Effects of Ad Hoc MAC Layer Medium Access Mechanisms under TCP
|
|
- Shana Bryant
- 5 years ago
- Views:
Transcription
1 Mobile Networks and Applications 6, , Kluwer Academic Publishers. Manufactured in The Netherlands. Effects of Ad Hoc MAC Layer Medium Access Mechanisms under TCP KEN TANG, MARIO CORREA and MARIO GERLA Computer Science Department, University of California, Los Angeles, USA Abstract. Mobile computing is the way of the future, as evident by such initiatives as Bluetooth, Iceberg and HomeRF. However, for mobile computing to be successful, an obvious layer, the MAC layer, must be efficient in channel access and reservation. Therefore, in-depth understanding is needed of the wireless MAC layer if wireless computing is to takeoff. Many random access wireless MAC protocols have been proposed and even standardized. However, there has yet been an attempt to understand why certain designs are used and what makes certain protocols better than others. In this paper, we survey several popular, contemporary, wireless, random access MAC protocols and determine the effects behind the design choices of these protocols. Keywords: wireless, ad hoc, random access, MAC 1. Introduction Mobile computing has proliferated in recent years. Initiatives, such as Bluetooth [6], Iceberg [8] and HomeRF [11], are making wireless networking a reality. Such technologies allow for wireless communications between numerous devices, such as the PC, PDA, cellular and cordless phones, pagers and other appliances, to be practical and seamless. With such diverse and dense communication environment, controlling access to the wireless medium plays an integral part in making Bluetooth, Iceberg and HomeRF become reality. Therefore, the success of mobile computing technologies will in part hinge on the effectiveness of the wireless MAC layer protocol being deployed. In this paper, we provide insights into the design of contemporary wireless, ad hoc random access MAC layer protocols. In particular, we focus on the various methods of channel access used to resolve contention on the wireless medium. We isolate individual medium access mechanisms (such as carrier sensing, RTS/CTS control frames and linklevel ACKs) through experiments to determine the effect each mechanism has on the network. In section 2, an overview of several random access wireless MAC layers is introduced. Section 3 discusses our research study. Simulation experiments are described in section 4. Results from our UDP and TCP experiments under various MAC protocols are presented in sections 5 and 6, respectively. Finally, section 7 concludes the paper. 2. Existing wireless random access MAC schemes This section presents an overview of several popular random access wireless MAC layer protocols. The protocols include Carrier Sense Multiple Access (CSMA), Multiple Access with Collision Avoidance (MACA), MACAW, Floor Acquisition Multiple Access (FAMA) and IEEE CSMA (Carrier Sense Multiple Access) requires carrier sensing before transmission. If the channel is free, the packet is transmitted immediately. Otherwise, it is rescheduled after a random timeout. The major limitation of CSMA is the hidden terminal and exposed terminal problem [12]. CSMA was used first in the Packet Radio network in the mid 1970 s [9]. An alternative to this scheme involves channel reservation overhead in order to reduce the number of collisions. This scheme, called Multiple Access with Collision Avoidance (MACA), utilizes control frames, which can be overheard by stations with the ability to collide with the upcoming transmission [10]. These control frames are of fixed size, and also contain the length of the proposed data transmission. The station wanting to transmit initiates a Request To Send (RTS) control frame, and sets a timer to await the Clear To Send (CTS) control frame from the intended receiver. Any station overhearing the RTS control frame is within range to collide with the expected CTS frame and must defer transmission for a period of time long enough to ensure delivery of the CTS. If the station does not receive the CTS within a specified timeout interval, it assumes a collision has occurred and initiates a backoff before attempting to retransmit. Any station overhearing the CTS control frame is within range to collide with the upcoming transmission and is required to defer for the full duration of transmission, as specified in the control frame. MACAW [2] is an enhancement to MACA. MACAW utilizes a MILD backoff to select the retransmission time. Besides using RTS/CTS, three other control frames are introduced (DS, ACK, RRTS). The protocol also implements a backoff copying scheme that allows stations to use the same backoff counters when transmitting to the same station. Moreover, a multiple stream model is included to foster fairness. Floor Acquisition Multiple Access (FAMA) is an experimental MAC protocol specifically developed for the Glomo
2 318 K. TANG ET AL. DARPA program [4]. It is a descendent of MACA. Like MACA, it uses RTS and CTS exchange to prepare the floor (medium) for data transmission. However, unlike MACA, it also utilizes carrier sensing. IEEE [7] expands on FAMA by adding link-level ACKs in addition to the RTS/CTS control frames. Furthermore, abandons the traditional CSMA in favor of CSMA/CA (Collision Avoidance). In , the Distributed Coordination Function (DCF) represents the basic access method that mobile nodes utilize to share the wireless channel. The scheme incorporates CSMA with Collision Avoidance (CSMA/CA) and acknowledgement (ACK). Optionally, the mobile nodes can make use of the virtual carrier sense mechanism that employs RTS/CTS exchange for channel reservation and fragmentation of packets in situations where the wireless channel experiences high bit error rate. CSMA/CA works as follows: a node wishing to transmit senses the channel, and if it is free for a time equal to the DCF InterFrame Space (DIFS), the node transmits. If the channel is busy, the node enters a state of collision avoidance and backs off from transmitting for a specified interval. In the collision avoidance state, the node sensing the channel busy will suspend its backoff timer, only resuming the backoff countdown when the channel is again sensed free for a DIFS period. A typical sequence of exchange in using the virtual carrier sensing mechanism involves the source node first sensing the channel using CSMA/CA. After CSMA/CA is executed, the source node transmits a RTS, followed by the destination node responding with a CTS, then with the source node sending the data frame and ending with the destination node confirming with an ACK to the source node. 3. Research goals The various random access schemes for wireless ad hoc networks presented in section 2 employ different methods, or mechanisms, for channel contention on the wireless medium. Among them are carrier sense, packet sense (no carrier sensing), carrier sense with collision avoidance, RTS/CTS control frames and link-level ACKs. For example, CSMA solely uses carrier sense. FAMA utilizes carrier sense with RTS/CTS control frames. MACA, on the other hand, digresses from the carrier sensing of FAMA and instead opts for packet sensing. MACAW adds on top of MACA link-level