Exploring Random Access and Handshaking Techniques in Large- Scale Underwater Wireless Acoustic Sensor Networks Peng Xie and Jun-Hong Cui Computer Science.

Slides:



Advertisements
Similar presentations
Fundamentals of Computer Networks ECE 478/578
Advertisements

Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Enhancement of Receiver-initiated Packet Train Protocol with Slotted Random Access for Underwater Acoustic Networks Nuttarit Leelapisut 1, Nitthita Chirdchoo.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Broadcasting Protocol for an Amorphous Computer Lukáš Petrů MFF UK, Prague Jiří Wiedermann ICS AS CR.
Module C- Part 1 WLAN Performance Aspects
An Adaptive Coordinated Medium Access Control for Wireless Sensor Networks Jing Ai, Jingfei Kong, Damla Turgut Networking and Mobile Computing (NetMoC)
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Evaluate IEEE e EDCA Performance Tyler Ngo CMPE 257.
Analyzing Multi-channel MAC Protocols for Underwater Sensor Networks Presenter: Zhong Zhou.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
DETERMINATION OF THE TOPOLOGY OF HIGH SURVIVAL HF RADIO COMMUNICATION NETWORK Andrea Abrardo.
Elec 599 Report: Modeling Media Access in Embedded Two-Flow Topologies of Multi-hop Wireless Networks Jingpu Shi Advisor: Dr. Edward Knightly Department.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Opersating Mode DCF: distributed coordination function
Venkatesh Rajendran, Katia Obraczka, J.J. Garcia-Luna-Aceves
: Data Communication and Computer Networks
Medium Access Control NWEN302 Computer Network Design.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Enhanced Slotted Aloha Protocols for Underwater Sensor Networks with Large Propagation Delay Kai Chen † Jianhua He § Yi Zhou ‡ Haibing Guan ‡ †School of.
Chapter 6 Multiple Radio Access
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
Mohamed Elhawary Computer Science Department Cornell University PERCOM 2008 Zygmunt J. Haas Electrical and Computer Engineering Department Cornell University.
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol Kurtis Kredo II, Petar Djukic, Prasant Mohapatra IEEE INFOCOM 2009.
Zhong Zhou +, Zheng Peng +, Jun-Hong Cui +, Zaihan Jiang * Handling Triple Hidden Terminal Problems for Multichannel MAC in Long-Delay Underwater Sensor.
Chih-Min Chao and Yao-Zong Wang Department of Computer Science and Engineering National Taiwan Ocean University, Taiwan IEEE WCNC 2010 A Multiple Rendezvous.
Designing Reliable Delivery for Mobile Ad-hoc Networks in Robots BJ Tiemessen Advisor: Dr. Dan Massey Department of Computer Science Colorado State University.
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Priority Scheduling in Wireless Ad Hoc Networks Xue Yang and NitinVaidya University of Illinois at Urbana-Champaign.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
1 A Multi-Rate Routing Protocol with Connection Entropy for MANETs Cao Trong Hieu, Young Cheol Bang, Jin Ho Kim, Young An Kim, and Choong Seon Hong Presenter:
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Introduction Network Quality Assurance (and Simulation!) Read Chapters 1, 2, 3.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Medium Access Control in Wireless networks
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
A Cluster Based On-demand Multi- Channel MAC Protocol for Wireless Multimedia Sensor Network Cheng Li1, Pu Wang1, Hsiao-Hwa Chen2, and Mohsen Guizani3.
Energy-Efficient, Application-Aware Medium Access for Sensor Networks Venkatesh Rajenfran, J. J. Garcia-Luna-Aceves, and Katia Obraczka Computer Engineering.
實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
A Cross-Layer Multihop Data Delivery Protocol With Fairness Guarantees for Vehicular Networks Gokhan Korkmaz, Eylem Ekici, and Fusun Ozguner Department.
Balancing the Hidden and Exposed Node Problems With Power Control In CSMA/CA-Based Wireless Networks Yihong Zhou and Scott M. Nettles Department of Electrical.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Structure-Free Data Aggregation in Sensor Networks.
DOTS: A Propagation Delay-aware Opportunistic MAC Protocol for Underwater Sensor Networks IEEE ICNP 2010 (18.2%) Youngtae Noh, Mario Gerla (UCLA, CS) Paul.
Optimizing Network Performance through Packet Fragmentation in Multi- hop Underwater Communications Stefano Basagni ∗, Chiara Petrioli † Roberto Petroccia.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
A Bidirectional Multi-channel MAC Protocol for Improving TCP Performance on Multihop Wireless Ad Hoc Networks Tianbo Kuang and Carey Williamson Department.
On the Physical Carrier Sense in Wireless Ad-hoc Networks
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Presentation transcript:

Exploring Random Access and Handshaking Techniques in Large- Scale Underwater Wireless Acoustic Sensor Networks Peng Xie and Jun-Hong Cui Computer Science &Engineering Department University of Connecticut

Medium Access Control (MAC) Contention-free Protocols Contention-based Protocols –Random Access: ALOHA, slotted ALOHA –Collision Avoidance with Handshaking MACA,MACAW

Network Model B is the only receiver, all other nodes are senders

Performance Metrics Throughput –The number of effective bits, i.e., the size of all data packet successfully received by the receiver. Communication Overhead –Ratio of the total number of bits sent by the sender to the number of effective bits received by the receiver.

Modeling Random Access Random Access for Underwater Sensor Networks –Same as random access for radio-based network –Node sends packets whenever it has data –A packet is successfully delivered if no collision occurs at the receiver side

Modeling Random Access (Cont’d) The sending data process of each node follows Poisson Distribution with data rate λ Data packet duration T p Data packet size S p Number of nodes in the network: n

Modeling Random Access (Cont’d) One data packet transmission –Success Probability –Average throughput of the whole networks –Communication overhead

Modeling Random Access (Cont’d) Trains of packets (m packets in a burst) –Success probability –Throughput –Communication overhead

Modeling RTS/CTS for Underwater Sensor Networks Infeasibility of RTS/CTS in Underwater Sensor Networks

Modeling RTS/CTS (Cont’d) Modifying RTS/CTS for Underwater Sensor Networks –When a sender receives CTS, the sender has to wait for the CTS to propagate the whole transmission range of the receiver. –The probability of data packet collision still exists, but can be negligible.

Modeling RTS/CTS (Cont’d) Maximum data rate –Time of one transmission: T Θ =T cts +T prop +T trans –Max data rate: λ t =min(1/ T Θ, λ(n-1)) Throughput: m×S p × λ t Communication overhead

General Parameter Setting –Bit rate: 10kbps –Distance between the sender and the receiver: 50 m –Transmission range: 100m –Data packet size: 40B –Control packet size: 4B –Number of network: 5 –Data rate: 1-5 packets/s

Performance Comparison :Non- Burst-Traffic Effect of Data Rate

Performance Comparison :Non- Burst-Traffic Effect of Transmission Range

Performance Comparison :Non- Burst-Traffic Effect of network density

Performance Comparison :Non- Burst-Traffic Effect of Transmission Distance

Performance Comparison :Non- Burst-Traffic Effect of Packet Size

Performance Comparison : Burst- Traffic

Conclusions The performance of random access and RTS/CTS are affected by many factors, such as transmission range, data generation, traffic burst, packet size and network topology. NO absolute winner for all network conditions.