SlideShare a Scribd company logo
1 of 5
SPECIFICA‘TION, VERIFICATION AND SIMULATION OF A WIRELESS LAN
                                PROTOCOL: MACAW

                                             G M Lundy, M. Almquist, T. Oruk
                                             U S Naval Postgraduate School
                                                     Monterey, CA 93943


                        ABSTRACT                                able to make some suggestions as to how it can be
A formal specification and verification of a wireless           improved, and to give a fairly accurate indication of how
LAN protocol is given, and a simulation of the                  much the improvements will help performance.
protocol’s performance is also described. The
 verification is a partial verification in that it does not     MACAW -- Multiple Access, Collision Avoidance,
 include a general verification of all possible                 Wireless -- was designed as an improvement upon an
 configurations of the protocol; however; it does cover         earlier protocol, called MACA [Karl. MACAW is based
 the expected usage of ihe protocol, which is for a small       on the same principle as is the cellular radio network for
 number of users sharing a cell. The simulation provides        automobiles. A set of base stations, which are ail
further insight into the protocol, especially concerning        connected by a wired system, communicate via radio
 its performance. Ba,sea! on the verification and               signals with the user stations. The difference is that with
simulation, some sug,gestions are made which can                MACAW, the base stations are connected by a local area
 improve the protocol’s performance.                            network -- such as CSMACD -- rather than a telephone
                                                                type network covering a large area. The area around
I. INTRODUCTION                                                 each base station is called a cell; and the users
Wireless communications in various forms has been the           communicate with the nearest base station. Another
subject of much attention and research in recent years.         difference is in the cell size; here we are using cells
Wireless communications include the broadcast radio             which are only a few meters in diameter, rather than
medium; terrestrial microwave[Mili]; satellite microwave        miles across. A third difference is that the :stations are
in all its forms [Ha,Ree]; and the International Amateur        not mobile, as are autos. The signals are relatively weak,
Radio Network, or “Ham Radio”[Bi]. Additionally ,               so that they should not penetrate beyond the “cell,” or
wireless communications includes acoustical (sound)             its local area. However it is possible that some
communications, used by submarines for many years,              interference between adjacent cells may occur. Other
and also for data communications, at least                      protocols for wireless and broadcast networks exist, and
experimentally [Rei]; and optical (visible) light               have been in use for years; these are discussed in the
communications, which are still used by maritime                references.
vessels. More recent fioms of wireless communications
includes wireless telephones; cellular telephones; air          MACA (medium accessicollision avoidance) Karl,
phones, which enable the passenger aboard an airliner to        MAC‘4W’s predecessor, used a sequence of three basic
connect to the long distance telephone system; and              messages: request-to-send, clear-to-send, and DATA.
wireless computer networks. Pagers and remote control           MACX used binary exponential backoff aligorithm to
devices might also be included, though these are very           resolve collisions, the same type used in CSMA/CIl.
“low bandwidth” communications devices.                         Studies showed that the MACA protocol was not fair to
                                                                all stations on the network, and the throughput was not
In this paper we discuss a protocol suggested for wireless      very high under conditions of imperfect channels [BD].
!oca1 computer networks, known as MACAW [BD]. This
protocol was suggested as an improved means to enable           MACAW (MACA-wireless) improved upon IMACA by
computers in a local area to communicate with each              adding to this message sequence. The request-to-send
other. The protocol is intended for a single channel            (KTS) message from the sending station is followed by
packet radio network. This means that all stations use the      the clear-to-send (CTS) from the receiver, as with
same channel (frequency), so that should more than one          MACA; but the DATA is preceded by a short data-send
transmit at a time the signals may interfere.                   (DS) packet, which serves to alert the nearby stations that
                                                                a data packet is about to be transmitted, reducing the
Next we briefly describe MACAW. In section 2 , the              probability of a collision. This is followed by an ACK
formal specification is summarized. Section 3 discusses         packet from the receiver, through which reliability is
averification of the protocol.Further study of the              enhanced. This means that MACAW is able to provide
protocol was carried out through a series of simulations;       reliability at the MAC layer, where MACA co’uld not.
this is described in section 4. As a result of this work -
what we have learned through the formal specification           MACAW also uses a different backoff algorithm than
process, the verification, and the simulation -- we are         MACA. MACAW’S developers felt that the MACA


 U.S. Government work not protected                           565
 by U S . copyright.
backoff algorithm oscillated too rapidly. Instead the          predicate. The full specification is given in [All.
value of the backoff counter is increased by a factor of
1.5 (rather than 3) for each collision, and decreased by       111. VERIFICATION OF MACAW
1 for each success. This provided a gentler fluctuation        A major benefit of formal specification of protocols or
in the backoff counter.                                        computer programs is the potential for automated
                                                               generation and analysis. This automated analysis was
In this paper we show that MACAW is a reasonable               conducted using the program developed in [Bu]. The
protocol for its intended purpose, however that it can be      analysis is done by constructing a directed graph of
slightly refined and impioved. Our contributions               states and the transitions between states.
include the formalizing of the protocol specification, its
verification, additional knowledge of its performance,         Three basic configurations were analyzed with the
and suggested improvements.                                    automated analysis. The number of machines was vaned
                                                               by using three input files with two, three and four
       ECIFIC~~IO~      OF MACAW                               machines. Though it is possible to have more than four
MACAW is formally specified and analyzed using a               machines in a single cell, this is unusual; a cell is only a
model called systems of communicating machines. This           few meters in diameter. So, while our verification does
model, originally defined by Lundy and Miller[LM] has          not cover all cases, it does cover the majority of
been used to analyze several communications protocols.         practical cases.
Each machine is defined as a finite state machine with
variables. Communication between machines is done              All of the the possible specified transitions of MACAW
through the use of shared variables. Local variables are       were not always executed by all machines; in fact, for
used to maintain the state information for each machine,       some cases, all transitions were not executed by any
and a predicate-action table serves to unify the state         machines. At first glance this appeared as a protocol
machines and the variables. The goal of formal                 error -- an unexecutable transition but in fact was not.
specification is to determine if the protocol is free from     It was simply a case in which the transition in question
errors, such as deadlock or unexecutable transitions,          was not needed. For example, in the two machine
and if it possesses “liveness,” which is defined as the        analysis, none of the quiet stare transitions were
ability to make positive progress. An additional benefit       executed for the simple reason that there was no other
is identification of ambiguities in the protocol.              machine causing interference.