ACKs, among other features. Finally, (with virtual carrier sense) coalesces FAMA, linklevel ACKs and collision avoidance. In our study, we isolate each of the above features to determine the individual effect each mechanism incurs on network performance and at the same time determine which combination works best under UDP and TCP. In particular, we hope to answer the following questions: First of all, what kind of basic medium access technique works best? Is it PSMA, CSMA or CSMA/CA? Also, it is well known that RTS/CTS improves the system performance of wireless networks. However, does the improvements aid in fairness, aggregate throughput or both? Furthermore, link-level ACKs have been suggested to alleviate the problems associated with the high error rates of the wireless channel. To what extent are link-level ACKs useful? Finally, with many possible combinations of wireless access mechanisms, which combination works best? Although there are many important metrics to consider, in this paper we focus on throughput and fairness. For our study, we implemented various combinations of the above features and compare them to one another in an effort to isolate each mechanism. The protocols implemented are packet sense (PSMA), carrier sense (CSMA), carrier sense with collision avoidance (CSMA/ CA), PSMA/RTS/CTS, CSMA/RTS/CTS, CSMA/CA/RTS/ CTS, PSMA/ACK, CSMA/ACK, CSMA/CA/ACK, PSMA/ RTS/CTS/ACK, CSMA/RTS/CTS/ACK and CSMA/CA/ RTS/CTS/ACK. The simulation platform used is GloMoSim [13]. Glo- MoSim is a discrete event parallel simulation environment implemented in PARSEC, PARallel Simulation Environment for Complex Systems [1]. It includes various detailed, wireless protocols in its library (radio propagation, mobility, MAC, network, transport and applications). In addition, GloMoSim provides a valuable and useful feature that facilitates different protocols at a given layer to be swapped in and out of the protocol stack and thus allows for comparison between these different protocols. Most importantly, Glo- MoSim permits the detailed modeling of several layers and the study of their interaction, yet preserving very good runtime efficiency and yielding manageable execution time. 4. Experimental configuration and parameters For our simulation experiments, we consider several topologies (figures 1 5): string, hidden terminal, exposed terminal, ring and bottleneck. The arrows represent the direction of data packet transmissions. Constant bit rate (CBR) with unbounded backlog executing with UDP or FTP with infinite backlog running on top of TCP is used for the application. We utilize static routing to route packets since mobility is not considered. Different MAC protocols are evaluated: PSMA, CSMA, CSMA/CA, PSMA/RTS/CTS, CSMA/RTS/CTS, CSMA/CA/RTS/CTS, PSMA/ACK, CSMA/ACK, CSMA/ CA/ACK, PSMA/RTS/CTS/ACK, CSMA/RTS/CTS/ACK and CSMA/CA/RTS/CTS/ACK. Each MAC protocol uses exponential backoff. Radios with no capture ability are modeled with a channel bandwidth of 2 Mbps. Furthermore, the channel uses free-space with no external noise (perfect channel). No capture ability of the radios and free-space channel model are used for easier understanding of the results due to their deterministic behavior as opposed to radios with capture ability and fading channel model, where there are randomness involved. Transmission and propagation delays are modeled. Processing delay is negligible. Each node has a 25-packet MAC layer buffer pool. Scheduling of packet transmissions is FIFO. The TCP simulation code was ported directly from FreeBSD code
3 EFFECTS OF AD HOC MAC LAYER MEDIUM ACCESS MECHANISMS 319 (TCP-Lite) into GloMoSim. TCP packet length is assumed fixed at 1460 B. In our experiments, we force the maximum TCP advertised window to be one packet size (i.e B) in order to better understand and analyze the network behavior. Also, it is shown in [5] that having an adaptive window does not help but rather worsens TCP s performance under a wireless ad hoc environment. TCP connections are started uniformly, distributed between 0 to 10 s. Each simulation run is executed for 200 simulated seconds. Five different sets of experiments are examined. First, with the variable number of hops experiment, we vary the number of hops for a connection from 1 to 5 using the topology in figure 1. Each node is only within range of their intermediate neighbors. This is an experiment useful to determine the effectiveness of each protocol when no contention exists. Next, we divert our attention to the hidden terminal environment depicted in figure 2. Node 1 is in radio range of node 0 and node 2. Node 0 and node 2 are not within reception range of each other. Connections are set up from node 0 to node 1 and from node 2 to node 1. With the ex- Figure 1. String topology. posed terminal experiments shown in figure 3, node 0 is in range of node 1, node 3 is in range of node 2, node 1 is in range of both node 0 and node 2 and node 2 is in range of both node 1 and node 3. Two connections are established, one between node 1 and node 0 and the other between node 2 and node 3. Then, we consider a ring topology as depicted in figure 4 to determine each protocol s fairness characteristics. The 8 nodes are engaged in single hop connections (node 0 to node 1, node 1 to node 2,..., node 7 to node 0) with each node being able to reach its neighboring nodes only. Finally, we examine multiple flows sharing a common bottleneck, as shown in figure 5. Here, we have connections from node 0 to node 5, node 1 to node 6, node 2 to node 7, node 3 to node 8 and node 4 to node 9. All sessions travel through common nodes and links, with the number of hops for the bottleneck link varying from 0 to 2. Furthermore, the senders (node 0, 1, 2, 3 and 4) are within transmission range of each other. The receivers (node 5, 6, 7, 8 and 9) are also within range of each other. The bottleneck experiments are used to gauge the behavior of the various protocols when contention exists for a particular link. In an attempt to shorten the length of the paper, we will use only tables to capture the abundant results from our simulation experiments. 5. Constant bit rate with UDP Figure 2. Hidden terminal topology. Figure 3. Exposed terminal topology. Figure 4. Ring topology. To investigate the impact of the individual medium access mechanisms (PSMA, CSMA, CSMA/CA, RTS/CTS and ACK) under UDP, we evaluate various protocols using the experiments mentioned in section 4 in addition to others. Here, the traffic constant bit rate is such that there will always be some packets to send from the queue. In other words, each node will have infinite backlog. The results of our experiments are presented in [3]. In this section, we provide a brief overview of the conclusions we derived in [3]. In [3], the results show that link-level acknowledgements do not contribute to the fairness of the various protocols. Furthermore, CSMA/RTS/CTS is the only protocol where ACKs consistently improves performance since they improve the coordination between sender and receiver. Overall, ACKs increase overhead and increase the possibility of collision. Thus, link-level ACKs is counterproductive under UDP since it contradicts the intent of UDP, which is to Figure 5. Bottleneck topology.
