PNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS

Similar documents
Performance Analysis of Distributed Mac Protocol with Physical Layer Network Coding Scheme

Almost as Good as Single-hop Full-Duplex: Bidirectional End-To-End Known Interference Cancellation

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Embracing Wireless Interference: Analog Network Coding

Addressing Asymmetric Link in Wireless Mesh Networks

Queue Management for Network Coding in Ad Hoc Networks

Figure.2. Hidden & Exposed node problem

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

OPTIMIZING THE DELAY IN MULTIHOP WIRELESS NETWORK USING NETWORK CODING AND SUCCESSIVE INTERFERENCE CANCELLATION

Wireless Networks (MAC)

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

Approaching Single-Hop Performance in Multi-Hop Networks: End-To-End Known-Interference Cancellation (E2E-KIC)

Adaptive Buffer size routing for Wireless Sensor Networks

WITH the evolution and popularity of wireless devices,

Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime

Analog Network Coding. Sachin Katti. Shyamnath Gollakota and Dina Katabi. Current Wireless. Router C

Review of Medium Access Control protocol for MANET

IEEE Medium Access Control. Medium Access Control

Efficient Power MAC Protocol in Ad-hoc Network s

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3

Lifetime Enhancement of Wireless Sensor Networks using Duty Cycle, Network Coding and Cluster Head Selection Algorithm

ECE 158A: Lecture 13. Fall 2015

Analyzing the effect of timer timeout and packet length on the performance of error control protocols

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

ISSN: International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Performance Improvement of Wireless Network Using Modern Simulation Tools

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

Congestions control through cloud computing with MANET

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Unit 7 Media Access Control (MAC)

A cluster based interference mitigation scheme for performance enhancement in IEEE

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

An Energy-Balanced Cooperative MAC Protocol in MANETs

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

Network Coding Based Packets Queue Operation for Wireless Ad Hoc Networks

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Strengthening Unlicensed Band Wireless Backhaul

A and C cant see each other, both send to B RTS/CTS can help

Computer Networks (Fall 2011) Homework 2

Wireless Local Area Networks. Networks: Wireless LANs 1

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Rate and Power Adaptation for Physical-Layer Network Coding with M-QAM Modulation

Challenges in Mobile Ad Hoc Network

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Design & Modeling of Hidden Nodes WLAN and MAC Layer Protocol Simulated By NS-2

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Combating Packet Loss in OPS networks: A Case for Network Coding. Gergely Biczók and Harald Øverby NTNU Dept. of Telematics.

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

Reservation Packet Medium Access Control for Wireless Sensor Networks

CMPE 257: Wireless and Mobile Networking

Detecting Sybil Nodes in Wireless Networks. *: SIS Dept., UNC Charlotte **: ECE Dept., WPI

XORs in the Air: Practical Wireless Network Coding

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

CMPE 257: Wireless and Mobile Networking

A Wireless Full-duplex and Multi-hop Network with Collision Avoidance using Directional Antennas

/99/$10.00 (c) 1999 IEEE

A Survey on Modified RTS/CTS Mechanism

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

An Efficient Scheduling Scheme for High Speed IEEE WLANs

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Interference avoidance in wireless multi-hop networks 1

Wireless LAN. Access Point. Provides network connectivity over wireless media

PRESENTED BY SARAH KWAN NETWORK CODING

CSMA based Medium Access Control for Wireless Sensor Network

Chapter 12 Multiple Access 12.1

CSE 461: Wireless Networks

MAC LAYER. Murat Demirbas SUNY Buffalo

Implementation of Genetic Algorithm for Combined Routing and Dimensioning for Dynamic WDM Networks

The MAC layer in wireless networks

Novel Techniques for Fair Rate Control in Wireless Mesh Networks

Published in: Mobile Wireless Middleware, Operating Systems, and Applications - Workshops

Local Area Networks NETW 901

Media Access Control in Ad Hoc Networks

Parallel Rendezvous Protocol with Improved Broadcast Mechanism for Ad-Hoc Networks