A formal specification of MACAW was developed in               With two machines: Machine 1 and machine 2 were run
[All, which includes a set of local variables, a set of        in the two machine analysis. Both began in the IDLE
shared variables, used for communication, a finite state       state and machine 1 had a message to send to machne
machine, and a predicate-action table.                         2. Once machne 3 received the DATA message from
                                                               machine 1 it sent a DATA message to machinel.
The shared variables are channel.type, channel.DA, esn,        (Machine 3’s action upon receiving a DATA message
channel-my-backoff,       channel-local-backofS,   and         included writing a DATA type message to its own output
channel-retry-amount.       These     are    used   for        buffer). No deadlock occurred and the total number of
communication between the nodes, and the names are             system state generated was 69. The corresponding
descriptive of their uses                                      global state analysis generated 275 states. One artificial
                                                               deadlock occurred in the global state analysis upon
The 1oca1 variables are inbuffer, outbuffer, backof,           receipt by machine 2 of the ACK message from
my-backoff, local-backoff.        Again, the names of the      machinel. The deadlock happened as a result of
variables are descriptive of their uses.                       clearing the output buffers when an ACK message was
                                                               received. Essentially, both machines received their
The finite state machine diagram has 10 major states.          respective DATA messages and no more data remained
These states are named IDLE, CONTEND, XMIT,                    to be transferred, thus causing a deadlock.
WFCTS, WFACK, WFDS, Q U E , WFDATA,
  FCONTEND, CQNTEND2.                                          Simulabons with 3 and 4 machines, which generated
                                                               many more states, are reported in [All.
The names of the states are descnptive; in IDLE, the
node has nothing to transmit. In CONTEND, the station          IV. SIMULATION AND ANALYSIS OF MACAW
has a message to transmit and is trying to get the             The purpose of the simulation is to determine the
channel; XMIT, is sending; “WF” signifies “Waiting             behavior of the protocol under different operational
for,” as in WFACK, “waiting for acknowledgment.”               conditions. Therefore, operational conditions are first
The initials CJTS signify “clear to send.”                     determined as test cases and simulations are performed
                                                               with these test cases. The results are analyzed and some
The predicate-action table unifies the finite-state            suggestions to improve the protocol are given.
diagram with the local and shared variables. Each
transition in the diagram has an entry in the table, and       The simulation model of the protocol was built using
for each entry there is an action and an enabling              OPNET 2 . k from M I D , Inc. The OPNET design



                                                             566
environment greatly eiased the simulation process.                              These cases are also tested from 10% to 100% of the
                                                                                total offered overlapping channel loads. An
A.Test Cases. The behaviors that we are interested in                           overlapping channel is the intersection of transmission
are the utilization of the channel and packet mean                              ranges of two (or more) non-communicating nodes
queue delay time. The usual performance measure for a                           where one’s transmission interferes with the other. .A
protocol is network utilization, but this does nut consider                     brief explanation of each case follows:
users of the network. ‘Therefore, mean queue delay time
is also considered as a performance measure of the                          Hidden node: While A is sending to B, C attempts to
protocol. These measures are related to the                                 send to B also. In this scenario A and C are not aware of
Communication channel load. The load of the channel                         each other but affected from each other’s transmission,
depends on the number of the nodes that are sharing the                     so they are hidden from each other. &)osed node:
same transmission media (channel) and their (internal)                      While B is sending to C, , attempts to send 1.0 B. Here B
                                                                                                        4
packet arrival rates. Besides these, the performance of                     is aware of A, thus B is exposed to -4’s transmissions.
the radio networks is greatly affected by hidden-                           Hidden and exposed nodes: While A and B are mutually
exposed nodeicell conditions [Karl.                                         exchangmg data, C attempts to send to R. Here A and C
                                                                            are hidden from each other and B is exposed to both A
With these consideratiions in mind, the test cases are                      and C. Hidden Cell: B and C are in different cells but
separated into two groups known as “load cases” and                         they can hear each other. Node . is not aware of the
                                                                                                                4
“hidden-exposed nodei’cell cases.” In the load cases, it                    communication going on in the adjacent cell since it
is also determined whether the protocol acts in favor of                    cannot hear anything from that cell, it is hid’den from A,
any specific communication topology. For each test                          the same is true for node D. Exmsed Cell B and C are
case, communication scenarios are determined and, for                       in different cells but each can hear the other’s
each scenario, test cases are generated with different                      transmissions while they are communicating with other
numbers of nodes and packet arrival rates.                                  nodes in their cells (A and D respectively). So they are
                                                                            exposed to each other’s transmissions.        ]Hidden and
With each load case, networks of up to four transmitting                    Exposed Cells: Node A does not hear any tiansmissions
nodes are built and each of these cases is tested from                      from the other cell xwhle node C is hearing node B. So
10% to 100% of the total offered channel loads. Having                      the adjacent cell is, hidden for A and exposed for C. All
up to four transmitting nodes for each load case                            in one: Heavy communication in both cells.
provided enough information about the behavior of .the
protocol under these conditions. Sample load case                           B. Performance Measure Criteria. As mentioned
scenarios are shown in Figure 1. The load case                              above, the performance measure also includes the mean
topologies of interest are as follows:                                      delay time in addition to utilization. The resultant
                                                                            formula is:
{a) reporting nodes with two, three and four transmitting
nodes; (b)one-wav communicating nodes with two,                                  Total-Performance = utilization I mean-queue-delay
three    and    four   transmitting    nodes;     (c)=
communicating nodes with one and two pairs mutually                         According to this formulation, if two utdizations are
communicating nodes; (d)ring communication with                             equal then the one with lesser mean delay time will have
three and four nodes.                                                       a better performance measure. For example, suppose
                                                                            we have measured an utilization of 54% with a mean
                                                                            delay time of 9 sec and for another case 54% Utilization
                                                                            with a mean delay of 3 sec. Just looking at the
                                                                            utilizations does not say anything about which one is
                                                                            better. But when delay times are considcrcd, the first
                                                                            case will have a performance measure of 0.54/9=0.06
                                                                            while the second case will have a prformaiuce measure
                                                                            of 0.%/3=0.18. This clearly shows that the second case
                                                                            is better.
                                                                            A performance measure should be independent of
                                                                            transmission speed of the network in order to be used to
                                                                            compare different protocols. Thus, delaiy time is
Figure 1: Sample load cases from each communication topology                normalized to data packet length. This me.ans we can
tested. For all cases above, all nodes are in one cell, that is all can     compare the performance of the protocol for networks
hear each other and arrows show the direction data streams. (a) four        with different transmission speeds.
reporting nodes, (b) two 1-way nodes, (c) two pairs cmss-
communicating nodes, (d) ring communication with four nodes.                C. Test Results. For all cases the Poisson distribution
                                                                            function is used for the packet arrival distnbution. The
Hidden-exposed nodeicell cases are shown in [Or].                           first test case, our base case, is chosen to determine the



