A new MAC protocol with pseudo-TDMA behaviour for supporting Quality of Service in 802.11 Wireless LANs Georgios S. Paschos*, Ioannis Papapanagiotou*, Stavros A. Kotsopoulos* and George K. Karagiannidis† *Wireless Laboratory, University of Patras, Kato Kastritsi, 26500, Greece. e-mail: [email protected], [email protected], [email protected]. †Aristotle University of Thessaloniki, Greece. e-mail: [email protected].

In this paper, a new Medium Access Control (MAC) protocol is proposed for Quality of Service (QoS) support in Wireless Local Area Networks (WLAN). The protocol is an alternative to the recent enhancement 802.11e. A new priority policy provides the system with better performance by simulating TDMA (Time Division Multiple Access) functionality. Collisions are reduced and starvation of low priority classes is prevented by a simple admission control algorithm. The model performance is found analytically extending previous work on this matter. The results show an improvement in overall QoS of the system. Keywords: Medium Access Control, Quality of Service, Wireless Local Area Networks

1. INTRODUCTION

As wireless connectivity rapidly becomes a necessity, new protocols arise in order to cover certain flows of the old ones. In 1999, the first IEEE protocol, 802.11, proposed among other the Distributed Coordination Function (DCF), a means to organize access in a common medium in distributed manner. Five years later, the need for Quality of Service support led to the creation of an improved version called Enhanced Distributed Coordination Function (EDCF) under the 802.11e protocol. In this protocol, high priority applications access the channel with greater probability. [1] and [2] contain thorough description of how this is achieved. However, [3] and [4] showed that in heavy load cases, mobile stations have extremely low probability to transmit low priority traffic when using EDCF, an effect called starvation of low priority applications. The quality of high priority classes is guaranteed in exchange of total surrender of low class quality. Knowledge of 802.11 and 802.11e is assumed in this paper [5], [6]. Thorough overviews of this matter are found in [7] and [1]. The 802.11 protocol utilizes a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) technique. In the Standards, two schemes are defined, Point Coordination Function (PCF) is controlled by a central point called Access Point, whereas Distributed Coordination Function (DCF) the management is distributed in every node of the network. PCF, despite providing better quality, can only be used in infrastructure-based networks and due to synchronization, has proved to be unreliable, [8]. On the other hand, DCF has become the preferred MAC function due to versatility. Great effort has been put into improving the performance of DCF as regards throughput [9], [10], delay, [11], and Quality of Service, [12]. Most of the proposed schemes and algorithms are focused on two settings namely the Arbitrary

InterFrame Spacing (AIFS) and the Contention Window (CW). These settings are used by the Mobile Station in order to differentiate from the rest of the contenders and access the common channel. Multimedia applications have been proved prone to end-to-end and jitter delay, a usual deficiency of packet switched networks. On the other hand, circuit-switched networks offer great quality support for multimedia services but they are abandoned due to their inferiority to packetswitched networks in providing data applications. Research in wireless ATM networks, [13] and [14], have shown that multimedia applications quality can be well-supported in packet switched networks by means of TDMA schemes where an occasional access is guaranteed in one slot of every frame. The proposed model is designed to create a virtual TDMA environment in a system with variable packet length. The virtual timeslots are used in order to offer guaranteed service for high quality classes and a reserved bandwidth for low priority classes by means of an admission algorithm. The model is designed to be backward compatible with the other 802.11 protocols. The rest of the paper is organized as follows. In section 2 and 3 the proposed model is described and evaluated respectively. In section 4, results are presented and in the final section, the conclusion is discussed. 2. SYSTEM MODEL

