Ad Hoc Operations of Enhanced IEEE 802

Slides:



Advertisements
Similar presentations
Contents IEEE MAC layer operation Basic CSMA/CA operation
Advertisements

Ethernet – CSMA/CD Review
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Jesús Alonso-Zárate, Elli Kartsakli, Luis Alonso, and Christos Verikoukis May 2010, Cape Town, South Africa, ICC 2010 Coexistence of a Novel MAC Protocol.
Contention Window Optimization for IEEE DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.
Module C- Part 1 WLAN Performance Aspects
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
Opersating Mode DCF: distributed coordination function
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
CWNA Guide to Wireless LANs, Second Edition
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Chapter 6 Multiple Radio Access
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
MAC Protocols for Sensor Networks
A Taxonomy of Mechanisms for Multi-Access
An Energy-efficient MAC protocol for Wireless Sensor Networks
David S. L. Wei Joint Work with Alex Chia-Chun Hsu and C.-C. Jay Kuo
Medium Access Control MAC protocols: design goals, challenges,
The University of Adelaide, School of Computer Science
Dynamic TDMA Slot Assignment in Ad Hoc Network
Computer Communication Networks
Topics in Distributed Wireless Medium Access Control
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
SENSYS Presented by Cheolki Lee
High Speed LANs – Ethernet and Token Ring
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
Net 435: Wireless sensor network (WSN)
Net301 lecture9 11/5/2015 Lect 9 NET301.
IEEE : Wireless LANs ALOHA, Slotted ALOHA
Analytical Modeling of Enhanced IEEE 802
On the Physical Carrier Sense in Wireless Ad-hoc Networks
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
Author: Giuseppe Bianchi
basics Richard Dunn CSE July 2, 2003.
The Medium Access Control Sublayer
Introduction to Wireless Networks
Self Organized Networks
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 12 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Ethernet – CSMA/CD Review
Channel Allocation Problem/Multiple Access Protocols Group 3
Performance Evaluation of an Integrated-service IEEE Network
Wireless LAN Simulation IEEE MAC Protocol
Outline 1. INTRODUCTION 2. PRELIMINARIES 3.THE PROPOSED PROTOCOL
Enhanced IEEE by Integrating Multiuser Dynamic OFDMA
of the IEEE Distributed Coordination Function
DL MU MIMO Error Handling and Simulation Results
Investigating Mac Power Consumption in Wireless Sensor Network
CSE 313 Data Communication
The System Issues of Rate Adaptation
Enhanced Backoff Scheme in CSMA/CA for IEEE
How MAC interacts with Capacity of Ad-hoc Networks – Interference problem Capacity of Wireless Networks – Part Page 1.
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Channel usage in NGV: follow-up
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Presentation transcript:

Ad Hoc Operations of Enhanced IEEE 802 Ad Hoc Operations of Enhanced IEEE 802.11 with Multiuser Dynamic OFDMA under Saturation Load Hasan Shahid Ferdous, Manzur Murshed Presented By Rashidul Hasan Monash University, Australia www.monash.edu.au

Outline Motivation of this research Basic idea Related challenges System description Simulation results Future goals Hasan Shahid Ferdous, WCNC 2011

Focus of Our Work IEEE 802.11 DCF Performance RTS/CTS Handshaking Protocol. Ad Hoc Operations The reasons of DCF inefficiency. A solution based on OFDMA Incorporate multiple concurrent transmissions/receptions. Improve performance. In this paper, we have focused on improving the performance of ad hoc operations of IEEE 802.11 based local area networks. We discuss the reasons of its DCF inefficiency and propose a solution based on OFDMA. Our proposed protocol improves the performance by incorporating multiple concurrent transmissions/receptions. Hasan Shahid Ferdous, WCNC 2011

Throughput of IEEE 802.11 802.11 Protocol Release Freq. (GHz) Typ. throughput (Mbps) Max net bitrate (Mbps) Modulation IR/FSSS Jun 1997 2.4 < 1 2 DSSS a Sep 1999 5 23 54 OFDM b 11 g Jun 2003 20 y Nov 2008 3.7 n Nov 2009 2.4/5 75 288.9 There have been lot of research works in the DCF performance. If we look at the performance of IEEE 802.11 networks, we can see that the practical achievable throughput is less than half of its theoretical capacity. This data is supported by the research works of Bianchi and many other researchers. Wireless Networking in the Developing World (2nd Edition) pp. 290 Hasan Shahid Ferdous, WCNC 2011

Performance of DCF DCF is not efficient. Major reasons for its inefficiency are Wastage of bandwidth in Backoff and IFS, Control Messages Collisions in RTS transmissions. Solution: Divide the nodes into groups. Incorporate multiple concurrent transmissions/receptions. In our previous paper, we have shown that the principle reason for DCF inefficiency is wastage of the available bandwidth in backoff and inter frame spacing times. We have shown that as the number of devices increases, collisions increases very rapidly and play a major role in DCF performance. In our previous paper, we proposed a solution by dividing the nodes into multiple disjoint groups and using OFDMA techniques to incorporate multiple concurrent transmissions/receptions. Hasan Shahid Ferdous, WCNC 2011

