Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Similar documents
IEEE Medium Access Control. Medium Access Control

CSE 461: Wireless Networks

CMPE 257: Wireless and Mobile Networking

MAC in /20/06

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Mohamed Khedr.

Computer Communication III

Wireless Local Area Network (IEEE )

Lecture 16: QoS and "

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Improving IEEE Power Saving Mechanism

Energy Management Issue in Ad Hoc Networks

Wireless Local Area Networks. Networks: Wireless LANs 1

Energy Management Issue in Ad Hoc Networks

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

CMPE 257: Wireless and Mobile Networking

Data Communications. Data Link Layer Protocols Wireless LANs

Logical Link Control (LLC) Medium Access Control (MAC)

Rahman 1. Application

SENSOR-MAC CASE STUDY

Wireless Networked Systems

Local Area Networks NETW 901

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Chapter 12 Multiple Access 12.1

MAC protocols. Lecturer: Dmitri A. Moltchanov

CSE 6811 Ashikur Rahman

Wireless LANs. ITS 413 Internet Technologies and Applications

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

The MAC layer in wireless networks

MAC protocols for ad hoc networks

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Unit 7 Media Access Control (MAC)

Multiple Access Links and Protocols

The MAC layer in wireless networks

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

MAC. Fall Data Communications II 1

Introduction to IEEE

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Embedded Internet and the Internet of Things WS 12/13

Advanced Networking Technologies

Wireless MACs: MACAW/802.11

Wireless Sensor Networks 8th Lecture

Media Access Control in Ad Hoc Networks

A QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CSE 461: Multiple Access Networks. This Lecture

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Optional Point Coordination Function (PCF)

CMPE 257: Wireless and Mobile Networking

ECEN 5032 Data Networks Medium Access Control Sublayer

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

Department of Electrical and Computer Systems Engineering

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Sensor Network Protocols

CS 410/510 Sensor Networks Portland State University

Strengthening Unlicensed Band Wireless Backhaul

WITH advances in wireless communications and the

Priority Scheduling in Wireless Ad Hoc Networks

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

MAC LAYER. Murat Demirbas SUNY Buffalo

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Collision Free and Energy Efficient MAC protocol for Wireless Networks

WIRELESS sensor networking is an emerging technology

Multiple Access in Cellular and Systems

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless Networking & Mobile Computing

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Wireless Protocols. Training materials for wireless trainers

Wireless Network Security Spring 2013

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Link Layer II: MACA and MACAW

Data and Computer Communications. Chapter 13 Wireless LANs

BLAM: An Energy-Aware MAC Layer Enhancement for Wireless Adhoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

ICE 1332/0715 Mobile Computing (Summer, 2008)

Wireless and Mobile Networks 7-2

Tarek Sheltami. CCSE COE 3/8/2008 1

CMPE 257: Wireless and Mobile Networking

Mobile Communications Chapter 7: Wireless LANs

Wireless Network Security Spring 2012

Wireless Communications

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Coordination-based Medium Access Control with Space-reservation for Wireless Ad Hoc Networks

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

Multiple Access Technique. Media Access Control (Intro.) Outline. Multiple Access Technique. Designing Issues of MAC protocols. Protocols examples

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

15-441: Computer Networking. Wireless Networking

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Internet Protocol Stack

Transcription:

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University 2-1

Outline Wireless MAC Issues Hidden terminal problem Exposed terminal problem Capture MAC Performance Metrics Wireless MAC Classification Distributed Wireless MAC Protocols CSMA/CA 802.11 MAC DCF Backoff Fairness Energy/Power 2-2

Fairness Issue Many definitions of fairness plausible Simplest definition: All nodes should receive equal bandwidth A B Two flows C D 2-3

Fairness Issue Assume that initially, A and B both choose a backoff interval in range [0,31] but their RTSs collide Nodes A and B then choose from range [0,63] Node A chooses 4 slots and B choose 60 slots After A transmits a packet, it next chooses from range [0,31] It is possible that A may transmit several packets before B transmits its first packet A B Two flows C D 2-4

Fairness Issue Unfairness occurs when one node has backed off much more than some other node A B Two flows C D 2-5

MACAW Solution for Fairness When a node transmits a packet, it appends the cw value to the packet, all nodes hearing that cw value use it for their future transmission attempts MACAW proposes maintaining cw independently for each receiver Using per-receiver cw is particularly useful in multi-hop environments, since congestion level at different receivers can be very different 2-6

