On exploiting spatial reuse in wireless ad hoc networks

Similar documents
Data and Computer Communications. Chapter 13 Wireless LANs

CSE 461: Wireless Networks

Mohamed Khedr.

MAC. Fall Data Communications II 1

Unit 7 Media Access Control (MAC)

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Multiple Access Links and Protocols

Local Area Networks NETW 901

Logical Link Control (LLC) Medium Access Control (MAC)

MAC in /20/06

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

The MAC layer in wireless networks

IEEE MAC Sublayer (Based on IEEE )

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Hands-On Exercises: IEEE Standard

Wireless LANs. ITS 413 Internet Technologies and Applications

CSE 6811 Ashikur Rahman

Rahman 1. Application

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

IEEE Medium Access Control. Medium Access Control

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless Local Area Networks (WLANs) Part I

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Wireless Networks (MAC)

The MAC layer in wireless networks

Lecture 16: QoS and "

Data Communications. Data Link Layer Protocols Wireless LANs

CMPE 257: Wireless and Mobile Networking

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

Chapter 6 Medium Access Control Protocols and Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks

Computer Networks. Wireless LANs

Lesson 2-3: The IEEE x MAC Layer

Wireless Networking & Mobile Computing

Introduction to IEEE

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Advanced Computer Networks WLAN

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Figure.2. Hidden & Exposed node problem

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Wireless Local Area Networks. Networks: Wireless LANs 1

ICE 1332/0715 Mobile Computing (Summer, 2008)

Computer Communication III

3.1. Introduction to WLAN IEEE

Wireless MACs: MACAW/802.11

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Wireless Networked Systems

Mohammad Hossein Manshaei 1393

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Secure communication over mobile ad-hoc network

CMPE 257: Wireless and Mobile Networking

Performance anomaly of b

Wireless LAN -Architecture

Design and analysis of MAC protocols for wireless networks

OPNET. Mustafa Ergen. UC Berkeley

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange

Medium Access and Routing In Multi Hop Wireless Infrastructures

Wireless Communications

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

ICE 1332/0715 Mobile Computing (Summer, 2008)

Efficient Power MAC Protocol in Ad-hoc Network s

Department of Electrical and Computer Systems Engineering

Wireless Protocols. Training materials for wireless trainers

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

INTRODUCTION TO WIRELESS LAN, MAC PROTOCOLS and INTERFERENCE. Choong Seon Hong, KHU

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Mobile Communications Chapter 7: Wireless LANs

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Nomadic Communications WLAN MAC Fundamentals

Wireless Communication and Networking CMPT 371

6th Slide Set Computer Networks

Wireless Communication Session 4 Wi-Fi IEEE standard

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

Transmission Control Protocol over Wireless LAN

Embedded Internet and the Internet of Things WS 12/13

CHAPTER 8: LAN Standards

Chapter 12 Multiple Access 12.1

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Neuro-fuzzy admission control in mobile communications systems

IEEE Wireless LANs

Midterm Review EECS 122. University of California Berkeley

High Performance Distributed Coordination Function for Wireless LANs

Wireless & Mobile Networking

CS263: Wireless Communications and Sensor Networks

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

Wireless Communication and Networking CMPT 371

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Lecture (08) Wireless Traffic Flow and AP Discovery

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

ISSN: International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012

MSIT 413: Wireless Technologies Week 8

Transcription:

University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2008 On exploiting spatial reuse in wireless ad hoc networks Ziguang Yan University of Wollongong Recommended Citation Yan, Ziguang, On exploiting spatial reuse in wireless ad hoc networks, MEng-Res thesis, School of Electrical, Computer and Telecommunications Engineering, University of Wollongong, 2008. http://ro.uow.edu.au/theses/111 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: research-pubs@uow.edu.au

On Exploiting Spatial Reuse in Wireless Ad Hoc Networks A thesis submitted in partial fulfillment of the requirements for the award of the degree Master of Engineering by Research From UNIVERSITY OF WOLLONGONG By Ziguang Yan School of Electrical, Computer and Telecommunications Engineering March 2008 1

