CMPE 257: Wireless and Mobile Networking

Similar documents
CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CSE 461: Wireless Networks

CMPE 257: Wireless and Mobile Networking

IEEE Medium Access Control. Medium Access Control

Media Access Control in Ad Hoc Networks

The MAC layer in wireless networks

Mohamed Khedr.

SENSOR-MAC CASE STUDY

The MAC layer in wireless networks

MAC LAYER. Murat Demirbas SUNY Buffalo

/99/$10.00 (c) 1999 IEEE

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

ICE 1332/0715 Mobile Computing (Summer, 2008)

MAC protocols. Lecturer: Dmitri A. Moltchanov

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Unit 7 Media Access Control (MAC)

MAC protocols for ad hoc networks

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

EE 122: Ethernet and

Aloha and slotted aloha

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Wireless MACs: MACAW/802.11

CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS

Chapter 12 Multiple Access 12.1

Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

/$10.00 (c) 1998 IEEE

CSE 461: Multiple Access Networks. This Lecture

Multiple Access Links and Protocols

Embedded Internet and the Internet of Things WS 12/13

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Link Layer II: MACA and MACAW

MAC in /20/06

Lecture 16: QoS and "

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Multiple Access Protocols

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

Link Layer: Retransmissions

Multiple Access Technique. Media Access Control (Intro.) Outline. Multiple Access Technique. Designing Issues of MAC protocols. Protocols examples

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CMPE 257: Wireless and Mobile Networking

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Advanced Networking Technologies

Medium Access Control Protocols: scheduled schemes

Wireless Medium Access Control Protocols

Data and Computer Communications. Chapter 13 Wireless LANs

Wireless Local Area Network (IEEE )

CSE/EE 461 Section 2

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

15-441: Computer Networking. Wireless Networking

Link Layer. (continued)

Embedded Internet and the Internet of Things WS 12/13

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

Chapter 6: MAC Protocols for Ad Hoc Wireless Networks. Jang Ping Sheu

Wireless Networked Systems

Department of Electrical and Computer Systems Engineering

CMPE 257: Wireless and Mobile Networking

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

Wireless Local Area Networks. Networks: Wireless LANs 1

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols

MAC. Fall Data Communications II 1

MSIT 413: Wireless Technologies Week 8

Wireless & Mobile Networking

MAC Protocols 10/6/2008. References. Medium Access Control (MAC)

Granting Silence to Avoid Wireless Collisions

Ethernet. Introduction. CSE 3213 Fall 2011

Medium Access Control Sublayer Chapter 4

ECEN 5032 Data Networks Medium Access Control Sublayer

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Logical Link Control (LLC) Medium Access Control (MAC)

UNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar

Wireless Sensor Networks 8th Lecture

Medium Access Control

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Performance Evaluation of Collision Avoidance Schemes in Ad-hoc Networks

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Rahman 1. Application

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Chapter 6 Medium Access Control Protocols and Local Area Networks

Computer Communication III

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Lesson 2-3: The IEEE x MAC Layer

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

UNIT-III MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS

CS 410/510 Sensor Networks Portland State University

Transcription:

CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1

Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu. E-mail attachment (plain text or pdf) Exam: May 14 (tentative). 2

Student Presentations Suggested topics/speakers: IoT (Anuj?) Mobility management/characterization (Larissa?) Security Energy management SDN (Ben?) Location management 3

Today MAC (cont d). 4

MACAW [Bharghavan, 1994]. Proposed as improvement to MACA [Karn, 1990]. Note that first IEEE 802.11 standard (IEEE 802.11 legacy ) released in 1997. Both MACA and MACAW are precursors of 802.11. 5

MACA Multiple Access Collision Avoidance (MACA). Proposed as alternative to CS in CSMA. Contention at receiver, not at sender. Introduced CA. MACA does not use CS. RTS/CTS handshake (2-way). 6

MACA If node A wants to transmit to B, it first sends an RTS packet to B, indicating the length of the data transmission to follow. B returns a CTS packet to A with the expected length of the transmission. A starts transmission when it successfully receives CTS. RTS and CTS packets are much shorter than data packets. A neighboring node overhearing an RTS defers its own transmission until the corresponding CTS would have been finished. A node hearing the CTS defers for the expected length of the data transmission. 7