The proposed model is a compatible enhancement to 802.11e protocol for Quality of Service. The design goal is to offer priority access to Multimedia Classes, to prevent unfairness problem from occurring and guarantee low delay. The model is based on the functionality of a local timer. A virtual frame duration Fd is decided before the operation of the network. Fd can be decided separately for each Physical (PHY) Layer Protocol and statistically defines the duration of a virtual frame that contains virtual timeslots. Since the duration of a virtual timeslot is bound by the Transmit Opportunity (TxOP) property of 802.11e, and the bandwidth and delay requirements of multimedia applications are known by the RTP protocol, the calculation of Fd is relatively easy. An example will be given in the results section. Using this local timer, every mobile station that transmits priority class information can selforganize the manner in which it transmits. Specifically, for priority classes only, figure 1 depicts a state diagram of the MAC functionality. Each state contains different values of AIFS and CW that the station uses to access the channel for this application. It is evident, that during state 1 the application request is in admission condition where it contends with all other requests. After the admission, the station occupies two basic states. In state 2, it refrains from transmission for as long as a Fd counter runs. An interrupt from the timer leads to state 3 where low AIFS and CW guarantee channel access. Certain issues remain to be discussed; the collision between two priority requests, and the admission and blocking issue.

FIGURE 1: State diagram for priority class. 2.1. Collision of two priority requests

Low AIFS and CW values ensure that no collision can occur between a high priority and a low priority class. Collision between low priority calls is on the other hand dealt normally as in DCF. Thus the point of interest is a possible collision between two high priority applications. Specifically, this can only happen between two ongoing calls, since new calls have different MAC settings. Assume Application1 successfully transmits at zero time and Application2 immediately follows after packet duration pd1. When the timer of Application1 expires at Fd, Application1 will try to transmit the next frame. As shown in figure 2, there is a chance that a low priority application may have just started to transmit a full TxOP long packet transmission. Collision between high priority applications can only occur in the case of accumulation of expired timers as in this case. This happens because pd1 will probably be smaller than TxOP and both Application1 and Application2 will be ready for transmission at Fd+TxOP(sec). To avoid such a misfortunate occasion, we define a fourth state (state 4) in which the priority application hops to when it has already waited in state 3 for TxOP(sec)/2. This extra state ensures an order between high priority applications and enables a First-In First-Out (FIFO) functionality of the high priority contention queue. This ensures collision-free behaviour assuming that all transmissions of priority class are longer than TxOP(sec)/2 and no transmission is greater than TxOP(sec)/2. Although, collisions due to MAC protocol are avoided, there is always a chance that the packet is not accepted correctly due to unpredictable behaviour of Wireless environment. In this case, collided packets are assumed lost and are not retransmitted at MAC layer. This UDP-like behaviour is in accordance with the TDMA-like nature of the proposed protocol.

FIGURE 2: Collision between two high priority applications when state 4 is not used. 2.2. Admission and Blocking

The Fd counter implies a fixed virtual frame length. This fixed length is very important for the quality of ongoing transmissions since an increase in the frame would cause a deterministic amount of delay in the system. This, also, implies that an admission strategy is necessary for preventing the system from overloading. Low priority applications are somewhat led through an admission procedure when contending for access with backoff counters. For high priority applications, a statistical admission is used. The call to be admitted senses the channel and makes x attempts to transmit. After x collisions the application becomes blocked. Blocking may also occur from the connection delay before the x retransmissions take place. AIFS setting is set equal to non priority case and CWp is set smaller. The result is that high priority classes are easily admitted when the load is small. As the load increases the blocking probability increases as well. If the remaining virtual slots are few, the connection probability will be very small due to high connection delay. Blocking probability and fairness for non priority class, are governed by x, CWp of State 1 and the number of non priority and priority contending mobiles. Figures 3 and 4 show some results on this matter. As the number of mobile terminals increases connection delay and blocking probability both increases. This increase depends on two separate effects; the available bandwidth and the number of contending mobiles. This is clearly shown in the case of connection delay. Since 14 is the maximum number of possible high priority applications for 1Mbps selected transmission rate [20], from that point and after, connection delay depends only on backoff contention. The analytic approach for blocking probability and connection delay is found in the next section. The values CWp=8 and x=4 are chosen in the rest of the analysis. Small CWp gives priority and smaller connection delay, but results in channel monopoly by the priority class. A large x reduces blocking probability, but it also causes greater connection delay and monopolization of channel.