                                                                          567
maximum performance of the node that is running                network increases, since per node utilization and data
MACAW protocol for a given arrival rate. This test is          mean queue delay times does not change.
conducted with a network of one transmitter and one
receiver, and utilization is calculated. Data mean queue       Hidden and Exposed Node/Cell Case Results In the
delay times are collected by OPNE3”s built-in utilities.       hidden node case, due to the rapid increase of the
OPNEX calculates the delay times of the packets that           backoff value of node B, performance is poor above
arrive to the queue during one unit of time and uses its       1 % of overlapping channel loads (load over node B).
                                                                0
mean (middle) value as a mean delay time of this time          Channel access is fair, because both transmitters are
period. The simulation result of this base case and the        using the same backoff value as in reporting nodes case
other cases are shown in detailed tables in [Or].              of load cases.
As seen from the table, the performance decreases              In the exposed node case performance is fairly high
rapidly beyond 80% offered channel loads due the high          compared to the hidden node case. However, above 80%
mean delay times. Maximum utilization observed for             of offered overlapping channel loads, the behavior of
the protocol with given packet sizes (30B for control          the network becomes similar to thc one way
packets, 520B for data packets), packet arrival                communicating node cases of the load cases. The
distribution function and backoff limits is 66%. These         “lucky” node gets the channel and keeps it.
results will be a base case to use in comparison with test
results.                                                        In the hidden and exposed node case , the hidden node
                                                               behavior is dominant. Due to the high delay times, the
Load Case Results         For the load cases, channel          performance decreases dramatically above 4%of
utilization almost never exceeds 50% for all simulations       overlapping channel loads .
(the maximum utilization observed for the protocol was
66% with current parameters). The exceptions are the           In the hidden cell case channel access of transmitter
base case and “one pair mutually communicating”                nodes (node -4 and D) are always fair because the
network case. In the base case there is no interfering         congestion levels at the receivers are similar. But due to
node against the transmitting node, so we should get           the congestion at the receiver side data packet delay
“the most” from the protocol. The reason that one pair         times in the transmitters are h g h so performance is low
mntually communicating network has high utilization            for cell loads above 25%. Its behavior is the same as the
and low backoff values than the other simulation cases is      hidden node case.
it has a slower rate of backoff increase for its remote
backoff values.                                                Modified Protocol Simulations During the simulations it
                                                               was observed that the backoff increase rate is one of the
For high loads, one-way communicating nodes cases              key factors that affects the performance of the MACAW
always violate the fairness of channel access. The             protocol under moderate and high loads (40% and
backoff algorithm dictates that each node keeps track          above). To further investigate, the same set of
of the congestion of the channel between itself and the        simulations were run with a lower backoff increase rate.
neighboring nodes via backoff values. When a node              As a result, for load cases with a small number of
attempts to communicate with one of its neighboring            transmitting nodes, significant performance gains were
nodes, it uses the associated backoff value. These             observed. These gains are due to the lower mean delay
backoff values are mutually exclusive. In a one way            times rather than increased utilization. But as the
communicating network scenario when a “lucky” node             number of the transmitting nodes increased, the
reaches the channel quicker than the others for a couple       performance gain achieved by this modification
of consecutive times it gets and keeps the channel by          degraded. No significant performance change was
h o w i n g other nodes have very high backoff values.         observed in hidden-exposed nodeicell cases.
Reporting and ring cases have similar results. They both       Another factor that affects the performance of the
have fair channel access during the simulations. But           protocol is the nodes’ inability to determine whether the
both have high backoff values. To have high backoff            channel is busy. According to the MACAW protocol,
value causes larger delay times on average therefore           nodes behave purely in accordance with the received
reporting and ring     cases have lower performance            packet information. The keyword here is “received.”
measures.                                                      The MAC layer that runs the MACAW protocol does not
                                                               know that it is receiving a packet until the entire packet
The best performance measures observed during the              has been transmitted. The probability of collision of two
simulations are around 20% channel load conditions for         transmitting nodes is the probability of transmission of
three and four transmitting nodes cases. A s the number        one node without recognizing (or before recognizing)
of transmitting nodes in the network increases, the effect     that another node is transmitting. The transmission
of having high backoff values decreases (for low loads),       probability of a node when it assumes that the channel is
because when the channel is free, the chance that there is     available is based on the distribution function and its
a node ready to transmit is high. So idle times of the         parameter value (in this case Poisson distribution with
channel are used and total performance measure of the



                                                             568
arrival rate value). The “recognition” period in the               observed, which was caused by the rapid iiocrease of the
original MACAW protocol is the time that it takes for              backoff increase rate for the small number of
control packet transmission plus propagation delay.                transmitting nodes cases. 4 relation between the backoff
Thus,      we     haw         a    sample     space     of         increase rate and the number of transmitting nodes was
time_slot+propugatic,n_clelay for a transmission event             observed (but this needs to be investigated more
that may cause a collision. When carrier sensing is                thoroughly). So, instead of using a linear increase rate
introduced to the protocol, this sample space shrinks to           use of dynamic or exponential increase rates may give
one propagarion-delay ( assuming time-slot >>                      better results. The dynamic increase can bind to the
propagation delay). So, carrier sensing will decrease the          number of transmitting nodes. For the fairness problem
probability    of     c:ollisions   by    a    factor   of         in one-way communicating nodes cases more
time-slotlpropagatioi~z_delay.    This is also what is             fundamental changes should be made to the algorithm.
observed during the simulations of the MACAW                       That is, the backoff algorithm needs to be thoroughly
protocol with carrier sensing capability. Significant              analyzed.
performance measure: increases observed for SO% and
above common channel loads. The source of gain is                  It is also observed that the channel acquisition with
lower mean delay times. While the greatest performance             carrier sensing is superior to the original MACAW
gain is achieved in the hidden node case (for SO%                  protocol policy. This is quite significant for medium
offered load), no change was observed in the hidden cell           and high loads. This contradicts the reasoning of the
case. In hidden cell case carrier sensing provides no help         original MACAW protocol specification which says
to the network to improve its performance, because                 “...carrier sensing is inappropriate” [13D].          This
transmitters are out of range from each other (the only            simulation is discussed in more detail in [Or] , as well as
time that a transmitter utilizes carrier sensing in this           the remainder of the simulations which are omitted here
topology is to sense its receiver’s RRTS packet).                  due to lack of space.

