5/12/2005doc.: IEEE 802.11-05/0334 Submission Ripple: A Distributed Medium Access Protocol for Wireless Mesh Network Presented at the IEEE802.11, 802.15,

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Achieving Throughput Fairness in Wireless Mesh Network Based on IEEE Janghwan Lee and Ikjun Yeom Division of Computer Science KAIST
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Doc.: IEEE /0324r0 Submission Slide 1Michelle Gong, Intel March 2010 DL MU MIMO Error Handling and Simulation Results Date: Authors:
Doc.: IEEE /0567r0 Submission Slide 1Michelle Gong, Intel May 2010 DL MU MIMO Analysis and OBSS Simulation Results Date: Authors:
A Centralized Scheduling Algorithm based on Multi-path Routing in WiMax Mesh Network Yang Cao, Zhimin Liu and Yi Yang International Conference on Wireless.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Module C- Part 1 WLAN Performance Aspects
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Network Technology CSE Network Technology CSE3020 Week 9.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Opportunistic Packet Scheduling and Media Access Control for Wireless LANs and Multi-hop Ad Hoc Networks Jianfeng Wang, Hongqiang Zhai and Yuguang Fang.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
TiZo-MAC The TIME-ZONE PROTOCOL for mobile wireless sensor networks by Antonio G. Ruzzelli Supervisor : Paul Havinga This work is performed as part of.
MAC Protocol By Ervin Kulenica & Chien Pham.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
MIMO and TCP: A CASE for CROSS LAYER DESIGN Soon Y. Oh, Mario Gerla Computer Science Dept. University of California, Los Angeles {soonoh,
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Elec 599 Report: Modeling Media Access in Embedded Two-Flow Topologies of Multi-hop Wireless Networks Jingpu Shi Advisor: Dr. Edward Knightly Department.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
BMWnet Wshnt.kuas.edu.tw Mesh Networks Prof. W.S. Hwang.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Wireless LAN Simulation - IEEE MAC Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Opersating Mode DCF: distributed coordination function
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱 2015/10/11.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
A QoS MAC Protocol for Differentiated Service in Mobile Ad Hoc Networks Chi-Hsiang Yeh, Tiantong You Queen’s University ICPP 2003’
Min-Te Sun, Lifei Huang, Anish Arora, Ten-Hwang Lai Presented by Md Tareq Adnan CSE High Performance Computer Networks 1.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Chapter 6 Multiple Radio Access
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
IEEE WLAN.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
A New Link Scheduling Algorithm for Concurrent Tx/Rx Wireless Mesh Networks Author: Kwan-Wu Chin University of Wollongong, Australia From: ICC 2008 Speaker:
Universität Karlsruhe Institut für Telematik ECE 591
A new Cooperative Strategy for Deafness Prevention in Directional Ad Hoc Networks Andrea Munari, Francesco Rossetto, and Michele Zorzi University of Padova,
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
ECE 256, Spring 2009 __________ Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver __________________.
Doc.: IEEE /0877r0 Submission July 2013 James Wang (MediaTek)Slide 1 HEW Beamforming Enhancements Date: Authors:
Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using Snooping Myunghwan Seo, Yonggyu Kim, and Joongsoo.
Turkmen Canli ± and Ashfaq Khokhar* Electrical and Computer Engineering Department ± Computer Science Department* The University of Illinois at Chicago.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
1 Energy Efficient Channel Access Scheduling For Power Constrained Networks Venkatesh Rajendran J.J. Garcia-Luna-Aceves Katia Obrackzka Dept. of Computer.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
An Opportunistic Directional MAC Protocol for Multi-hop Wireless Networks with Switched Beam Directional Antennas Osama Bazan and Muhammad Jaseemuddin.
The Medium Access Control Sublayer
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
MAC Protocols for Sensor Networks
Multi-channel, multi-radio wireless networks
Wireless LAN Simulation IEEE MAC Protocol
Presentation transcript:

5/12/2005doc.: IEEE /0334 Submission Ripple: A Distributed Medium Access Protocol for Wireless Mesh Network Presented at the IEEE802.11, , , , , & Interim Meeting, May 2004 by Ray-Guang Cheng Cun-Yi Wang Jen-Shun Yang

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 2 Outline Motivation Lessons Learned from the Nature Our Solution Algorithm of Ripple Protocol An Example Appendix

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 3 Motivation: Collision due to Hidden Node Multi-hop Forwarding

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 4 Motivation: Optimal forwarding Spatial Reuse Distance Source: IEEE P TGs 11-04/0709r2 n n+1 n+2 n+3 n+4 Multi-hop Forwarding

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 5 O bservations Existing MAC mechanisms Random access mechanism Performance degradation caused by Hidden/exposed nodes exponential backoff Performance is severely degraded when the network is heavy loaded Could we have better solutions? Prerequisites Distributed protocol

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 6 Lessons Learned from the Nature Optimum duration Spatial reuse distance Ripple Effect

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 7 Our Solution: Ripple Protocol Approaches Adopts controlled access mechanism To prevent from unintentional frame collisions To eliminate exponential backoff Uses RTS/CTS to prevent from hidden node problem Utilizes spatial reuse to improve utilization

