Media Access Control in Ad Hoc Networks

Similar documents
CMPE 257: Wireless and Mobile Networking

Mohamed Khedr.

IEEE Medium Access Control. Medium Access Control

CSE 461: Wireless Networks

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

The MAC layer in wireless networks

The MAC layer in wireless networks

Chapter 12 Multiple Access 12.1

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Multiple Access Links and Protocols

Wireless MACs: MACAW/802.11

ICE 1332/0715 Mobile Computing (Summer, 2008)

CMPE 257: Wireless and Mobile Networking

Unit 7 Media Access Control (MAC)

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

/99/$10.00 (c) 1999 IEEE

Rahman 1. Application

Logical Link Control (LLC) Medium Access Control (MAC)

ECEN 5032 Data Networks Medium Access Control Sublayer

MAC in /20/06

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Collisions & Virtual collisions in IEEE networks

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Aloha and slotted aloha

Computer Communication III

Link Layer II: MACA and MACAW

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

MAC protocols. Lecturer: Dmitri A. Moltchanov

CSE 6811 Ashikur Rahman

A Survey on Modified RTS/CTS Mechanism

Lecture 16: QoS and "

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

CMPE 257: Wireless and Mobile Networking

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

MAC. Fall Data Communications II 1

Data Communications. Data Link Layer Protocols Wireless LANs

Figure.2. Hidden & Exposed node problem

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Data and Computer Communications. Chapter 13 Wireless LANs

Strengthening Unlicensed Band Wireless Backhaul

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

SENSOR-MAC CASE STUDY

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless Medium Access Control Protocols

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Local Area Networks NETW 901

CSE 461: Multiple Access Networks. This Lecture

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

/$10.00 (c) 1998 IEEE

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Multiple Access in Cellular and Systems

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

Wireless Local Area Network (IEEE )

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

EE 122: Ethernet and

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Chapter 6 Medium Access Control Protocols and Local Area Networks

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

MAC protocols for ad hoc networks

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Embedded Internet and the Internet of Things WS 12/13

Mobile Communications Chapter 7: Wireless LANs

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Wireless Local Area Networks. Networks: Wireless LANs 1

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

15-441: Computer Networking. Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Communications

Wireless networks. Wireless Network Taxonomy

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Efficient Power MAC Protocol in Ad-hoc Network s

Chapter 6 Medium Access Control Protocols and Local Area Networks

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Wireless & Mobile Networking

Page 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

MSIT 413: Wireless Technologies Week 8

Computer Networks. Wireless LANs

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

MAC LAYER. Murat Demirbas SUNY Buffalo

Medium Access Control Sublayer Chapter 4

An Efficient Scheduling Scheme for High Speed IEEE WLANs

CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS

Chapter 6 Wireless and Mobile Networks

ECE 4450:427/527 - Computer Networks Spring 2017

Nomadic Communications WLAN MAC Fundamentals

MULTIPLE ACCESS PROTOCOLS 2. 1

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Transcription:

Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and effectively in a fair manner among the various nodes that require this resource.

What are the possible ways? Fixed Allocation o TDMA, FDMA allocate a share of the available bandwidth permanently to users. o Will soon run out of bandwidth not scalable. Dynamic Allocation Reservations o Difficult to do in a distributed setting. o Synchronization between nodes is extremely difficult. Random Access Methods o Popular ones used in networks Aloha, CSMA-CD. o Carrier Sensing does not help as much. o Does not yield high throughput. Token Passing is not an option really!

Physical Channel The wireless channel is harsh. Three kinds of effects that usually occur: Attenuation due to path-loss As radio transmission goes over a distance r, it is attenuated as 1/r 4. (The exponent could be different in different scenarios, but this is usually used. Shadowing Due to the presence of hills, other large objects. Usually lognormal. Multi-path Fading Due to the multi-path nature of channel.

Multi-Path Effects Could cause a significant attenuation due to the destructive combination of signals. Usually rate dependent. For narrowband it causes what is called as non-frequency selective fading wipes out certain frequencies totally. Usually follows a Rayleigh or Ricean distribution. For broadband transmission causes spreading of signals overlay of delayed signals causes what is called as Inter Symbol Interference.

Some Key Concepts COLLISIONS: When two or more transmissions are received at the same time, it is said that there is a collision at the receiver (Note that the two transmissions ought to be with the same frequency and at the same time.). CAPTURE: If the signal strength of one of the signals is sufficiently larger than that of an other, this signal could potentially be captured at the receiver. The other signal is called INTERFERENCE. CARRIER: Usually there is a high frequency carrier upon which the data is super-imposed (MODULATION). For the purposes of this discussion we ignore capture and interference only collisions.