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications

CSMA/CA BASED AD-HOC NETWORK USING MAC PROTOCOL

15-441: Computer Networking. Wireless Networking

Some Optimization Trade-offs in Wireless Network Coding

Transcription:

PNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS Gowdara Rajasekhar Gowda 1, Dr. B R Sujatha 2 1MTech (DECS) student, E&C Dept, Malnad College of Engineering, Karnataka, India. 2Associate professor, E&C Dept, Malnad College of Engineering, Karnataka, India. -------------------------------------------------------------*******------------------------------------------------------------ Abstract - Physical-layer network coding (PNC) allows nodes to transmit simultaneously. In this paper, PNC based distributed MAC protocol in multi-hop wireless networks has been implemented. This MAC protocol is based on the carrier sense multiple access (CSMA) strategy. In this protocol, each node collects information about the queue status of its neighbouring nodes. When a node finds that there is an opportunity for some of its neighbours to perform PNC, it notifies its corresponding neighbouring nodes and initiates the process of packet exchange using PNC, with the node itself as a relay. During the packet exchange process, the relay also works as a coordinator. The PNC based distributed MAC protocol also supports the conventional network coding and conventional relaying schemes when there are no possibilities of simultaneous transmissions. PNC usually makes use of the natural phenomenon of electromagnetic waves- they add together when they share the same physical space. The mixing of electromagnetic waves is a form network coding, performed by the nature. Keywords: Carrier Sense Multiple Access (CSMA), 802.11 MAC, Conventional Network Coding (CNC), Physical Layer Network Coding (PNC). 1. INTRODUCTION Wireless networks [7] are being increasingly used for the advantages it is providing for personal communication such as mobility to the users. In these networks increasing bandwidth efficiency and minimizing interference are the two important criteria. This is because available bandwidth in wireless communication is limited when compared to wired networks and interference is also more due to the random nature of the channel. Bandwidth efficiency can be achieved with MAC protocols by coordinating the channel access between the multiple nodes. Several multiplexing schemes have been designed and being used to reduce interference. Also instead of treating interference as hindrance to be avoided, it is exploited to systems advantage for improving the throughput performance. One such scheme is physical layer network coding, which is dealt in this paper. 2. RELAYING SCHEMES Physical layer network coding [2] is subfield of network coding. In network coding relay encodes the packets after receiving them in separate communication phases. The encoding function is used in network coding is logical XOR operation. Compared with conventional relaying/routing schemes, the network throughput, end-to-end delay and network reliability can be improved with network coding. Physical layer network coding is comparing with the conventional network coding [2] and conventional relaying schemes in Fig.1 In conventional relaying method it needs 4 time slots to exchange the packets x aand x b between A and B through relay node R as shown in the Fig.1. In conventional network coding it needs 3 time slots and takes ¾ of the time compared with the conventional relaying schemes. In physical layer network coding it needs two times slots and half the time compared to the conventional relaying schemes. The physical layer network coding can achieve throughput gain of 2 over conventional relaying and 1.5 over conventional network coding. (a) 2015, IRJET.NET- All Rights Reserved Page 329