Another MACAW Proposal For the scenario below, when node A sends an RTS to B, while node C is receiving from D, node B cannot reply with a CTS, since B knows that D is sending to C When the transfer from C to D is complete, node B can send a Request-to-send-RTS to node A [Bharghavan94Sigcomm] Node A may then immediately send RTS to node B A B C D 2-7

This approach, however, does not work in the scenario below Node B may not receive the RTS from A at all, due to interference with transmission from C A B C D 2-8

Outline Wireless MAC Issues Hidden terminal problem Exposed terminal problem Capture MAC Performance Metrics Wireless MAC Classification Distributed Wireless MAC Protocols CSMA/CA 802.11 MAC DCF Backoff Fairness Priority Scheduling Power 2-9

Priority Scheduling Given packets belonging to different priority classes, packets with higher priority should be transmitted first High A Low B Since the packets may be at different nodes sharing the wireless channel, how to coordinate access? 2-10

Priorities in 802.11 CTS and ACK have priority over RTS After channel becomes idle If a node wants to send CTS/ACK, it transmits SIFS duration after channel goes idle If a node wants to send RTS, it waits for DIFS > SIFS 2-11

SIFS and DIFS DATA1 ACK1 backoff RTS SIFS DIFS DIFS 2-12

Variation in Backoff Interval [Aad01] For high priority packets Backoff interval in [0,CWh] For low priority packet Backoff interval in [CWh+1, CWl] Higher priority packets use small backoff intervals Higher probability of transmitting a high priority packet before a pending low probability packet 2-13

With this scheme, if two high priority packets collide, they will have to choose a new backoff interval, and may be transmitted after a low priority packets Example: Packet H1 : backoff interval 9 slots Packet H2 : backoff interval 9 slots Packet L : backoff interval 13 slots When H1 and H2 collide Packet L : backoff interval is now 4 slots Assume that H1 and H2 pick backoff intervals 6 and 7 slots respectively, after collision Packet L will be transmitted first 2-14

Second Mechanism [Aad01] High priority packets always choose backoff in [0,CWh] Low priority packets wait for LIFS idle period before counting down where LIFS = DIFS + CWh Ensures that high priority packets will always get a chance to transmit before a low priority packet can 2-15

Example DIFS H busy H backoff H L busy LIFS LIFS H L backoff 2-16

Disadvantage: When no high priority packets, low priority packet unnecessarily wait for long periods of time How to avoid priority reversal, and also minimize wait for low priority packets? [Yang02Mobihoc] 2-17

Priority Using Black Bursts [Hiperlan/1,Sobrinho96,99] All nodes begin the priority contention phase together Higher priority node transmit a longer burst than low priority node After transmitting its burst, a node listens to the channel If channel still busy, the node has lost contention to a higher priority node 2-18

Outline Wireless MAC Issues Hidden terminal problem Exposed terminal problem Capture MAC Performance Metrics Wireless MAC Classification Distributed Wireless MAC Protocols CSMA/CA 802.11 MAC DCF Backoff Fairness Priority Scheduling Energy Conservation 2-19

Energy Conservation Since many mobile hosts are operated by batteries, MAC protocols which conserve energy are of interest Two approaches to reduce energy consumption Power save: Turn off wireless interface when desirable Power control: Reduce transmit power 2-20

Power Aware Multi-Access Protocol (PAMAS) [Mobicom 98Singh] A node powers off its radio while a neighbor is transmitting to someone else Node A sending to B B Node C stays powered off A C 2-21

Power Aware Multi-Access Protocol (PAMAS) What should node C do when it wakes up and finds that D is transmitting to someone else C does not know how long the transfer will last Node D sending to E Node A sending to B B C stays powered off A C D E C wakes up and finds medium busy 2-22

PAMAS PAMAS uses a control channel separate from the data channel Node C on waking up performs a binary probe to determine the length of the longest remaining transfer C sends a probe packet with parameter L All nodes which will finish transfer in interval [L/2,L] respond Depending on whether node C see silence, collision, or a unique response it takes varying actions 2-23

Disadvantages of PAMAS Use of a separate control channel Nodes have to be able to receive on the control channel while they are transmitting on the data channel And also transmit on data and control channels simultaneously A node (such as C) should be able to determine when probe responses from multiple senders collide 2-24

Power Save in IEEE 802.11 Ad Hoc Mode Time is divided into beacon intervals ATIM window Beacon interval Each beacon interval begins with an ATIM window ATIM =?? 2-25

