Simulation of MAC layer EEL 6507 Fall 2003 Scott Owen & Eric Donnelly.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Module C- Part 1 WLAN Performance Aspects
Chapter 6 High-Speed LANs1 Chapter 6 High-Speed LANs.
Wireless Local Area Networks By Edmund Gean August 2, 2000.
1 實驗五:媒介存取協定模擬 教師: 助教:. 2 Outline  Background  Transmission Protocols  ALOHA  CSMA/CD  CSMA/CA  Network Devices  Hub  Switch  Access Point (AP)
“Performance Comparison of the Radio Link Protocols of IEEE a and HIPERLAN/2” – Hui Li, et al. Presentation byTom Bruns.
Network Technology CSE Network Technology CSE3020 Week 9.
Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment Authors: Laura Marie Feeney, Martin Nilsson Swedish.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
802.11n MAC layer simulation Submitted by: Niv Tokman Aya Mire Oren Gur-Arie.
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
MAC Protocol By Ervin Kulenica & Chien Pham.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Voice Traffic Performance over Wireless LAN using the Point Coordination Function Wei Supervisor: Prof. Sven-Gustav Häggman Instructor: Researcher Michael.
ECE 4450:427/527 - Computer Networks Spring 2015
Wireless LAN Simulation - IEEE MAC Protocol
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Opersating Mode DCF: distributed coordination function
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
Lecture 4 Wireless Medium Access Control
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He.
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
WLAN.
WLAN.
11 Chapter 4. Wireless Local Area Networks Departamento de Tecnología Electrónica Some of these slides are copyrighted by: Computer Networking: A Top Down.
實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
The “New Network Node” Algorithm Brought to you by: Brian Wolf(Researcher) Harlan Russell (Advisor) Joe Hammond (Advisor Emeritus) Vivek Mehta(Graduate.
5/12/2005doc.: IEEE /0334 Submission Ripple: A Distributed Medium Access Protocol for Wireless Mesh Network Presented at the IEEE802.11, ,
Media Access Methods MAC Functionality CSMA/CA with ACK
ICUPC’98 Jing Deng and Zygmunt J. Hass
VoIP over Wireless Networks
Feb Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [The Potentials of IEEE CSMA/CA to.
Lab 7 – CSMA/CD (Data Link Layer Layer)
“Performance Comparison of the Radio Link Protocols of IEEE 802
Wireless LANs Wireless proliferating rapidly.
Wireless Networks.
CS 457 – Lecture 7 Wireless Networks
Measuring the Reliability of WiFi Networks
WiFi Networks: IEEE b Wireless LANs
Full-Duplex based MAC enhancements
Multi-Hop Broadcast from Theory to Reality:
Introduction to Wireless Networks
Tutorial 5 What is the main physical reason for the failure of many MAC schemes known from wired networks? What is done in wired networks to avoid this.
Performance Evaluation of an Integrated-service IEEE Network
Wireless LAN Simulation IEEE MAC Protocol
PCF Enhancements and Contention Free Bursts
WiFi Networks: IEEE b Wireless LANs
Wireless LANs CS 352, Lecture 16
Presentation transcript:

Simulation of MAC layer EEL 6507 Fall 2003 Scott Owen & Eric Donnelly

Covered in this presentation: Background Approach Simulation Results Conclusions

Background Distinguishing features of compared to other protocols: – CSMA/CA, instead of the more common CSMA/CD – Exponential backoff algorithm

Background Modes: Infrastructure and Ad-hoc – Focus on Ad-hoc mode infrastructure network ad-hoc network AP wired network AP: Access Point

Background RTS/CTS – Used to solve “hidden node” problem

Background Timing diagram:

Background Timing diagram (Our Simulation):

Approach Goal: – To create a simulation for the MAC layer that would allow various conditions to be tested – As a test case we will investigate the optimum Maximum Transmission Unit (MTU) size, for different device population densities – Coding was done in Matlab

Matlab Code State Machine Nodes optionally mobile (random linear path) All nodes aware of each other – Can transmit to any node – Node might not be in range – Node might fall out of range mid-transmission – Hidden nodes possible All nodes have data to transmit at all times (not Poisson)

State Machine Ready To TX Tx Rx ACK Tx ACK Wait Tx ACK Rx Rx ACK Wait Backoff

Simulation Results

Conclusions The goal of a suitable simulation of the MAC layer was accomplished Our test experiment relating the optimum MTU to the number of active nodes showed: – Sparsely populated areas are more efficient when all nodes have larger MTU’s – Densely populated areas operate better when all nodes have small MTU’s