MACA (Cont d) Nodes close to sender: If no CTS heard, OK to transmit. Why? Avoid exposed terminal problem: nodes that hear only RTS can transmit simultaneously with RTS sender. Nodes close to receiver: Upon hearing CTS, defer till after data. Avoid hidden terminal. Binary exponential back-off (BEB). 8

MACAW Inspired 802.11. 2 basic changes to MACA: Additional signaling. Modified backoff algorithm. 9

MACA s BEB BEB = binary exponential back-off. Back-off timer doubled at every collision. Reduced to default value after successful RTS-CTS exchange. Possible unfair channel allocation (starvation). 10

MACAW Backoff Tries to avoid BEB s unfairness. Proposed fix: sharing congestion information among nodes. Backoff counter information propagated in packet header. After successful transmission, neighbors have the same backoff counter. 11

Backoff Timer Adjustment MACA adjusts backoff timer fairly quickly. MACAW tries to prevent large variations of the back-off value. Uses multiplicative increase and linear decrease (MILD). Upon collision, back-off timer multiplied by 1.5. Upon successful transmission, decremented by 1. 12

Data Transmission in MACAW Added ACK. Reliability at layer 2. If ACK not received: Retransmit frame. Increment back-off timer if RTS-CTS unsuccessful. 13

Data Transmission in MACAW Added small Data Sending (DS) control frame. Addresses exposed terminal problem. In MACA, exposed node (received RTS but not CTS) is allowed to transmit. Example: S1->R1 and S2->R2 CTS from R2 may collide with transmission S1->R1. S2 does not get CTS from R2 and backs-off. Fix: make sure S2 knows RTS-CTS exchange between S1 and R1 was successful. S1 sends small control frame, DS, before sending data. DS contains data exchange duration. When S2 receives DS, defers its transmission. R1 S1 S2 R2 14

Data Transmission in MACAW Added Request for Request-to-Send (RRTS). R2 contends on behalf of S2 if it received RTS from S2 and it could not have responded because deferring due to S1->R1 exchange. When S2 receives RRTS from R2, proceeds with RTS. Stations overhearing the RRTS defer long enough to hear successful RTS-CTS. RRTS RRTS S2 R2 R1 S1 15

FAMA 16

FAMA Protocols Floor Acquisition Multiple Access. Floor acquisition = gain control of channel. Assumptions: Single-channel, asynchronoustransmission systems. Floor acquisition: Packet sensing: Aloha style RTS transmission. Carrier sensing `a la CSMA. 17

FAMA Protocols MACA is an example of a FAMA protocol. Floor acquisition on packet-by-packet basis. No physical CS; only virtual CS. RTS/CTS exchange. RTS is sent using Aloha. 18

FAMA Paper (Garcia-Luna et al.) Floor acquisition strategy that use: Carrier sensing Receiver-based busy tone mechanism End result: priority to stations that successfully complete RTS-CTS handshake. 19

FAMA-NPS FAMA non-persistent packet sensing. No carrier sensing, i.e., MACA. Uses ALOHA to transmit RTS. RTS duration = 2*channel maximum propagation delay. Ensures so data does not collide with RTS- CTS. 20

FAMA-NCS Non-persistent CS + RTS/CTS. Non-persistent CS using uniform distribution of back-off. CTS dominance Length of CTS > RTS + 1 max RTT. CTS dominates in its neighborhood in case of RTS being transmitted concurrently. Dominating CTS like a busy tone. 21

CTS Dominance 22

Schedule-Based MACs: TRAMA, DYNAMMA, Soft-TDMAC Slides adapted from Vladi Petkov s presentation 23

What s schedule-based MAC? How is it different from random access MAC? 24

Outline TRAMA and DYNAMMA Common features TRAMA protocol description DYNAMMA protocol description Results comparison Soft-TDMAC 25

Features of TRAMA and DYNAMMA Common to both Schedule based data transmission Energy-efficient Use of 2-hop neighborhood information TRAMA! Application independent! Explicit schedules! Single channel DYNAMMA! Application independent! Flow-based! Multi-channel 26