FIGURE 3: Connection Delay for high priority class, CWp=[4,8,16,32] and x=[2,4,6,8]. Transmission rate is 1Mbps

FIGURE 4: Blocking Probability for high priority class, CWp=[4,8,16,32] and x=[2,4,6,8]. Transmission rate is 1Mbps 3. MATHEMATICAL ANALYSIS 3.1. Analysis for non-priority class

Low priority class is treated separately from high priority since they follow different state transitions. The analysis found in [15], is the basis of the on to be used. In, [15], Ziouva proposed a modified analysis considering freezing backoff counters, while [17], applies the previous on 802.11e. In our analysis we incorporate the recent findings of [18]. In figure 5, the backoff procedure is shown.

FIGURE 5: State diagram for low priority traffic analysis with freezing backoff counters (found also in [18]).

For the solution of the Markov chain we assume that priority application admission procedure has a negligible influence on non priority access. The backoff procedure is normally analyzed and the bandwidth reduction due to priority transmissions is only taken into account in throughput and delay analysis. If bi,j,k is the stationary probability of backoff state i,j,k, we have: b1, j , 0 = ψ jb1, 0, 0 for j ∈ [1,m] 1

1 + p 0(Wj − 1 − k ) ψ jb1, 0, 0 1 − pi b 0, j , k = (Wj − 1 − k )ψ jb1, 0, 0

b1, j , k =

for k ∈ [1,Wj-1] and j ∈ [0,m]

(1)

for k ∈ [0,Wj-2] and j ∈ [0,m] 1 Where Wj=2jW0 and p0 and pi are the probabilities that another station is accessing the channel after an occupied period or an idle period respectively. ψj is: if j = 0, ⎧1 ⎪ ⎪ p0 (W0 − 1) if j = 1, ⎪ W1 ⎪⎪ ψ j = ⎨ p0 (W0 − 1) (2) π j if j = [2, m − 1], ⎪ W1 ⎪ ⎪ p0 (W0 − 1) Wm πj if j = m ⎪ W1 Wm − p1 − p0 (Wm − 1) ⎪⎩ Where πj is: j

π j = ∏[ x=2

p1 p 0 + (Wx − 1 − 1)] Wx Wx

(3)

The sum of all stationary probabilities should be equal to 1: m

∑ ⎡⎣∑ j =0

Wj − 2 k =0

b 0, j , k + ∑ k =0 b1, j , k ⎤ = 1 ⎦ Wj −1

Solving the system of (1)-(4) for b1,0,0 we get: 2 (1 − p1 ) b1,0,0 = m ∑ψ j ⎡⎣( p0 − p1 + 1)W j 2 + ( p1 − 3 p0 + 1)W j + 2 ( p0 − p1 )⎤⎦

(4)

(5)

j =0

We also define the probabilities of accessing the channel after a busy period τb and after an idle period τi: m

∑b

1, j , 0

τb =

j =0

q1 1− 1 − q 0 − q1

(6)

m

τi =

∑b

0, j , 0

j =0

(7)

q1 1 − q 0 − q1

The probabilities of an idle (busy) slot after a busy period q0 (p0)and after an idle period q1 (p1) are: q 0 = (1 − τ i ) n (8)

q1 = (1 − τ b) n

(9)

p 0 = 1 − (1 − τ i )n −1 p1 = 1 − (1 − τ b)

n −1

(10)

(11) And the probabilities of idle channel, successful transmission and collision, all defined in a free from priority contention slot are:

q1 1 − q 0 + q1 Ps = nτ i (1 − τ i ) n −1 Pi + nτ b(1 − τ b) n −1 (1 − Pi ) Pi =

(12) (13)

Pc = 1 − Pi − Ps (14) These probabilities are defined as in [18] since they are valid only for the proportion of bandwidth left free from high priority access called 1-BWp. BWp is the percentage of resources occupied by priority applications. A simple approach to BWp is: pd (15) BW p = N a Fd Nα is the number of successfully accepted calls to the system and pd is the total duration of a high priority application transmitted packet. Normalized throughput for non priority applications will be: S np =