CSMA Carrier Sense Multiple Access Every node senses the channel before initiating a transmission. If it senses a carrier it defers transmission. If it senses a busy channel, it backs-off in accordance to the exponential back-off scheme. CSMA is popular in many architectures such as in Ethernet. Ability to detect collisions CSMA CA. However, in Wireless LANs and Ad hoc Networks this does not work very well. Collision happens at receiver not transmitter!

Hidden and Exposed Terminals A wants to transmit to B. D A B C F C senses channel no idea A is transmitting. C initiates transmission to F. Collision at B. C and A are hidden from each other. E D could potentially transmit to E but does not senses A s carrier. D is exposed to A. Loss in throughput.

MACA : Multiple Access with Collision Avoidance C A RTS CTS Exchange of two short messages Request to Send (RTS), and Clear to Send (CTS). They are fixed size when A wishes to transmit to B, it sends an RTS message. RTS message contains duration of proposed transmission If B knows that the channel is free, it responds with a CTS message. (CTS also contains duration of proposed communication) How does this help? B D

C A RTS CTS B D Any station that hears the RTS message, defers all communication for some time until the associated CTS message has been finished. A CTS message defers communication for the duration of the time indicated in the CTS message. When A is transmitting data, C can go ahead and access the channel. What all could go wrong here?

Some effects in MACA Node B s CTS message may not be heard by A. B found that the channel was already busy. RTS packet might collide. If A does not receive a CTS, it times-out and schedules the packet for retransmission. MACA uses the binary exponential back-off algorithm to select the retransmission time. B s CTS message collides at C. This would cause C to be unaware of the pending communication between nodes A and B. NOTE: MACA is used (with Modifications) in the WaveLAN cards.

Details of Exponential Back-Off, etc. RTS and CTS slot times (defined to be 30 bytes) form the basic slot size. If CTS is not heard, a station chooses a time that is uniformly distributed between 1 and BO (for Back-Off). What is BO? If a CTS message is received then BO is set to BO min. If a CTS is missed, then, if the previous BO was BO old, the new BO, BO new is set to BO new = Min ( 2 x BO old, BO min ). BO min and BO max represent the minimum and maximum back-off intervals.

Reference P. Karn, MACA A new channel access method for Packet Radio, ARRL/CRRL/Amateur Radio 9 th Computer Networking Conference, September 1990. Notice that this was primarily meant for packet radio networks relatively stationary. Mobility causes problems to some extent.

Design Criteria The MAC protocol should yield the best possible network utilization. Yet, it should be fair it should not be the case wherein one node could dominate the channel access and other nodes be starved. These are in some sense contradicting features. Studies by Bharghavan (UIUC) et al, lead to certain observations with regards to the features of MACA.

Unfairness due to Binary Exponential Back-Off Let us consider two nodes contending for channel bandwidth in some vicinity e.g. D A and B A. D E A B Less Backed-Off Node Wins If both B A and D A require long term data transfer and both B and D are heavily loaded, then the one that starts earlier captures the channel. The other backs-off more and more. Similarly if one is heavily loaded say B A and the other is not, B A gets exclusive use until B is done. Again because D backs off more and more.

MACAW Modification Include in packet header, the value of the back-off counter. Thus, whenever a node hears the packet, it copies the value indicated into its own back-off counter. Thus, each node in the range of the transmitting node has the same back-off counter. Really designed for Wireless LANs. Does not eliminate the problem here. Can you think why?

MACAW also proposes to make the back-off more gentle! The current scheme results in widely fluctuating oscillations. Thus, decrease by one at the receipt of a CTS rather than starting all over with BO min. Also, instead of doubling the time-out when a CTS is missed, change it to such that BO new = Min(1.5 BO old, BO max ). This helps in reducing number of fluctuations. They call this the MILD model.

Reliability in MACA Mobility (or fading) causes packets to be corrupted or lost. How is reliability ensured? One could have reliability at the link level or end-to-end. In MACA, no concept of reliability at link level. If due to some reason packet is lost, MACA relies on a higher layer (TCP) to make the recovery. Link level recovery is good if the links are not that stable wireless. In MACAW, an additional ACK message is included to provide link layer reliability.

Reliability in MACAW The authors amend the RTS-CTS exchange to include a fourth message which they call the ACK message. This provides some reliability example if CTS message collides at C and it initiates a message at the same time as A does to B, then the data never reaches B. Note: Everything is asynchronous here. D E A B C Back-off upon discovery of loss. F If ACK is not received due to data loss, reschedule retransmission. If data was indeed received and ACK lost, when RTS is sent for retransmission, reply with ACK.