.4nother improvement achieved by carrier sensing is                V. CONCLUSIONS
fairer channel access of the transmitting nodes                    Uk described the: specification, verification, and
(compared to the original network) in the “hidden-                 simulation of MACAW. The specification uncovered
exposed cell” and “aill-in-one” network topologies.                some ambiguities in the original specilfication. The
                                                                   verification showed the protocol to be free of deadlocks,
In “hidden-exposed cell” network node C cannot get                 for most practical cases. Simulations gave further
the common channel1 as frequently as in the origmal                confidence in the protocol and showed further possible
protocol. Now C should wait B to send a11 its packet and           improvements in performance. We showed that the
act accordingly (nod,e C must understand what B is                 backoff algorithm is of major importance to the
“saying”). ’Ihis increases the performance of node A               performance of the protocol, and topology is also
slightly, because backoff values are dominant for the              critical. The protocol can also be improvled by adding
performance and here there is a big difference between             carrier sensing. Simulations suggest that this could
congestion levels of the receivers (especially for high            improve utilization under heavy load by about 5%.
loads).
                                                                   REFERENCES
In “all-in-one” case fairness is achieved between inner            [All         Almquist, Marty, Formal Spec$cation and Analysis ~7f a
                                                                                Wireless Media Access Protocol, MS Thesis, Department of
nodes. In the originail protocol for high loads (go%),                          Computer Science, Naval Postgraduate Schcol, Monterey, CA,
one of the inner noldes has much higher performance                             1995.
measure than the other. Now with carrier sensing both              [BDl         Bharghavan, V., Demer;, A.. Sbenker. S. and Zhang, L.
                                                                                “MACAW A Media Access Protocol for Wireless LAN’s,”
have similar performances. The performance difference                           Proceedings of ACM SIGCOMM 94, pp. 212-25, ACM, 1994.
between inner and outer nodes are still great because of           [BUI         Bulbul, B. AProtocol Validator,for the SCM and CFSMModels,
                                                                                MS Thesk, Naval Postgraduate School, 1993.
the congestion levels at the receivers.                            CEPl         Epstein, M., et al, “Application of Commercial Wireless LAN
                                                                                Technology to Forward Area Mobile Communication,“
Simulation Summary. It was determined that the                                  Proceedings,      Military     Communications      Conference,
                                                                                (MILCOM), 19%.
backoff algorithm has a significant importance for the             [Gel         Geier, Jim, Wireless Networking Handbook, New Riders, 1996.
Performance of the protocol, where performance is                  l I E l l-
                                                                   -        l   IEEE P802.11, Drafl Standard for Wirei’ess LAN Medium
defined in terms of channel utilization and transmitter                         Access Contrvl (MAC) and Physical Luyer Specifiraation
                                                                                (PHY), 19 J d y 1996.
mean delay times.                                                  [Karl        Karn P., “ M C A - A New Channel Access Method for Packet
                                                                                Radio,” ARRLICRRL, Amateur Radio Yth Computer Networkmg
                                                                                Conference, September 22, 1990.
Backoff is the measure of the congestion at the location           [Kat]        Katz, R, “Adaptation and Mobility in Wireless Information
of the node. Distribution of this information throughout                        System,”IEEE Personal Communications, First Quarter 1994.
the network provides fair access to this node by other             &MI          Lundy, G., and Miller, R, “Specification ancl analysis of a data
                                                                                transfer protocol using systems of communicating machines,”
nodes since each node keeps track of the other node’s                           Distributed Computing, May 1991.
congestion information in the network. But this does not           D l          Oruk, Tufon. Simulation and Analysis o a Wireless MAC
                                                                                                                      f
                                                                                Protocol: MACAW, MS Thesis, Department of Computer
help in the situations like one way communicating nodes                         Science, Naval Postgraduate Schml, 1996.
cases.     Also some performance degradation was



                                                             569

More Related Content

What's hot

11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manetAlexander Decker
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manetAlexander Decker
 
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...inventionjournals
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...ijsrd.com
 
An energy efficient mac protocol for wireless
An energy efficient mac protocol for wirelessAn energy efficient mac protocol for wireless
An energy efficient mac protocol for wirelessnabil_alsharafi
 
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...Eswar Publications
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
 
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Eiko Seidel
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106ijctet
 
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...Pranjal Das
 
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...Eiko Seidel
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
 
Unit vi and vii vtu
Unit vi and vii vtuUnit vi and vii vtu
Unit vi and vii vtuchempa
 
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...IRJET Journal
 

What's hot (20)

11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
 
Protocol p pt
Protocol p ptProtocol p pt
Protocol p pt
 
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
Dynamic Power Allocation for Mc-Cdma System Using Iterative Water Filling Alg...
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
 
An energy efficient mac protocol for wireless
An energy efficient mac protocol for wirelessAn energy efficient mac protocol for wireless
An energy efficient mac protocol for wireless
 
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...
Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication ...
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
 
P26093098
P26093098P26093098
P26093098
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106
 
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
 
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...
 
Unit vi and vii vtu
Unit vi and vii vtuUnit vi and vii vtu
Unit vi and vii vtu
 
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
 

Viewers also liked

Mortgage calculations qualifying for a mortgage in canada
Mortgage calculations qualifying for a mortgage in canadaMortgage calculations qualifying for a mortgage in canada
Mortgage calculations qualifying for a mortgage in canadaKola Ifabumuyi
 
Effective and Efficient Shape-Based Pattern Detection over Streaming Time Series
Effective and Efficient Shape-Based Pattern Detection over Streaming Time SeriesEffective and Efficient Shape-Based Pattern Detection over Streaming Time Series
Effective and Efficient Shape-Based Pattern Detection over Streaming Time Seriesambitlick
 
Raj Roy - CV
Raj Roy - CVRaj Roy - CV
Raj Roy - CVRaj Roy
 
NOHAMED KHALIL ABDEL-ALEEM- UT
NOHAMED KHALIL ABDEL-ALEEM- UTNOHAMED KHALIL ABDEL-ALEEM- UT
NOHAMED KHALIL ABDEL-ALEEM- UTMohammed Khalil
 
E ohutus - netikett ja turvalised paroolid
E ohutus - netikett ja turvalised paroolidE ohutus - netikett ja turvalised paroolid
E ohutus - netikett ja turvalised paroolidmerilinlepik
 
The IP Landscape: Intellectual Property in Theme Parks and Attractions
The IP Landscape: Intellectual Property in Theme Parks and Attractions The IP Landscape: Intellectual Property in Theme Parks and Attractions
The IP Landscape: Intellectual Property in Theme Parks and Attractions Jack Rouse Associates
 
ppl Internship report (Syed Wajih ul Hasnain)
ppl Internship report (Syed Wajih ul Hasnain)ppl Internship report (Syed Wajih ul Hasnain)
ppl Internship report (Syed Wajih ul Hasnain)syedwajih
 
10 step marketing plan arvin matias
10 step marketing plan arvin matias10 step marketing plan arvin matias
10 step marketing plan arvin matiasArvin Matias
 
Insuficiencia respiratoria aguda, IRA
Insuficiencia respiratoria aguda, IRAInsuficiencia respiratoria aguda, IRA
Insuficiencia respiratoria aguda, IRAjoel cordova
 