PsE { P}np (1 − BW p )

( Pi ⋅ aSlotTime + PsTs + PcTc ) (1 − BWp ) + BWp ⋅ pd

and the average delay will be: E { D}np = E { N } ( E {B} + Tc + Ttimeout ) + E {B} + Ts

(16)

(17)

Where E{N} is the average number of retransmissions, E{B} is the average delay between each transmission, E{X} is the delay of backoff slots, E{NF} is the average number of backoff freezing for each transmission and BD is the average number of backoff counters to be reduced until the transmission. Equation (17) can be solved using (18)-(22). p + p1 E {N} = 0 −1 (18) Ps

((

E { B} = E { X } + E { N F } 1 − BW p

)( P T

s s

+ PcTc ) + BW p ⋅ pd

E { X } = BD × aSlotTime

)

(19) (20)

BD (21) −1 max ( ConIdleSlots,1) Where ConIdleSlots is the number of consecutive idle slots between each backoff freezing, defined as: Pi 1 − BW p ConIdleSlots = (22) 1 − Pi 1 − BW p E {N F } =

(

m W j −1

BD = ∑



(

)

m

)

k ⋅ b0, j ,k = b1,0,0 ∑ψ j

(

)(

Wj Wj −1 Wj − 2

)

(23) 3 The average durations of several cases frames Ts and Tc for basic and RTS-CTS access are found in [15] and [19]. Ttimeout is the time after a collision for which the channel is considered occupied. j =0 k =0

j =0

3.2. Analysis for priority class

The throughput and delay analysis for priority class is much simpler than for non priority class as long as the hidden terminal assumption is made. Throughput is given by:

E { P} p

S p = Na

(24) Fd + TxOP / R Where E{P}p is the expected packet length in bits per frame. The average delay will be: TxOP (25) E { D} p = ( FPA − 1) Fd + 2 Where FPA is the packet accumulation factor indicating how many high priority packets are needed to be accumulated in a large packet that is longer than TxOP/2. The first part of the expected delay is a deterministic delay imposed by the packet accumulation. The second part is the expected value of a uniform random variable of how long a priority call may wait in states 3 and 4. Expected delay is independent of the load of the system.

FIGURE 6: State diagram for high priority traffic at admission time.

Connection delay can be found with an analysis similar to EDCF as in [17]. The Markov chain for high priority admission will be a simple chain with CWp different backoff stages with equal probability of selection and the stages for freezing of backoff counter (figure 6). The stationary probabilities are: (26) b0i = CW p − 1 − i b10 , for i ∈ [1,CWp-1]

(

b1i =

)

(

1 + p0p CW p − 1 − i p1p

b00 = b10 Using b00 +

1− CW p − 1

)b

10 ,

for i ∈ [1,CWp-2]

(27) (28)

p0p

CW p − 2

∑ i =1

b0i +

CW p −1

∑ i =1

b1i + b10 = 1 , the stationary probabilities can be calculated: 1

b10 =

(1 − p ) (CW 1+ p 0

p

) + CW ( CW

−1

p

p

) + CW

−1

p

− 1 + p0p

2 p0p The probabilities of channel access for priority admission are: b00 τ ip = ⎛ ⎞ q1p ⎜ p p ⎟ ⎝ 1 − q0 + q1 ⎠ b10 τ bp = ⎛ ⎞ q1p 1 − ⎜ p p ⎟ ⎝ 1 − q0 + q1 ⎠

( CW

p

1 − p1p

)(

− 1 CW p − 2

)

(29)

2

(30)

(31)

Where:

( ) ) (1 − τ )  q

q0p = (1 − τ i ) 1 − τ ip  q0

(32)

q1p = (1 − τ b

(33)

n

n

p b

p0p = 1 − (1 − τ i )

n −1

1

= p0

(34)

p1p = 1 − (1 − τ b ) = p11 (35) Equations (32)-(35) show that the behaviour of admission is very much depended upon low priority access conditions, which in cases of heavy loaded channels prevents the phenomenon of resource starvation of low priority class. Further on, the average number of backoff slots for every connection attempt can be found: CW p − 2 b (36) BD p = ∑ i ⋅ b0i = 10 CW p − 1 CW p − 2 2CW p − 3 6 i =0 The average delay for every attempt to connect will be: ⎛ BD p ⎞ E {CD}1 = BD p ⋅ aSlotTime + ⎜ (37) − 1⎟ PsTs + PcTc + BW p ⋅ pd ⎝ Pi ⎠ The probability to successfully access the channel is: n −1

(

)(

)(

)

(

(

)(

Pap = Pi (1 − τ i ) τ ip + (1 − Pi )(1 − τ b ) τ bp 1 − BW p n

n

)

)

(38)

The average connection delay, disregarding the calls that will drop due to extensive delay, is: x

(

E {CD} = Pap E {CD}1 ∑ l 1 − Pap l =1

)

l −1

(39)

Defining a threshold of acceptable connection delay ThrCD, the fact that a priority demand will be blocked due to unacceptable delay will cause less number of retrials ( x ) and greater Blocking Probability. We calculate Blocking Probability as:

(

PB = 1 − Pap

)

{

}

min x , ⎡⎣ max ( x )|CD ≤ThrCD ⎤⎦

(40)

4. RESULTS

In this section we calculate the behaviour of the proposed model in comparison with other standard models, DCF and EDCF. The performance of all three MAC protocols is tested for variable number of contending stations and for several conditions; medium transmission rate, basic or handshaking access and both low and high priority applications. Every terminal is assumed to demand both kinds of applications. In case of DCF, EDCF and low priority class of the proposed protocol, it is assumed that a packet is always available for transmission. On the other hand, the policy of our proposed protocol for high priority class demands a fixed number of applications running on each terminal, which we set to 1. Therefore, the comparison is best made at high number of stations where saturation throughput is reached for every case. The priority applications for the showcased results are Voice over IP (VoIP) applications using the G.711 codec [20]. 160B of payload are transmitted every 20ms. The Fd timer could be set to 20ms for this case. However, the packet length (in Bytes) need to be greater than TxOP/2. Thus, a 4 packet accumulation is proposed before transmission, which yields a 60ms buffer delay. This deficiency is necessitated by the priority class collision avoidance mechanism proposed in section 2.1. Fd is, then, chosen to be 80ms and the packet payload would be 640B. Throughput is a presentative feature for a MAC protocol. It is showcased in figures (7)-(10) for basic and RTS-CTS access and for 1Mbps and 11Mbps transmission rate. Careful reading of the figures is required at all cases, since the high priority demand of our proposed protocol is in

saturation mode only at high number of stations, thus resulting in a drop in throughput for low number of stations. For high number of stations, it is evident that the proposed protocol yields higher throughput and this is due to small backoff delay of TDMA functionality. Throughput rate is inferior to transmission rate only in terms of header bits. Another result observation is that RTS-CTS offer no evident advantage to our scheme which at first is natural since the collisions are not really an issue. However, RTS-CTS would be very important in real cases where the hidden terminal problem would rise. Basic Access 11Mbps 5

0.8

4.5

0.7

4

Throughput (Mbps)

Throughput (Mbps)

Basic Access 1Mbps 0.9

0.6 0.5 0.4

DCF EDCF low priority class EDCF high priority class Proposed protocol low priority class Proposed protocol high priority class sum of EDCF apps sum of proposed protocol apps

0.3 0.2

3 2.5

DCF EDCF low priority class EDCF high priority class Proposed protocol low priority class Proposed protocol high priority class sum of EDCF apps sum of proposed protocol apps

2 1.5 1

0.1 0

3.5

0.5

5

10

15

20

25

No of Stations

30

35

0

40

5

10

15

20

25

No of Stations

30

35

40

35

40

FIGURE 7: Throughput for 1Mbps and 11Mbps transmission rate and basic access. RTS-CTS 11Mbps 4.5

0.8

4

0.7

3.5

Throughput (Mbps)

Throughput (Mbps)

