You are on page 1of 12

 Simple Distributed Coordination Function

DCF is the default mode used to share the physical medium. It is


used in both cases of ad hoc and infrastructure networks. Any Wi-
Fi device must contain an implementation of this mode. This DCF
corresponds to an improved version of Carrier Sense Multiple
Access with Collision Avoidance. To understand QoS in Wi-Fi
networks, it is important to first briefly understand the
operation of the basic 802.11 standard. The MAC layer,
whose main function is to coordinate access to the wireless
medium, is the main element in enabling QoS capability.
Since collisions are difficult to detect in a wireless
environment, the Wi-Fi standard uses a backoff-based
collision avoidance technique (CSMA/CA) instead of the more
familiar Carrier Sense Multiple Access/Collision Detection
(CSMA/CD) used in standard Ethernet. The standard specifies
two channel access (or medium access coordination)
mechanisms and our focus is mandatory Distributed
Coordination Function (DCF).
The DCF uses a collision avoidance mechanism to control
access to the shared wireless medium. This is because
collisions are difficult to detect in a wireless environment, so a
backoff-based collision avoidance technique, rather than the
collision detection technique common in standard Ethernet, is
used.

How it works
Each wireless station/user first listens to the wireless medium
to detect transmissions. If the medium is sensed to be busy,
the user waits until the ongoing transmission is over. If the
medium is detected to be idle for a Distributed Inter-Frame
Space (DIFS) interval, the user enters a backoff procedure. In
the backoff procedure, the user selects a random backoff time
(in slots) from a contention window, and starts decrementing a
backoff counter for each slot that is sensed to be idle. If, while
counting down, another user begins transmitting, the user in
backoff mode suspends its counting, until the transmitting user
finishes and the medium is sensed to be idle for a DIFS
duration, and resumes its countdown thereafter. Once the
backoff interval expires, the user begins transmission. The
value of the random backoff interval is chosen from an interval
called the Contention Window (CW), which lies between two
preconfigured values, CW_min and CW_max. The contention
window is set to CW_min at the first transmission attempt, and
doubles after each unsuccessful attempt, until it reaches
CW_max (after which it remains at CW_max). The contention
window is reset to CW_min after every successful
transmission.

After transmitting its data, the user waits for a Short-Inter-


Frame Space (SIFS) for an ACK from the recipient, which
notifies the user that its frame was successfully received. If the
ACK is not received within a time out period, the sender
assumes that there was a collision, and schedules
a retransmission by entering the backoff process again, until
the maximum number of retransmissions has occurred, at
which point the packet is dropped.

What we want

QoS capabilities enabled by 802.11e


The IEEE 802.11e standard is an enhancement to the MAC
sublayer to add QoS functionality to Wi-Fi networks. It does so
by adding support for:

Prioritizing data packets based on their type.

Allowing user/end stations to communicate their QoS


requirements to the access point.

Supporting admission control

We need an advanced EDCF system


AEDCF using Wireless sensing network WSN

 we want to emphasize that the current generation of


NIC is simply an incremental evolution of the legacy
802.11a/b/g architectures using wireless sensing
network, which have been designed to support single-
packet-single-acknowledgment transmissions within the
time constraint of the DCF access strategy. When they
are used to transmit burst of packets separated by SIFS
interval in a TXOP (e.g., with HT-PHY in 802.11n), it’s
the kernel that handles the transmission of the BAR,
processes the BA and retransmits the missing frames.
When state-of-the-art VHT-PHY NIC (i.e., 802.11ac
compliant) transmits an Aggregated Mac Protocol Data
Unit (A-MPDU), the retransmission of the MPDUs that
have not been correctly received is handled by the NIC,
but as can be verified by sniffing the channel, all MPDUs
between the first and the last not acknowledged
(included) are retransmitted. To understand what the
consequences are of the possible implementation of
802.11aa on top of these NICs we report in Figure
3.4 the high-level architecture of the transmission path of
a 802.11 NIC where direct memory access (DMA)
transfers data between the memory of the main host
running the operating system (OS) and the NIC circuitry.
A kernel thread writes frames into a consecutive set of
memory pages which are arranged in a circular ring
style: it then programs the DMA controller on the NIC to
produce incremental addresses for fetching contiguous
rows of memory cells and storing them into the internal
NIC buffer. This technique emulates a simple FIFO
queue for pushing frames to the NIC; if more FIFO
queues are needed, such as for supporting Quality-of-
Service (QoS) with the more recent Enhanced
Distributed Channel Access (EDCA) function, multiple
DMA controllers are programmed to present different
memory windows to the NIC. The benefit of the DMA-
based approach is twofold: i) it guarantees that the NIC
is always fed with frames without having to ask for new
ones to the main host; ii) it relieves the main host CPU
while the NIC is transmitting frames. Once the NIC has
handled a frame, it acknowledges the kernel raising an
IRQ, the corresponding DMA controller starts fetching
the next frame from memory and the kernel reclaims the
DMA slot in the ring for new frames that will eventually
come.

Results

A sensor network is a group of


sensor nodes which have
communication and sensing
capabilities. The sensors
function together as a cooperative
network for the purpose
of monitoring the environment.
Practically, sensor nodes
are often formed in different
modalities, such as radar,
acoustic and thermal, based on
specific sensing applica-
tions
A sensor network is a group of
sensor nodes which have
communication and sensing
capabilities. The sensors
function together as a cooperative
network for the purpose
of monitoring the environment.
Practically, sensor nodes
are often formed in different
modalities, such as radar,
acoustic and thermal, based on
specific sensing applica-
tions
A sensor network is a group of
sensor nodes which have
communication and sensing
capabilities. The sensors
function together as a cooperative
network for the purpose
of monitoring the environment.
Practically, sensor nodes
are often formed in different
modalities, such as radar,
acoustic and thermal, based on
specific sensing applica-
tions
Clustering: The sensor nodes of WSN are distributed in a
clustered way using where each node within the cluster
can send and receive information from any nodes.
Algorithm 1 (ECHSA) is used to elect resourceful.
Initialize sensor nodes with position and dimension in
targeted area employ for cluster formation.
for ∀ , find distance from sink and store into vector d as
follows Clusters (groups) are formed by employing well-
known clustering algorithms.

Algorithm
for i=1:1:n
S(i).xd=rand(1,1)*xm; %generates a random no. use to randomly
distibutes nodes on x axis
XR(i)=S(i).xd;
S(i).yd=rand(1,1)*ym; %generates a random no. use to randomly
distibutes nodes on y axis
YR(i)=S(i).yd;
S(i).G=0; %node is elegible
talhar=rand*a
S(i).E=Eo*(1+talhar);
S(i).A=talhar;
E(i)= S(i).E;
if (E(i)>Echeck)
mony=mony+1;
end
Et=Et+E(i); %estimating total energy of the network
%initially there are only nodes
S(i).type='N';
end

EDCF uses this Contention Window to differentiate


between high priority and low priority services. The
central coordinator assigns a Contention Window of
shorter length to the stations with higher priority that
helps them to transmit before the lower priority ones.

Two sinks
100 nodes
Energy
Probability
Transmitter
Receiver
Compression of signal
Distance
Randomly distributed nodes
Total energyof the network
Distance between initial and farthest point \

You might also like