Tarek Sheltami. CCSE COE 3/8/2008 1

Similar documents
The MAC layer in wireless networks

The MAC layer in wireless networks

CSE 461: Wireless Networks

/99/$10.00 (c) 1999 IEEE

IEEE Medium Access Control. Medium Access Control

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

Mohamed Khedr.

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks

A Survey on Modified RTS/CTS Mechanism

CMPE 257: Wireless and Mobile Networking

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks

Chapter 12 Multiple Access 12.1

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

/$10.00 (c) 1998 IEEE

Media Access Control in Ad Hoc Networks

CSE 6811 Ashikur Rahman

Logical Link Control (LLC) Medium Access Control (MAC)

Rahman 1. Application

Review of Medium Access Control protocol for MANET

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

ICE 1332/0715 Mobile Computing (Summer, 2008)

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

Multiple Access Links and Protocols

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Wireless Medium Access Control Protocols

Unit 7 Media Access Control (MAC)

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

MAC protocols. Lecturer: Dmitri A. Moltchanov

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

Computer Communication III

CMPE 257: Wireless and Mobile Networking

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

Lecture 16: QoS and "

Wireless Local Area Networks (WLANs) Part I

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Data and Computer Communications. Chapter 13 Wireless LANs

MAC Research Highlight

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Turning Hidden Nodes into Helper Nodes in IEEE Wireless LAN Networks

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Wireless Communications

Wireless Networking & Mobile Computing

Wireless LANs. ITS 413 Internet Technologies and Applications

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Round. Stations {A,B,C,D,E} {A,B} 6 {C,D,E} {A,B} {C} 13 {E} 12 {D}

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Implicit MAC Acknowledgment: An Optimization to

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

ECE442 Communications Lecture 3. Wireless Local Area Networks

MSIT 413: Wireless Technologies Week 8

Remarks On Per-flow Differentiation In IEEE

MAC. Fall Data Communications II 1

Wireless & Mobile Networking

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

CSE 461: Multiple Access Networks. This Lecture

Design and Implementation of IEEE Based Dual Media Access Control for MANETs Amit Kumar Department of Computer Science Engineering

Wireless LAN MAC protocols

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Figure.2. Hidden & Exposed node problem

MAC LAYER. Murat Demirbas SUNY Buffalo

Embedded Internet and the Internet of Things WS 12/13

Wireless MACs: MACAW/802.11

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

MAC in /20/06

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

MAC protocols for ad hoc networks

Data Communications. Data Link Layer Protocols Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Network (IEEE )

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks

Performance anomaly of b

Effect of Turn-Around Times on the Performance of High Speed Ad-hoc MAC Protocols

Multiple Access Protocols

Performance Evaluation of Collision Avoidance Schemes in Ad-hoc Networks

Transcription:

Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1

Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation results 3/8/2008 2

Medium Access Control Nodes must decide when to access the channel, i.e., transmit Two conflicting targets: Collisions of packets must be avoided Bandwidth must not be underutilized d Therefore, a balance is needed. This is the task of the MAC protocol 3/8/2008 3

MAC Protocols 1. Random Access: Nodes contend for the channel whenever they have a packet Simplest example is Slotted Aloha: Nodes transmit packets whenever they arrive 2. Transmission Scheduling: Each node can transmit during a preassigned set of slots. Simplest example is TDMA/FDMA/CDMA. / 3. Hybrid Protocols: Nodes have preassigned slots but also contend. Simplest example is Reservation Aloha: Nodes contend for a slot whenever they need it, but then have priority in following frames. 3/8/2008 4

Properties of Each Scheme Random access is preferable when: traffic is bursty (e.g., data). topology changes fast or is unknown. Transmission scheduling is preferable when: traffic is periodic (e.g. voice traffic). topology changes slowly. quality guarantees are needed. Hybrid protocols are adaptable to the traffic/mobility conditions. 3/8/2008 5

