CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

Similar documents
Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Solving the near far problem in CDMA-based ad hoc networks q

Mohammad Hossein Manshaei 1393

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

SENSOR-MAC CASE STUDY

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Local Area Networks NETW 901

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

CSC 4900 Computer Networks: Wireless Networks

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

MAC LAYER. Murat Demirbas SUNY Buffalo

Mobile Communications Chapter 3 : Media Access

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Multiple Access in Cellular and Systems

Rahman 1. Application

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Multiple Access Links and Protocols

COMP 3331/9331: Computer Networks and Applications

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Sample solution to Midterm

Wireless MACs: MACAW/802.11

CSMA based Medium Access Control for Wireless Sensor Network

ECE 4450:427/527 - Computer Networks Spring 2017

Node activity scheduling in wireless sensor networks

Subject: Adhoc Networks

MULTIPLE ACCESS PROTOCOLS 2. 1

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Strengthening Unlicensed Band Wireless Backhaul

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

Wireless networks. Wireless Network Taxonomy

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Logical Link Control (LLC) Medium Access Control (MAC)

Interference avoidance in wireless multi-hop networks 1

CS 332 Computer Networks Wireless Networks

Chapter 6 Local Area Networks and Media Access Control. School of Info. Sci. & Eng. Shandong Univ.

CSCI-1680 Wireless Chen Avin

Data Link Layer: Collisions

Wireless and Mobile Networks

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Mobile and Sensor Systems

Advanced Networking Technologies

Media Access Control in Ad Hoc Networks

IEEE Medium Access Control. Medium Access Control

Chapter 3 MEDIA ACCESS CONTROL

CHAPTER TWO LITERATURE REVIEW

Chapter 6 Wireless and Mobile Networks

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Chapter 3: Medium Access Control in Wireless Sensor Networks

Wireless Sensor Networks 8th Lecture

Wireless and Mobile Networks 7-2

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.

CMPE 257: Wireless and Mobile Networking

XORs in the Air: Practical Wireless Network Coding

The MAC layer in wireless networks

Data Link Layer Technologies

CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

CS 268: Computer Networking. Taking Advantage of Broadcast

Last Lecture: Data Link Layer

Physical Layer: Multiplexing, Spectrum Spreading and Switching. Covers Chapters# 06 & 08 from Text Book

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Chapter 6 Medium Access Control Protocols and Local Area Networks

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Wireless Medium Access Control Protocols

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

EE 122: Ethernet and

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

ECE 4450:427/527 - Computer Networks Spring 2017

Implementation and use of Software Defined Radio (SDR) technology for Public Safety, Traffic applications, and Highway Engineering

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

Reducing Inter-cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks

Wireless Networks. Wireless Links. Mike Freedman hap:// Interference / bit errors

CMPE 257: Wireless and Mobile Networking

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

CSE 6811 Ashikur Rahman

Multiple-access protocols

Coordination-based Medium Access Control with Space-reservation for Wireless Ad Hoc Networks

Exploiting Processing Gain in Wireless Ad Hoc Networks Using Synchronous Collision Resolution* Medium Access Control Schemes

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

A Survey on Modified RTS/CTS Mechanism

Aloha and slotted aloha

Wireless Communications

The MAC layer in wireless networks

15-441: Computer Networking. Wireless Networking

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Modeling of Partially Overlapping Wireless Personal Area Networks

Wireless Networking: An Introduction. Hongwei Zhang

Medium Access Control Protocols: scheduled schemes

Medium Access Control in Wireless Sensor Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Reading. Read 3 MPLS links on the class website

Transcription:

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for 600.647-Advanced Topics in Wireless Networks. JHU. Spring 04

Today s Presentation Introduction The Near-Far problem Protocol design Protocol description Simulation Results and Evaluation Conclusion and future work

Introduction: Motivation Mobile Ad hoc NETworks (MANETs) Ability to provide temporary wireless networking capability; low throughput Challenge: Increases overall n/w throughput maintaining low energy consumption Harsh characteristics of channel Contention based nature of MAC Focus: CDMA based design of MAC protocol to improve n/w throughput

Intro: CDMA? Code Division Multiple Access Bandwidth = Scarce Traditional methods: transmit using least b/w Eg. TDMA, FDMA CDMA based on Spread Spectrum: Each user occupies entire available b/w. Transmitter B1 bits/s spread with pseudorandom noise (PN) B2 bits/s

Intro: CDMA! B2/B1 >> 1 (processing gain) PN statistically random but can be exactly reproduced through precise math rules Using locally generated PN receiver despreads signal; recovers original info Several independently coded signals can occupy the same channel b/w provided each signal has diff PN code

Intro: CDMA Propaganda 3G s choice 6 times capacity of TDMA, FDMA Graceful signal degradation Multi-path resistance Interference rejection 802.11 spreads signals with common PN code at physical layer Thus not allowing concurrent transmissions Diagram

Intro: Code Assignment Issues Absence of centralized control (base station) Code assignment protocol: diff codes to diff terminals Trivial in small n/ws Not feasible for MANET s time async systems Spatial code reuse necessary

Intro: Spreading Code protocol Which codes to use for packet transmission and monitoring for packet reception 3 types Receiver based Transmitter based Hybrid

Intro: Receiver based Transmitter uses code of intended receiver to spread packet Idle node will monitor its own code only Advantages: Simple receiver circuit Disadvantage: Primary collision can happen Broadcast requires transmitter to unicast to each receiver Diagram

Intro: Transmitter based A different code is assigned to each node But, the receiving node must listen to all codes Advantages: Avoids Primary Collision Simplified Broadcast Disadvantage: Increased complexity of the receiver