4 320 K. TANG ET AL. support unreliable transfer of data. RTS/CTS is responsible for the fairness (i.e. node coordination) of the protocols that employ it. By being fair and allowing all clients to successfully transmit packets, the RTS/CTS mechanism increases the throughput of each client/server pair. In summary, the degree of coordination is greater when using RTS/CTS than when using ACKs. When communicating using unreliable transmission it is desirable to be as aggressive as possible and have some form of coordination between nodes. Of the three basic protocols (PSMA, CSMA, and CSMA/CA), CSMA is the best building block over the topologies evaluated. It performs the best in the variable hops experiments. In the string experiments, CSMA/RTS/CTS/ACK is the only protocol that allows both clients to successfully send packets. CSMA/RTS/CTS performs better than all the other protocols and has a slight advantage over CSMA/CA/RTS/CTS and CSMA/CA/RTS/ CTS/ACK. Any protocol using RTS/CTS control frames, except PSMA/RTS/CTS/ACK, does well in the hidden terminal experiments and none of them has a clear advantage. The performance of CSMA is comparable to that of PSMA in the exposed terminal topology. In the more complex cross and bottleneck topologies, CSMA/RTS/CTS/ACK performs well. The protocol performs better over both cross traffic scenarios and its performance is comparable to that of PSMA/RTS/CTS in the bottleneck experiments. While the performance of CSMA/CA/RTS/CTS/ACK is comparable to that of CSMA/RTS/CTS/ACK in many topologies, it is a bit too conservative for this environment. The extra waiting time before transmission degrades performance in many of the more congested environments. 6. File transfer with TCP To determine the affects of the individual medium access mechanisms (PSMA, CSMA, CSMA/CA, RTS/CTS and ACK) under TCP, we contrast various protocols using the experiments mentioned in section 4. The traffic type is FTP with infinite backlog at each source node PSMA, CSMA and CSMA/CA We start by examining the performance of TCP on top of PSMA, CSMA and CSMA/CA with the variable number of hops experiments. Here no contention exists, and therefore, intuitively, we expect PSMA and CSMA to exhibit similar network behavior since carrier sensing is not needed. CSMA/CA, meanwhile, produces less throughput due to the unnecessary collision avoidance overhead. Table 1 confirms our insight. The throughput behavior shown in table 1 also supports the send-and-wait model (since TCP window size is set to one packet size). Assuming that propagation, processing and carrier-sensing delays are negligible, the expected utilization of a onehop connection for a send-and-wait protocol is given by td tx + ta, Table 1 Variable number of hops experiment, throughput in bits per second. Number of hops PSMA CSMA CSMA/CA Table 2 Hidden terminal experiment, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA where td, tx and ta are the transmission delay of actual application level data unit (1460 B), application level data unit with lower level headers and TCP ACK with lower level headers, respectively. With the size of TCP/IP header being 40 B and CSMA header being 12 B, the expected utilization of a one-hop connection is Thus, the expected throughput for a 2 Mbps channel is 1868 Kbps. For a twohop connection, we have td 2tx + 2ta. Here, the expected link utilization is 0.467, and thus, the expected throughput is 934 Kbps. The analytical results are slightly higher than simulation since propagation, processing, and carrier-sensing delays are not taken into consideration in the analytical model. The equation can be easily generalized to the n hop case. We note a very close match between simulation and analysis in table 1. Now, let us refer to the hidden terminal experiments. All three protocols (PSMA, CSMA and CSMA/CA) mirror one another (table 2). The connection from node 2 to node 1 captures the channel and locks out the connection from node 0 to node 1 completely. The capture behavior is explained by the interplay of MAC timeouts with TCP timeouts, coupled with the presence of undetected link losses. When two sessions compete for the same channel and one is pushed back by the timeouts, the binary backoff nature of both MAC and TCP timeouts makes the situation progressively worse for the loser. Note that the collision avoidance scheme of CSMA/CA alone does not work well without feedback from control frame losses, such as RTS or ACK frames. This is because the MAC backoff value does not increase when collisions of data frames due to contention occur since the MAC layer has no way of finding out about the collisions. Therefore, the collision avoidance part of CSMA/CA has no beneficial effect. In terms of throughput, CSMA outperforms PSMA and CSMA/CA. In the exposed terminal experiments (table 3), the connection between node 1 and node 0 is totally locked out in PSMA. This is counterintuitive since we expect a MAC layer protocol that does not carrier sense to do well in the exposed
5 EFFECTS OF AD HOC MAC LAYER MEDIUM ACCESS MECHANISMS 321 Table 3 Exposed terminal experiment, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA Table 4 Ring experiment, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA Table 5 Bottleneck experiment, zero hops, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA Table 6 Bottleneck experiments, one hop, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA terminal scenario [10]. However, since TCP acknowledges every data packet, the TCP ACK may deter node 0 from sending TCP ACK to node 1 since node 1 cannot receive any data packets from node 0 while node 2 is transmitting to node 3. What makes things worse is the fact that since the transmission delay of TCP ACKs are minimal compared to the data packets, the data packets from node 2 will more likely interfere with the ACKs sent by node 0 node 1. This scenario causes TCP ACKs from node 0 to be lost, resulting in retransmissions by node 1. CSMA and CSMA/CA fare better in both overall throughput and fairness because these protocols carrier senses before transmitting both TCP data and TCP ACKs. A busy channel triggers exponential backoff and thus allows one of the nodes to transmit successfully. To further analyze the effects of PSMA, CSMA and CSMA/CA, we next consider the ring experiments (table 4). Under the ring experiments, PSMA achieves better fairness and aggregate throughput compare to that of CSMA and CSMA/CA. PSMA