How does this change effect? We said that while A B, D could perform D E. Ok in MACA Exposed Terminal problem resolved? Now, since DATA/ACK exchange occurs, CTS message from E could collide with a transmission from A (retransmissions allowed!). This results in increase in D s backoff counter: more problems. D E A B C F Note that now, congestion occurs at both transmitter and receiver. D has to defer transmission while A B is happening. But what if CTS is lost? D has to sense for A s carrier MACAW proposes a special,short DS (Data Sending) packet prior to data transmission.

Need for some synchronization Let us look at two contending flows: A B C D If they are heavily loaded flows, one flow C D may totally get the channel bandwidth. B does not respond since it has heard C s CTS message. Now, unless A transmits an RTS in the small gap between the communications between D and C, it can never get the channel. Note data transfer takes a relatively long time. Furthermore, this would result in A backing off a lot. Lack of synchronization between when communication between D and C pauses. The magic RRTS message.

A B C D The RRTS Message Note B knows when the gaps occur, although A does not. So why not B take an aggressive role? B sends a RRTS Request for Request to Send Message to A. A responds with RTS and communications continue. Stations overhearing RRTS (In our case C) defer transmissions for two slot periods enough for an RTS CTS exchange. Does this solve all problems?

A B C D Unfortunately, the answer is NO. Look at the above wherein C D instead of vice versa. In this case C D dominates the channel. A s RTS arrives during data transfer from C to D in most cases and cannot even be heard by B... unless it arrives in a gap during communication. The RRTS message does not help here!

Much more difficult. Multicast or Broadcast What do we do, we want multiple people to receive the packet upon broadcast. Unreliable is one option akin to Aloha. We could use CSMA. MACAW suggests that we use an RTS immediately followed by data at least receivers in range will defer transmissions noting that this is a multicast (as indicated in RTS). However, same flaws as CSMA. Open Problem reliable broadcast/multicast.

Other problems with back-off A B C D A s back-off timer is copied by B, which is copied by C, which is in turn copied by D. The propagation is not good! CTS failures may not be due to congestion; could be due to fading.

Reference Bhargavan, V., Demers, A., Shenker, S. and Zhang, L., MACAW: A media access protocol for wireless LANs, Proceedings of ACM SIGCOMM 94, pp. 212-25, ACM, 1994 Note that this paper has been written with Wireless LANs in mind.. but many concepts are applicable to ad hoc networks so keep that in your mind when you read the paper.

The IEEE 802.11 Protocol The IEEE 802.11 MAC protocol derives from MACA [1] and MACAW [2]. It uses both a physical and a virtual carrier sense mechanism. It uses an RTS-CTS-DATA-ACK dialogue to accomplish data transmission. Each message in the dialogue contains duration information for the remainder of the dialogue.

The IEEE 802.11 MAC layer The Distributed Coordination Function (DCF): Fundamental, contention-based access method. Implemented for use with both ad hoc and infrastructure networks. The Point Coordination Function (PCF): Optional, contention-free access method usable only on infrastructure networks. DCF utilizes an RTS-CTS exchange to reserve the channel prior to DATA transmission. Successful DATA transmission is followed by an ACK from the recipient. PCF requires one node to function as a polling master. This node is called the point coordinator (PC).

The DCF Carrier Sensing Virtual carrier sense implemented using a network allocation vector (NAV). The NAV at each node is set to indicate the remaining time before the medium is expected to become idle. The NAV is updated based on duration information contained in overheard messages. Actual carrier sense combines the NAV state, the node s transmission status and the physical carrier sense indication from the physical layer.

Basic Medium Access under the DCF

Medium Access Issues in Heterogeneous Networks The existing medium access schemes typically assume homogeneous power capabilities, i.e. all nodes transmit at the same power level. The rapid spread of multifarious wireless network enabled devices jeopardizes this assumption. It is important to investigate if the MAC protocol in use unduly favors devices that can transmit at higher power levels.

Failure of RTS/CTS in Heterogeneous Network

Effects of range heterogeneity Significant degradation in throughput. One way of overcoming this is to flood (remember flooding?) the CTS message within certain distance of the transmission. However, this does not help. Why? A lot more messages create more collisions and therefore a further degradation in throughput. Need for a more intelligent way of dissemination of control messages.

Reference Poojary, N., Krishnamurthy, S.V. and Dao, S, Medium Access Control in a Network of Ad Hoc Nodes with Heterogeneous Transmit Power Capabilities, Proceedings of ICC 2001. On my web site.