Mohd aijaz hussain cv(Design & Execution)
Mohd aijaz hussain cv(Design & Execution)Mohd aijaz hussain cv(Design & Execution)
Mohd aijaz hussain cv(Design & Execution)aijaz hussain
 
A privacy preserving framework for managing mobile ad requests and billing in...
A privacy preserving framework for managing mobile ad requests and billing in...A privacy preserving framework for managing mobile ad requests and billing in...
A privacy preserving framework for managing mobile ad requests and billing in...LeMeniz Infotech
 

Viewers also liked (19)

Mortgage calculations qualifying for a mortgage in canada
Mortgage calculations qualifying for a mortgage in canadaMortgage calculations qualifying for a mortgage in canada
Mortgage calculations qualifying for a mortgage in canada
 
Effective and Efficient Shape-Based Pattern Detection over Streaming Time Series
Effective and Efficient Shape-Based Pattern Detection over Streaming Time SeriesEffective and Efficient Shape-Based Pattern Detection over Streaming Time Series
Effective and Efficient Shape-Based Pattern Detection over Streaming Time Series
 
Frankenstein op een behangrol
Frankenstein op een behangrolFrankenstein op een behangrol
Frankenstein op een behangrol
 
Raj Roy - CV
Raj Roy - CVRaj Roy - CV
Raj Roy - CV
 
Mohan Pullabhatla
Mohan PullabhatlaMohan Pullabhatla
Mohan Pullabhatla
 
NOHAMED KHALIL ABDEL-ALEEM- UT
NOHAMED KHALIL ABDEL-ALEEM- UTNOHAMED KHALIL ABDEL-ALEEM- UT
NOHAMED KHALIL ABDEL-ALEEM- UT
 
Econ304 1 intro
Econ304 1 introEcon304 1 intro
Econ304 1 intro
 
seminar
seminarseminar
seminar
 
E ohutus - netikett ja turvalised paroolid
E ohutus - netikett ja turvalised paroolidE ohutus - netikett ja turvalised paroolid
E ohutus - netikett ja turvalised paroolid
 
The IP Landscape: Intellectual Property in Theme Parks and Attractions
The IP Landscape: Intellectual Property in Theme Parks and Attractions The IP Landscape: Intellectual Property in Theme Parks and Attractions
The IP Landscape: Intellectual Property in Theme Parks and Attractions
 
ppl Internship report (Syed Wajih ul Hasnain)
ppl Internship report (Syed Wajih ul Hasnain)ppl Internship report (Syed Wajih ul Hasnain)
ppl Internship report (Syed Wajih ul Hasnain)
 
10 step marketing plan arvin matias
10 step marketing plan arvin matias10 step marketing plan arvin matias
10 step marketing plan arvin matias
 
Zeeshan Hyder
Zeeshan HyderZeeshan Hyder
Zeeshan Hyder
 
Econ708 fidning topic
Econ708   fidning topicEcon708   fidning topic
Econ708 fidning topic
 
Rinitis Alérgica
Rinitis Alérgica Rinitis Alérgica
Rinitis Alérgica
 
Nguyen khoi viet cardiac mri for the evaluation of ischemic heart disease jfi...
Nguyen khoi viet cardiac mri for the evaluation of ischemic heart disease jfi...Nguyen khoi viet cardiac mri for the evaluation of ischemic heart disease jfi...
Nguyen khoi viet cardiac mri for the evaluation of ischemic heart disease jfi...
 
Insuficiencia respiratoria aguda, IRA
Insuficiencia respiratoria aguda, IRAInsuficiencia respiratoria aguda, IRA
Insuficiencia respiratoria aguda, IRA
 
Mohd aijaz hussain cv(Design & Execution)
Mohd aijaz hussain cv(Design & Execution)Mohd aijaz hussain cv(Design & Execution)
Mohd aijaz hussain cv(Design & Execution)
 
A privacy preserving framework for managing mobile ad requests and billing in...
A privacy preserving framework for managing mobile ad requests and billing in...A privacy preserving framework for managing mobile ad requests and billing in...
A privacy preserving framework for managing mobile ad requests and billing in...
 

Similar to Specifica‘tion, verification and simulation of a wireless lan

A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...cscpconf
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptxHirazNor
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...IJCNCJournal
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...ijaia
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127IJMER
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksIJMER
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-mainRahul Singh
 
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSSLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSijwmn
 
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSSLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSijwmn
 
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...IJNSA Journal
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessIJORCS
 
General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...ijwmn
 
General Model for Single and Multiple Channels WLANs with Quality of Service...
 General Model for Single and Multiple Channels WLANs with Quality of Service... General Model for Single and Multiple Channels WLANs with Quality of Service...
General Model for Single and Multiple Channels WLANs with Quality of Service...ijwmn
 
Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...BRNSSPublicationHubI
 

Similar to Specifica‘tion, verification and simulation of a wireless lan (20)

PROGRESS 1& 2.ppt
PROGRESS 1& 2.pptPROGRESS 1& 2.ppt
PROGRESS 1& 2.ppt
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptx
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
 
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSSLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
 
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSSLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
 
mn paper
mn papermn paper
mn paper
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
 
General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...
 
General Model for Single and Multiple Channels WLANs with Quality of Service...
 General Model for Single and Multiple Channels WLANs with Quality of Service... General Model for Single and Multiple Channels WLANs with Quality of Service...
General Model for Single and Multiple Channels WLANs with Quality of Service...
 
Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
 

More from ambitlick

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...ambitlick
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsambitlick
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013ambitlick
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013ambitlick
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocationambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2 ambitlick
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1ambitlick
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portalambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”ambitlick
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...ambitlick
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministicambitlick
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...ambitlick
 

More from ambitlick (20)

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projects
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
 
Embassy
EmbassyEmbassy
Embassy
 
Crm
Crm Crm
Crm
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministic
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 

Recently uploaded

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Recently uploaded (20)

