Wireless Ad hoc Networking Uses material from others, notably adapted from a tutorial by Nitin Vaidya.

Slides:



Advertisements
Similar presentations
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Advertisements

Medium Access Issues David Holmer
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Mobile Routing protocols MANET Lecture: 4. DIALOGUE CONTROL In any communication there are two types of user dialogues. –long session-oriented transactions.
CSMA/CA in IEEE Physical carrier sense, and Virtual carrier sense using Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 10 Introduction to Networks and the Internet.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
1 Introduction to Wireless Networks Michalis Faloutsos.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
ECE 4450:427/527 - Computer Networks Spring 2015
PG 1 Advances in Wireless Networks Case Study: Mesh Networks Max Lakshtanov.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Ad Hoc Network.
IEEE WLAN.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
WLAN.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
MAC Protocols for Sensor Networks
Media Access Methods MAC Functionality CSMA/CA with ACK
Wireless Sensor Networks 4. Medium Access
Medium Access Control in Wireless Networks
Outline What is Wireless LAN Wireless Transmission Types
Wireless MAC.
EA C451 (Internetworking Technologies)
Overview of Wireless Networks:
Medium Access Control MAC protocols: design goals, challenges,
The University of Adelaide, School of Computer Science
Wireless LANs Wireless proliferating rapidly.
Computer Communication Networks
Distributed Medium Access Control in Wireless Networks
Topics in Distributed Wireless Medium Access Control
MACAW: A Media Access Protocol for Wireless LAN’s
Wireless Networks.
TCP and MAC interplay in Wireless Ad Hoc Networks
CHARACTERISTICS.
Wireless and Mobile Ad Hoc Networks
CS 457 – Lecture 7 Wireless Networks
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Nitin Vaidya University of Illinois at Urbana-Champaign
Wireless Ad Hoc Network
컴퓨터 네트워크 Chapter 4 컴퓨터 네트워크.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks
Introduction to Wireless Networks
Wireless LAN Simulation IEEE MAC Protocol
Subject Name: Adhoc Networks Subject Code: 10CS841
IEEE , Token Rings 4/26/2019 CS/ECE UIUC, Fall 2006.
Wireless LANs CS 352, Lecture 16
Chapter 6 Multiple Radio Access.
Presentation transcript:

Wireless Ad hoc Networking Uses material from others, notably adapted from a tutorial by Nitin Vaidya

Agenda Aim: to give you a quick tutorial into wireless (mostly ad hoc) networking Really quick – this is a big research area with a lot to cover Why? It’s the underlying technology for self-configuring sensor networks But not quite so Focus on Personal Communication Resource issues Sensor-network specific discussions will follow

Overview Wireless Propagation/Communication Basics Wireless Networks Overview MAC design

Wireless Propagation Basics

Ideal Wireless Propagation Signal attenuates logarithmically with the distance Precv  Psend * (1/r)n R is the distance between sender and receiver N is the path loss exponent which is characteristic of the environment. Usually, between 2 in free space, to up to 6 indoors To receive correctly, the received power should be higher than the receiver radio sensitivity (also, any interference should be really weak – capture threshold)

Wireless Channel Channel varies with location and time Radio propagation is very complex Attenuation Shadows: signals blocked by large objects Multipath scattering from nearby objects Radar multipath echoes from an actual target cause ghosts to appear. Result: Rapid fluctuation of received power

Wireless Channel Many bad effects: high errors, discovering low quality paths, failing to discover good quality paths, etc. A lot of research ignores these effects Not realistic Mobility (including that of surrounding objects)

Channel Communications Technologies Basic channel allocation strategies include TDMA, FDMA, and combinations CDMA/Spread spectrum Spread the transmitted data across the full available spectrum Pseudo random sequence Resilient to jamming

Wireless Networking

Two types of WLANs Infrastructure: One master, several slaves Ad-hoc: All potential masters and slaves at the same time

Last Hop Networks Nodes connect through an Access Point (AP) which is connected to the Internet (wired) Traffic is always to/from the AP AP can arbitrate communication schedule (making MAC easier) Solution is centralized and scalable Often used solution today

Ad Hoc Networks Wireless networks with all nodes wireless B A D A C F F B E E C Wireless networks with all nodes wireless Do not need a static infrastructure Self Organizing or peer-to-peer networks Multi-hop wireless: nodes route packets for others Mobility causes dynamic topology

WLAN; example of use

Why Ad Hoc Networks ? Ease of deployment Speed of deployment Decreased dependence on infrastructure

Many Applications Sensor Networks! Personal area networking cell phone, laptop, ear phone, wrist watch Military environments soldiers, tanks, planes Civilian environments taxi cab network meeting rooms boats, small aircraft Emergency operations search-and-rescue policing and fire fighting

Many Variations Fully Symmetric Environment Asymmetric Capabilities all nodes have identical capabilities and responsibilities Asymmetric Capabilities transmission ranges and radios may differ battery life at different nodes may differ processing capacity may be different at different nodes speed of movement Asymmetric Responsibilities only some nodes may route packets some nodes may act as leaders of nearby nodes (e.g., cluster head)

Some Challenges Limited wireless transmission range Broadcast nature of the wireless medium Packet losses due to transmission errors Host mobility Battery constraints Ease of snooping on wireless transmissions (security hazard)