RTS-CTS 1Mbps 0.9

0.6 0.5

DCF EDCF low priority class EDCF high priority class Proposed protocol low priority class Proposed protocol high priority class sum of EDCF apps sum of proposed protocol apps

0.4 0.3

3 2.5

1.5

0.2

1

0.1

0.5

0

5

10

15

20

25

No of Stations

30

35

40

DCF EDCF low priority class EDCF high priority class Proposed protocol low priority class Proposed protocol high priority class sum of EDCF apps sum of proposed protocol apps

2

0

5

10

15

20

25

No of Stations

30

FIGURE 8: Throughput for 1Mbps and 11Mbps transmission rate and RTS-CTS access.

Delay is a very important characteristic of a MAC protocol, as well. Particularly in the case of high quality applications, delay is indicative of the sustainability of the MAC performance. In figures (11)-(12), average delay is showcased for 1Mbps rate and both access mechanisms. Again, it is shown that RTS-CTS access has no great impact in the performed analysis of the proposed protocol, as expected. High priority average delay is independent of traffic and lower than any other case. Low priority delay, on the other hand, can be very high when the high priority applications occupy the greater portion of the available bandwidth. If an improvement is required on this matter, CWp can be modified to perform a tighter admission control for high priority calls, nevertheless leading to higher blocking probability.

Average Delay (msec)

15000

Basic Access 1Mbps DCF EDCF low priority class EDCF high priority class Proposed protocol low priority class Proposed protocol high priority class

10000

5000

0 2

4

6

8

10

12

14

Number of Stations

16

18

20

FIGURE 9: Average Delay for basic access in the channel and 1Mbps transmission rate. RTS-CTS 1Mbps

Average Delay (msec)

15000

DCF EDCF low priority class EDCF high priority class Proposed protocol low priority class Proposed protocol high priority class

10000

5000 4000 3000 2000 1000 0 2

4

6

8

10

12

14

Number of Stations

16

18

20

FIGURE 10: Average Delay for RTS-CTS access in the channel and 1Mbps transmission rate. 5. CONCLUSION

In this paper a new MAC protocol is proposed to be a backward compatible advancement to the wide-known 802.11e protocol. A timer called Fd timer is used in a distributed manner from each wireless terminal to create a virtual TDMA-like frame. Each terminal uses another timer to prevent collisions with other high priority applications. The performance is improved since low priority class starvation effect is reduced. Moreover, a tradeoff between high priority admission characteristics (connection delay and blocking probability) and low priority performance can be used in Quality of Service optimization procedure. The results show an overall improvement in throughput. The gain in thtoughput is justified by the decrease in the backoff delay. Finally, the average delay for priority class is independent of load conditions, as expected by the TDMA nature of the proposed protocol.

REFERENCES [1] Kong Z., Tsang D., Bensaou B and Gao D., Performance Analysis of IEEE 802.11e ContentionBased Channel Access, IEEE Journal on Selected Areas in Communications, Vol. 22, Dec 2004. [2] Mangold S., Choi S., Hiertz G., Klein O. and Walke B., Analysis of IEEE 802.11e for QoS Support in Wireless LANs, IEEE Wireless Communications, 2003.

