Search results for "Network allocation vector"
showing 6 items of 6 documents
A Kalman Filter Approach for Distinguishing Channel and Collision Errors in IEEE 802.11 Networks
2008
In the last years, several strategies for maximizing the throughput performance of IEEE 802.11 networks have been proposed in literature. Specifically, it has been shown that optimizations are possible both at the medium access control (MAC) layer, and at the physical (PHY) layer. In fact, at the MAC layer, it is possible to minimize the channel waste due to collisions and backoff expiration times, by tuning the minimum contention window as a function of the network congestion level. At the PHY layer, it is possible to improve the transmission robustness, by selecting a suitable modulation/coding scheme as a function of the channel quality perceived by the stations. However, the feasibility…
Kalman filter estimation of the contention dynamics in error-prone IEEE 802.11 networks
2008
In the last years, several strategies for maximizing the throughput performance of IEEE 802.11 networks have been proposed in literature. Specifically, it has been shown that optimizations are possible both at the medium access control (MAC) layer, and at the physical (PHY) layer. In fact, at the MAC layer, it is possible to minimize the channel wastes due to collisions and backoff expiration times, by tuning the minimum contention window as a function of the number n of competing stations. At the PHY layer, it is possible to improve the transmission robustness, by selecting a suitable modulation/coding scheme as a function of the channel quality perceived by the stations. However, the feas…
An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards
2006
It has been observed that IEEE 802.11 commercial cards produced by different vendors show a different behavior in terms of perceived throughput or access delay. Performance differences are evident both when the cards contend alone to the channel, and when heterogeneous cards contend together. Since the performance misalignment does not disappear by averaging the environmental factors (such as propagation conditions, laptop models, traffic generators, etc), it is evident that the well known throughput-fairness property of the DCF protocol is not guaranteed in actual networks. In this paper we propose a methodological approach devised to experimentally characterize the IEEE 802.11 commercial …
Reliable Data Gathering in Tree-Based IEEE 802.15.4 Wireless Sensor Networks
2007
This paper describes a routing protocol for enhanced robustness in IEEE 802.15.4-based sensor networks, which also addresses typical MAC layer issues, including power management, synchronization and link reliability. The algorithm uses a single-path strategy in error-free scenarios and resorts to using alternative paths when communication errors are detected. Our proposal exploits implicit acknowledgement of reception, a feature which may be provided by data aggregation when a broadcast medium such as the wireless channel is used. Therefore MAC layer acknowledgements are not used and errors recovery relies on a caching and retransmission strategy. The protocol requires synchronization among…
Achieving Robustness through Caching and Retransmissions in IEEE 802.15.4-based WSNs
2007
This paper proposes a network-layer protocol for wireless sensor networks based on the IEEE 802.15.4 standard. Our protocol is devised to provide reliable data gathering in latency-constrained applications, and exploits both the flexibility of the IEEE 802.15.4 MAC layer and features of data aggregation techniques, such as implicit acknowledgment of reception. The proposed protocol acts as a routing module and a control entity for the MAC layer and provides reliable communication, while managing power saving and synchronizertion among nodes. Without relying on MAC-layer acknowledgments, the protocol implements caching and network-layer retransmissions, triggered upon detection of a link fai…
WINSE: WiMAX NS-2 extension
2009
IEEE 802.16 standard defines the wireless broadband technology called WiMAX. When compared to other wireless technologies, it introduces many interesting advantages at PHY, MAC, and QoS layers. Heavy simulations are needed to study IEEE 802.16 performance and propose further enhancements to this standard. Link level simulations are not always sufficient, while system level simulators are not always accurate to capture MAC and transport protocol details. We implemented a 802.16 extension for the NS-2 network simulator. It includes upper PHY modeling, almost all the features of the 802.16 MAC layer, as well as the QoS framework. This article describes the implemented features, simulation meth…