(b) (c) Fig-1. Three relaying schemes: (a) Conventional relaying, (b) CNC, (c) PNC. 3. PACKET EXCHANGE USING PNC PNC based distributed MAC protocol modifies the requestto-send/clear-to-send (RTS/CTS) based IEEE 802.11 MAC protocol, to support PNC. In PNC based distributed MAC protocol, each node shares its queue status information with its neighbouring nodes by adding a few bytes of control information to the data and acknowledgement (ACK) frames. Using queue status and routing information relay node sense that there is an opportunity for two of its neighbouring nodes i,e. node A and node B to exchange packets through PNC, with R as the relay node, node R performs channel access with the CSMA strategy and coordinates the nodes A and B to send packets. CSMA is the probabilistic medium access control protocol, in which every node sense the medium before transmitting whether the medium is idle or busy, if the medium is busy, node defers its transmission. If idle, node transmits immediately. When node R senses that there is opportunity to perform PNC, it sends an RTS-PNC frame, to its neighbouring nodes which are involving in PNC i,e. A and B. RTS-PNC contains the addresses of the two source/destination nodes A and B and the address of node R. The node that has a shorter packet to send (which can be known from the queue status stored at R) is set as node A, After receiving the RTS-PNC frame, the nodes A and B separately respond to R with CTS frames. When node R successfully receives both CTS frames, it sends a coordination (CO-PNC) frame, to coordinate packet transmissions of the nodes A and B. After receiving CO- PNC, node A starts data transmission after time TSIFS, node B starts data transmission after time 2TSIFS + TPHY- Hd + TMAC-Hd. This process requires that nodes A and B are synchronized. The data frame of node B is bit reversed order i,e. tail of the data frame is in the beginning and header is at end. This is done to make sure that node R can successfully decode the headers of both data frames. After the relay R receives the simultaneously transmitted and partly superimposed signal, it performs the coding operation CPNC( ) to the superimposed part of the signal. The encoding function CPNC( ) can be either amplify and forward or two phase DF schemes. The resulting coded packet is forwarded to the nodes A and B. When node A or B receives the coded packet, it attempts to extract the packet, which it intends to receive, from the coded packet with the help of its own which was sent to other node. If successful, an ACK frame is transmitted to the relay node R. After the relay R receives the ACK frames from destination nodes A and B, an ACK-PNC frame are generated which contains the address(es) of the source node(s) to be acknowledged. After receiving ACK-PNC, each acknowledged source node flushes the packet, which it has just sent, from the queue. 4. MANAGING QUEUE In PNC based distributed MAC protocol, each node manages two sender queues, which are actual queue and virtual queue[1]. 4.1. Actual queue The actual queue stores the actual data packets that remain to be sent by the node, as in traditional communication networks. 4.2. Virtual queue: The virtual queue does not store actual data packets. It stores virtual data packets which contain some essential information of the packets in the actual queue of the node s neighbors. Virtual packets are denoted by pv and reverse virtual packet is denoted by pv. 5. PNC MAC ALGORITHM Fig- 2 PNC MAC algorithm 2015, IRJET.NET- All Rights Reserved Page 330

1. Source Node first sends the RTS control Packet to the Relay Node 2. The Relay node will send CTS control packet to the initiator. 3. The Source Node and Destination Node sends the actual Data Packet to the Relay Node 4. The Relay Node stores the packet in its Queue 5. The relay node performs encoding operation such as amplify and forward method or decode and forward method. 6. The Relay Node will send the data packet to both source node and destination node. Fig-3. Data flow diagram of the PNC based distributed MAC protocol 7. RESULTS AND DISCUSSIONS Results for PNC based distributed MAC protocol is obtained by simulation using the MATLAB tool. Linear topology has been deployed with one source node, one relay node, and one destination node respectively as shown in figure 3. 6. Data flow diagram Data flow diagram (DFD) explains how information is processed by system in terms inputs and outputs. DFD focus on the flow of data, where data comes from, where it will go, and where it will store in the system. It does not show information about the timing of process, about whether processes will operate in series or in parallel. As shown in fig-2 source and destination nodes first sends the RTS control Packet to the relay node. The Relay node will send CTS control packet to the source and destination nodes. The source and destination nodes send the actual data packet to the relay node simultaneously. The relay node stores the packet in its queue and coded into a single packet. The relay node will send the data packet to the destination node as well as the source node. The destination will extract the data packet which intends to receive from source node. Fig-4. Linear topology node deployment Now we will compare the performance parameters - throughput, time taken to complete packet exchange, and energy consumption by PNC based distributed MAC protocol with 802.11 MAC protocol and CNC-MAC protocols. 7.1 THROUGHPUT Fig-5. Throughput comparison plot 2015, IRJET.NET- All Rights Reserved Page 331

