, Yanyong Zhang Wade Trappe, Richard

More information

Partial overlapping channels are not damaging

Partial overlapping channels are not damaging Journal of Networking and Telecomunications (2018) Original Research Article Partial overlapping channels are not damaging Jing Fu,Dongsheng Chen,Jiafeng Gong Electronic Information Engineering College,

More information

Jamming Wireless Networks: Attack and Defense Strategies

Jamming Wireless Networks: Attack and Defense Strategies Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University IAB, Dec. 6 th, 2005 Roadmap Introduction and Motivation Jammer Models

More information

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang WINLAB, Rutgers University IAB 2004 Roadmap Motivation and Introduction

More information

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

UNDERSTANDING AND MITIGATING

UNDERSTANDING AND MITIGATING UNDERSTANDING AND MITIGATING THE IMPACT OF RF INTERFERENCE ON 802.11 NETWORKS RAMAKRISHNA GUMMADI UCS DAVID WETHERALL INTEL RESEARCH BEN GREENSTEIN UNIVERSITY OF WASHINGTON SRINIVASAN SESHAN CMU 1 Presented

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

Energy-Efficient Communication Protocol for Wireless Microsensor Networks

Energy-Efficient Communication Protocol for Wireless Microsensor Networks Energy-Efficient Communication Protocol for Wireless Microsensor Networks Wendi Rabiner Heinzelman Anatha Chandrasakan Hari Balakrishnan Massachusetts Institute of Technology Presented by Rick Skowyra

More information

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop

More information

SourceSync. Exploiting Sender Diversity

SourceSync. Exploiting Sender Diversity SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored

More information

Distributed Beamforming for Safer Wireless Power Transferring

Distributed Beamforming for Safer Wireless Power Transferring Distributed Beamforming for Safer Wireless Power Transferring *, Han Ding**, Sugang Li*, Michael Sanzari*, Yanyong Zhang*, Wade Trappe*, Zhu Han*** and Richard Howard* *Wireless Information Network Laboratory

More information

Multiple Access Schemes

Multiple Access Schemes Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,

More information

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-

More information

Real-time Distributed MIMO Systems. Hariharan Rahul Ezzeldin Hamed, Mohammed A. Abdelghany, Dina Katabi

Real-time Distributed MIMO Systems. Hariharan Rahul Ezzeldin Hamed, Mohammed A. Abdelghany, Dina Katabi Real-time Distributed MIMO Systems Hariharan Rahul Ezzeldin Hamed, Mohammed A. Abdelghany, Dina Katabi Dense Wireless Networks Stadiums Concerts Airports Malls Interference Limits Wireless Throughput APs

More information

CS649 Sensor Networks IP Lecture 9: Synchronization

CS649 Sensor Networks IP Lecture 9: Synchronization CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

StarPlus Hybrid Approach to Avoid and Reduce the Impact of Interference in Congested Unlicensed Radio Bands

StarPlus Hybrid Approach to Avoid and Reduce the Impact of Interference in Congested Unlicensed Radio Bands WHITEPAPER StarPlus Hybrid Approach to Avoid and Reduce the Impact of Interference in Congested Unlicensed Radio Bands EION Wireless Engineering: D.J. Reid, Professional Engineer, Senior Systems Architect

More information

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings

More information

Data Dissemination in Wireless Sensor Networks

Data Dissemination in Wireless Sensor Networks Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks

More information

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE. Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18

More information

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

ZigBee Propagation Testing

ZigBee Propagation Testing ZigBee Propagation Testing EDF Energy Ember December 3 rd 2010 Contents 1. Introduction... 3 1.1 Purpose... 3 2. Test Plan... 4 2.1 Location... 4 2.2 Test Point Selection... 4 2.3 Equipment... 5 3 Results...