Intro: Hybrid based Prevalent Approach Fields of the packet are spread using a common code Other fields are spread by a receiver or a transmitter based mechanism In the reservation based schemes: a code is used for RTS/CTS Another code for data exchange Receivers will listen to the common code If a receiver was intended by the transmitter Switch to own (or transmitter) code to receive the signal Example: RA-CDMA

Intro: RA-CDMA Guaranteed free of primary collisions However, non-zero cross-correlation causes multi-access interference; MAI Results in secondary collision at receiver (collisions between transmissions using diff codes) This is known as Near-Far problem; the bane of MANETs

The Near-Far problem in RA- CDMA System is time-sync if signals originate from same transmitter. Eg downlink in cellular CDMA Common time reference, diff receivers, same path and same time delays Complete orthogonal codes System is time-async if signals originate from multiple transmitters. Eg uplink in cellular or MANETs No common time reference, diff transmitters, diff path and diff time delays Not possible to have orthogonal codes

The Near-Far problem in RA- CDMA CDMA codes suffer from non-zero cross-corr Receiver computes cross corr between signal and local PN If PN same message intended for this receiver Else 0 or non-zero depending if sync or async Near-Far severe consequence of MAI: receiver trying to detect signal of one is closer to another Transmission power equal, closer signal higher power incorrect decoding. Collision Diagram

NFP: Impact d0=distance between receiver and intended transmitter Calculations show that if there is only 1 interferer at distance < 0.38 d0 from receiver, secondary collision will occur p=probability that terminal is transmitting in a given slot L=number of nodes within a circle centered at transmitter radius d0

NFP: Impact

Proposed protocol Main Goals: To provide a CDMA-based MAC solution that addresses near-far problem A Protocol that can achieve enhanced throughput keeping the same energy requirement Basic idea a distributed admission and feedback among nodes Diagram

Proposed protocol Suppose that A wants to communicate with B using a given code and C wants to communicate with D using a different code. Suppsoe that dab dcd, dcb << dab, and dad << dcd. Then, the MAI caused by C makes it impossible for B to receive A s transmission. Similarily, the MAI caused by A makes it impossible for D to receive C s transmission.

Comparison SS protocol Decides which PN code used to Spread the signal Doesn t t solve contention on the medium MAC Protocol Responsible for minimizing or eliminating collisions Even if a terminal has an available spreading code, it may not be allowed to transmit

Design Goals Asynchronous, distributed, scalable solution for large Networks (Matches MANET environment) Receiver stage shouldn t be overly complex (Receiver Based spreading code) Adapt to channel characteristics and mobility patterns Able to coupe with incorrect code assignment code assignment is left to the upper layers

Design Architecture Two Separate Frequency channels (FDM-like partitioning) - one for the RTS/CTS and the other for data exchange Common Spreading Code for the control channel Receiver Based spreading codes for the data channel Codes are not assumed to be orthogonal Control and data channels are completely orthogonal Diagram

Design Architecture

Protocol Assumptions Control and data channels are completely orthogonal Channel gain is stationary for the duration of the control and data packet Transfer Gain is same in both directions Data packets between pair of terminals observe similar gain The radio stage can provide a feedback to the upper MAC layer (about the interference level) both ways

Protocol Description Contention based. Uses a variant of RTS/CTS reservation scheme RTS and CTS are spread using a common code and transmitted over the control channel using fixed power Pmax RTS and CTS are heard by potentially interfering nodes, however, these nodes are allowed to transmit based on some constraints For the Data channel, Receive and Transmitter should agree on: Spreading Code: code assignment is dealt with at upper layers Transmit Power Choice of power is critical and represents a trade-off between link quality and max allowable interference

More protocol description In addition, the protocol incorporates an Interference Margin into the power computation. Allows nodes at some distance from a receiver to start new transmissions in the future Nodes exploit the knowledge of the power level of the overheard RTS and CTS transmissions to compute this margin A transmitter can decide when and at what power it can transmit without disturbing ongoing transmissions in its surrounding and at the same time ensuring enough power at the receiver given the current MAI at the receiver. Distribute feedback to neighbors, through the CTS messages.

Channel Access Mechanism Transmissions that cause neither primary nor secondary collisions RTS/CTS provide 3 functions: Allow nodes to estimate channel gains between transmitter and receiver A receiver uses CTS to notify its neighbors of the additional interference noise allowable noise rise it can accept without impacting its current reception Each terminal keeps listening to the control channel regardless of the signal destination

Protocol recovery When transmission and propagation times of control packets are long high probability of collision of CTS and RTS of another contending terminal leading to collision with data packets Eg

Code Assignment N/w topology continuously changing Diff to guarantee correct code assignment Duty of MAC to reduce/eliminate contention (see previous slide)

Simulation Used CSIM programs Focused on 1 hop throughput Data packets have fixed size Transmission periods for RTS, CTS, data, ACK in tens of ms Used random grid and clustered topologies M=number of mobile hosts. Assume 36 Length 3 km CA-CDMA 280% throughput increase over 802.11. Due to simultaneous transmissions Uses shorter links to save energy

Graphs

Conclusion & Future Work Conclusion: CA-CDMA is a distributed power control CDMA based MAC protocol. CA-CDMA provides an enhancement for the throughput in MANETs through addressing the near far problem Future Work: Combine CA-CDMA with other capacity optimization schemes. E.g. directional antennas Multi-rate support is also another opportunity for capacity optimization Devise better schemes for access control over the control channel

Thank you! PS: I hope I get a good grade!