Power Save in IEEE 802.11 Ad Hoc Mode If host A has a packet to transmit to B, A must send an ATIM Request to B during an ATIM Window On receipt of ATIM Request from A, B will reply by sending an ATIM Ack, and stay up during the rest of the beacon interval If a host does not receive an ATIM Request during an ATIM window, and has no pending packets to transmit, it may sleep during rest of the beacon interval 2-26

Power Save in IEEE 802.11 Ad Hoc Mode Node A ATIM Req ATIM Ack Data Ack Node B Node C Sleep 2-27

Power Save in IEEE 802.11 Ad Hoc Mode Size of ATIM window and beacon interval affects performance [Woesner98] If ATIM window is too large, reduction in energy consumption reduced Energy consumed during ATIM window If ATIM window is too small, not enough time to send ATIM request 2-28

Power Save in IEEE 802.11 Ad Hoc Mode How to choose ATIM window dynamically? Based on observed load [Jung02infocom] How to synchronize hosts? If two hosts ATIM windows do not overlap in time, they cannot exchange ATIM requests Coordination requires that each host stay awake long enough (at least periodically) to discover out-of-sync neighbors [Tseng02infocom] ATIM ATIM 2-29

Impact on Upper Layers If each node uses the 802.11 power-save mechanism, each hop will require one beacon interval This delay could be intolerable Allow upper layers to dictate whether a node should enter the power save mode or not [Chen01mobicom] 2-30

Energy Conservation Power save Power control 2-31

Power Control Power control has two potential benefit Reduced interference & increased spatial reuse Energy saving 2-32

Power Control When C transmits to D at a high power level, B cannot receive A s transmission due to interference from C A B C D 2-33

Power Control If C reduces transmit power, it can still communicate with D Reduces energy consumption at node C Allows B to receive A s transmission (spatial reuse) A B C D 2-34

Power Control α Received power level is proportional to 1/d, α >= 2 If power control is utilized, energy required to transmit to a host at distance d is proportional to α d + constant Shorter hops typically preferred for energy consumption (depending on the constant) [Rodoplu99] Transmit to C from A via B, instead of directly from A to C A B C 2-35

Power Control with 802.11 Transmit RTS/CTS/DATA/ACK at least power level needed to communicate with the received A B C D A/B do not receive RTS/CTS from C/D. Also do not sense D s data transmission B s transmission to A at high power interferes with reception of ACK at C 2-36

Transmitting RTS at the highest power level also reduces spatial reuse Nodes receiving RTS/CTS have to defer transmissions 2-37

Modification to Avoid Interference Transmit RTS/CTS at highest power level, DATA/ACK at least required power level Increase DATA power periodically so distant hosts can sense transmission [Jung-Infocom02] Power level Need to be able to change power level rapidly 2-38

Caveat Energy saving by power control is limited to savings in transmit energy Other energy costs may not change For some 802.11 devices, the energy consumption of the wireless interface reduces only by a factor of 2 when transmit power reduced from max to min possible for the device 2-39

Small Addresses Save Energy [Schurgers01mobihoc] In sensor networks, packet sizes are small, and MAC addresses may be a substantial fraction of the packet Observation: MAC addresses need only be unique within two hops E1 G0 D3 A2 C0 F2 B1 Fewer addresses are sufficient: Address size can be smaller. [Schurgers00mobihoc] uses Huffman coding to assign variable size encoding to the addresses Energy consumption reduced due to smaller addresses 2-40

MAC Summary Designing MAC protocols for ad hoc networks is very difficult Issues to consider: Hidden/exposed terminal Collision avoidance Congestion control Fairness Reliability Energy efficiency IEEE 802.11 DCF (RTS/CTS/DATA/ACK) widely used, but many other protocols are proposed 2-41

What you should know (1) Wireless Mac issues Half Duplex operation, Time Varying Channel, Burst Errors Performance parameters for MAC Hidden Nodes Exposed Nodes Captured Nodes MACA Mac Protocol RTS-CTS Mechanisms Limitations of RTS-CTS mechanisms 2-42

What you should know (2) Functions and operation of the MAC layer Minimum frame exchange protocol RTS-CTS extension Operation of access mechanisms Operation of basic access mechanism Role of timing intervals Operation of DCF, DCF with RTS-CTS and PCF Fairness Issues Energy Issues 2-43