SlideShare a Scribd company logo
1 of 4
Download to read offline
A Channel Allocation Algorithm for Reducing the Channel
Sensing/Reserving Asymmetry in 802.11ac Networks
Abstract:
The major goal of IEEE 802.11ac is to provide very high throughput (VHT)
performance while at the same time guaranteeing backward compatibility.
To achieve this goal, 802.11ac adopts the channel bonding technique that
makes use of multiple 20MHz channels in 5GHz band. Due to the
heterogeneity of bandwidth that each device exploits, and the fixed total
transmission power in the standards, a problem called ‘Hidden Channel’
arises. In this paper, we first analyze the problem and show how the
contention parameters and transmission time affect collision probability
and fairness in some deployment scenarios.
Then, we propose a heuristic channel allocation algorithm that aims to
avoid such problematic situations effectively. Through simulations, we
demonstrate that our proposed channel allocation algorithm lowers the
packet error rate (PER) compared to uncoordinated and RSSI (Received
Signal Strength Indicator) based allocation schemes and increases the
network-wide throughput as well as the throughput of a station that
experiences poor performance. This implies improved fairness
performance among transmission pairs with various channel bandwidths.
Existing System:
The quality of the transmission could vary significantly causing unfairness.
Further, the fixed transmission power and the difference in CCA sensitivity
and bandwidth usage lead to asymmetric sensing/reserving situations
between two devices.
This implies that a transmission from a device may not be sensed by
another device while it is sensed in the other direction, so channel
reservation is successful only in one direction. We call this problem the
Hidden Channel (HC) problem throughput this paper. The HC problem
has basically originated due to the heterogeneity of the channel and
bandwidth usage.
Proposed System:
We analyze the asymmetric channel sensing/reserving situation from the
perspective of downlink communication, and illustrate via numerical
results how the contention parameters and the packet length impact
performance.
We use graph coloring to model the channel allocation problem, and prove
that the problem is NP-hard.
We present a heuristic algorithm that aims to eliminate the HC problem
while maximizing channel utilization.
We evaluate the performance of our heuristic algorithm with simulations.
To the best of our knowledge, this is the first work that explicitly deals with
channel allocation to alleviate the HC problem in 802.11ac networks.
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• RAM : 256 Mb.
Software Requirements:
• Operating system : - Windows XP.
• Front End : - JSP
• Back End : - SQL Server
Software Requirements:
• Operating system : - Windows XP.
• Front End : - .Net
• Back End : - SQL Server

More Related Content

What's hot

Icfcc conference real
Icfcc conference realIcfcc conference real
Icfcc conference real
UM
 
Lifetime-Aware Scheduling and Power Control for MTC in LTE Networks
Lifetime-Aware Scheduling and Power Control for MTC in LTE NetworksLifetime-Aware Scheduling and Power Control for MTC in LTE Networks
Lifetime-Aware Scheduling and Power Control for MTC in LTE Networks
amin azari
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networks
lily888
 

What's hot (14)

A Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling RouterA Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling Router
 
Icfcc conference real
Icfcc conference realIcfcc conference real
Icfcc conference real
 
30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed
 
Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...
 
Network layer
Network layerNetwork layer
Network layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Resource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networksResource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networks
 
Lifetime-Aware Scheduling and Power Control for MTC in LTE Networks
Lifetime-Aware Scheduling and Power Control for MTC in LTE NetworksLifetime-Aware Scheduling and Power Control for MTC in LTE Networks
Lifetime-Aware Scheduling and Power Control for MTC in LTE Networks
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
IEEE 2014 JAVA NETWORKING PROJECTS Cost effective resource allocation of over...
IEEE 2014 JAVA NETWORKING PROJECTS Cost effective resource allocation of over...IEEE 2014 JAVA NETWORKING PROJECTS Cost effective resource allocation of over...
IEEE 2014 JAVA NETWORKING PROJECTS Cost effective resource allocation of over...
 
An enhanced available bandwidth estimation technique for an end to end networ...
An enhanced available bandwidth estimation technique for an end to end networ...An enhanced available bandwidth estimation technique for an end to end networ...
An enhanced available bandwidth estimation technique for an end to end networ...
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networks
 

Viewers also liked

El porc senglar solitari
El porc senglar solitariEl porc senglar solitari
El porc senglar solitari
josegkast
 
I moduli di alimentazione a inverter trifase a velocità variabile di Fairchil...
I moduli di alimentazione a inverter trifase a velocità variabile di Fairchil...I moduli di alimentazione a inverter trifase a velocità variabile di Fairchil...
I moduli di alimentazione a inverter trifase a velocità variabile di Fairchil...
SEIGRADI
 
Ute ivet-monge-gonzalo-remache-nuevas dimensiones de lo social-febrero-2014
Ute ivet-monge-gonzalo-remache-nuevas dimensiones de lo social-febrero-2014Ute ivet-monge-gonzalo-remache-nuevas dimensiones de lo social-febrero-2014
Ute ivet-monge-gonzalo-remache-nuevas dimensiones de lo social-febrero-2014
Ive7916
 