Comparison of fadh hoc and dinfrastructure Network Topologies.. Before CSMA/CA: Slotted Aloha (Roberts 72 [1]) Carrier Sense Multiple l Access (CSMA) (Kleinrock 72 [2]) CSMA with Collision Detection (CSMA/CD) (Metcalfe 76 [3]) Busy Tone Multiple Access (BTMA) (Tobagi 76 [4]) CSMA with Collision Avoidance (CSMA/CA): MACA (Karn 90 [5]) MACAW (Bharghavan 94 [6]) IEEE 802.11 standard ( 97 [7]) After CSMA/CA: Fairness enhanced CSMA/CA (Ozugur 99 [8]) Dual Busy Tone Multiple Access (DBTMA) (Haas 99 [9, 10]) CSMA/CA with Power Control (Agarwal 01 [11], Jung 02 [12]) CATA (Tang 99 [13]) Progressive Backoff Algorithm (PBOA), Progressive Ramp Up Algorithm (PRUA) (Toumpis 03 [14]) 3/8/2008 6

Slotted ALOHA Transmission time is divided into time slots BS transmits beacon signal for time and all MTs is divided into time slots to this beacon signal When MT generates a packet, it is buffered and transmitted at the start of the next time slot Assuming equal length packet, either we have a complete collision or no collision Throughput of slotted ALOHA = 36%, which is still low 3/8/2008 7

Carrier Sense Multiple Access (CSMA) It is possible that a node sense the channel to idle, but should not transmit (the hidden terminal problem). It is possible that a node senses the channel busy, but should transmit (In the examples, only nodes connected by a straight line can listen to each other s transmissions.) 3/8/2008 8

Busy Tone Multiple Access (BTMA) Receiver transmits a busy tone in another channel (control channel). Nodes sense the control channel before transmitting. 3/8/2008 9

Disadvantages of BTMA Some bandwidth is sacrificed, and nodes must be full-duplex (harder than half-duplex) If all receivers transmit BT, some transmitters are unnecessarily stopped If only intended receiver transmits BT, there are collisions elsewhere In first case, C can not transmit a packet to A (he should have been allowed) In second case, B transmits a packet to C and there is collision (bandwidth is wasted) 3/8/2008 10

Carrier Sense Multiple Access Collision Avoidance (CSMA/CA) 3/8/2008 11

CSMA/CA.. IEEE 802.11b has four types of Inter Frame Space (IFS): Short IFS (SIFS): is the period between the completion of packet transmission and the start of the ACK frame. (The minimum IFS) Point Coordination IFS (PIFS): is SIFS plus a Slot Time, which is optional and we do not use it in our study Distributed IFS (DIFS): is PIFS plus a Slot Time Extended IFS (EIFS): is a longer IFS used by a station that has received a packet that it could not understand. This is needed to prevent collisions 18/9/2004 12

CSMA/CA.. 18/9/2004 13

Backoff Mechanism 1. Motivation: When channel becomes available, maybe more than one node have packets to transmit If all of them transmit, there will be collisions 2. Solution: nodes backoff for random times: Each selects a random number for backoff counter between 1 and the contention window CW While channel is idle, nodes reduce backoff counter First one to hit 0 transmits The rest freeze their counters 3/8/2008 14

Congestion Control The contention window size should reflect the level of congestion in the network: If there is little traffic, the contention ti window should be small If there is a lot of traffic, the window should be large to reduce collisions The solution of IEEE 802.11: If a node transmits but fails, it doubles the contention window, until it reaches CWmax If a node transmits and succeeds, it resets the contention window to CWmin CWmin = 15 and CWmax =1023 slot time (50 micro-second) 3/8/2008 15

Problem1: Fairness Assume heavy traffic: all nodes need the channel all of the time. But red and blue transmissions cannot coexist (see previous slide). In 4-node example, if A has the channel, D can not get it back We have long-term fairness but not short-term fairness. In 6-node example, C can only initiate transmission if both A and F are silent at the same time. Backoff algorithm makes matters worse! Nodes that fail in handshake double their contention window. 3/8/2008 16

Problem 2: Spatial Reuse with CSMA/CA CSMA/CA ensures fewer collisions, but introduces artificial restrictions on transmissions. In following examples, the blue and the red transmission are compatible, but CSMA/CA does not allow them Reason: With CSMA/CA, transmitter is also required to receive, receiver is also required to transmit Hidden terminal problem morphs to another problem! Exposed terminal problem not solved at all!