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

Specifica‘tion, verification and simulation of a wireless lan

  • 1. SPECIFICA‘TION, VERIFICATION AND SIMULATION OF A WIRELESS LAN PROTOCOL: MACAW G M Lundy, M. Almquist, T. Oruk U S Naval Postgraduate School Monterey, CA 93943 ABSTRACT able to make some suggestions as to how it can be A formal specification and verification of a wireless improved, and to give a fairly accurate indication of how LAN protocol is given, and a simulation of the much the improvements will help performance. protocol’s performance is also described. The verification is a partial verification in that it does not MACAW -- Multiple Access, Collision Avoidance, include a general verification of all possible Wireless -- was designed as an improvement upon an configurations of the protocol; however; it does cover earlier protocol, called MACA [Karl. MACAW is based the expected usage of ihe protocol, which is for a small on the same principle as is the cellular radio network for number of users sharing a cell. The simulation provides automobiles. A set of base stations, which are ail further insight into the protocol, especially concerning connected by a wired system, communicate via radio its performance. Ba,sea! on the verification and signals with the user stations. The difference is that with simulation, some sug,gestions are made which can MACAW, the base stations are connected by a local area improve the protocol’s performance. network -- such as CSMACD -- rather than a telephone type network covering a large area. The area around I. INTRODUCTION each base station is called a cell; and the users Wireless communications in various forms has been the communicate with the nearest base station. Another subject of much attention and research in recent years. difference is in the cell size; here we are using cells Wireless communications include the broadcast radio which are only a few meters in diameter, rather than medium; terrestrial microwave[Mili]; satellite microwave miles across. A third difference is that the :stations are in all its forms [Ha,Ree]; and the International Amateur not mobile, as are autos. The signals are relatively weak, Radio Network, or “Ham Radio”[Bi]. Additionally , so that they should not penetrate beyond the “cell,” or wireless communications includes acoustical (sound) its local area. However it is possible that some communications, used by submarines for many years, interference between adjacent cells may occur. Other and also for data communications, at least protocols for wireless and broadcast networks exist, and experimentally [Rei]; and optical (visible) light have been in use for years; these are discussed in the communications, which are still used by maritime references. vessels. More recent fioms of wireless communications includes wireless telephones; cellular telephones; air MACA (medium accessicollision avoidance) Karl, phones, which enable the passenger aboard an airliner to MAC‘4W’s predecessor, used a sequence of three basic connect to the long distance telephone system; and messages: request-to-send, clear-to-send, and DATA. wireless computer networks. Pagers and remote control MACX used binary exponential backoff aligorithm to devices might also be included, though these are very resolve collisions, the same type used in CSMA/CIl. “low bandwidth” communications devices. Studies showed that the MACA protocol was not fair to all stations on the network, and the throughput was not In this paper we discuss a protocol suggested for wireless very high under conditions of imperfect channels [BD]. !oca1 computer networks, known as MACAW [BD]. This protocol was suggested as an improved means to enable MACAW (MACA-wireless) improved upon IMACA by computers in a local area to communicate with each adding to this message sequence. The request-to-send other. The protocol is intended for a single channel (KTS) message from the sending station is followed by packet radio network. This means that all stations use the the clear-to-send (CTS) from the receiver, as with same channel (frequency), so that should more than one MACA; but the DATA is preceded by a short data-send transmit at a time the signals may interfere. (DS) packet, which serves to alert the nearby stations that a data packet is about to be transmitted, reducing the Next we briefly describe MACAW. In section 2 , the probability of a collision. This is followed by an ACK formal specification is summarized. Section 3 discusses packet from the receiver, through which reliability is averification of the protocol.Further study of the enhanced. This means that MACAW is able to provide protocol was carried out through a series of simulations; reliability at the MAC layer, where MACA co’uld not. this is described in section 4. As a result of this work - what we have learned through the formal specification MACAW also uses a different backoff algorithm than process, the verification, and the simulation -- we are MACA. MACAW’S developers felt that the MACA U.S. Government work not protected 565 by U S . copyright.
  • 2. backoff algorithm oscillated too rapidly. Instead the predicate. The full specification is given in [All. value of the backoff counter is increased by a factor of 1.5 (rather than 3) for each collision, and decreased by 111. VERIFICATION OF MACAW 1 for each success. This provided a gentler fluctuation A major benefit of formal specification of protocols or in the backoff counter. computer programs is the potential for automated generation and analysis. This automated analysis was In this paper we show that MACAW is a reasonable conducted using the program developed in [Bu]. The protocol for its intended purpose, however that it can be analysis is done by constructing a directed graph of slightly refined and impioved. Our contributions states and the transitions between states. include the formalizing of the protocol specification, its verification, additional knowledge of its performance, Three basic configurations were analyzed with the and suggested improvements. automated analysis. The number of machines was vaned by using three input files with two, three and four ECIFIC~~IO~ OF MACAW machines. Though it is possible to have more than four MACAW is formally specified and analyzed using a machines in a single cell, this is unusual; a cell is only a model called systems of communicating machines. This few meters in diameter. So, while our verification does model, originally defined by Lundy and Miller[LM] has not cover all cases, it does cover the majority of been used to analyze several communications protocols. practical cases. Each machine is defined as a finite state machine with variables. Communication between machines is done All of the the possible specified transitions of MACAW through the use of shared variables. Local variables are were not always executed by all machines; in fact, for used to maintain the state information for each machine, some cases, all transitions were not executed by any and a predicate-action table serves to unify the state machines. At first glance this appeared as a protocol machines and the variables. The goal of formal error -- an unexecutable transition but in fact was not. specification is to determine if the protocol is free from It was simply a case in which the transition in question errors, such as deadlock or unexecutable transitions, was not needed. For example, in the two machine and if it possesses “liveness,” which is defined as the analysis, none of the quiet stare transitions were ability to make positive progress. An additional benefit executed for the simple reason that there was no other is identification of ambiguities in the protocol. machine causing interference. A formal specification of MACAW was developed in With two machines: Machine 1 and machine 2 were run [All, which includes a set of local variables, a set of in the two machine analysis. Both began in the IDLE shared variables, used for communication, a finite state state and machine 1 had a message to send to machne machine, and a predicate-action table. 