More information

Cellular systems 02/10/06

Cellular systems 02/10/06 Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from

More information

Wireless in the Real World. Principles

Wireless in the Real World. Principles Wireless in the Real World Principles Make every transmission count E.g., reduce the # of collisions E.g., drop packets early, not late Control errors Fundamental problem in wless Maximize spatial reuse

More information

Spectrum Sensing Brief Overview of the Research at WINLAB

Spectrum Sensing Brief Overview of the Research at WINLAB Spectrum Sensing Brief Overview of the Research at WINLAB P. Spasojevic IAB, December 2008 What to Sense? Occupancy. Measuring spectral, temporal, and spatial occupancy observation bandwidth and observation

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks.

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. Sanjit Kaul and Marco Gruteser WINLAB, Rutgers University. Ryokichi Onishi and Rama Vuyyuru Toyota InfoTechnology Center. ICVES 08 Sep 24 th

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

Wireless TDMA Mesh Networks

Wireless TDMA Mesh Networks Wireless TDMA Mesh Networks Vinay Ribeiro Department of Computer Science and Engineering IIT Delhi Outline What are mesh networks Applications of wireless mesh Quality-of-service Design and development

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

LoRa Scalability: A Simulation Model Based on Interference Measurements

LoRa Scalability: A Simulation Model Based on Interference Measurements sensors Article LoRa Scalability: A Simulation Model Based on Interference Measurements Jetmir Haxhibeqiri *, Floris Van den Abeele, Ingrid Moerman and Jeroen Hoebeke Department of Information Technology,

More information

Mathematical Problems in Networked Embedded Systems

Mathematical Problems in Networked Embedded Systems Mathematical Problems in Networked Embedded Systems Miklós Maróti Institute for Software Integrated Systems Vanderbilt University Outline Acoustic ranging TDMA in globally asynchronous locally synchronous

More information

Point to Multipoint Topologies

Point to Multipoint Topologies Today wireless ISPs are at a critical juncture, on one hand the demand for internet and wireless applications is undergoing exponential growth, while on the other hand the spectrum crunch is turning out

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

2.4GHz & 900MHz UNLICENSED SPECTRUM COMPARISON A WHITE PAPER BY INGENU

2.4GHz & 900MHz UNLICENSED SPECTRUM COMPARISON A WHITE PAPER BY INGENU 2.4GHz & 900MHz UNLICENSED SPECTRUM COMPARISON A WHITE PAPER BY INGENU 2.4 GHZ AND 900 MHZ UNLICENSED SPECTRUM COMPARISON Wireless connectivity providers have to make many choices when designing their

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks

Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks Abdelmalik Bachir, Martin Heusse, and Andrzej Duda Grenoble Informatics Laboratory, Grenoble, France Abstract. In preamble

More information

Revisiting Neighbor Discovery with Interferences Consideration

Revisiting Neighbor Discovery with Interferences Consideration Author manuscript, published in "3rd ACM international workshop on Performance Evaluation of Wireless Ad hoc, Sensor and Ubiquitous Networks (PEWASUN ) () 7-1" DOI : 1.115/1131.1133 Revisiting Neighbor

More information

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Wi-Fi Wireless Fidelity Spread Spectrum CSMA Ad-hoc Networks Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Outline for Today We learned how to setup a WiFi network. This

More information

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks

More information

Wireless Sensor Networks

Wireless Sensor Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless

More information

Mobile Communications

Mobile Communications COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

SIGNIFICANT advances in hardware technology have led

SIGNIFICANT advances in hardware technology have led IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 5, SEPTEMBER 2007 2733 Concentric Anchor Beacon Localization Algorithm for Wireless Sensor Networks Vijayanth Vivekanandan and Vincent W. S. Wong,

More information

Multihop Routing in Ad Hoc Networks

Multihop Routing in Ad Hoc Networks Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline

More information

Automatic power/channel management in Wi-Fi networks

Automatic power/channel management in Wi-Fi networks Automatic power/channel management in Wi-Fi networks Jan Kruys Februari, 2016 This paper was sponsored by Lumiad BV Executive Summary The holy grail of Wi-Fi network management is to assure maximum performance