obtains an aggregate throughput of 3 Mbps while CSMA and CSMA/CA both achieve 2.1 Mbps. PSMA s throughput of 3 Mbps is quite good considering the fact that the maximum theoretical throughput achievable on the ring is 4 Mbps (i.e., two simultaneous transmissions at least 3 hops apart). We note here again that CSMA/CA has no benefit compare to CSMA. Without control frames to determine the status of the receiver, the collision avoidance mechanism of CSMA/CA does not work well and, thus, behaves similar to plain CSMA. Therefore, the behaviors of both protocols are comparable throughout all experiments. Finally, we examine multiple TCP flows sharing a common bottleneck. The performance of PSMA, CSMA and CSMA/CA is shown in tables 5 7. In all three scenarios, the protocols perform relatively the same, with no one protocol in particular standing out. As the number of hops on the bottleneck link increases, more connections are unable to get data through. With so much contention and possibility of interference between TCP data and TCP ACK packets and no control frames to coordinate the access of the channel, the Table 7 Bottleneck experiments, two hops, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA results are not surprising. Capture is evident throughout, no matter the protocol and no matter the scenario. From the above experiments, we see that CSMA/CA has no beneficial effect without the feedback given by control frames such as RTS/CTS or ACK exchanges. Thus, CSMA is the better alternative to CSMA/CA due to lesser overhead. Between PSMA and CSMA, it is a toss up. PSMA is superior in both overall throughput and fairness under the ring experiment, but looses to CSMA in the exposed terminal environment in terms of being fair. We need to note that although PSMA does not sense carrier before transmitting, when used under TCP the TCP ACKs provide feedback on the state of the destination node and thus emulate some form of carrier sensing RTS/CTS To isolate the impact of RTS/CTS control frames, we contrast the following protocols: PSMA/RTS/CTS, CSMA/ RTS/CTS and CSMA/CA/RTS/CTS to PSMA, CSMA and CSMA/CA. Furthermore, we also evaluate PSMA/RTS/ CTS/ACK, CSMA/RTS/CTS/ACK and CSMA/CA/RTS/ CTS/ACK against PSMA/ACK, CSMA/ACK and CSMA/ CA/ACK. Thus, we are merely affixing RTS/CTS control frames to PSMA, CSMA, CSMA/CA, PSMA/ACK, CSMA/ACK and CSMA/CA/ACK. In the variable number of hops (tables 8 and 9), we see that adding RTS/CTS control frames only increase the overhead since there is no channel access contention by competing sources. In fact, the overhead results in a loss of about
6 322 K. TANG ET AL. Table 8 Variable number of hops experiment, without ACKs, throughput in bits per second. Number of hops PSMA CSMA CSMA/CA PSMA/RTS/CTS CSMA/RTS/CTS CSMA/CA/RTS/CTS Table 9 Variable number of hops experiment, with ACKs, throughput in bits per second. Number of PSMA/ CSMA/ CSMA/CA/ PSMA/RTS/CTS/ CSMA/RTS/CTS/ CSMA/CA/RTS/CTS/ hops ACK ACK ACK ACK ACK ACK Table 10 Hidden terminal experiment, without ACKs, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA PSMA/RTS/CTS CSMA/RTS/CTS CSMA/CA/RTS/CTS Table 11 Hidden terminal experiment, with ACKs, throughput in bits per second. TCP connection PSMA/ CSMA/ CSMA/CA/ PSMA/RTS/CTS/ CSMA/RTS/CTS/ CSMA/CA/RTS/CTS/ ACK ACK ACK ACK ACK ACK Table 12 Exposed terminal experiment, without ACKs, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA PSMA/RTS/CTS CSMA/RTS/CTS CSMA/CA/RTS/CTS Table 13 Exposed terminal experiment, with ACKs, throughput in bits per second. TCP PSMA/ CSMA/ CSMA/CA/ PSMA/RTS/CTS/ CSMA/RTS/CTS/ CSMA/CA/RTS/CTS/ connection ACK ACK ACK ACK ACK ACK Kbps on average, although the overhead cost becomes minimal as we increase the number of hops. We now look at the hidden terminal experiments (tables 10 and 11). Using RTS/CTS with PSMA provides no benefit. However, when combined with CSMA and CSMA/CA, fairness is achieved. The RTS/CTS exchange allows the competing nodes to be aware of each other and thus they are able to better coordinate for equal channel access. With CSMA/RTS/CTS, fairness is achieved without sacrificing the overall throughput of the network. Aggregate throughput is lower with the introduction of RTS/CTS to CSMA/CA. Adding RTS/CTS to PSMA/ACK, CSMA/ ACK and CSMA/CA/ACK also aids in fairness. Merging RTS/CTS with PSMA/ACK and CSMA/CA/ACK results in excellent fair sharing between the connection from node 0 to node 1 and node 2 to node 1. Combining RTS/CTS to CSMA/ACK has little effect. For the exposed terminal experiments (tables 12 and 13), the addition of the RTS/CTS to PSMA, CSMA and CSMA/ CA has a major impact on PSMA but does little for CSMA
7 EFFECTS OF AD HOC MAC LAYER MEDIUM ACCESS MECHANISMS 323 Table 14 Ring experiments, without ACKs, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA PSMA/RTS/CTS CSMA/RTS/CTS CSMA/CA/RTS/CTS Table 15 Ring experiments, with ACKs, throughput in bits per second. TCP PSMA/ CSMA/ CSMA/CA/ PSMA/RTS/CTS/ACK CSMA/RTS/CTS/ACK CSMA/CA/RTS/CTS/ connection ACK ACK ACK ACK Table 16 Bottleneck experiment, without ACKs, zero hops, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA PSMA/RTS/CTS CSMA/RTS/CTS CSMA/CA/RTS/CTS and CSMA/CA. PSMA/RTS/CTS alleviates most of the capture characteristics of PSMA and at the same time maintains good aggregate throughput. The RTS/CTS acts like a virtual carrier sense for PSMA, and thus, we expect the performance of PSMA/RTS/CTS to be similar to that of CSMA. This is consistent with the hidden terminal experiments where the virtual carrier sense emulation of the RTS/CTS control frames of PSMA/RTS/CTS behaves like CSMA and thus exhibit similar network behavior as that of CSMA with the hidden terminal environment. When incorporating RTS/ CTS with PSMA/ACK, CSMA/ACK and CSMA/CA/ACK, the RTS/CTS control frames again provides better fairness with PSMA/ACK. With just PSMA/ACK, the connection between node 2 to node 3 locks out the connection from node 1 to node 0, achieving a throughput of 1.76 Mbps. By introducing RTS/CTS, both sessions are able to more equally share the channel, with the node 2 to node 3 session getting 687 Kbps while the node 1 to node 0 achieving 988 Kbps. As for CSMA/ACK and CSMA/CA/ACK, adding RTS/CTS results in comparable network performances. As we move to the ring experiments, we see that total throughput increases with the use of RTS/CTS on top of PSMA, CSMA and CSMA/CA (tables 14 and 15). Aggregate throughputs of PSMA, CSMA and CSMA/CA in the