2. Once machne 3 received the DATA message from machine 1 it sent a DATA message to machinel. The shared variables are channel.type, channel.DA, esn, (Machine 3’s action upon receiving a DATA message channel-my-backoff, channel-local-backofS, and included writing a DATA type message to its own output channel-retry-amount. These are used for buffer). No deadlock occurred and the total number of communication between the nodes, and the names are system state generated was 69. The corresponding descriptive of their uses global state analysis generated 275 states. One artificial deadlock occurred in the global state analysis upon The 1oca1 variables are inbuffer, outbuffer, backof, receipt by machine 2 of the ACK message from my-backoff, local-backoff. Again, the names of the machinel. The deadlock happened as a result of variables are descriptive of their uses. clearing the output buffers when an ACK message was received. Essentially, both machines received their The finite state machine diagram has 10 major states. respective DATA messages and no more data remained These states are named IDLE, CONTEND, XMIT, to be transferred, thus causing a deadlock. WFCTS, WFACK, WFDS, Q U E , WFDATA, FCONTEND, CQNTEND2. Simulabons with 3 and 4 machines, which generated many more states, are reported in [All. The names of the states are descnptive; in IDLE, the node has nothing to transmit. In CONTEND, the station IV. SIMULATION AND ANALYSIS OF MACAW has a message to transmit and is trying to get the The purpose of the simulation is to determine the channel; XMIT, is sending; “WF” signifies “Waiting behavior of the protocol under different operational for,” as in WFACK, “waiting for acknowledgment.” conditions. Therefore, operational conditions are first The initials CJTS signify “clear to send.” determined as test cases and simulations are performed with these test cases. The results are analyzed and some The predicate-action table unifies the finite-state suggestions to improve the protocol are given. diagram with the local and shared variables. Each transition in the diagram has an entry in the table, and The simulation model of the protocol was built using for each entry there is an action and an enabling OPNET 2 . k from M I D , Inc. The OPNET design 566
  • 3. environment greatly eiased the simulation process. These cases are also tested from 10% to 100% of the total offered overlapping channel loads. An A.Test Cases. The behaviors that we are interested in overlapping channel is the intersection of transmission are the utilization of the channel and packet mean ranges of two (or more) non-communicating nodes queue delay time. The usual performance measure for a where one’s transmission interferes with the other. .A protocol is network utilization, but this does nut consider brief explanation of each case follows: users of the network. ‘Therefore, mean queue delay time is also considered as a performance measure of the Hidden node: While A is sending to B, C attempts to protocol. These measures are related to the send to B also. In this scenario A and C are not aware of Communication channel load. The load of the channel each other but affected from each other’s transmission, depends on the number of the nodes that are sharing the so they are hidden from each other. &)osed node: same transmission media (channel) and their (internal) While B is sending to C, , attempts to send 1.0 B. Here B 4 packet arrival rates. Besides these, the performance of is aware of A, thus B is exposed to -4’s transmissions. the radio networks is greatly affected by hidden- Hidden and exposed nodes: While A and B are mutually exposed nodeicell conditions [Karl. exchangmg data, C attempts to send to R. Here A and C are hidden from each other and B is exposed to both A With these consideratiions in mind, the test cases are and C. Hidden Cell: B and C are in different cells but separated into two groups known as “load cases” and they can hear each other. Node . is not aware of the 4 “hidden-exposed nodei’cell cases.” In the load cases, it communication going on in the adjacent cell since it is also determined whether the protocol acts in favor of cannot hear anything from that cell, it is hid’den from A, any specific communication topology. For each test the same is true for node D. Exmsed Cell B and C are case, communication scenarios are determined and, for in different cells but each can hear the other’s each scenario, test cases are generated with different transmissions while they are communicating with other numbers of nodes and packet arrival rates. nodes in their cells (A and D respectively). So they are exposed to each other’s transmissions. ]Hidden and With each load case, networks of up to four transmitting Exposed Cells: Node A does not hear any tiansmissions nodes are built and each of these cases is tested from from the other cell xwhle node C is hearing node B. So 10% to 100% of the total offered channel loads. Having the adjacent cell is, hidden for A and exposed for C. All up to four transmitting nodes for each load case in one: Heavy communication in both cells. provided enough information about the behavior of .the protocol under these conditions. Sample load case B. Performance Measure Criteria. As mentioned scenarios are shown in Figure 1. The load case above, the performance measure also includes the mean topologies of interest are as follows: delay time in addition to utilization. The resultant formula is: {a) reporting nodes with two, three and four transmitting nodes; (b)one-wav communicating nodes with two, Total-Performance = utilization I mean-queue-delay three and four transmitting nodes; (c)= communicating nodes with one and two pairs mutually According to this formulation, if two utdizations are communicating nodes; (d)ring communication with equal then the one with lesser mean delay time will have three and four nodes. a better performance measure. For example, suppose we have measured an utilization of 54% with a mean delay time of 9 sec and for another case 54% Utilization with a mean delay of 3 sec. Just looking at the utilizations does not say anything about which one is better. But when delay times are considcrcd, the first case will have a performance measure of 0.54/9=0.06 while the second case will have a prformaiuce measure of 0.%/3=0.18. This clearly shows that the second case is better. A performance measure should be independent of transmission speed of the network in order to be used to compare different protocols. Thus, delaiy time is Figure 1: Sample load cases from each communication topology normalized to data packet length. This me.ans we can tested. For all cases above, all nodes are in one cell, that is all can compare the performance of the protocol for networks hear each other and arrows show the direction data streams. (a) four with different transmission speeds. reporting nodes, (b) two 1-way nodes, (c) two pairs cmss- communicating nodes, (d) ring communication with four nodes. C. Test Results. For all cases the Poisson distribution function is used for the packet arrival distnbution. The Hidden-exposed nodeicell cases are shown in [Or]. first test case, our base case, is chosen to determine the 567
  • 4. maximum performance of the node that is running network increases, since per node utilization and data MACAW protocol for a given arrival rate. This test is mean queue delay times does not change. conducted with a network of one transmitter and one receiver, and utilization is calculated. Data mean queue Hidden and Exposed Node/Cell Case Results In the delay times are collected by OPNE3”s built-in utilities. hidden node case, due to the rapid increase of the OPNEX calculates the delay times of the packets that backoff value of node B, performance is poor above arrive to the queue during one unit of time and uses its 1 % of overlapping channel loads (load over node B). 0 mean (middle) value as a mean delay time of this time Channel access is fair, because both transmitters are period. The simulation result of this base case and the using the same backoff value as in reporting nodes case other cases are shown in detailed tables in [Or]. of load cases. As seen from the table, the performance decreases In the exposed node case performance is fairly high rapidly beyond 80% offered channel loads due the high compared to the hidden node case. However, above 80% mean delay times. Maximum utilization observed for of offered overlapping channel loads, the behavior of the protocol with given packet sizes (30B for control the network becomes similar to thc one way packets, 520B for data packets), packet arrival communicating node cases of the load cases. The distribution function and backoff limits is 66%. These “lucky” node gets the channel and keeps it. results will be a base case to use in comparison with test results. In the hidden and exposed node case , the hidden node behavior is dominant. Due to the high delay times, the Load Case Results For the load cases, channel performance decreases dramatically above 4%of utilization almost never exceeds 50% for all simulations overlapping channel loads . (the maximum utilization observed for the protocol was 66% with current parameters). The exceptions are the In the hidden cell case channel access of transmitter base case and “one pair mutually communicating” nodes (node -4 and D) are always fair because the network case. In the base case there is no interfering congestion levels at the receivers are similar. But due to node against the transmitting node, so we should get the congestion at the receiver side data packet delay “the most” from the protocol. The reason that one pair times in the transmitters are h g h so performance is low mntually communicating network has high utilization for cell loads above 