Design and Analysis of Medium Access Protocols for Multi-hop Wireless Networks

Design and Analysis of Medium Access Protocols for Multi-hop Wireless Networks PDF Author: Kezhu Hong
Publisher:
ISBN:
Category : Computer network protocols
Languages : en
Pages : 286

Get Book Here

Book Description

Design and Analysis of Medium Access Protocols for Multi-hop Wireless Networks

Design and Analysis of Medium Access Protocols for Multi-hop Wireless Networks PDF Author: Kezhu Hong
Publisher:
ISBN:
Category : Computer network protocols
Languages : en
Pages : 286

Get Book Here

Book Description


MAC Protocol Design in Full-Duplex Enabled Wireless Networks

MAC Protocol Design in Full-Duplex Enabled Wireless Networks PDF Author: Liqun Fu
Publisher: Springer Nature
ISBN: 3031572963
Category :
Languages : en
Pages : 158

Get Book Here

Book Description


Medium Access Control in Wireless Networks

Medium Access Control in Wireless Networks PDF Author: Hongyi Wu
Publisher: Nova Publishers
ISBN: 9781600219443
Category : Computers
Languages : en
Pages : 662

Get Book Here

Book Description
Wireless technologies and applications are becoming one of the fastest growing and most promising areas in recent years. To accommodate data transmission by multiple stations sharing the scarce wireless bandwidth, a medium access control (MAC) protocol plays a crucial role in scheduling packet transmission fairly and efficiently. The emerging wireless networks, such as ad-hoc networks, sensor networks or mesh networks, are mostly multi-hop based and in distributed manner, which brings a lot of problems and challenges in designing fine-tuned MAC protocols tailored for modern wireless network. In this book, the authors give complete and in-depth overviews to the classic medium access control algorithms and the related protocols, as well as their applications in various wireless data networks especially the most successful Wireless Local Area Networks (WLAN). The book consists of three major parts. Part I of this book, including Chapters 1-7, is emphasising on the fundamentals of medium access control algorithms and protocols. Chapter 1 provides an introduction to the wireless networks, such as overview of wireless networks, problems and challenges of the wireless networks, and the classifications of MAC protocols as well as the performance metrics. Chapter 2 introduces important collision resolution algorithms applied in medium access controls, for example, the splitting algorithm and the backoff algorithm. Chapter 3 reviews the hybrid access control algorithms that combine both contention and allocation schemes. A series of important collision avoidance schemes are introduced in Chapters 4-7 respectively, with a specific design goal covered in each chapter. Chapter 4 focuses on the multi-channel MAC protocols for collision avoidance; Chapter 5 introduces the concepts of power control and power management in medium access control and how they can be applied in MAC protocol design; Chapter 6 presents how to provide Quality-of- Service (QoS) to multimedia wireless networks, in either centralised or distributed manner; and Chapter 7 explains how the smart antennas can be applied in the medium access control to provide high channel throughput and low packet collision.

Medium Access Protocol (MAC) Design for Wireless Multi-hop Ad Hoc and Sensor Networks

Medium Access Protocol (MAC) Design for Wireless Multi-hop Ad Hoc and Sensor Networks PDF Author: Afef Sayadi
Publisher:
ISBN:
Category :
Languages : en
Pages : 0

Get Book Here

Book Description
Wireless multi-hop ad hoc and sensor networks provide a promising solution to ensure ubiquitous connectivity for the Future Internet. Good network connectivity requires designing a reliable Medium Access Control (MAC) protocol, which is a challenging task in the ad hoc and sensor environments. The broadcast and shared nature of the wireless channel renders the bandwidth resources limited and expose the transmissions to relatively high collisions and loss rates. The necessity to provide guaranteed Quality of Service (QoS) to the upper layers triggered the design of conflict-free MAC protocols. The TDMA synchronization constraint is basically behind the rush of MAC protocol design based on a fixed frame size. This design shows inflexibility towards network variations and creates a network dimensioning issue that leads to a famine risk in case the network is under-dimensioned, and to a waste of resources, otherwise. Moreover, the alternative dynamic protocols provide more adaptive solutions to network topology variations at the expense of a fair access to the channel. Alongside with the efficient channel usage and the fair medium access, reducing the energy consumption represents another challenge for ad hoc and sensor networks. Solutions like node activity scheduling tend to increase the network lifetime while fulfilling the application requirements in terms of throughput and delay, for instance. Our contributions, named OSTR and S-OSTR, address the shortcomings of the medium access control protocol design in the challenging environment of wireless multi-hop ad hoc and sensor networks, respectively. For OSTR the idea consists in adopting a dynamic TDMA frame size that increases slot-by-slot according to the nodes arrival/departure to/from the network, and aiming to achieve a minimum frame size. For this end, OSTR couples three major attributes: (1) performing slot-by-slot frame size increase, (2) providing a spatial reuse scheme that favors the reuse of the same slot if possible, (3) and ensuring an on-demand frame size increase only according to the node requirements in terms of throughput. To tackle different frame sizes co-existence in the network, OSTR brings a cooperative solution that consists in fixing an appointment, a date when the frame size in the network is increased. Concerning S-OSTR, it is an amendment of OSTR for wireless sensor networks. It brings the idea of a dynamic active period, since it deploys a dynamic frame size that is built slot-by-slot according to nodes arrival to the network. S-OSTR enforces the slot-by-slot frame size increase by a node activity scheduling to prolong the inactivity period in the network, and hence prolong the overall network lifetime for wireless sensor networks. Our contributions are both based on the new dynamic TDMA frame size increase that consists in increasing the frame size slot-by-slot aiming to achieve a shorter frame size, and hence improve the channel utilization, and reduce the energy consumption. The performance analysis of OSTR and S-OSTR shows that they present good potentials to support QoS requirements, to provide energy-efficiency, to ensure fair medium access, to accommodate network topology changes and finally, to enhance robustness against scalability. The impact of this new TDMA frame size increase technique on the medium access control protocol performance is highlighted through multiple simulations of OSTR and S-OSTR. Multiple comparative studies are also handled to point out the effectiveness of this new technique and the soundness of our contributions.

