Search results for "access protocols"

showing 5 items of 5 documents

Out-of-Band Signaling Scheme for High Speed Wireless LANs

2007

In recent years, the physical layer data rate provided by 802.11 Wireless LANs has dramatically increased thanks to significant advances in the modulation and coding techniques employed. However, previous studies show that the 802.11 MAC operation, namely the distributed coordination function (DCF), represents a limiting factor: the throughput efficiency drops as the channel bit rate increases, and a throughput upper limit does indeed exist when the channel bit rate goes to infinite high. These findings indicate that the performance of the DCF protocol will not be efficiently improved by merely increasing the channel bit rate. This paper shows that the DCF performance may significantly bene…

Computer scienceComputer network performanceWireless LANThroughputDistributed coordination functionBackward compatibilityIEEE 802.11Packet switchingWireless lanWireless LAN Throughput Bit rate Physical layer Modulation coding Access protocols Content management Signal design Media Access Protocol Performance analysisElectrical and Electronic EngineeringIEEE 802.11Settore ING-INF/03 - Telecomunicazionibusiness.industryApplied MathematicsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerCode rateComputer Science ApplicationsComputer network performance; IEEE 802.11; Wireless LANBurst switchingModulationOut-of-band managementbusinessCommunication channelComputer networkIEEE Transactions on Wireless Communications
researchProduct

Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches

2010

With the popularity of the IEEE 802.11 standards, many analytical saturation throughput studies for the distributed coordination function (DCF) have been reported. In this paper, we outline a number of issues and criticalities raised by previously proposed models. In particular, a careful look at backoff counter decrement rules allows us to conclude that, under saturation conditions, the slot immediately following a successful transmission can be accessed only by the station (STA) that has successfully transmitted in the previous channel access. Moreover, due to the specific acknowledgment (ACK) timeout setting adopted in the standard, the slot immediately following a collision cannot be ac…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceAerospace EngineeringThroughputDistributed coordination functionIEEE 802.11Wireless lanWireless Application ProtocolElectrical and Electronic Engineeringbusiness.industrySettore ING-INF/03 - Telecomunicazioni802.11 Performance analysisWiFiPerformance analysisComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCode ratemedium access protocolsAutomotive EngineeringbusinessTimeoutcomputerWireless sensor network802.11Computer networkCommunication channel
researchProduct

Underwater Multirobot Cooperative Intervention MAC Protocol

2020

This work introduces a Medium Access Control (MAC) protocol designed to allow a group of underwater robots that share a wireless communication channel to effectively communicate with each other. The goal of the Underwater Multirobot Cooperative Intervention MAC (UMCI-MAC) protocol presented in this work is to minimize the end to end delay and the jitter. The access to the medium in UMCI-MAC follows a Time Division Multiple Access (TDMA) strategy which is arbitrated by a master, which also has the capability to prioritize the transmission of some nodes over the rest of the network. Two experiments have been carried out with a team of four Autonomous Underwater Vehicles (AUV) in order to comp…

wireless networksaccess protocolsGeneral Computer ScienceComputer scienceUnderwater communicationsEnd-to-end delayTime division multiple accessThroughput02 engineering and technologyteleroboticsTelecomunicació0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessGeneral Materials ScienceJitterbusiness.industryNetwork packetWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral Engineering020302 automobile design & engineering020206 networking & telecommunicationsApplication layerunderwater communicationslcsh:Electrical engineering. Electronics. Nuclear engineeringremotely operated vehiclesbusinessCommunications protocolRobotsProtocols de xarxes d'ordinadorslcsh:TK1-9971Underwater acoustic communicationComputer networkCommunication channelIEEE Access
researchProduct

MAC Design for WiFi Infrastructure Networks: A Game-Theoretic Approach

2011

In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios because of non-standard configurations of the nodes. Due to the proliferation of open source drivers and programmable cards, enabling an easy customization of the channel access policies, we propose a game-theoretic analysis of random access schemes. Assuming that each node is rational and implements a best response strategy, we show that…

FOS: Computer and information sciencesgame theorycheating nodeaccess protocolsmobile nodesComputer sciencegame-theoretic approachMAC designDistributed coordination functionUpload[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]MAC protocolschannel access policyComputer Science - Computer Science and Game TheoryFOS: MathematicsElectrical and Electronic EngineeringMathematics - Optimization and Controlwireless LANdistributed coordination functionMechanism designcheating nodesWiFi infrastructure networksbusiness.industryApplied MathematicsNode (networking)WiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWiFi; cheating nodes; game theory; MAC protocolsComputer Science ApplicationsShared resourceprogrammable cardsOptimization and Control (math.OC)game-theoretic analysisBest responserandom access schemebusinessrandom access protocolRandom accessCommunication channelComputer networkComputer Science and Game Theory (cs.GT)
researchProduct

Analysis of MAC-level throughput in LTE systems with link rate adaptation and HARQ protocols

2015

LTE is rapidly gaining momentum for building future 4G cellular systems, and real operational networks are under deployment worldwide. To achieve high throughput performance, in addition to an advanced physical layer design LTE exploits a combination of sophisticated mechanisms at the radio resource management layer. Clearly, this makes difficult to develop analytical tools to accurately assess and optimise the user perceived throughput under realistic channel assumptions. Thus, most existing studies focus only on link-layer throughput or consider individual mechanisms in isolation. The main contribution of this paper is a unified modelling framework of the MAC-level downlink throughput of …

radio linksaccess protocolscellular radioSettore ING-INF/03 - Telecomunicazionibusiness.industryOrthogonal frequency-division multiplexingComputer science4G mobile communicationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerHybrid automatic repeat requestComputer architectureTelecommunications linkLong Term EvolutionLTE MAC CQI AMC HARQ throughput analysis.Isolation (database systems)Radio resource managementbusinessThroughput (business)Computer networkCommunication channel2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
researchProduct