ring experiment are 3.03, 2.08 and 2.06 Mbps, respectively, comparing to that of PSMA/RTS/CTS, CSMA/RTS/CTS and CSMA/CA/RTS/CTS, whose throughputs are 3.17, 3.34 and 2.70 Mbps, respectively. Using RTS/CTS with PSMA renders the system less fair while the opposite is true with CSMA and CSMA/CA where the amount of fair sharing is increased. However, when combining RTS/CTS with PSMA/ACK, CSMA/ACK and CSMA/CA/ACK, we observe that the RTS/CTS actually degrades the fair sharing of the system. Thus, too much control frames can be detrimental to the fairing sharing of the wireless channel. Throughput of PSMA/ACK ranges from 446 to 238 Kbps while PSMA/RTS/CTS/ACK ranges from 845 to 79 Kbps. With CSMA/ACK, minimum and maximum throughput is 444 and 275 Kbps, respectively, while CSMA/ACK/RTS/ CTS exhibited minimum and maximum throughput of 804 and 37 Kbps, respectively. Similarly, CSMA/CA/ACK shows throughput ranging from 555 to 204 Kbps while CSMA/CA/ACK/RTS/CTS shows throughput from 566 to 167 Kbps. Under the bottleneck experiments (tables 16 21), the addition of RTS/CTS to PSMA, CSMA and CSMA/CA in-
8 324 K. TANG ET AL. Table 17 Bottleneck experiment, with ACKs, zero hops, throughput in bits per second. TCP PSMA/ CSMA/ CSMA/CA/ PSMA/RTS/CTS/ CSMA/RTS/CTS/ CSMA/CA/RTS/CTS/ connection ACK ACK ACK ACK ACK ACK Table 18 Bottleneck experiment, without ACKs, one hop, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA PSMA/RTS/CTS CSMA/RTS/CTS CSMA/CA/RTS/CTS Table 19 Bottleneck experiment, with ACKs, one hop, throughput in bits per second. TCP PSMA/ CSMA/ CSMA/CA/ PSMA/RTS/CTS/ CSMA/RTS/CTS/ CSMA/CA/RTS/CTS/ connection ACK ACK ACK ACK ACK ACK Table 20 Bottleneck experiment, without ACKs, two hops, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA PSMA/RTS/CTS CSMA/RTS/CTS CSMA/CA/RTS/CTS Table 21 Bottleneck experiment, with ACKs, two hops, throughput in bits per second. TCP PSMA/ CSMA/ CSMA/CA/ PSMA/RTS/CTS/ CSMA/RTS/CTS/ CSMA/CA/RTS/CTS/ connection ACK ACK ACK ACK ACK ACK creases the collective throughput of the system under the various bottleneck scenarios. The degree of fairness is also increased. We observe, however, that fairness begins to fade as the number of hops of the bottleneck link increases. When RTS/CTS is added to PSMA/ACK, CSMA/ACK and CSMA/CA/ACK, the aggregate throughput again increases in all bottleneck scenarios. However, its effect on fairness is not quite universal. Using RTS/CTS with CSMA/ACK actually worsens fairness in the zero-hop bottleneck experiments. On the other hand, when included with CSMA/ CA/ACK or PSMA/ACK in the zero-hop bottleneck experiments, the RTS/CTS improves fairness. In the other bottleneck experiments, the RTS/CTS has no major impact in terms of fairness. Note that with CSMA/CA/ACK and CSMA/CA/ACK/RTS/CTS, fairness is preserved no matter the number of hops. From the above experiments, we conclude that for the most part, the RTS/CTS control frames do improve the fair-
9 EFFECTS OF AD HOC MAC LAYER MEDIUM ACCESS MECHANISMS 325 Table 22 Variable number of hops experiment, without RTS/CTS, throughput in bits per second. Number of hops PSMA CSMA CSMA/CA PSMA/ACK CSMA/ACK CSMA/CA/ACK Table 23 Variable number of hops experiment, with RTS/CTS, throughput in bits per second. Number of PSMA/ CSMA/ CSMA/CA/ PSMA/ CSMA/ CSMA/CA/ hops RTS/CTS RTS/CTS RTS/CTS ACK ACK ACK Table 24 Hidden terminal experiment, without RTS/CTS, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA PSMA/ACK CSMA/ACK CSMA/CA/ACK Table 25 Hidden terminal experiment, with RTS/CTS, throughput in bits per second. TCP PSMA/ CSMA/ CSMA/CA/ PSMA/ CSMA/ CSMA/CA/ connection RTS/CTS RTS/CTS RTS/CTS RTS/CTS/ACK RTS/CTS/ACK RTS/CTS/ACK ness characteristics of the network and in some cases also increase the aggregate throughput. However, there are times when the combination of RTS/CTS and ACK control frames will not help but instead hurt the fair sharing of the channel ACK To determine the effects of ACKs, the following protocols are put in juxtaposition: PSMA/ACK, CSMA/ACK and CSMA/CA/ACK to PSMA, CSMA and CSMA/CA. In addition, we also compare PSMA/RTS/CTS/ACK, CSMA/RTS/ CTS/ACK and CSMA/CA/RTS/CTS/ACK to PSMA/RTS/ CTS, CSMA/RTS/CTS and CSMA/CA/RTS/CTS. We start again with the variable number of hops experiment. From tables 22 and 23, we see as before that the ACKs only adds overhead here since there is no channel contention. The overhead for PSMA/ACK, CMSA/ACK, PSMA/RTS/CTS/ACK and CSMA/RTS/CTS/ACK is approximately 70 Kbps compared to that of PSMA, CSMA, PSMA/RTS/CTS and CSMA/RTS/CTS, respectively. However, the overhead for using ACK frames in CSMA/CA/ ACK and CSMA/CS/RTS/CTS/ACK is more than 200 Kbps. Still, as the number of hops increases, the overhead is reduced substantially. Examining the results of the hidden terminal experiments (tables 24 and 25), we learn that ACKs give mixed results regarding the fair sharing of the network. Adding ACKs to PSMA had little effect while adding ACKs to CSMA and CSMA/CA increases fairness, although not totally. When used with PSMA/RTS/CTS, ACKs greatly level the throughput of both connections. However, putting ACKs with CSMA/RTS/CTS actually worsens fair sharing. Using ACKs with CSMA/CA/RTS/CTS added no benefit. In terms of throughput, when combined with PSMA (1.74 vs Mbps), PSMA/RTS/CTS (1.74 vs Mbps), CSMA (1.75 vs Mbps) and CSMA/RTS/CTS ( vs bps), link-level ACKs improve the aggregate throughput while the throughput deteriorates with CSMA/ CA (1.72 vs Mbps) and CSMA/CA/RTS/CTS (1.61 vs Mbps). In the exposed terminal experiments, link-level ACKs demonstrate no improvements in either fairness or total throughput. As a matter of fact, aggregate throughput decreases slightly (tables 26 and 27). The lack of improvement when ACKs are introduced is attributed to the fact that