Medium access using OFDM-TDMA Traditional 802.11 devices use OFDM and share the medium in a TDMA fashion. All the subcarriers in the available bandwidth is used by one station at a particular time. Hasan Shahid Ferdous, WCNC 2011

Orthogonal Frequency Division Multiple Access (OFDMA) But using OFDMA, we can share the medium in both time and frequency domain. Here a group of subcarriers, called sub-channel is assigned to a node, and multiple device can use the spectrum at the same time. Hasan Shahid Ferdous, WCNC 2011

Enhanced IEEE 802. 11 by Integrating Multiuser Dynamic OFDMA Enhanced IEEE 802.11 by Integrating Multiuser Dynamic OFDMA [IWTS 2010] Pros A complete OFDMA based DCF for access point based operations of IEEE 802.11 Collision decrease by up to 80% Throughput increase by up to 40% Latency decrease by up to 20% Cons Discusses AP based operations only Ad hoc mode poses additional challenges Based on OFDMA, we have proposed a DCF for access point based operations of IEEE 802.11. This work is presented and published in 9th Annual Wireless Telecommunications symposium. In that work, we have shown that our proposed protocol can improve the performance substantially. We achieved a throughput improvement of up to 40% by reducing collisions up to 80% and decreasing delay by up to 20%. But this work was for access point based operations only, where all the communicating was between the nodes and the access point. In ad hoc mode, there is no central control and any node can send data to any other node. This poses a lot more additional challenges. In this paper we discuss these issues and how to solve them and by doing so propose a complete OFDMA based DCF for IEEE 802.11 Hasan Shahid Ferdous, WCNC 2011

Challenges in ad hoc operations Sub-channel assignment No centralized control. Require dynamic decisions. Solutions: NDMs Nodes can use NDMs to periodically broadcast about their chosen sub-channel Find the least used sub-channel based on the information To understand these problems, consider a scenario with two devices in two sub-channels. The first problem is sub-channel assignment in ad hoc operations. In access point based operations, a device needs to associate itself with the AP. So, AP has a complete list of active devices and can assign sub-channels to them uniformly. In ad hoc operations, there is no such central control. But in that mode, devices require to transmit a short broadcast message named network discovery message (NDM) periodically so that each device can know its neighbors. We can use these NDMs to calculate a uniform sub-channel assignment in a distributed manner and thus solve the problem. So, in this work, we will assume that each node can calculate which sub-channel it will use to transmit its RTS message. When the medium is idle for more than DIFS period, a node can transmit an RTS using its assigned sub-channel or listen for the channel to decode transmissions from others. When a device receives and decodes an RTS that was intended for it, it halts its own backoff counter and waits for the completion of the current contention cycle. Then it transmits a CTS message using the sub-channel at which it has received that RTS message. Hasan Shahid Ferdous, WCNC 2011

Challenges in ad hoc operations (cont.) Receiver End Virtual Collisions The second problem is a special type of wastage in RTS messages. In access point based communications, all the uplink transmissions are intended for the access point. As we are considering a single cell network where all the devices can listen and decode the transmission of other devices, a collision cannot occur at the receiver end. But in ad hoc operations, the receiver can be in other sub-channels than the transmitter. So, when a device is in midway of its RTS transmission, its intended receiver may also start his own RTS transmission, thus the first RTS message will be ignored by the receiver. Again, a device may already have started its RTS transmission when another device starts transmitting an RTS to it, resulting in the loss of that second RTS. We will call this phenomenon as the receiver end virtual collisions. Though it is not a collision, one RTS message is lost because the receiver is in the transmitting mode and did not listen for that RTS message, which is illustrated in the figure. As we increase the number of sub-channels, more time is required to transmit an RTS message and the probability of receiver end collisions increases, especially when the number of devices per sub-channel is low. Hasan Shahid Ferdous, WCNC 2011

Challenges in ad hoc operations (cont.) Backoff Halting Our third problem is backoff halting due top receiver busy issue. See in the figure that when node1 is inside its backoff stage and senses that its intended receiver node 2 has sent an RTS message successfully, it must halt its backoff. Because at that point, it will be meaningless to send that RTS message; it will eventually be neglected by node 2, which is already transmitting. This issue was not present when we discussed access point based operations, where a node will halt its backoff only when any other device in its own group has transmitted an RTS message. Hasan Shahid Ferdous, WCNC 2011

Challenges in ad hoc operations (cont.) Deadlock Our final problem was to avoid deadlock. The previous issue of backoff halting can cause a deadlock in our proposed DCF. Consider a very simple case - there are only two sub-channels and one device is assigned to each of them. When the first device transmits its RTS, it is intended towards the second device, which cannot transmit any RTS now. So our policy for AP based operations will not work here anymore, as it requires at least one RTS transmission from each sub-channel. To cope up with this new issue, we introduce a new parameter - RTS_timeout, after which period the contention cycle is over, no matter how many RTS has been sent. This RTS_timeout will help us avoid the deadlock and has important impacts on the performance of the proposed DCF when the number of devices per sub-channel is very low. Hasan Shahid Ferdous, WCNC 2011