More information

Vidyut: Exploiting Power Line Infrastructure for Enterprise Wireless Networks. Vivek Yenamandra and Kannan Srinivasan

Vidyut: Exploiting Power Line Infrastructure for Enterprise Wireless Networks. Vivek Yenamandra and Kannan Srinivasan Vidyut: Exploiting Power Line Infrastructure for Enterprise Wireless Networks Vivek Yenamandra and Kannan Srinivasan Motivation Increasing demand for wireless capacity Proliferation of BYOD in workplaces

More information

IEEE C802.16a-02/94r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16a-02/94r1. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group OFDM sub-channelization improvement and system performance selected topics 2002-11-14 Source(s)

More information

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted

More information

Addressing Repeatability in Wireless Experiments using ORBIT Testbed

Addressing Repeatability in Wireless Experiments using ORBIT Testbed Addressing Repeatability in Wireless Experiments using ORBIT Testbed Sachin Ganu, Haris Kremo, Richard Howard 1 and Ivan Seskar WINLAB, Rutgers University, 73 Brett Road, Piscataway, NJ 08854 {sachin,

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

LTE Direct Overview. Sajith Balraj Qualcomm Research

LTE Direct Overview. Sajith Balraj Qualcomm Research MAY CONTAIN U.S. AND INTERNATIONAL EXPORT CONTROLLED INFORMATION This technical data may be subject to U.S. and international export, re-export, or transfer ( export ) laws. Diversion contrary to U.S.

More information

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference

More information

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:

More information

Mesh Networks with Two-Radio Access Points

Mesh Networks with Two-Radio Access Points 802.11 Mesh Networks with Two-Radio Access Points Jing Zhu Sumit Roy jing.z.zhu@intel.com roy@ee.washington.edu Communications Technology Lab Dept. of Electrical Engineering Intel Corporation, 2111 NE

More information

Designing Reliable Wi-Fi for HD Delivery throughout the Home

Designing Reliable Wi-Fi for HD Delivery throughout the Home WHITE PAPER Designing Reliable Wi-Fi for HD Delivery throughout the Home Significant Improvements in Wireless Performance and Reliability Gained with Combination of 4x4 MIMO, Dynamic Digital Beamforming

More information

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer

More information

Fast and efficient randomized flooding on lattice sensor networks

Fast and efficient randomized flooding on lattice sensor networks Fast and efficient randomized flooding on lattice sensor networks Ananth Kini, Vilas Veeraraghavan, Steven Weber Department of Electrical and Computer Engineering Drexel University November 19, 2004 presentation

More information

LoRaWAN. All of the gateways in a network communicate to the same server, and it decides which gateway should respond to a given transmission.

LoRaWAN. All of the gateways in a network communicate to the same server, and it decides which gateway should respond to a given transmission. LoRaWAN All of the gateways in a network communicate to the same server, and it decides which gateway should respond to a given transmission. Any end device transmission can be heard by multiple receivers,

More information

Evaluation of HIPERLAN/2 Scalability for Mobile Broadband Systems

Evaluation of HIPERLAN/2 Scalability for Mobile Broadband Systems Evaluation of HIPERLAN/2 Scalability for Mobile Broadband Systems Ken ichi Ishii 1) A. H. Aghvami 2) 1) Networking Laboratories, NEC 4-1-1, Miyazaki, Miyamae-ku, Kawasaki 216-8, Japan Tel.: +81 ()44 86

More information

Funneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks

Funneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks Funneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks Gahng-Seop Ahn, Emiliano Miluzzo, Andrew T. Campbell Se Gi Hong, Francesca Cuomo EE Dept., Columbia University CS

More information

SMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks. COMP Paper Presentation Junhua Yan Nov.

SMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks. COMP Paper Presentation Junhua Yan Nov. SMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks COMP635 -- Paper Presentation Junhua Yan Nov. 28, 2017 1 Reliable Transmission in Wireless Network Transmit at the lowest

More information

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Giuseppe Anastasi Pervasive Computing & Networking Lab () Dept. of Information Engineering, University of Pisa E-mail:

More information

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,

More information

Mobile Positioning in Wireless Mobile Networks

Mobile Positioning in Wireless Mobile Networks Mobile Positioning in Wireless Mobile Networks Peter Brída Department of Telecommunications and Multimedia Faculty of Electrical Engineering University of Žilina SLOVAKIA Outline Why Mobile Positioning?

More information

Distance-Aware Virtual Carrier Sensing for Improved Spatial Reuse in Wireless Networks

Distance-Aware Virtual Carrier Sensing for Improved Spatial Reuse in Wireless Networks Distance-Aware Virtual Carrier Sensing for mproved Spatial Reuse in Wireless Networks Fengji Ye and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic nstitute Troy, New York 8 Abstract n this paper

More information

On the Effects of Node Density and Duty Cycle on Energy Efficiency in Underwater Networks

On the Effects of Node Density and Duty Cycle on Energy Efficiency in Underwater Networks On the Effects of Node Density and Duty Cycle on Energy Efficiency in Underwater Networks Francesco Zorzi, Milica Stojanovic and Michele Zorzi Dipartimento di Ingegneria dell Informazione, Università degli

More information

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Nithin Sugavanam, C. Emre Koksal, Atilla Eryilmaz Department of Electrical and Computer Engineering The Ohio State

More information

Active RFID System with Wireless Sensor Network for Power

Active RFID System with Wireless Sensor Network for Power 38 Active RFID System with Wireless Sensor Network for Power Raed Abdulla 1 and Sathish Kumar Selvaperumal 2 1,2 School of Engineering, Asia Pacific University of Technology & Innovation, 57 Kuala Lumpur,

More information

The Armstrong Project Technical Report

The Armstrong Project Technical Report The Armstrong Project Technical Report : A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks Gahng-Seop Ahn, Emiliano Miluzzo, Andrew T. Campbell, Se Gi Hong, and Francesca Cuomo CU/EE/TAP-TR-26-8-3

More information

Location Enhancement to IEEE DCF

Location Enhancement to IEEE DCF Location Enhancement to IEEE 82.11 DCF Tamer Nadeem, Lusheng Ji, Ashok Agrawala, Jonathan Agre Department of Computer Science University of Maryland, College Park, MD 2742 {nadeem, agrawala}@cs.umd.edu

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 181 A NOVEL RANGE FREE LOCALIZATION METHOD FOR MOBILE SENSOR NETWORKS Anju Thomas 1, Remya Ramachandran 2 1

More information

1 Interference Cancellation

1 Interference Cancellation Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.

More information

Cricket: Location- Support For Wireless Mobile Networks

Cricket: Location- Support For Wireless Mobile Networks Cricket: Location- Support For Wireless Mobile Networks Presented By: Bill Cabral wcabral@cs.brown.edu Purpose To provide a means of localization for inbuilding, location-dependent applications Maintain

More information

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University Computer Networks Week 03 Founda(on Communica(on Concepts College of Information Science and Engineering Ritsumeikan University Agenda l Basic topics of electromagnetic signals: frequency, amplitude, degradation

More information

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation

More information

Link Activation with Parallel Interference Cancellation in Multi-hop VANET

Link Activation with Parallel Interference Cancellation in Multi-hop VANET Link Activation with Parallel Interference Cancellation in Multi-hop VANET Meysam Azizian, Soumaya Cherkaoui and Abdelhakim Senhaji Hafid Department of Electrical and Computer Engineering, Université de

