4,199 research outputs found

    Unsaturated Throughput Analysis of IEEE 802.11 in Presence of Non Ideal Transmission Channel and Capture Effects

    Full text link
    In this paper, we provide a throughput analysis of the IEEE 802.11 protocol at the data link layer in non-saturated traffic conditions taking into account the impact of both transmission channel and capture effects in Rayleigh fading environment. The impact of both non-ideal channel and capture become important in terms of the actual observed throughput in typical network conditions whereby traffic is mainly unsaturated, especially in an environment of high interference. We extend the multi-dimensional Markovian state transition model characterizing the behavior at the MAC layer by including transmission states that account for packet transmission failures due to errors caused by propagation through the channel, along with a state characterizing the system when there are no packets to be transmitted in the buffer of a station. Finally, we derive a linear model of the throughput along with its interval of validity. Simulation results closely match the theoretical derivations confirming the effectiveness of the proposed model.Comment: To appear on IEEE Transactions on Wireless Communications, 200

    Protocols for dynamic spectrum access in cognitive radio networks

    Get PDF
    Spectrum access protocols permit secondary users to transmit on frequency bands that are not being utilized by the primary owners. A cognitive radio that wishes to transmit in a band must first decide if the band is available (i.e., not being used by the owner) and then it must periodically re-evaluate the band\u27s availability once it begins transmitting in the band to ensure that a signal from a primary owner has not emerged. To accomplish these tasks, spectrum access protocols employ periodic sensing of the channel. Frequent sensing intervals are required to ensure that cognitive radios wishing to access the band are not disrupting transmissions by the owners of the band. Because spectrum sensing requires that radios cease transmission to observe the channel, the potential for throughput by the secondary users is reduced. A proposed enhancement to standard spectrum access protocols is presented that permits secondary users to monitor the frequency bands while communicating. This capability increases the amount of time that radios can transmit on the band and it decreases the amount of time required to detect the emergence of transmissions by a primary owner. Both improvements are obtained via a protocol that observes statistics obtained in the receiver of the cognitive radio during packet reception. The statistics are obtained with little or no additional hardware and do not require complicated channel measurements or pilot symbols. The proposed protocol for spectrum access is applicable to both single-link networks and multi-link cooperative networks

    Saturation Throughput Analysis of IEEE 802.11 in Presence of Non Ideal Transmission Channel and Capture Effects

    Full text link
    In this paper, we provide a saturation throughput analysis of the IEEE 802.11 protocol at the data link layer by including the impact of both transmission channel and capture effects in Rayleigh fading environment. Impacts of both non-ideal channel and capture effects, specially in an environment of high interference, become important in terms of the actual observed throughput. As far as the 4-way handshaking mechanism is concerned, we extend the multi-dimensional Markovian state transition model characterizing the behavior at the MAC layer by including transmission states that account for packet transmission failures due to errors caused by propagation through the channel. This way, any channel model characterizing the physical transmission medium can be accommodated, including AWGN and fading channels. We also extend the Markov model in order to consider the behavior of the contention window when employing the basic 2-way handshaking mechanism. Under the usual assumptions regarding the traffic generated per node and independence of packet collisions, we solve for the stationary probabilities of the Markov chain and develop expressions for the saturation throughput as a function of the number of terminals, packet sizes, raw channel error rates, capture probability, and other key system parameters. The theoretical derivations are then compared to simulation results confirming the effectiveness of the proposed models.Comment: To appear on IEEE Transactions on Communications, 200

    REED-SOLOMON CODED FREQUENCY-HOPPED PACKET RADIO NETWORKS WITH RECEIVER MEMORY, THROUGHPUT-DELAY ANALYSIS

    Get PDF
    This paper investigates the performance of frequency hopped packet radio networks which employ a memory at the receiver. The main feature of the memory is that all successive transmissions are utilized for packet reconstruction. Two schemes based on RS codes are investigated. System performance is analyzed in both slotted and unslotted channels. Fixed and adaptive packet lengths are considered. It is demonstrated that it is possible to achieve high throughput even in dense jamming environments