10 326 K. TANG ET AL. Table 26 Exposed terminal experiment, without RTS/CTS, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA PSMA/ACK CSMA/ACK CSMA/CA/ACK Table 27 Exposed terminal experiment, with RTS/CTS, throughput in bits per second. TCP connection PSMA/ CSMA/ CSMA/CA/ PSMA/ CSMA/ CSMA/CA/ RTS/CTS RTS/CTS RTS/CTS RTS/CTS/ACK RTS/CTS/ACK RTS/CTS/ACK Table 28 Ring experiment, without RTS/CTS, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA PSMA/ACK CSMA/ACK CSMA/CA/ACK Table 29 Ring experiment, with RTS/CTS, throughput in bits per second. TCP PSMA/ CSMA/ CSMA/CA/ PSMA/ CSMA/ CSMA/CA/ connection RTS/CTS RTS/CTS RTS/CTS RTS/CTS/ACK RTS/CTS/ACK RTS/CTS/ACK Table 30 Bottleneck experiment, without RTS/CTS, zero hops, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA PSMA/ACK CSMA/ACK CSMA/CA/ACK in the exposed terminal scenario, link-level ACKs in most cases will not experience any collisions and, therefore, will not greatly affect the overall performance of the network in the exposed terminal environment. Using RTS/CTS control frames by themselves is sufficient here in the exposed terminal environment. Moving on to the ring experiments (tables 28 and 29), we see that ACKs with PSMA had little effect. However, with combined with CSMA or CSMA/CA, the overall throughput dramatically increases, from 2.1 Mbps in CSMA to 3.2 Mbps in CSMA/ACK and from 2.1 Mbps in CSMA/CA to 2.7 Mbps in CSMA/CA/ACK. The same pattern occurs when we introduce ACKs to PSMA/RTS/CTS, CSMA/RTS/CTS and CSMA/CA/RTS/CTS, although to a lesser extent. It is uncertain whether or not ACKs have any beneficial outcomes in terms of fairness under the ring experiment. Under the bottleneck experiments (tables 30 35), the addition of ACKs again is not beneficial when combined with PSMA/ACK and CSMA/ACK. And once more, us-
11 EFFECTS OF AD HOC MAC LAYER MEDIUM ACCESS MECHANISMS 327 Table 31 Bottleneck experiment, with RTS/CTS, zero hops, throughput in bits per second. TCP PSMA/ CSMA/ CSMA/CA/ PSMA/ CSMA/ CSMA/CA/ connection RTS/CTS RTS/CTS RTS/CTS RTS/CTS/ACK RTS/CTS/ACK RTS/CTS/ACK Table 32 Bottleneck experiment, without RTS/CTS, one hop, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA PSMA/ACK CSMA/ACK CSMA/CA/ACK Table 33 Bottleneck experiment, with RTS/CTS, one hop, throughput in bits per second. TCP PSMA/ CSMA/ CSMA/CA/ PSMA/ CSMA/ CSMA/CA/ connection RTS/CTS RTS/CTS RTS/CTS RTS/CTS/ACK RTS/CTS/ACK RTS/CTS/ACK Table 34 Bottleneck experiment, without RTS/CTS, two hops, throughput in bits per second. TCP connection PSMA CSMA CSMA/CA PSMA/ACK CSMA/ACK CSMA/CA/ACK Table 35 Bottleneck experiment, with RTS/CTS, two hops, throughput in bits per second. TCP PSMA/ CSMA/ CSMA/CA/ PSMA/ CSMA/ CSMA/CA/ connection RTS/CTS RTS/CTS RTS/CTS RTS/CTS/ACK RTS/CTS/ACK RTS/CTS/ACK ing ACKs with CSMA/CA shows improvement over simply using CSMA/CA due the feedback that occurs when ACK frames are lost. From the results of the experiments above, the conclusion is that ACKs in general improves the combined throughput of the network but its effect on fairness is mixed Summary From the observations in section 6.1, the resolve is that PSMA and CSMA works best overall compared to CSMA/ CA in terms of overall network throughput and fairness. By examining section 6.2, we see that RTS/CTS control frames
12 328 K. TANG ET AL. assist to provide fairness to the network and in most circumstances improves the aggregate throughput of the network as well. We also discover that although RTS/CTS control frames when appended to PSMA/ACK, CSMA/ACK and CSMA/CA/ACK in general help reduce capture effects, there are certain circumstances that too much control frames are deleterious to fair sharing. Finally, section 6.3 leads us deduce that ACKs in general improve the cumulative throughput of the network environment under study. The combination that works best together is CSMA/CA/ RTS/CTS/ACK when running FTP. CSMA/CA/RTS/CTS/ ACK provides a superior mixture of fairness and aggregate network throughput under the seven topologies being studied. What distinguishes CSMA/CA/RTS/CTS/ACK from the rest of the protocols we analyze is the fact that even when competing traffics are several hops away from one another, CSMA/CA/RTS/CTS/ACK still manages to provide some sort of channel access coordination among the competing streams. 7. Conclusion From the UDP and TCP experiments that we conducted, the general trend is that carrier sensing by itself is superior to packet sensing and carrier sensing with collision avoidance. The RTS/CTS mechanism is mainly responsible for channel access coordination, which in turn leads to greater fair sharing of the network resource and in some cases improves total throughput. With ACK control frames, more often than not, aggregate throughput is increased due to the persistent retransmission when ACK frames are lost. However, sometimes fairness is sacrificed. The combination of CSMA/RTS/CTS/ACK is the favorite for UDP traffic with CBR, although CSMA/CA/RTS/ CTS/ACK comes in a close second. On the TCP side running FTP, CSMA/CA/RTS/CTS/ACK is the clear winner. Thus, we conclude that CSMA/CA/RTS/CTS/ACK provides the best overall network service under general terms. Not surprising, CSMA/CA/RTS/CTS/ACK is exactly the IEEE standard with virtual carrier sense enabled. Two other important mechanisms should also be considered. Specifically, the backoff schemes and the yield time used in MAC protocols. Yield time is defined as the amount of time the sender backs off before sending another data frame after transmitting a data frame. Yield time also refers to the amount of time the receiver backs off before sending a frame after receiving a data frame. By adjusting the backoff schemes and yield time parameters, we can conceivably manipulate the outcome of the network performance. For example, if we implement a less aggressive backoff timer or use a longer yield time, fairness can be achieved. Therefore, further research is needed regarding the MAC layer timers and their effects on the protocols studied in this paper. References [1] R. Bagrodia, R. Meyerr et al., PARSEC: A parallel simulation environment for complex system, Computer Magazine (1998). [2] V. Bharghavan, A. Demers, S. Shenker and L. Zhang, MACAW: A media access protocol for wireless LAN s, in: ACM SIGCOMM (1994). [3] M. Correa and K. Tang, Isolation of wireless ad hoc medium access mechanisms under UDP, (May 28, 1999). [4] C. Fullmer and J.J. Garcia-Luna-Aceves, Floor acquisition multiple access (FAMA) for packet radio networks, Computer Communication Review 25(4) (October 1995). Also in: ACM SIGCOMM 95, Cambridge, MA, USA (28 August 1 September 1995). [5] M. Gerla, K. Tang and R. Bagrodia, TCP performance in wireless multihop networks, in: Proceedings of IEEE WMCSA 99 (February 1999). [6] J. Haartsen, M. Naghshineh, J. Inouye, O.J. Joeressen and W. Allen, Bluetooth: Vision, goals, and architecture, ACM SIGMOBILE Mobile Computing and Communications Review 2(4) (October 1998) [7] IEEE , Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, Draft standard, P802.11/D5.0 (July 1996). [8] A. Joseph, B.R. Badrinath and R. Katz, A case for services over cascaded networks, in: First ACM/IEEE International Conference on Wireless and Mobile Multimedia (WoWMoM 98), Dallas, TX (October 1998). [9] J. Jubin and J.D. Tornow, The DARPA packet radio network protocols, Proceedings of the IEEE (January 1987). [10] P. Karn, MACA a new channel access method for packet radio, in: ARRL/CRRL Amateur Radio 9th Computer Networking Conference, ARRL (1990). [11] K.J. Negus, J. Waters, J. Tourrilhes, C. Romans, J. Lansford and S. Hui, HomeRF and SWAP: Wireless networking for the connected home, ACM SIGMOBILE Mobile Computing and Communications Review 2(4) (October 1998) [12] A.S. Tanenbaum, Computer Networks, 3rd ed. (Prentice Hall, Englewood Cliffs, NJ, 1996). [13] X. Zeng, R. Bagrodia and M. Gerla, GloMoSim: a library for the parallel simulation of large-scale wireless networks, PADS (1998). Ken Tang graduated from the University of California, Irvine (UCI), with a Bachelor of Science degree in information and computer science in He then received his Masters of Science degree in computer science in 1999 from the University of California, Los Angeles (UCLA). Currently, Ken is a Ph.D. student at UCLA. His research interest is in the area of ad hoc networks, specifically focusing on ad hoc medium access control protocols. Ken is a member of ACM. ktang@cs.ucla.edu Mario Correa graduated from California State University, Los Angeles, with a Bachelor degree in mathematics in He is currently a graduate student in computer science at the University of California, Los Angeles (UCLA). His research interest is in the area of wireless networks. mcorrea@cs.ucla.edu Mario Gerla received his graduate degree in electrical engineering from Politecnico di Milano, Italy, in 1966 and his M.S. and Ph.D. degrees in computer science from University of California, Los Angeles, in 1970 and 1973, respectively. From 1973 to 1976, Dr. Gerla was a manager in Network Analysis Corporation, Glen Cove, NY, where he was involved in several computer network design projects for both government and industry, including performance analysis and topological updating of the ARPANET under a contract from DoD. From 1976 to 1977, he was with Tran Telecommunication, Los Angeles, CA, where he participated in the development of an integrated packet and circuit network. Since 1977, he
13 EFFECTS OF AD HOC MAC LAYER MEDIUM ACCESS MECHANISMS 329 has been on the Faculty of the Computer Science Department of UCLA. His research interests include the design, performance evaluation, and control of distributed computer communication systems and networks. His current research projects cover the following areas: design and performance evaluation of protocols and control schemes for ad hoc wireless networks; routing, multicasting, congestion control and bandwidth allocation in wide area networks, and traffic measurements and characterization. Dr. Gerla currently serves on the editorial board for IEEE/ACM Transactions on Networking and ACM/Kluwer Journal of Wireless Networks (WINE).
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Ken Tang, Mario Gerla {ktang, gerla}@cs.ucla.edu Wireless Adaptive Mobility Laboratory Computer Science Department University of California, Los
More informationMAC RELIABLE BROADCAST IN AD HOC NETWORKS
MAC RELIABLE BROADCAST IN AD HOC NETWORKS KenTang,MarioGerla Computer Science Department University of California, Los Angeles {ktang, gerla}@cs.ucla.edu ABSTRACT Traditional wireless ad hoc medium access
More informationMedia Access Control in Ad Hoc Networks
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and
More informationTCP over Wireless Multi-hop Protocols: Simulation and Experiments
TCP over Wireless Multi-hop Protocols: Simulation and Experiments Mario Gerla, Rajive Bagrodia, Lixia Zhang, Ken Tang, Lan Wang {gerla, rajive, lixia, ktang, lanw}@cs.ucla.edu Wireless Adaptive Mobility
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More information/99/$10.00 (c) 1999 IEEE
COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationEmpirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks
Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering
More information/$10.00 (c) 1998 IEEE
Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationReliable on-demand multicast routing with congestion control in wireless ad hoc networks
Reliable on-demand multicast routing with congestion control in wireless ad hoc networks KenTang,MarioGerla Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 ABSTRACT
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationIEEE Medium Access Control. Medium Access Control
IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference
More informationA Survey on Modified RTS/CTS Mechanism
A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur
More informationInteractions Between TCP and the IEEE MAC Protocol
Interactions Between TCP and the IEEE 82.11 MAC Protocol Rui Jiang Vikram Gupta Computer Science and Engineering Department University of California, Riverside Chinya V. Ravishankar Abstract The IEEE 82.11x
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationSimulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks
Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationAd Hoc, Wireless, Mobile Networks: The Role of Performance Modeling and Evaluation
Ad Hoc, Wireless, Mobile Networks: The Role of Performance Modeling and Evaluation Mario Gerla, Manthos Kazantzidis, Guangyu Pei, Fabrizio Talucci, and Ken Tang Computer Science Department & Electrical
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationA Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks
A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering National Chiao Tung University
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationA Performance Analysis of IEEE Networks in the Presence of Hidden Stations
A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationCollision Free and Energy Efficient MAC protocol for Wireless Networks
110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin
More informationCellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network
ISBN 978-1-84626-xxx-x Proceedings of 2009 International Conference on Machine Learning and Computing Perth, Australia, 10-12 July, 2009, pp. xxx-xxx Cellular Learning Automata-based Channel Assignment
More informationCollisions & Virtual collisions in IEEE networks
Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing
More informationP B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.