Statement of Originality I, Ziguang Yan, declare that this thesis, submitted in partial fulfillment of the requirements for the award of Master of Engineering - Research, in the School of Electrical, Computer and Telecommunications Engineering, University of Wollongong, is wholly my own work unless otherwise referenced or acknowledged. The document has not been submitted for qualifications at any other academic institution. Ziguang Yan March 2008 2

Abstract Wireless ad hoc networks have been increasingly popular in recent years with the development of mobile devices. However, both theoretical and simulation works show that the capacity of wireless ad hoc networks is bounded due to its nature of distributed and multihop. Spatial reuse is a promising technology to increase the capacity of wireless ad hoc networks by allowing more transmissions to occur simultaneously. In this thesis, we enhance 802.11 performances by exploiting the benefits of spatial reuse in wireless ad hoc networks which is achieved by transmission power control (TPC) and directional antennas. We first propose spatial TPC based on basic TPC to fully exploit the benefits of spatial reuse achieved by transmission range control. Simulation results show that spatial TPC achieves higher throughput and lower power consumption compared to 802.11 and basic TPC. We also develop four schemes of directional MAC protocols with the intention of overcoming the new hidden node problem faced by directional antennas. By extensive simulations under different topologies and traffic patterns, we find the directional RTS/CTS (DD) scheme outperforms 802.11 as well as other three schemes by fully exploiting the benefits of spatial reuse achieved by directional antennas. Keywords: Wireless ad hoc networks, MAC, CSMA, 802.11 DCF, Spatial reuse, Power control, Directional antennas, OPNET simulation. 3

Table of Contents Abstract...3 List of Figures...6 List of tables...9 List of tables...9 Abbreviations...10 Chapter 1: Introduction...13 Chapter 2: Preliminaries...16 2.1 Physical issues...16 2.2 Neighbor discovery and location awareness...22 2.3 MAC protocols...23 2.4 Broadcasting...26 Chapter 3: 802.11 DCF...32 3.1 Functional description...32 3.1.1 DCF...32 3.1.2 Power saving...38 3.2 802.11 performance analysis...40 3.2.1 Numerical results...40 3.2.2 Simulation results and analysis...45 3.3 Chapter Summary...48 Chapter 4: OPNET simulation...49 4.1 OPNET modeling mechanisms...49 4.1.1 Network domain...50 4.1.2 Node domain...51 4.1.3 Process domain...55 4

4.2 OPNET Pipeline...62 4.3 802.11 Model...74 4.4 Chapter Summary...82 Chapter 5: Transmission Power Control...83 5.1 TPC protocols...84 5.2 Simulation results...88 5.3 Related work...93 5.4 Chapter Summary...94 Chapter 6: Directional MAC...95 6.1 Impact of directional antennas...95 6.2 Directional MAC...98 6.3 Four schemes and Simulation results...100 6.4 Related work...112 6.5 Chapter Summary...115 Chapter 7: Conclusions...116 7.1 Conclusions...116 7.2 Future Work...117 5

List of Figures Figure 1: Directional antenna model...17 Figure 2: Three conflictions scenarios...18 Figure 3: Interference range...20 Figure 4: DPSK modulation...21 Figure 5: Broadcasting intersection...27 Figure 6: on/off and relay-node-based broadcast schemes...31 Figure 7: DCF channel access...35 Figure 8: RTS/CTS exchange...36 Figure 9: 802.11 power saving...39 Figure 10: Atomic topologies...40 Figure 11: Four way handshake...41 Figure 12: Throughput without collision risks...43 Figure 13: Throughput under collisions...44 Figure 14: Throughput (left) and delay (right) for topology I...45 Figure 15: Throughput (left) and delay (right) for topology II.A...46 Figure 16: Throughput (left) and delay (right) for topology II.B...47 Figure 17: OPNET domain hierarchy...49 Figure 18: Wireless pipeline...50 Figure 19: Coordinate system...51 Figure 20: Node domain...52 Figure 21: Statistics index...52 Figure 22: Antenna module sharing...53 Figure 23: Antenna coordinate system (φ [0, 180] θ [0, 360])...53 Figure 24: Omni-directional and directional antennas...54 6