More information

SC - Single carrier systems One carrier carries data stream

SC - Single carrier systems One carrier carries data stream Digital modulation SC - Single carrier systems One carrier carries data stream MC - Multi-carrier systems Many carriers are used for data transmission. Data stream is divided into sub-streams and each

More information

Adaptive Modulation, Adaptive Coding, and Power Control for Fixed Cellular Broadband Wireless Systems: Some New Insights 1

Adaptive Modulation, Adaptive Coding, and Power Control for Fixed Cellular Broadband Wireless Systems: Some New Insights 1 Adaptive, Adaptive Coding, and Power Control for Fixed Cellular Broadband Wireless Systems: Some New Insights Ehab Armanious, David D. Falconer, and Halim Yanikomeroglu Broadband Communications and Wireless

More information

Experimental Analysis of Concurrent Packet Transmissions in Low-Power Wireless Networks

Experimental Analysis of Concurrent Packet Transmissions in Low-Power Wireless Networks Experimental Analysis of Concurrent Packet Transmissions in Low-Power Wireless Networks Dongjin Son,2 Bhaskar Krishnamachari John Heidemann 2 {dongjins, bkrishna}@usc.edu, johnh@isi.edu Department of Electrical

More information

Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios

Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios Roberto Hincapie, Li Zhang, Jian Tang, Guoliang Xue, Richard S. Wolff and Roberto Bustamante Abstract Cognitive radios allow

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,

More information

SoftBank Japan - rapid small cell deployment in the urban jungle

SoftBank Japan - rapid small cell deployment in the urban jungle Enabling 5G The world s only self-organising microwave backhaul SoftBank Japan - rapid small cell deployment in the urban jungle Urban small cells deployed at street level are the next logical step to

More information

Localization in WSN. Marco Avvenuti. University of Pisa. Pervasive Computing & Networking Lab. (PerLab) Dept. of Information Engineering

Localization in WSN. Marco Avvenuti. University of Pisa. Pervasive Computing & Networking Lab. (PerLab) Dept. of Information Engineering Localization in WSN Marco Avvenuti Pervasive Computing & Networking Lab. () Dept. of Information Engineering University of Pisa m.avvenuti@iet.unipi.it Introduction Location systems provide a new layer

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

On Practical Selective Jamming of Bluetooth Low Energy Advertising

On Practical Selective Jamming of Bluetooth Low Energy Advertising On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,

More information

Channel Deployment Issues for 2.4-GHz WLANs

Channel Deployment Issues for 2.4-GHz WLANs Channel Deployment Issues for 2.4-GHz 802.11 WLANs Contents This document contains the following sections: Overview, page 1 802.11 RF Channel Specification, page 2 Deploying Access Points, page 5 Moving

More information

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Anand Prabhu Subramanian, Jing Cao 2, Chul Sung, Samir R. Das Stony Brook University, NY, U.S.A. 2

More information

Optimized Asynchronous Multi-channel Neighbor Discovery

Optimized Asynchronous Multi-channel Neighbor Discovery Optimized Asynchronous Multi-channel Neighbor Discovery Niels Karowski TKN/TU-Berlin niels.karowski@tu-berlin.de Aline Carneiro Viana INRIA and TKN/TU-Berlin aline.viana@inria.fr Adam Wolisz TKN/TU-Berlin

More information

G.T. Hill.

G.T. Hill. Making Wi-Fi Suck Less with Dynamic Beamforming G.T. Hill Director, Technical Marketing www.ruckuswireless.com What We ll Cover 802.11n overview and primer Beamforming basics Implementation Lot of Questions

More information

Zippy: On-Demand Network Flooding

Zippy: On-Demand Network Flooding Zippy: On-Demand etwork Flooding Felix utton, Bernhard Buchli, Jan Beutel, and Lothar Thiele enys 2015, eoul, outh Korea, 1 st 4 th ovember 2015 enys 2015 Problem tatement Energy-efficient wireless dissemination

More information