1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of
More informationImpact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks
Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk
More informationCongestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks
Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks Ken Tang * Katia Obraczka + Sung-Ju Lee^ Mario Gerla * * Computer Science Department, University of California, Los
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationLECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA
Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in
More informationWireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC
Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Wireless MAC 2 1 Wireless MAC CSMA as wireless MAC? Hidden and exposed terminal problems make
More informationA Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks
A Jamming-Based MAC Protocol to Improve the Performance of Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationCERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research
CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationImproving TCP Performance over Wireless Networks using Loss Predictors
Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationPerformance analysis of Internet applications over an adaptive IEEE MAC architecture
Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationDoes IEEE MAC Protocol Work Well in Multi-hop Wireless Ad Hoc Networks?
Abstract: Does IEEE 802.11 MAC Protocol Work Well in Multi-hop Wireless Ad Hoc Networks? Shugong Xu Tarek Saadawi Dept. of Electrical Engineering, City University of New York, City College, New York, NY
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationA QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control
Proceedings of the World Congress on Engineering and Computer Science 28 WCECS 28, October 22-24, 28, San Francisco, USA A QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control Mahasweta
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationEnhancements and Performance Evaluation of Wireless Local Area Networks
Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,
More informationExpanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks
Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationAchieving MAC Fairness in Wireless Ad-hoc Networks using Adaptive Transmission Control
Achieving MAC Fairness in Wireless Ad-hoc Networks using Adaptive Transmission Control Zhifei Li School of Computer Engineering Nanyang Technological University Singapore, 639798 Sukumar Nandi Dept. of
More informationJaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation
Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More informationLink Layer II: MACA and MACAW
Link Layer II: MACA and MACAW COS 463: Wireless Networks Lecture 5 Kyle Jamieson [Parts adapted from J. Kurose, K. Ross, D. Holmar] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet
More informationENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY
ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY L. Donckers, P.J.M. Havinga, G.J.M. Smit, L.T. Smit University of Twente, department of Computer Science, PO Box 217, 7 AE Enschede, the Netherlands
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationIEEE Ad Hoc Networks: Performance Measurements
IEEE 8.11 Ad Hoc Networks: Performance Measurements Giuseppe Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 561 Pisa, Italy Email: g.anastasi@iet.unipi.it Eleonora Borgia,
More informationDynamic Power Control MAC Protocol in Mobile Adhoc Networks
Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department
More informationChannel-Hopping Multiple Access
Channel-Hopping Multiple Access Asimakis Tzamaloukas and J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering University of California, Santa Cruz, California 9564 jamal,
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationIBM Research Report. MACA-P : A MAC Protocol to Improve Parallelism in Multi-Hop Wireless Networks
RC22325 (W0202-014) February 5, 2002 Computer Science IBM Research Report MACA-P : A MAC Protocol to Improve Parallelism in Multi-Hop Wireless Networks Arup Acharya, Archan Misra IBM Research Division
More informationA new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake
Mobile Information Systems 5 (009) 3 DOI 0.333/MIS-009-0070 IOS Press A new MAC protocol for reducing effect of needless transmission deferment induced by missed / handshake Tetsuya Shigeyasu a, Daishi
More informationOutline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationMAC. Fall Data Communications II 1
802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions
More informationCan Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?
Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels
More informationMAC LAYER. Murat Demirbas SUNY Buffalo
MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationChannel-Hopping Multiple Access
Channel-Hopping Multiple Access Asimakis Tzamaloukas and J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering University of California, Santa Cruz, California 9564 fjamal,
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationPower Aware Routing using Power Control in Ad Hoc Networks
Power Aware Routing using Power Control in Ad Hoc Networks Eun-Sun Jung and Nitin H. Vaidya Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu, Dept.
More informationReliable Multicast Scheme Based on Busy Signal in Wireless LANs
Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationStrengthening Unlicensed Band Wireless Backhaul
be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism
More informationEnhancing the DCF mechanism in noisy environment
Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen
More informationWireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs
Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)
More informationImproving Fairness among TCP Flows crossing Wireless Ad Hoc and Wired Networks
Improving Fairness among TCP Flows crossing Wireless Ad Hoc and Wired Networks Luqing Yang 1 Winston K.G. Seah 1,2 Qinghe Yin 2 1 Department of Electrical Engineering, National University of Singapore,
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 5 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so
More informationAppointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks
Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University
More informationA Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks
A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks Sumeeth Nagaraj, Christian Schlegel High Capacity Digital Communications Lab University of Alberta, Canada. e-mail: {snagaraj,schlegel}@ece.ualberta.ca
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationAnalysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm
International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationA Modular and Scalable Simulation Tool for Large Wireless Networks
A Modular and Scalable Simulation Tool for Large Wireless Networks Rajive. Bagrodia, Mario. Gerla Department of Computer Science University of California, Los Angeles Los Angeles, CA 90095 Abstract. This
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More informationAn Enhanced IEEE Retransmission Scheme
An Enhanced IEEE 802.11 Retransmission Scheme Hao-Li Wang, Jinghao Miao, J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University haoli, jhmiao, morris@iastate.edu Abstract In
More informationWireless Local Area Network (IEEE )
Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode
More informationFigure.2. Hidden & Exposed node problem
Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More information