Design and Analysis of Medium Access Control Protocols for Broadband Wireless Networks

Design and Analysis of Medium Access Control Protocols for Broadband Wireless Networks PDF Author: Lin Cai
Publisher:
ISBN:
Category :
Languages : en
Pages : 169

Get Book Here

Book Description
The next-generation wireless networks are expected to integrate diverse network architectures and various wireless access technologies to provide a robust solution for ubiquitous broadband wireless access, such as wireless local area networks (WLANs), Ultra-Wideband (UWB), and millimeter-wave (mmWave) based wireless personal area networks (WPANs), etc. To enhance the spectral efficiency and link reliability, smart antenna systems have been proposed as a promising candidate for future broadband access networks. To effectively exploit the increased capabilities of the emerging wireless networks, the different network characteristics and the underlying physical layer features need to be considered in the medium access control (MAC) design, which plays a critical role in providing efficient and fair resource sharing among multiple users. In this thesis, we comprehensively investigate the MAC design in both single- and multi-hop broadband wireless networks, with and without infrastructure support.

On-Demand Medium Access in Heterogeneous Multihop Wireless Networks

On-Demand Medium Access in Heterogeneous Multihop Wireless Networks PDF Author: Vivek Jain
Publisher: LAP Lambert Academic Publishing
ISBN: 9783844326185
Category :
Languages : en
Pages : 136

Get Book Here

Book Description
This book gives readers an in-depth analysis of the fundamentals behind designing on-demand medium access control (MAC) protocols for multihop wireless networks, esp. with nodes having multiple antenna technologies. This is the first attempt towards designing and analyzing on-demand, also known as contention-based, MAC protocols for multiple beam smart antennas (MBSA). The book begins with a general introduction of the state-of-art problems and solutions that then forms the basis of this book. The book then introduces mathematical models to analyze MBSA and derive basic MAC fundamentals. The readers are then exposed to step-by-step MAC design for MBSA in wireless ad hoc networks. Once the basic design is completed, advanced concepts such as wireless mesh network architecture, Quality of Service (QoS), interoperability with existing IEEE802.11 standards and co-existence with other antenna technologies, viz., omnidirectional and directional, are introduced. Finally, the book ends with introducing link layer reliable and energy-efficient communication mechanisms for wireless sensor networks.

Multiple Access Protocols

Multiple Access Protocols PDF Author: Raphael Rom
Publisher: Springer Science & Business Media
ISBN: 1461234026
Category : Technology & Engineering
Languages : en
Pages : 179

Get Book Here

Book Description
Computer communication networks have come of age. Today, there is hardly any professional, particularly in engineering, that has not been the user of such a network. This proliferation requires the thorough understanding of the behavior of networks by those who are responsible for their operation as well as by those whose task it is to design such networks. This is probably the reason for the large number of books, monographs, and articles treating relevant issues, problems, and solutions in this field. Among all computer network architectures, those based on broadcast mul tiple access channels stand out in their uniqueness. These networks appear naturally in environments requiring user mobility where the use of any fixed wiring is impossible and a wireless channel is the only available option. Because of their desirable characteristics multiple access networks are now used even in environments where a wired point-to-point network could have been installed. The understanding of the operation of multiple access network through their performance analysis is the focus of this book.

Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks

Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks PDF Author: Soufiene Djahel
Publisher: GRIN Verlag
ISBN: 3656041024
Category : Computers
Languages : en
Pages : 170

Get Book Here

Book Description
Doctoral Thesis / Dissertation from the year 2011 in the subject Computer Science - Internet, New Technologies, Lille 1 University (Laboratoire d'Informatique Fondamentale de Lille), course: Security in Wireless Multi-hop Networks, language: English, abstract: While the rapid proliferation of mobile devices along with the tremendous growth of various applications using wireless multi-hop networks have significantly facilitate our human life, securing and ensuring high quality services of these networks are still a primary concern. In particular, anomalous protocol operation in wireless multi-hop networks has recently received considerable attention in the research community. These relevant security issues are fundamentally different from those of wireline networks due to the special characteristics of wireless multi-hop networks, such as the limited energy resources and the lack of centralized control. These issues are extremely hard to cope with due to the absence of trust relationships between the nodes. To enhance security in wireless multi-hop networks, this dissertation addresses both MAC and routing layers misbehaviors issues, with main focuses on thwarting black hole attack in proactive routing protocols like OLSR, and greedy behavior in IEEE 802.11 MAC protocol. Our contributions are briefly summarized as follows. As for black hole attack, we analyze two types of attack scenarios: one is launched at routing layer, and the other is cross layer. We then provide comprehensive analysis on the consequences of this attack and propose effective countermeasures. As for MAC layer misbehavior, we particularly study the adaptive greedy behavior in the context of Wireless Mesh Networks (WMNs) and propose FLSAC (Fuzzy Logic based scheme to Struggle against Adaptive Cheaters) to cope with it. A new characterization of the greedy behavior in Mobile Ad Hoc Networks (MANETs) is also introduced. Finally, we design a new backoff scheme to quickly detect the greedy nodes that do not comply with IEEE 802.11 MAC protocol, together with a reaction scheme that encourages the greedy nodes to become honest rather than punishing them.

Wireless MAC Protocol Design and Analysis

Wireless MAC Protocol Design and Analysis PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description
Wireless networks are becoming very common due to their advantages such as rapid deployment and support for mobility. In this dissertation, we design and analyze the Medium Access Control (MAC) protocol for two popular wireless networks: Wireless Sensor Networks (WSNs) and Wireless Local Area Networks (WLANs). For WSNs, we design and analyze an energy efficient MAC protocols. Energy efficiency is a key design factor of a MAC protocol for WSNs. Existing preamble-sampling based MAC protocols have large overheads due to their preambles and are inefficient at large wakeup intervals. Synchronous scheduling MAC protocols minimize the preamble by combining preamble sampling and scheduling techniques; however, they do not prevent energy loss due to overhearing. In this dissertation, we present an energy efficient MAC protocol for WSNs, called AS-MAC, that avoids overhearing and reduces contention and delay by asynchronously scheduling the wakeup time of neighboring nodes. We also provide a multi-hop energy consumption model for AS-MAC. To validate our design and analysis, we implement the proposed scheme on the MICAz and TELOSB platforms. Experimental results show that AS-MAC considerably reduces energy consumption, packet loss and delay when compared with other energy efficient MAC protocols. For WLANs, we present a saturation throughput model for IEEE 802.11, the standard of WLAN, for a simple infrastructure scenario with hidden stations. Despite the importance of the hidden terminal problem, there have been a relatively small number of studies that consider the effect of hidden terminals on IEEE 802.11 throughput. Moreover, existing models are not accurate for scenarios with the short-term unfairness. In this dissertation, we present a new analytical saturation throughput model for IEEE 802.11 for a simple but typical infrastructure scenario with small number of hidden stations. Simulation results are used to validate the model and show that our model is extremely accura.

On Integrated Architecture for Multi-hop Wireless Networks

On Integrated Architecture for Multi-hop Wireless Networks PDF Author: Anurag Gupta
Publisher:
ISBN: 9780549025344
Category :
Languages : en
Pages : 157

Get Book Here

Book Description
In this dissertation we focus on design and analysis of an integrated architecture for useful and efficient multihop wireless networks (MWNs). We first concentrate on development of on-demand medium access control (MAC) protocols for the network and cross layer optimizations to improve network performance using multiple beam antennas. We show the inherent inability of predominantly used MAC protocols to fully exploit the benefits of multiple beam antenna arrays and demonstrate the superiority of our protocols. We also present our receiver oriented MAC protocol to provide differentiated service classes on these antenna systems, the first successful attempt to achieve this goal. We next look at the security of communication over multihop wireless networks. In this section we also provide a highly scalable and completely distributed protocol to generate symmetric group communication keys. We then move on to queueing analysis of multihop wireless networks which cannot be quantified using classical queueing theory. We present our theory of Exclusive Access Queues (EAQs) and show how to apply them to MWNs. Finally, we present the design of the wireless device driver we implemented to run our protocols on wireless devices. We show the architecture best suited for the requirements of our protocols and the inter-operation between various driver entities.