    Carrier Sense Random Packet CDMA Protocol in Dual-Channel Networks

    Get PDF
    Code resource wastage is caused by the reason that many hopping frequency (FH) sequences are unused, which occurs under the condition that the number of the actual subnets needed for the tactical network is far smaller than the networking capacity of code division net¬working. Dual-channel network (DCN), consisting of one single control channel and multiple data channels, can solve the code resource wastage effectively. To improve the anti-jamming capability of the control channel of DCN, code division multiple access (CDMA) technology was introduced, and a carrier sense random packet (CSRP) CDMA protocol based on random packet CDMA (RP-CDMA) was proposed. In CSRP-CDMA, we provide a carrier sensing random packet mechanism and a packet-segment acknowledgement policy. Furthermore, an analytical model was developed to evaluate the performance of CSRP-CDMA networks. In this model, the impacts of multi-access interference from both inter-clusters and intra-clusters were analyzed, and the mathematical expressions of packet transmission success probability, normalized network throughput and signal interference to noise ratio, were also derived. Analytical and simulation results demonstrate that the normalized network throughput of CSRP-CDMA outperforms traditional RP-CDMA by 10%, which can guarantee the resource utilization efficiency of the control channel in DCNs

    Channel-access and routing protocols to utilize multiple heterogeneous channels for ad hoc networks

    Get PDF
    In this thesis, we consider a multi-channel ad hoc network employing frequency-agile radios that utilize direct-sequence spread-spectrum signaling. Two of the key distributed protocols for this type of network control channel access and routing. The channel-access protocol is responsible for controlling access to the channels available to the terminals in the network, and the routing protocol determines how packets are forwarded among the terminals in the network. To achieve reliable and efficient network performance, these protocols should cooperate with one another and take advantage of the multiple channels available to the network. In this thesis, we investigate a number of channel-access strategies for selecting a channel as well as various channel metrics to be used with routing. For our channel-access protocol, one channel is designated the control channel and is used to reserve access to one of the traffic channels. The channel-access protocol selects the traffic channel for a data packet transmission by examining the characteristics of the different traffic channels. New channel metrics are proposed to characterize the channels, and the metric values are used to assign a link resistance value for a link. Least-resistance routing utilizes the link resistances to calculate routes. The performance of the channel metrics for the routing protocol and the channel-access strategies are examined with a discrete-event simulation. From our investigations, we show that a jointly designed protocol that coordinates the channel-access strategies with the channel metrics results in network performance that is better than traditional channel-access and minimum-hop routing protocols

    Alibi framework for identifying reactive jamming nodes in wireless LAN

    Get PDF
    Reactive jamming nodes are the nodes of the network that get compromised and become the source of jamming attacks. They assume to know any shared secrets and protocols used in the networks. Thus, they can jam very effectively and are very stealthy. We propose a novel approach to identifying the reactive jamming nodes in wireless LAN (WLAN). We rely on the half-duplex nature of nodes: they cannot transmit and receive at the same time. Thus, if a compromised node jams a packet, it cannot guess the content of the jammed packet. More importantly, if an honest node receives a jammed packet, it can prove that it cannot be the one jamming the packet by showing the content of the packet. Such proofs of jammed packets are called "alibis" - the key concept of our approach. In this paper, we present an alibi framework to deal with reactive jamming nodes in WLAN. We propose a concept of alibi-safe topologies on which our proposed identification algorithms are proved to correctly identify the attackers. We further propose a realistic protocol to implement the identification algorithm. The protocol includes a BBC-based timing channel for information exchange under the jamming situation and a similarity hashing technique to reduce the storage and network overhead. The framework is evaluated in a realistic TOSSIM simulation where the simulation characteristics and parameters are based on real traces on our small-scale MICAz test-bed. The results show that in reasonable dense networks, the alibi framework can accurately identify both non-colluding and colluding reactive jamming nodes. Therefore, the alibi approach is a very promising approach to deal with reactive jamming nodes.published or submitted for publicationnot peer reviewe
    • …
    corecore