Dokumentasi di desa gunung rejo kecamatan singosari
Dokumentasi di desa gunung rejo kecamatan singosariDokumentasi di desa gunung rejo kecamatan singosari
Dokumentasi di desa gunung rejo kecamatan singosari
rara701
 

Viewers also liked (20)

Lola isa elena (1)
Lola isa elena (1)Lola isa elena (1)
Lola isa elena (1)
 
Congelador de disco
Congelador de discoCongelador de disco
Congelador de disco
 
El porc senglar solitari
El porc senglar solitariEl porc senglar solitari
El porc senglar solitari
 
I moduli di alimentazione a inverter trifase a velocità variabile di Fairchil...
I moduli di alimentazione a inverter trifase a velocità variabile di Fairchil...I moduli di alimentazione a inverter trifase a velocità variabile di Fairchil...
I moduli di alimentazione a inverter trifase a velocità variabile di Fairchil...
 
Ute ivet-monge-gonzalo-remache-nuevas dimensiones de lo social-febrero-2014
Ute ivet-monge-gonzalo-remache-nuevas dimensiones de lo social-febrero-2014Ute ivet-monge-gonzalo-remache-nuevas dimensiones de lo social-febrero-2014
Ute ivet-monge-gonzalo-remache-nuevas dimensiones de lo social-febrero-2014
 
Dokumentasi di desa gunung rejo kecamatan singosari
Dokumentasi di desa gunung rejo kecamatan singosariDokumentasi di desa gunung rejo kecamatan singosari
Dokumentasi di desa gunung rejo kecamatan singosari
 
Practica 2
Practica 2Practica 2
Practica 2
 
Slideshare-Practica
Slideshare-PracticaSlideshare-Practica
Slideshare-Practica
 
Introduccion a las bases de datos
Introduccion a las bases de datosIntroduccion a las bases de datos
Introduccion a las bases de datos
 
Màrqueting relacional per a la cultura
Màrqueting relacional per a la culturaMàrqueting relacional per a la cultura
Màrqueting relacional per a la cultura
 
Practica1 14 feb 2014
Practica1 14 feb 2014Practica1 14 feb 2014
Practica1 14 feb 2014
 
Assisi con Papa Francesco
Assisi con Papa FrancescoAssisi con Papa Francesco
Assisi con Papa Francesco
 
Servizi generale
Servizi generaleServizi generale
Servizi generale
 
Quantum at Persontrafik Stockholm
Quantum at Persontrafik StockholmQuantum at Persontrafik Stockholm
Quantum at Persontrafik Stockholm
 
1954 doctrina nacional
1954 doctrina nacional1954 doctrina nacional
1954 doctrina nacional
 
PEAD - Practica 8 Circuito off-delay
PEAD - Practica 8 Circuito off-delayPEAD - Practica 8 Circuito off-delay
PEAD - Practica 8 Circuito off-delay
 
Escornabois pablo guerrica e martín
Escornabois pablo guerrica e martínEscornabois pablo guerrica e martín
Escornabois pablo guerrica e martín
 
Presentation румъния2
Presentation румъния2Presentation румъния2
Presentation румъния2
 
Examen
ExamenExamen
Examen
 
Sin título 2
Sin título 2Sin título 2
Sin título 2
 

Similar to A channel allocation algorithm for reducing the channel sensing reserving asymmetry in 802.11ac networks

Cooperation without synchronization practical cooperative relaying for wirele...
Cooperation without synchronization practical cooperative relaying for wirele...Cooperation without synchronization practical cooperative relaying for wirele...
Cooperation without synchronization practical cooperative relaying for wirele...
ieeeprojectschennai
 
Ieee interference-measurements-802.11n
Ieee interference-measurements-802.11nIeee interference-measurements-802.11n
Ieee interference-measurements-802.11n
Steph Cliche
 
Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802
Mumbai Academisc
 
band width ppt
band width pptband width ppt
band width ppt
Sai Nukala
 

Similar to A channel allocation algorithm for reducing the channel sensing reserving asymmetry in 802.11ac networks (20)

Cooperation without synchronization practical cooperative relaying for wirele...
Cooperation without synchronization practical cooperative relaying for wirele...Cooperation without synchronization practical cooperative relaying for wirele...
Cooperation without synchronization practical cooperative relaying for wirele...
 
Cooperative load balancing and dynamic
Cooperative load balancing and dynamicCooperative load balancing and dynamic
Cooperative load balancing and dynamic
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
 
Ieee interference-measurements-802.11n
Ieee interference-measurements-802.11nIeee interference-measurements-802.11n
Ieee interference-measurements-802.11n
 
Performance analysis of 802.11ac with frame aggregation using NS3
Performance analysis of 802.11ac with frame aggregation using NS3 Performance analysis of 802.11ac with frame aggregation using NS3
Performance analysis of 802.11ac with frame aggregation using NS3
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
 
Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
At34278282
At34278282At34278282
At34278282
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
 
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...
 