Problem 3: CSMA has no Power Control Transmitter receiver pairs must use the same power because communication must be bidirectional (setting (A)). Different pairs must use same power, otherwise strong transmitters kill weak transmitters (setting (B)).

Performance Evaluation [11] Have all the nodes transmit the RTS/CTS packets with maximum power, and the DATA/ACK packets with less power. Transmissions are protected, power is conserved Actually a bad idea: Still nodes must be separated more than necessary It is harder for potential interferers to sense the channel

Problem 4: Transmissions over weak links are not protected (Minimum S/R required for successful reception: = 10.) Problem is typically masked by poor physical layer mode.

Other Problems Control packets might collide. Nodes must decide a power threshold for declaring the channel busy. Placing the threshold h too high h will prohibit some transmissions i that could take place. Placing it too low will not protect sufficiently other transmissions. No matter where you place the threshold, mistakes will be made. The problem is that you are sensing at the wrong place (i.e., the transmitter, not the receiver.) e

References. G. Roberts, Aloha packet system with and without slots and capture, Stanford, CA: Stanford arch Institute, Advanced Research Projects Agency, Network Information Center.. Kleinrock and F. A. Tobagi, Packet switching in radio channels: Part I Carrier Sense Multiple ss models and their throughput-delay characteristics, IEEE Trans. Commun., vol. 23, no. 12, pp. 1416, Dec. 1975.. M. Metcalfe and D. R. Boggs, Ethernet: distributed packet switching for local computer networks, m. of the ACM, vol. 19, no. 5, pp. 395 404, July uy 1976.. A. Tobagi and L. Kleinrock, Packet switching in radio channels: Part II the hidden terminal lem in carrier sense multiple-access and the busy tone solution. IEEE Trans. Commun., vol. 23, 2, pp. 1417 1433, Dec. 1975.. Karn, MACA: A new channel access method for packet radio, in Proc. CNC, vol. 1, London, rio, Canada, Sep. 1990, pp. 134 140.. Bharghavan, A. Demers, S. Shenkar, and L. Zhang, MACAW: A media access protocol for wireless s, in Proc. ACM SIGCOMM, London, UK, Aug. 1994, pp. 212 225. ireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 11.. Ozugur, M. Naghshineh, P. Kermani, and J. A. Copeland, Fair media access for wireless LANs, in. IEEE GLOBECOM, vol. 1B, Rio De Janeiro, Brazil, Dec. 1999, pp. 570 579.

References.. Z. J. Haas and J. Deng, Dual busy tone multiple access (DBTMA) a multiple access control me d hoc networks, IEEE Trans. Commun., vol. 50, no. 6, pp. 975 985, 985, June 2002. S. Agarwal, S. Krishnamurthy, R. H. Katz, and S. K. Dao, Distributed power control in ad hoc ess orks, in Proc. IEEE PIMRC, 2001. E.-S. Jung and N. H. Vaidya, A power control o MAC protocol o o for ad hoc networks, in Proc. ACM com, Atlanta, GA, Sep. 2002, pp. 36 47. Z. Tang and J. J. Garcia-Luna-Aceves, A protocol for topology-dependent transmission scheduling ess networks, in Proc. IEEE WCNC, vol. 3, New Orleans, LA, Sep. 1999,,pp. 1333 1337. S. Toumpis and A. J. Goldsmith, Performance, optimization, and cross-layer design of media access ol protocols for wireless ad hoc networks, in Proc. IEEE ICC, Anchorage, AK, May 2003, pp. 2240. A. Colvin, CSMA with collision avoidance, Computer Communications, vol. 6, no. 5,,pp pp. 227 235, 1983. B. P. Crow, I. Widjaja, J. G. Kim, and P. T. Sakai, IEEE 802.11 Wireless Local Area Networks, IEEE mun. Mag., vol. 35, no. 9, pp. 116 126, Sep. 1997.