[3] Robinson J. W. and Randhawa T. S., Saturation Throughput Analysis of IEEE 802.11e Enhanced Distributed Coordination Function, IEEE Journal on Selected Areas in Communications, Vol. 22, No. 5, June 2004. [4] He D. and Shen C. Q., Simulation Study of IEEE 802.11e EDCF, Vehicular Technology Conference, 2003 (VTC 2003-Spring), April 2003, p685-689. [5] Wireless LAN Medium Access Control (MAC) and Physical Layer Specifications, IEEE Std. 802.11, 1999. [6] Medium Access Control (MAC) Enhancements for Quality of Service (QoS), D4.4, , IEEE Draft Std 802.11e, 2003. [7] Cali F, Conti M and Gregori E., IEEE 802.11 protocol: design and performance evaluation of an adaptive backoff mechanism. IEEE Journal on Selected Areas in Communications, 2000. [8] Al-Karaki J. N. and Chang J. M., A Simple Distributed Access Control Scheme for Supporting QoS in IE EE 802.11 Wireless LANs, Wireless Communications and Networking Conference (WCNC), 2004. [9] Wang W., Liew S. C. and Li V., Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions on Vehicular Technology, Vol. 54, No. 1, Jan. 2005. [10] Pang Q., Liew S. C., Lee J. and Chan S.-H., A TCP-like Adaptive Contention Window Scheme for WLAN, ICC 2004. [11] Pollin S., Motamedi A., Bahai A., Catthoor F. and Van der Perre L., Delay improvement of IEEE 802.11 distributed coordination function using size-based scheduling , IEEE International Conference on Communications (ICC'05), Seoul, May 2005. [12] Zhu H., Li M., Chlamtac I. and Prabhakaran B., A Survey of Quality of Service in IEEE 802.11 Networks, IEEE Wireless Commnications, Aug. 2004. [13] Bauchot F., MASCARA: A wireless ATM MAC protocol, presented at the Wireless ATM Workshop, Helsinki, Finland, (1996). [14] Sanchez J., Martinez R., Marcellin M. W., A survey of MAC protocols proposed for Wireless ATM Published in IEEE Network, Nov/Dec 1997, Vol 11 No. 6, pp. 52-62. [15] Bianchi G., Performance analysis of the IEEE 802.11 distributed coordination function, IEEE J. Select. Areas Commun., vol. 18, pp. 318–320, Mar. 2000. [16] Ziouva E. and Antonakopoulos T., CSMA/CA Performance under High Traffic Conditions Throughput and Delay analysis, International Journal for Computer Communications 25, 2002, 313321. [17] Xiao Y., Performance analysis of IEEE 802.11e EDCF under saturation condition, Proc. ICC, Paris, France, June 2004. [18] Foh C. H. and Tantra J. W., Comments on IEEE 802.11 Saturation Throughput Analysis with Freezing of Backoff Counters, IEEE Communications Letters, Vol. 9, No. 2, 2005. [19] Xiao Y. and Rosdahl J., Throughput and Delay Limits of IEEE 802.11, IEEE Communications Letters, Vol.6, No. 8, Aug. 2002. [20] Garg S. and Kappes M., On the Throughput of 802.11b Networks for VoIP, Avaya Labs technical report, March 2002.

A new MAC protocol with pseudo-TDMA behaviour for ...

In this paper, a new Medium Access Control (MAC) protocol is proposed for ..... We also define the probabilities of accessing the channel after a busy period τb ...

872KB Sizes 0 Downloads 182 Views

Recommend Documents

CT-MAC: A MAC Protocol for Underwater MIMO Based Network ...
tic networks. Although extensive research has been con- ducted at the physical layer for underwater MIMO commu- nications, the corresponding medium access control (MAC) is still largely ... derwater MIMO based network uplink communications. In. CT-MA

A MAC protocol for reliable communication in low ... - Semantic Scholar
Apr 8, 2016 - sonalized medication [9]. ..... We use the reserved bits 7–9 of the frame control field for spec- ..... notebook are connected by a USB cable. Fig.

CRN Survey and A Simple Sequential MAC Protocol for ... - CiteSeerX
COMSATS Institute of Information Technology. Abbottabad, Pakistan [email protected]. Tahir Maqsood. Computer Science Department. COMSATS Institute of ...

A MAC protocol for reliable communication in low ... - Semantic Scholar
Apr 8, 2016 - BANs share the spectrum, managing channel access dynamically to .... run together on an android platform or on a mote with sufficient.