The need for 2-hop neighborhoods: Hidden terminals 27

The need for 2-hop neighborhoods: Hidden terminals 28

The need for 2-hop neighborhoods: Who else can transmit? 29

The need for 2-hop neighborhoods: They can 30

The need for 2-hop neighborhoods: How could they know? 31

Neighborhood-aware contention Resolution (NCR) Presented in A New Approach to Channel Access Scheduling for Ad Hoc Networks Determines priority allocation for each contending entity Different for each contention context (slot) Respected by all other contending entities NCR algorithm 32

TRAMA Overview Random access mode Permits node join/leave Contention based access Sized according to how dynamic and number of nodes Neighbor Protocol runs in this mode Scheduled access mode Adaptive Election Algorithm Schedule Exchange Protocol Data transfer 33

TRAMA Neighbor Protocol! Gathers neighborhood information by exchanging signaling packets 34

TRAMA Schedule Exchange Protocol Maintains traffic-based schedule information Transmitter for slot re-use. Receiver: power efficiency. 35

TRAMA Schedule Exchange Protocol 1. SCHEDULE_INTERVAL determined from application traffic generation 2. Node computes winning slots (highest priority among 2-hop neighbors) 3. Node announces receivers for the slots or gives up vacant slots (bitmap scheme allows broadcast and multicast) 4. Last slot in interval is reserved for broadcasting next interval s schedule 36

TRAMA Adaptive Election Algorithm Node u s priority at time t determined by: This priority is used by the SEP to determine winning slots At any give time slot, t, node u is in: TX if u has highest priority in 2-hop neighborhood and has data to send RX if it is intended receiver of the current transmitter SL otherwise Why is this important? 37

DYNAMMA Overview! Dynamically adapts to traffic patterns! Collision-free multi-channel operation! Minimum signaling overhead 38

DYNAMMA Functional elements Traffic and Neighbor Discovery Happens in signaling slots (all nodes awake) Signaling packet holds: Superframe ID Location of signaling slot within superframe One-hop neighborhood information Traffic information Distributed scheduling algorithm Gather active contending flows for this timeslot Compute flow priorities Examine and schedule flows starting at highest priority rather involved see paper for details 39

DYNAMMA Traffic classification! Flows are put into the 3 classes depending on their arrival and service rates 40

Results outline TRAMA Synthetic traffic scenario Sensor network data-sink scenarios DYNAMMA Synthetic traffic scenario Sensor network data-sink scenario Testbed experiments 41

TRAMA Evaluation Simulation setup TRAMA compared to: NAMA, 802.11, CSMA, SMAC Synthetic data generation Each node sends to randomly chosen neighbor Poisson data sources Data-gathering scenario Data sink periodically requests data from all sensors 42

TRAMA Synthetic traffic delivery and delay 43

TRAMA Synthetic traffic energy consumption 44

TRAMA Data gathering corner and center sink 45

TRAMA Data gathering edge sink 46

TRAMA Data gathering energy consumption 47

DYNAMMA Delivery ratio and delay 48

DYNAMMA Energy consumption 49

DYNAMMA Testbed implementation 50

Differences and similarities 51

Soft-TDMAC Paper contributions " Present Soft-TDMAC Software TDMA-based multi-hop MAC protocol " Achieve microsecond precision networkwide synchronization Better than any previously achieved on top of 802.11 commodity hardware 52

Soft-TDMAC Paper contributions (cont d) " Present an extensible Linux MAC implementation architecture MAC protocol coded in userspace software module Not dependent on hardware timers With small modification will work on any 802.11 hardware 53

Soft-TDMAC Structure Time slot width: T s = 16us One slot fits: 12 bytes @ 6Mbps 108 bytes @ 54Mbps Control TxOp: 20 slots Data TxOp: variable 54

Soft-TDMAC Linux Architecture Kernel module 55 High Resolution Timers requires fully preemptible, real-time kerne

Soft-TDMAC Linux Architecture Userspace library 56

Soft-TDMAC Linux Architecture Userspace MAC implementation 57

Soft-TDMAC Testbed HP nc6000 laptops Atheros AR5212 cards Linux 2.6.23 kernel MadWifi driver modified for debugging/profiling 58