ICUPC’98 Jing Deng and Zygmunt J. Hass

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
MAC Protocol By Ervin Kulenica & Chien Pham.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
A Medium Access Control Protocol with Reliable Multicast Support for Wireless Networks Thesis defense of: Vikram Shankar Advising Committee: Dr. Sandeep.
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Tamer Nadeem Dept. of Computer Science Lec #5: Advanced MAC Schemes Dual Busy Tone & Collision.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Mohamed Elhawary Computer Science Department Cornell University PERCOM 2008 Zygmunt J. Haas Electrical and Computer Engineering Department Cornell University.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
WLAN.
Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using Snooping Myunghwan Seo, Yonggyu Kim, and Joongsoo.
Medium Access Control in Wireless networks
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Balancing the Hidden and Exposed Node Problems With Power Control In CSMA/CA-Based Wireless Networks Yihong Zhou and Scott M. Nettles Department of Electrical.
Performance Evaluation of Multiple IEEE b WLAN Stations in the Presence of Bluetooth Radio.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
MAC Protocols for Sensor Networks
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Wireless Sensor Networks 4. Medium Access
MAC Protocols that use directional Antennas
A Power Control MAC Protocol for Ad Hoc Networks
Medium Access Control MAC protocols: design goals, challenges,
The University of Adelaide, School of Computer Science
CT301 LECTURE 8.
Communication Networks: Technology & Protocols
Wireless LANs Wireless proliferating rapidly.
Topics in Distributed Wireless Medium Access Control
MACAW: A Media Access Protocol for Wireless LAN’s
TCP and MAC interplay in Wireless Ad Hoc Networks
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
Multiple Access, Collision Avoidance for Wireless LAN’s
Net301 lecture9 11/5/2015 Lect 9 NET301.
The Medium Access Control Sublayer
CS 457 – Lecture 7 Wireless Networks
COMP/ELEC 429/556 Introduction to Computer Networks
Computer Communication & Networks
The Medium Access Control Sublayer
Full-Duplex based MAC enhancements
He Xiaoben Further study of multi-hop communications - modeling the hidden terminal problem He Xiaoben
Introduction to Wireless Networks
The Impact of Multihop Wireless Channel on TCP Performance
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Performance Evaluation of an Integrated-service IEEE Network
Wireless LAN Simulation IEEE MAC Protocol
Subject Name: Adhoc Networks Subject Code: 10CS841
Outline 1. INTRODUCTION 2. PRELIMINARIES 3.THE PROPOSED PROTOCOL
MITP 413: Wireless Technologies Week 8
Directional Antennas for Wireless Networks
of the IEEE Distributed Coordination Function
Enhanced Backoff Scheme in CSMA/CA for IEEE
Wireless LAN Protocols
Chapter 6 Multiple Radio Access.
Multiple Access Control (MAC) Protocols
Chapter 12 Media Access Control (MAC)
Distributed Systems 6. Medium Access Control Sublayer
Presentation transcript:

Dual Busy Tone Multiple Access : A New Medium Access Control for Packet Radio Networks ICUPC’98 Jing Deng and Zygmunt J. Hass School of Electrical Engineering Cornell University

Introduction Fundamental problems in wireless network hidden terminal problem exposed terminal problem Goal: A MAC protocol with enhancement of busy tones Busy tone: a function similar to carrier sense IEEE 802.11, MACA, MACAW RTS/CTS to solve the hidden terminal problem However, due to mobility, propagation delay, and transmission delay, the probability of packet collision may be high (to be analyzed later).

Effect of Mobility Nm = number of nodes which will move into the transmission range of A during a propagation delay and thus interfere with the reception of A To find Nm, we can Find out the angle . Integrate over the dotted circle. Through calculus, it can be shown that Nm = 0.01 Insignificant!!

Effect of Packet Collision A sends an RTS to B. B replies a CTS to A. At the same time C initiates an RTS to D. (This is OK with A.) Thus, B’s CTS is destroyed at D. During the transmission of data packet from A to B, D can potentially destroy this data packet by sending anything (such as an RTS, CTS, …).

Analysis of the Probability The vulnerability period of B’s CTS packet is 2Tc. Recall the ALOHA definition. The number of nodes C that start a new RTS during the vulnerability period is: b = percentage of ready nodes Sshaded = that covered by B’s but not A’s transmission range d = nodal density Tw = the optimal backoff time (assuming an ideal situation)

Now that D does not know B’s RTS. possible location of D = in both B’s and C’s ranges During B’s reception of data packet, the number of D’s that will make damage is: TD = transmission time of data packet Note: TD (data packet) is much greater than TC (control packet) It can be calculated that under heavy load, the probability that data packet being destroyed is about 0.6.

Observation of DBTMA DBTMA = dual busy tone multiple access Frequency Assignment: data channel control channel : bandwidth for control packets BTt (transmit busy tone) BTr (receive busy tone) BTr BTt frequency control channel data channel

DBTMA Operations Still based on RTS/CTS. Busy Tone Usage Rules: When one is sending, turn on its BTt. When one is receiving, turn on its BTr. Packet Sending/Receiving Rules: When sending RTS, make sure that there is no BTr (receive busy tone). When sending CTS, make sure that there is no BTt (transmit busy tone).

DBTMA State Diagram

Performance Evaluation Simulation parameters Coverage area (S) : 6 * 6 [km] Nodal transmission radius (R) : 0.5, 2 [km] Number of nodes (N) : 400 The length of control packets (LC) : 48 [bits] The length of data packets (LD) : 1024 [bits] Link data rate (Rd) : 2.048, 20.48, 2048 [kbps]

Performance Evaluation Traffic Load : aggregated traffic load in the whole coverage area Network Utilization : total number of packets being transmitted and received successfully per packet transmission time Percentage of packet collisions percentage of collided data packets among data packets transmitted

Network Utilization R = 0.5 R = 2

Collision Ratio R = 0.5 R = 2

Effect of Mobility on Network Utilization negligible difference V = 0 and 100 km/hour r = 0.1 radian/sec Tm = 0.0001 sec

Conclusions Two busy tones decouple the two communication directions similar to the carrier sense in wired networks doubling the network capacity Effect of mobility at the MAC layer is less significant than packet collision.