A Novel Multi-channel MAC Protocol for Ad hoc Networks
Ongoing, Limited and Unknown. 1) Normal: nodes have up-to-date information of their neighbor nodes. 2) Ongoing: nodes are exchanging data during the current ATIM window because of the E-Tx mode. 3) Limited: nodes which lost their neighbor's status si

A Multi-channel MAC Protocol for VANETs
Transportation Systems (ITS), 2011. [5] Chong Han, Dianati, M., Tafazolli, R., Kernchen, R. Asynchronous Multi-Channel MAC for Vehicular Ad. Hoc Networks, Vehicular Networking Conference (VNC),. 2011. [6] Hang Su and Xi Zhang, Clustering-Based. Multi

CT-MAC: A MAC Protocol for Underwater MIMO Based Network Uplink ...
Nov 6, 2012 - (KMt >Mr) will degrade the performance of the network. In addition, block .... first broadcasts a test packet to the whole network to assist.

A Cognitive MAC Protocol Using Statistical Channel ...
Channel Allocation for Wireless Ad-hoc Networks. Alex Chia-Chun .... Such advanced spectrum sensing technology is crucial to the success of. CR devices.

Demo: Towards a MAC protocol App Store
every step of the supply chain: from frequent monitoring in densely packed .... have some parameters that can be adapted: CSMA/CA has a changeable ...

An Enhanced Multi-channel MAC Protocol for Wireless ...
An Enhanced Multi-channel MAC Protocol for. Wireless Ad hoc Networks. Duc Ngoc Minh Dang. ∗. , Nguyen Tran Quang. ∗. , Choong Seon Hong. ∗ and Jin ...

An Energy Efficient Multi-channel MAC Protocol for ... - IEEE Xplore
Department of Computer Engineering, Kyung Hee University, 449-701, ... Department of Electronics and Communications Engineering, Kwangwoon University, ...

Correctness proof of a new protocol for selfishness nodes ... - LSI
E − mail: [email protected] ... E − mail: [email protected] ... Definition 4 (Host state:) A host state Mh is a marking reachable from any marking M ...

NOMADIC: A New mObility MAnagement protocol for ...
Inter domain mobility: This mobility is related to network layer ... A lookup mechanism is run to maintain and update the session information. The flowchart to ...

cybercromlech: a new framework for collective behaviour game ...
Creation of new games using the CyberCromlech. – Complication of the CyberCromlech architecture. e.g.. – Increase the spatial dimensions of CyberCromlech ...

Correctness proof of a new protocol for selfishness nodes ... - LSI
The resource limitation of nodes used in the ad hoc network, particulary the energy ... Definition 4 (Host state:) A host state Mh is a marking reachable from any ... have just to prove that when the monitoring node A sends n packets to B, then if ..

A SINR-Based MAC Protocol for Wireless Ad Hoc ...
the Dept. of Computer Engineering, Kyung Hee University, Korea (e-mail: {dnmduc ... The minimum arc length between two interfering nodes is. πRNT /3.

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc ...
Email: [email protected]. Abstract—In regular wireless ad hoc network, the Medium. Access Control (MAC) coordinates channel access among nodes and the ...

ASYMPTOTIC BEHAVIOUR FOR A NONLOCAL ...
In this paper we study the asymptotic behaviour as t → ∞ of solutions to a .... r(t)≤|ξ|≤R. (e−Atpα(ξ) + e−t|ξ|α/2)dξ. ≤ td/α ϕL1(Zd). ∫ r(t)≤|ξ|≤R e−Bt|ξ|α dξ. =.

Motivation for a specialized MAC -
on the scheme, collisions may occur during the reservation period, the transmission period can then be accessed without collision. One basic scheme is demand assigned multiple access (DAMA) also called reservation. Aloha, a scheme typical for satelli

with mac app.pdf
Connect more apps... Try one of the apps below to open or edit this item. with mac app.pdf. with mac app.pdf. Open. Extract. Open with. Sign In. Main menu.

QoSBeeManet: a new QoS multipath routing protocol ...
Dec 6, 2010 - and real time applications in the MANET context,. • Need of a .... Good Packet Delivery Ratio (the best is DSR due to the cache routing policy).

A New Theory on the Behaviour of Light
et al. (1976) sent electromagnetic signals between standard clock stations on Earth and showed that these signals ..... the water by precisely the required amount. This requirement ...... and controller of theory and opinion”. It is interesting to