Figure 25: Receiver statistics collection...56 Figure 26: Receiver interrupt trigger setting...57 Figure 27: Packet overlapping...58 Figure 28: Unforced and forced states...60 Figure 29: State flow...60 Figure 30: Radio transmitter attributes...62 Figure 31: 14 pipeline stages in OPNET...64 Figure 32: Antenna pattern and attributes...68 Figure 33: Transmission range under LoS propagation model...69 Figure 34: 802.11 node model...74 Figure 35: State machine for 802.11 DCF...77 Figure 36: Spatial reuse achieved by power control...84 Figure 37: Transmission ranges for three power control schemes...87 Figure 38: New hidden problems caused by variable transmission ranges...88 Figure 39: Linear topology...89 Figure 40: Throughput (left) and power consumption (right) for linear topology...90 Figure 41: Grid topology...90 Figure 42: Throughput (left) and delay (right) for grid topology...91 Figure 43: Random topology...92 Figure 44: Throughput (left) and delay (right) for random topology...92 Figure 45: Spatial Reuse...96 Figure 46: Longer Transmission Range...97 Figure 47: New hidden node problem...98 Figure 48: DNAV...99 Figure 49: Simulation topologies...101 7

Figure 50: Topology 1.1...102 Figure 51: Throughput and Fairness...103 Figure 52: Topology 1.2...104 Figure 53: Throughput under topology 1.2...104 Figure 54: Topology 2.1...105 Figure 55: Throughput under topology 2.1...106 Figure 56: Topology 2.2...106 Figure 57: Throughput under topology 2.2...107 Figure 58: Topology 2.3...107 Figure 59: Throughput under topology 2.3...108 Figure 60: Topology 3.1...108 Figure 61: Throughput under topology 3.1...109 Figure 62: Topology 3.2...110 Figure 63: Throughput under topology 3.2...110 Figure 64: Topology 4...111 Figure 65: Throughput under topology 4...112 8

List of tables Table 1: IFS times...33 Table 2: Radio module attributes...63 Table 3: Interrupts for 802.11 DCF...76 Table 4: Deference...78 Table 5: Power consumptions under three statuses...83 Table 6: Neighbor information table...87 9

Abbreviations ACK AoA AP ATIM BEB BER BSS CCA CFP CP CS CSMA CTS CW DCF DIFS DPSK DMAC DNAV EIFS FSM GPS IFS LoS acknowledgement angle of arrival access point announcement traffic indication message binary exponential backoff bit error rate basic service set clear channel assessment contention free period contention period carrier sense carrier sense multiple access clear to send contention window distributed coordination function distributed (coordination function) interframe space differential phase shift key basic directional MAC protocol directional network allocation vector extended interframe space finite state machine global positioning system interframe space line of sight 10

MAC MSDU NAV PCF PCS PLCP PS RTS RTT SIFS SISO SNR STA TPC ToA VCS WLAN WM medium access control MAC service data unit network allocation vector point coordination function physical carrier sensing physical layer convergence protocol power saving request to send round trip time shortest interframe space single in single out signal to noise ratio station transmission power control time of arrival virtual carrier sensing wireless local area network wireless medium 11

Acknowledgement I would like to express my deepest gratitude to my supervisor Dr. Raad Raad for his patience and guidance during my research. Without his support and valuable suggestions, none of this would have been possible. I also would like to thank Darryn Lowe and Dr. Kwan-wu Chin for their working enthusiasms and kind support. I want to thank my parents, who have been giving me spiritual and financial support to make this degree possible. Finally I want to thank my friends and guys in TITR lab for their kindness, humor and support. 12