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 8 Our Solution: Ripple Protocol (cont.) Q: What is the optimum network utilization if spatial reuse is utilized? A: TX RX TX RX … Spatial reuse distance 1313

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 9 System Model Targeted Application Environment Wireless backbone (backhaul) system high data rate is provided by mesh links Basic assumption Tree Topology Non-mobile Mesh Points and Mesh AP routing path has been determined One-hop radio coverage Separate channels are assigned for downlink and uplink paths Unidirectional data-frame delivery

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 10 Network Topology : Tree

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 11 Frame Formats DATA frame: DATA frame carries user information. The time required to transmit the DATA frame is a constant. NULL frame: NULL frame is a DATA frame but carries no information. RTS frame: a node, which has the right to send a DATA frame, will send an RTS frame. CTS frame: the target node that receives an RTS frame will responses a CTS frame. Ready-to-send (RTR) frame: a node, which has the right to receive a DATA frame, will send an RTR frame to the sender if the expected RTS frame is not received. ACK frame: a node receives a DATA frame correctly will response an ACK frame.

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 12 Operational States Transmit (TX) state: a node which is ready to send a DATA frame will enter this state. Receive (RX) state: a node which is ready to receive a DATA frame will enter this state. Listen state: a node which is a hidden node (i.e., CTS frame is overheard) or an exposed node (i.e., RTS frame is overheard) or both will enter this state. Idle state: a node which has interrupted by unexpected conditions during TX, RX, and Listen states will return to this state. The idle state is also the initial state for all nodes.

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 13 Algorithm of Ripple Protocol Basic concept: Sender: send RTS Receiver: send RTR if RTS is not received Child nodes of a cross node are forbidden to send RTS or RTR Downlink: State transition: RX mode  TX mode  Listen mode  RX mode … Current state  next frame behavior RX mode  send RTS Listen mode  send RTR if RTS is not received Child nodes of a cross node cannot send RTR Uplink: State transition: TX mode  RX mode  Listen mode  TX mode … Current state  next frame behavior TX mode  send RTR if RTS is not received Listen mode  send RTS Child nodes of a cross node cannot send RTS

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 14 Topology of an Example Internet … A1A1 A2A2 AiAi … … C1C1 B1B1 B2B2 BjBj D1D1 D2D2 DkDk E1E1 E2E2 EmEm … C 1 : could be a super node Root Node Chain Mode Cross Mode

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 15 Downlink transmission- Chain Mode TX RX TX RX … Spatial reuse distance

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 16 Thank you for you attention!

5/12/2005doc.: IEEE /0334 Submission Appendix

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 18 TX RX Listen Idle Receive DATA Receive RTR or CTS, and wait for SIFS Overhear RTS, CTS, RTR Overhear CTS or RTR Timeout CTS or RTR Timeout Receive RTR or CTS, and wait for SIFS DATA Timeout Overhear RTS, CTS, RTR Receive DATA State Transition Diagram: Downlink

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 19 RX TX Listen Idle Receive DATA Receive RTR or CTS, and wait for SIFS Overhear RTS, CTS, RTR Overhear CTS or RTR Timeout CTS or RTR Timeout Receive RTR or CTS, and wait for SIFS DATA Timeout Overhear RTS, CTS, RTR Receive DATA State Transition Diagram: Uplink

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 20 DATA RTS DATA TX Listen DATA A9A9 A 10 A7A7 A8A8 A5A5 A6A6 A3A3 A4A4 A1A1 A2A2 A 12 A 13 A 11 A 14 RTRACKRTSCTSACKRTSACKRTSRTRCTSACKRTSRTRCTSACKRTSCTSACKRTSCTSACKRTSCTSACKRTSACKRTSCTSACKRTSCTSRTRACKRTSCTSACKRTSCTSACKRTSCTSACKRTSCTSACKRTSCTSACKRTSCTSACKRTSCTSACKRTSCTSACKRTSCTSACKRTSCTSRTRACK CTSACKRTSCTSACKRTSACKRTS Listen RX TX RX TX RX TX RX TXRX TX RX TXRX Listen TX ListenTX RX Listen TXRX TX Listen TXRX TX Listen RX TX Listen RX Listen TX RX TX RX Listen TX RX TXRX Listen TX RX Listen RX TX RX TX Idle time Node “ripple effect” CTS Idle Listen

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 21 Timing Diagram of an Example: Uplink

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 22 Achievements of Ripple Protocol Mitigate performance degradation caused by hidden and/or exposed nodes Flow Control over Multi-hop paths to avoid performance degradation and/or meet QoS goals Coordinating channel access across multiple nodes to avoid performance degradation and/or meet QoS goals in the multi-hop network Traffic prioritization within a WLAN Mesh Mesh link communication coordination Support for admission control Support for multiple classes of traffic Improving Spatial Reuse in a mesh network

5/12/2005 Submission Ray-Guang Cheng, Cun-Yi Wang, and Jen-Shun Yang doc.: IEEE /0334 Slide 23 Ripples Conflict in Cross Node Solution Apply Scheduling Algorithm in cross node to determine the precedence of the cross paths. To root gateway