Design and Optimization of Medium Access Control ... - CiteSeerX
Recommend Documents
Medium Access Control design for UWB Communication. Systems: review ... for a MAC protocol should be however defined independently of the physical layer. .... As a consequence, the introduction of QoS management in- volves several ..... [5] X. Xiao a
studies are then used to design a MAC protocol called RF-. MAC that optimizes ..... power spectral density (PSD) of the two groups of ETs is the other concern ...
medium access in wireless networks may proceed to Section 2 immediately. .... The access point decides (schedules) which slot is to be used by which node. ..... Switching to a schedule-based protocol (i.e., TDMA) has the great advantage of ...
must operate for a number of years to make applications economically viable. This ..... they introduce Sensor MAC, inspired the development of a whole string of energy- .... for long contention windows or to collapse when using short windows.
performance gains in wireless mesh network performance ... spatially diverse wireless networks. ... P parameters and investigates the potential benefits of.
MACA-P is a set of enhancements to the 802.11 MAC that allows parallel ..... Master Transmission Schedules: MACA-P essentially works by creating an ...
... on a com- bination of wavelength- and time-division multiple ac- ... ful upgrade path for accessing the enormous fibre bandwidth, as well ... casting common data on a number of wavelengths ... data on different wavelengths at the same time.
Hidden and Exposed Nodes and Medium. Access Control in Wireless Ad-Hoc Networks. M. J. Saeed, M. Merabti, R. J. Askwith. School of Computing and ...
May 15, 2006 - not made or distributed for profit or commercial advantage and that copies ... to increase throughput of an ad hoc wireless network by using ...
Journal of Engineering Science and Technology. Vol. 12, No. ...... Eris, C.; Saimler, M.; Gungor, V.C.; Fadel, E.; and Akhyldiz, I.F. (2014). Lifetime analysis of ...
What is Multi-Rate? □ Ability of a wireless card to automatically operate at
several different bit-rates. (e.g. 1, 2, 5.5, and 11 Mbps for 802.11b). □ Part of
many ...
This effort comes as a response to the increasing demand for the transmission .... The available transmission rate between a transmitter and a receiver is set ...
conservative and cheat-proof MAC protocol, are then pro- posed with tunable ... sign efficient protocols in other non-cooperative and selfish ... We conduct our work using game theory, a powerful tool ... access probability update scheme is the best
As a result, the time is divided into time frames, referred to as super time frames (STF). Each STF ..... In Proceedings ACM SIGCOMM'97, Cannes, France, Sept.
matic Repeat reQuest (FHARQ) and Adaptive Modulation and Coding (AMC) [7,8,9,10]. The HSDPA concept is ap- plicable on a new type of transport channel, ...
P.O. Box 407, 00045 NOKIA GROUP, Finland. Mika Rinne .... Mean number of packets in a packet call. 25 ..... nology Conference (VTC) Fall 2002, Vol.1 pp. 477-.
half-duplex (HD) capable devices are present in existing wireless local area networks (WLANs), ... to exploit the full advantages of IBFD technology in wire-.
Feb 2, 2014 - key words: cognitive radio, medium access control, MAC protocol, dy- namic spectrum .... works aim at providing a list and/or classification of is- sues concerning ...... requires a strict time synchronization for users opera- tion.
accurate estimation of the medium access control layer packet delay distribution for IEEE 802.11. ... Section 4 presents the numerical calculations for our new mathematical model ..... Dr Wang also holds the Microsoft Certified System Engineer.
Chair for Computer Networks, Faculty of Computer Science ... MS-MAC [14] extends SMAC to support mobility. Each ... it takes to create new connections is lower. ..... ded networked sensor systems, pages 307â320, New York, NY, USA,. 2006.
ACM SenSys'03, Los Angeles, CA, USA, 2003. [20] K.L. McMillan. ... Lecture Notes in Computer Science (LNCS), pages 330â354, Venice,. Italy, September ...
been extensively studied in the contexts of wired networks, they cannot be directly ... While MANETs exhibit unique advantages compared to one-hop wireless ...
networks which include uplink and downlink multi-user physical layer models as well as .... Downloaded on August 17, 2009 at 19:53 from IEEE Xplore. Restrictions apply. .... followed by a contention-free data window. Figure 3 illustrates this,.
TCP-Friendly Medium Access Control for Ad-Hoc Wireless Networks: Alleviating Self- ..... MAC layer packet buffer and interface queue for a suit- able packet ...
Design and Optimization of Medium Access Control ... - CiteSeerX
or START_DEF to be asserted and goes to start of defer when either ... de-assert the signal âTXDVâ and âSTRTâ. .... FPGAs using VHDL or Verilogâ,3rd edition â.