Ieee 802.11.n
Ieee 802.11.nIeee 802.11.n
Ieee 802.11.n
 
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
 
Ieee 802.11.n
Ieee 802.11.nIeee 802.11.n
Ieee 802.11.n
 
Ieee 802.11.n
Ieee 802.11.nIeee 802.11.n
Ieee 802.11.n
 
Ieee 802.11.n
Ieee 802.11.nIeee 802.11.n
Ieee 802.11.n
 
band width ppt
band width pptband width ppt
band width ppt
 
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN
 

More from ieeeprojectschennai

More from ieeeprojectschennai (20)

Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and prediction
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalability
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...
 
Parallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and predictionParallel application signature for performance analysis and prediction
Parallel application signature for performance analysis and prediction
 
Dynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalabilityDynamic scheduling of irregular stream programs toward many core scalability
Dynamic scheduling of irregular stream programs toward many core scalability
 
Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...Swiper exploiting virtual machine vulnerability in third party clouds with co...
Swiper exploiting virtual machine vulnerability in third party clouds with co...
 
Practical conflict graphs in the wild
Practical conflict graphs in the wildPractical conflict graphs in the wild
Practical conflict graphs in the wild
 
Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...Design and analysis of medium access protocol throughput and short term fairn...
Design and analysis of medium access protocol throughput and short term fairn...
 
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
Fundamental limits of cdf based scheduling throughput, fairness, and feedback...
 
Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...Ensuring predictable contact opportunity for scalable vehicular internet acce...
Ensuring predictable contact opportunity for scalable vehicular internet acce...
 
Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...Utilize signal traces from others a crowdsourcing perspective of energy savin...
Utilize signal traces from others a crowdsourcing perspective of energy savin...
 
Swimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehiclesSwimming seamless and efficient wi fi based internet access from moving vehicles
Swimming seamless and efficient wi fi based internet access from moving vehicles
 
Spatial spectrum access game
Spatial spectrum access gameSpatial spectrum access game
Spatial spectrum access game
 
On availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksOn availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networks
 
Managing contention with medley
Managing contention with medleyManaging contention with medley
Managing contention with medley
 
Impact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networksImpact of location popularity on throughput and delay in mobile ad hoc networks
Impact of location popularity on throughput and delay in mobile ad hoc networks
 
Frequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filtersFrequency diversity aware wi-fi using ofdm-based bloom filters
Frequency diversity aware wi-fi using ofdm-based bloom filters
 
attack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithmsattack resilinet mxi zones over road networks architecture and algorithms
attack resilinet mxi zones over road networks architecture and algorithms
 
Economic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timingEconomic analysis of 4 g upgrade timing
Economic analysis of 4 g upgrade timing
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 

A channel allocation algorithm for reducing the channel sensing reserving asymmetry in 802.11ac networks

  • 1. A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in 802.11ac Networks Abstract: The major goal of IEEE 802.11ac is to provide very high throughput (VHT) performance while at the same time guaranteeing backward compatibility. To achieve this goal, 802.11ac adopts the channel bonding technique that makes use of multiple 20MHz channels in 5GHz band. Due to the heterogeneity of bandwidth that each device exploits, and the fixed total transmission power in the standards, a problem called ‘Hidden Channel’ arises. In this paper, we first analyze the problem and show how the contention parameters and transmission time affect collision probability and fairness in some deployment scenarios. Then, we propose a heuristic channel allocation algorithm that aims to avoid such problematic situations effectively. Through simulations, we demonstrate that our proposed channel allocation algorithm lowers the packet error rate (PER) compared to uncoordinated and RSSI (Received Signal Strength Indicator) based allocation schemes and increases the network-wide throughput as well as the throughput of a station that experiences poor performance. This implies improved fairness performance among transmission pairs with various channel bandwidths.
  • 2. Existing System: The quality of the transmission could vary significantly causing unfairness. Further, the fixed transmission power and the difference in CCA sensitivity and bandwidth usage lead to asymmetric sensing/reserving situations between two devices. This implies that a transmission from a device may not be sensed by another device while it is sensed in the other direction, so channel reservation is successful only in one direction. We call this problem the Hidden Channel (HC) problem throughput this paper. The HC problem has basically originated due to the heterogeneity of the channel and bandwidth usage. Proposed System: We analyze the asymmetric channel sensing/reserving situation from the perspective of downlink communication, and illustrate via numerical results how the contention parameters and the packet length impact performance. We use graph coloring to model the channel allocation problem, and prove that the problem is NP-hard.
  • 3. We present a heuristic algorithm that aims to eliminate the HC problem while maximizing channel utilization. We evaluate the performance of our heuristic algorithm with simulations. To the best of our knowledge, this is the first work that explicitly deals with channel allocation to alleviate the HC problem in 802.11ac networks. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • RAM : 256 Mb. Software Requirements: • Operating system : - Windows XP. • Front End : - JSP • Back End : - SQL Server Software Requirements:
  • 4. • Operating system : - Windows XP. • Front End : - .Net • Back End : - SQL Server