25%. Its behavior is the same as the and low backoff values than the other simulation cases is hidden node case. it has a slower rate of backoff increase for its remote backoff values. Modified Protocol Simulations During the simulations it was observed that the backoff increase rate is one of the For high loads, one-way communicating nodes cases key factors that affects the performance of the MACAW always violate the fairness of channel access. The protocol under moderate and high loads (40% and backoff algorithm dictates that each node keeps track above). To further investigate, the same set of of the congestion of the channel between itself and the simulations were run with a lower backoff increase rate. neighboring nodes via backoff values. When a node As a result, for load cases with a small number of attempts to communicate with one of its neighboring transmitting nodes, significant performance gains were nodes, it uses the associated backoff value. These observed. These gains are due to the lower mean delay backoff values are mutually exclusive. In a one way times rather than increased utilization. But as the communicating network scenario when a “lucky” node number of the transmitting nodes increased, the reaches the channel quicker than the others for a couple performance gain achieved by this modification of consecutive times it gets and keeps the channel by degraded. No significant performance change was h o w i n g other nodes have very high backoff values. observed in hidden-exposed nodeicell cases. Reporting and ring cases have similar results. They both Another factor that affects the performance of the have fair channel access during the simulations. But protocol is the nodes’ inability to determine whether the both have high backoff values. To have high backoff channel is busy. According to the MACAW protocol, value causes larger delay times on average therefore nodes behave purely in accordance with the received reporting and ring cases have lower performance packet information. The keyword here is “received.” measures. The MAC layer that runs the MACAW protocol does not know that it is receiving a packet until the entire packet The best performance measures observed during the has been transmitted. The probability of collision of two simulations are around 20% channel load conditions for transmitting nodes is the probability of transmission of three and four transmitting nodes cases. A s the number one node without recognizing (or before recognizing) of transmitting nodes in the network increases, the effect that another node is transmitting. The transmission of having high backoff values decreases (for low loads), probability of a node when it assumes that the channel is because when the channel is free, the chance that there is available is based on the distribution function and its a node ready to transmit is high. So idle times of the parameter value (in this case Poisson distribution with channel are used and total performance measure of the 568
  • 5. arrival rate value). The “recognition” period in the observed, which was caused by the rapid iiocrease of the original MACAW protocol is the time that it takes for backoff increase rate for the small number of control packet transmission plus propagation delay. transmitting nodes cases. 4 relation between the backoff Thus, we haw a sample space of increase rate and the number of transmitting nodes was time_slot+propugatic,n_clelay for a transmission event observed (but this needs to be investigated more that may cause a collision. When carrier sensing is thoroughly). So, instead of using a linear increase rate introduced to the protocol, this sample space shrinks to use of dynamic or exponential increase rates may give one propagarion-delay ( assuming time-slot >> better results. The dynamic increase can bind to the propagation delay). So, carrier sensing will decrease the number of transmitting nodes. For the fairness problem probability of c:ollisions by a factor of in one-way communicating nodes cases more time-slotlpropagatioi~z_delay. This is also what is fundamental changes should be made to the algorithm. observed during the simulations of the MACAW That is, the backoff algorithm needs to be thoroughly protocol with carrier sensing capability. Significant analyzed. performance measure: increases observed for SO% and above common channel loads. The source of gain is It is also observed that the channel acquisition with lower mean delay times. While the greatest performance carrier sensing is superior to the original MACAW gain is achieved in the hidden node case (for SO% protocol policy. This is quite significant for medium offered load), no change was observed in the hidden cell and high loads. This contradicts the reasoning of the case. In hidden cell case carrier sensing provides no help original MACAW protocol specification which says to the network to improve its performance, because “...carrier sensing is inappropriate” [13D]. This transmitters are out of range from each other (the only simulation is discussed in more detail in [Or] , as well as time that a transmitter utilizes carrier sensing in this the remainder of the simulations which are omitted here topology is to sense its receiver’s RRTS packet). due to lack of space. .4nother improvement achieved by carrier sensing is V. CONCLUSIONS fairer channel access of the transmitting nodes Uk described the: specification, verification, and (compared to the original network) in the “hidden- simulation of MACAW. The specification uncovered exposed cell” and “aill-in-one” network topologies. some ambiguities in the original specilfication. The verification showed the protocol to be free of deadlocks, In “hidden-exposed cell” network node C cannot get for most practical cases. Simulations gave further the common channel1 as frequently as in the origmal confidence in the protocol and showed further possible protocol. Now C should wait B to send a11 its packet and improvements in performance. We showed that the act accordingly (nod,e C must understand what B is backoff algorithm is of major importance to the “saying”). ’Ihis increases the performance of node A performance of the protocol, and topology is also slightly, because backoff values are dominant for the critical. The protocol can also be improvled by adding performance and here there is a big difference between carrier sensing. Simulations suggest that this could congestion levels of the receivers (especially for high improve utilization under heavy load by about 5%. loads). REFERENCES In “all-in-one” case fairness is achieved between inner [All Almquist, Marty, Formal Spec$cation and Analysis ~7f a Wireless Media Access Protocol, MS Thesis, Department of nodes. In the originail protocol for high loads (go%), Computer Science, Naval Postgraduate Schcol, Monterey, CA, one of the inner noldes has much higher performance 1995. measure than the other. Now with carrier sensing both [BDl Bharghavan, V., Demer;, A.. Sbenker. S. and Zhang, L. “MACAW A Media Access Protocol for Wireless LAN’s,” have similar performances. The performance difference Proceedings of ACM SIGCOMM 94, pp. 212-25, ACM, 1994. between inner and outer nodes are still great because of [BUI Bulbul, B. AProtocol Validator,for the SCM and CFSMModels, MS Thesk, Naval Postgraduate School, 1993. the congestion levels at the receivers. CEPl Epstein, M., et al, “Application of Commercial Wireless LAN Technology to Forward Area Mobile Communication,“ Simulation Summary. It was determined that the Proceedings, Military Communications Conference, (MILCOM), 19%. backoff algorithm has a significant importance for the [Gel Geier, Jim, Wireless Networking Handbook, New Riders, 1996. Performance of the protocol, where performance is l I E l l- - l IEEE P802.11, Drafl Standard for Wirei’ess LAN Medium defined in terms of channel utilization and transmitter Access Contrvl (MAC) and Physical Luyer Specifiraation (PHY), 19 J d y 1996. mean delay times. [Karl Karn P., “ M C A - A New Channel Access Method for Packet Radio,” ARRLICRRL, Amateur Radio Yth Computer Networkmg Conference, September 22, 1990. Backoff is the measure of the congestion at the location [Kat] Katz, R, “Adaptation and Mobility in Wireless Information of the node. Distribution of this information throughout System,”IEEE Personal Communications, First Quarter 1994. the network provides fair access to this node by other &MI Lundy, G., and Miller, R, “Specification ancl analysis of a data transfer protocol using systems of communicating machines,” nodes since each node keeps track of the other node’s Distributed Computing, May 1991. congestion information in the network. But this does not D l Oruk, Tufon. Simulation and Analysis o a Wireless MAC f Protocol: MACAW, MS Thesis, Department of Computer help in the situations like one way communicating nodes Science, Naval Postgraduate Schml, 1996. cases. Also some performance degradation was 569