International Journal of Computer Applications (0975 – 8887) Volume 13– No.1, January 2011
Design and Optimization of Medium Access Control Protocol of IEEE 802.3 Transmitter with VHDL Puran Gour
Ravi Shankar Mishra
Saima Khan
Rajesh Nema
Assistant professor NRI IIST,BHOPAL
Head of the Department NRI IIST,BHOPAL
M.Tech. scholar NRI IIST,BHOPAL
Assistant professor NRI IIST,BHOPAL
ABSTRACT The purpose of this paper is to design and develop a MAC Transmitter on Field Programmable Gate Arrays (FPGA) that converts 32 bit data in to 4 bit DATA for transmitter. In this paper we design the Ethernet (802.3) connection oriented LAN Medium Access Control Transmitter (MAC). It starts by describing the behavior of MAC circuit using VHISC Hardware Description Language (VHDL). A synthesized VHDL model of the chip is developed and implemented on target technology. This paper will concentrate on the testability features that increase product reliability. It focuses on the design of a MAC Transmitter chip with embedded Built-In-Self- Test (BIST) architecture using FPGA technology.
and FSM coding style influence performance of MAC transmitter[1][3].However effective VHDL coding style optimizes FPGA resource allocation for area and speed performance of IEEE 802.3 MAC transmitter can be optimized using linear feedback shift register, one hot finite machine (FSM) state encoding style.
ASSUMPTIONS 1. The size of transmitter buffer is assume to be equal to the maximum allowed size of frame 1500(data)+6(Destination Address) + 2(length) = 1508bytes. 2. Simulation model of LLC and PLS will be used for testing.
General Terms
2.MAC TRANSMITTER
Medium Access Control, VHISC Hardware Description Language
TXC
CD
START_DEF
Keywords-Local
Area Network (LAN), Medium Access Control(MAC), Linear feed Back Register, Logical Link Control(LLC), VHISC Hardware Description Language (VHDL).
X_BSY
CS
TXDV
XMIT_FRAME
DEFER
D_OUT TRANSMITTER
XMIT_OVER
STRT_XMIT
STRT EOF 8
1. INTRODUCTION The Media Access Control (MAC) data communication protocol sub-layer, also known as the Medium Access Control, is a part of the data link layer specified in the seven-layer of OSI model (layer 2). It provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multipoint network, typically with a local area network (LAN) or metropolitan area network (MAN). A MAC protocol is not required in full-duplex point-to-point communication. In single channel point-topoint communications full-duplex can be emulated. This emulation can be considered a MAC layer. The MAC sublayer acts as an interface between the Logical Link Control sub layer and the network's physical layer. The MAC layer provides an addressing mechanism called physical address or MAC address. This is a unique serial number assigned to each network adapter, making it possible to deliver data packets to a destination within a sub network, i.e. a physical network without routers, for example an Ethernet network. FPGA area and speed optimization to implement computer network protocol is subject of research mainly due to its importance to network performance. The objective of resource utilization of field programming gate array(FPGA) is to allocate contending to embed maximum intricate functions. This approach makes design cost effective and maximizing IEEE 802.3 MAC performance. Binary exponential back off algorithm. Very high speed integrated circuit hardware description language (VHSICHDL) VHDL coding to implemented synchronous counter
ERR1
EN_CRC
32
CRC-32
STRT_BO BACK OFF
FRAME ASSEMBLER ERR2 BUF_DATA 32
3
BUFFER MODEL
DATA_32
CNTL
9 BUF_ADD
SOURCE ADDRESS
RW
ADD_48
Fig1: Optimization Implementation of Defer On receiving „STRT_XMIT‟ from the upper layer (LLC) this Block makes the „X_BUSY‟ signal active and starts the process of monitoring the channel for „CARRIERS SENSE‟. This process is called „DEFER‟. The signal „CARRIER SENSE‟ is provide the physical layer. It monitor the channel for inter-frame gap period, which‟s 96 bit period. The period is split up into two different slot 60 bit period and 36-bit period[1].During the 60-bit period if it receives „CARRIER SENSE‟ as active then the timer is restarted. After 60 bit time period is elapsed, the transmitter does not monitor „CARRIER SENSE‟ for next 36 bit period[1] and gives the signal „XMIT_FRAME‟. Once the transmission is started it waits for XMIT_OVER
8
International Journal of Computer Applications (0975 – 8887) Volume 13– No.1, January 2011 or START_DEF to be asserted and goes to start of defer when either is asserted.
3. OPTIMIZATION IMPLEMENTATION OF BACK OFF When a transmission attempt has been terminated due to collision, it is retired by the transmitter until it is successful or a maximum number of sixteen attempts have been made. The scheduling of the retransmission is determined by a controlled randomization process known as “Truncated Binary Exponential Back Off”[1][4]. After the end of enforcing a Collision (jamming), the transmitter delay before attempting to retransmit the frame delay is an integer multiple of slot times to delay before the retransmission attempt is chosen as a uniformly distributed random integer r in the range. 0