Wireless MAC

Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference MAC protocol design has been an active area of research for many years

MAC: A Simple Classification Wireless MAC Centralized Distributed Guaranteed or controlled access Random access Focus today

Hidden Terminal Problem [Tobagi75] Node B can communicate with A and C both A and C cannot hear each other When A transmits to B, C cannot detect the transmission using the carrier sense mechanism If C transmits, collision will occur at node B A B C

S2 can’t transmit due to S1’s transmission to R1 Exposed node problem S2 can’t transmit due to S1’s transmission to R1

Busy Tone [Tobagi75,Haas98] A receiver transmits busy tone when receiving data All nodes hearing busy tone keep silent Avoids interference from hidden terminals Requires a separate channel for busy tone

MACA Solution for Hidden Terminal Problem [Karn90] When node A wants to send a packet to node B, node A first sends a Request-to-Send (RTS) to B On receiving RTS, node B responds by sending Clear-to-Send (CTS), provided node B is able to receive the packet When a node (such as C) overhears a CTS, it keeps quiet for the duration of the transfer Transfer duration is included in RTS and CTS both A B C

Reliability Wireless links are prone to errors. High packet loss rate detrimental to transport-layer performance. Mechanisms needed to reduce packet loss rate experienced by upper layers

A Simple Solution to Improve Reliability When node B receives a data packet from node A, node B sends an Acknowledgement (ACK). This approach adopted in many protocols [Bharghavan94,IEEE 802.11] If node A fails to receive an ACK, it will retransmit the packet A B C

IEEE 802.11 Wireless MAC Distributed and centralized MAC components Distributed Coordination Function (DCF) Point Coordination Function (PCF) Based on polling Almost never used in practice DCF suitable for multi-hop ad hoc networking DCF is a Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) protocol

IEEE 802.11 DCF Uses RTS-CTS exchange to avoid hidden terminal problem Any node overhearing a CTS cannot transmit for the duration of the transfer Uses ACK to achieve reliability Any node receiving the RTS cannot transmit for the duration of the transfer To prevent collision with CTS when it arrives at the sender When B is sending data to C, node A will keep quite A B C

IEEE 802.11 RTS = Request-to-Send RTS A B C D E F

IEEE 802.11 B overhears RTS and keeps quiet for the duration specified in RTS to avoid collision with upcoming CTS RTS = Request-to-Send RTS A B C D E F

IEEE 802.11 CTS = Clear-to-Send CTS A B C D E F

E overhears CTS and keeps quiet for the Duration specified in CTS IEEE 802.11 E overhears CTS and keeps quiet for the Duration specified in CTS CTS = Clear-to-Send CTS A B C D E F

IEEE 802.11 DATA A B C D E F

IEEE 802.11 ACK A B C D E F

CSMA/CA Carrier sense in 802.11 Collision avoidance Physical carrier sense (pretty aggressive) Virtual carrier sense via RTS/CTS and Network Allocation Vector (NAV) A node updates its NAV updated based on overheard RTS/CTS/DATA/ACK packets, each of which specified duration of a pending transmission – Don’t send any packet during the duration of NAV Collision avoidance Nodes stay silent when carrier sensed (physical/virtual) Backoff intervals used to reduce collision probability

Flowchart of CSMA/CA CW=CWmin Double CW

Backoff Interval When transmitting a packet, choose a backoff interval in the range [0,cw] cw is contention window Count down the backoff interval when medium is idle Count-down is suspended if medium becomes busy When backoff interval reaches 0, transmit RTS

DCF Example B1 = 25 B2 = 20 B1 = 5 B2 = 15 data wait data wait B2 = 10 B1 and B2 are backoff intervals at nodes 1 and 2 cw = 31

Backoff Interval The time spent counting down backoff intervals is a part of MAC overhead Choosing a large cw leads to large backoff intervals and can result in larger overhead Choosing a small cw leads to a larger number of collisions (when two nodes count down to 0 simultaneously)

Since the number of nodes attempting to transmit simultaneously may change with time, some mechanism to manage contention is needed IEEE 802.11 DCF: contention window cw is chosen dynamically depending on collision occurrence

Binary Exponential Backoff in DCF When a node fails to receive CTS in response to its RTS, it increases the contention window cw is doubled (up to an upper bound) If no RTS/CTS is used, a sender doubles its CW if no ACK is received after a timeout period When a node successfully completes a data transfer, it restores cw to Cwmin cw follows a sawtooth curve

Discussion What do you think is the effect of packet loss on the performance of this algorithm? Any fairness concerns?

Variation in Backoff Interval [Aad01] For high priority packets Backoff interval in [0,CWh] For low priority packet Backoff interval in [CWh+1, CWl] Higher priority packets use small backoff intervals Higher probability of transmitting a high priority packet before a pending low probability packet

Disadvantage: When no high priority packets, low priority packet unnecessarily wait for long periods of time How to avoid priority reversal, and also minimize wait for low priority packets ? [Yang02Mobihoc]

For the next week… Questions? 2/2/’10: OMNeT++ tutorial 2/11/’10: Read “System architecture directions for networked sensors” (Critique due at the beginning of the class) Questions?