We can observe from the figure 4 throughput of the PNC based distributed MAC protocol is more than other two protocols. As the no of nodes in the network increases collisions also increases, so throughput also decreases for all three protocols. Throughput can be defined as the ratio of the number of packets transmitted to the number of packets delivered at the destination. 7.2 ENERGY CONSUMED Fig-7: End to End delay plot The end-to-end delay of PNC based distributed MAC protocol in the linear topology is the lowest compared with the other two protocols, the reason is that when using PNC, the data packets do not enter the queue of the relay. Instead, they are forwarded to the destinations immediately after they have been received by the relay. 8. CONCLUSION The simulation results show that the proposed PNC based distributed MAC protocol brings throughput, energy consumption, and end to end delay improvement in various scenarios compared with the protocols that do not support PNC, while maintaining a similar delay as CNC- MAC. It follows that PNC-MAC is beneficial for throughputsensitive applications of wireless networks. REFERENCES [1]Shiqiang Wang, Qingyang song, and Xingwei Wang, Distributed MAC Protocal supporting physical-layer network coding, IEEE Transactions on Mobile Computing,v ol.12, pp.1023-1036, May 2013. Fig-6: Energy consumption plot Energy consumption of PNC based distributed MAC protocol is less when compared to CNC-MAC and 802.11 MAC protocols. This is because when the number of nodes increases collision will occur due to hidden node problem. To avoid this hidden node problem PNC based distributed MAC protocol uses the virtual carrier sensing mechanism with help of network allocation vector. 7.3 END TO END DELAY [2] S. Zhang, S. C. Liew, P. P. Lam, Hot Topic: Physical-layer Network Coding, ACM MobiCom 06, pp. 358-365, Sept. 2006. [3] R. Ahlswede, N. Cai, S.-Y. R. Li, R. W. Yeung, Network Information Flow, IEEE Trans.Inform. Theory, vol. 46, no. 4, pp. 1204-1216, July 2000. [4] S.-Y. R. Li, R.W. Yeung, N. Cai, Linear Network Coding, IEEE Trans. Inform. Theory, vol.49, no.2, pp. 1204-1216, Feb. 2003. [5] M. Dankberg, M. Miller, and M. Mulligan, Selfinterference cancellation for two-party relayed communication, UnitedStates Patent, 5596439, Jan. 1997. [6] P. Popovski, H. Yomo, The Anti-packets Can Increase the Achievable Throughput of a Wireless Multi-hop Network, IEEE ICC 06, pp. 3885-3890, June 2006. [7] M. Gast, 802.11 Wireless Networks: The Definitive Guide, Second Edition. Sebastopol: O Reilly Media, Inc, April 2005. [8] J. H. Sørensen, R. Krigslund, P. Popovski, T. K. Akino, and T. Larsen, Scalable DeNoise-and-Forward in bidirectional relay networks, Computer Networks, vol. 54, no. 10, pp. 1607 1614, Jul. 2010. 2015, IRJET.NET- All Rights Reserved Page 332

[9] S. Katti, S. Gollakota, and D. Katabi, Embracing wireless interference: analog network coding, in Proc. SIGCOMM 2007, pp. 397 408, 2007. [10] Andrew S. Tanenbaum, Computer networks, Fourth edition,pearson Education, 2003. BIOGRAPHIES Mr. Gowdara Rajasekhar Gowda obtained B.E degree in Electronics and Communication Engineering from Visvesvaraya Technological University during 2010-13, pursuing MTech in Digital Electronics and Communication Systems at Malnad College of Engineering, Hassan. Presently, he undertaking his academic project on PNC based distributed MAC protocol at MCE, HASSAN. Dr.B R Sujatha received her BE degree from NIE,University of Mysore, ME from dept. of Electrical Communication Engineering, IISc, Bengaluru and PhD from VTU, Belagavi. She is currently working as Professor at Malnad College of Engineering, Hassan. Her research interests include Wireless/Adhoc networks, Information theory,coding,cryptography. She is a member of IEEE and Fellow of IETE. 2015, IRJET.NET- All Rights Reserved Page 333

2015, IRJET.NET- All Rights Reserved Page 334