Our System To analyze the impact of sub-channelization, we considered saturation load in this paper we did not consider adaptive modulation and coding (AMC) Nodes periodically broadcast a NDM. When a device joins the system, it can transmit a Hello message. Other devices respond with NDM. Nodes in the same group share the same frequency sub- channel and contend among themselves to capture the channel. To analyze the impact of sub-channelization we assumed perfect channel conditions so that we can consider only the impact of our modifications. We did not use adaptive modulation and coding (AMC). We can describe the operation of our proposed DCF in the following steps. Nodes periodically broadcast a NDM that contains information about the sub-channel it is using, along with other parameters. When a device joins the system, it can transmit a Hello message. Other devices respond with NDM. The new device can then find the sub-channel that it will use by selecting the least used sub-channel. The whole procedure can be repeated periodically to accommodate topology changes in the network. Nodes in the same group share the same frequency sub-channel and contend among themselves to capture the channel using the same backoff rules as in IEEE 802.11 DCF Hasan Shahid Ferdous, WCNC 2011

Our System After transmitting RTS, the sender(s) wait for CTS. Other nodes in its group halt their backoff until the next contention cycle starts. When in backoff, if a node can decode an RTS and decide that its intended receiver has transmitted that message, it halts its backoff and waits for the next contention cycle. Alternatively, if a device receives an RTS with its own address in the destination address field, it halts its backoff counter and replies with a CTS message when the contention cycle is over. After transmitting RTS, the sender(s) wait for CTS. Other nodes in its group halt their backoff until the next contention cycle starts. So, there can be no more than one successful RTS sent from each group in a contention cycle. When in backoff, nodes can listen for the channel. If a node can decode an RTS and decide that its intended receiver has transmitted that message, it halts its backoff and waits for the next contention cycle. Alternatively, if a device receives an RTS with its own address in the destination address field, it halts its backoff counter and replies with a CTS message when the contention cycle is over. Hasan Shahid Ferdous, WCNC 2011

Our System The contention cycle ends as soon as either each group has sent one RTS, or a RTS_timeout has occurred. Nodes that have received an RTS message transmit CTS using the same sub-channel at which they have received that RTS. Devices calculate sub-carrier assignment in a distributed ways. They start transmitting data using the calculated sub-channels after waiting for SIFS time. Devices can detect a collision by the absence of a CTS in response to its RTS. Finally, the receiving devices transmit ACK. The contention cycle ends as soon as either each group has sent one RTS (successful or unsuccessful), or a RTS_timeout has occurred. No device will initiate a new RTS after the contention cycle is over, only the ongoing RTS transmissions will continue. When the contention cycle is over, nodes that have received an RTS message wait for the channel to remain idle for SIFS time and then transmit CTS using the same sub-channel at which they have received that RTS. Devices that have received CTS message, calculate sub-carrier assignment in a distributed ways. They start transmitting data using the calculated sub-channels after waiting for SIFS time. Devices can detect a collision by the absence of a CTS in response to its RTS. Then they wait for the beginning of another contention cycle using the same binary exponential backoff rules used by the IEEE 802.11 DCF. Finally, after waiting for SIFS time, the receiving devices transmit ACK using the same sub-channels at which they have received data. Hasan Shahid Ferdous, WCNC 2011

Our New DCF Hasan Shahid Ferdous, WCNC 2011 This figure illustrates the operation of our proposed DCF, where there are four sub-channels and devices are contending to access them. Hasan Shahid Ferdous, WCNC 2011

Simulation Scenario Number of sub-channel = 2, 4, 8 Number of Nodes = 2, 4, .... ..., 50 Packet size = 1024 bytes. Simulation time = 106 µs Number of simulations = 100 IEEE 802.11a/g system parameters. To analyze the performance of our proposed DCF, we developed a discrete event driven simulation using SimJava2 and examined every aspect of our system. We assumed perfect channel conditions so that we can consider only the impact of our modifications. We tried to remain close to the IEEE 802.11 a/g protocol. We did not use adaptive modulation and coding (AMC); rather we used fixed data rate of 36 Mbps to simulate both traditional IEEE 802.11 and our proposed system. We varied the number of nodes from 1 to 50 and experimented with 2, 4, and 8 sub-channels to examine the performance of our proposed system. We will now show a few important results. For full details, please refer to our paper. Hasan Shahid Ferdous, WCNC 2011

RTS Collision Probability Let us consider the percentage of RTS messages that are lost due to collisions first. We can see that collisions in standard IEEE 802.11 DCF increase very quickly as the number of devices increases and it can reach up to 53% with 50 nodes present in the system. Sub-channelization can decrease collisions significantly, except for the case when the number of devices per sub-channel is too low. In those cases, the receiver end collisions discussed earlier causes the RTS collision probability to be very high. As we increase the number of sub-channels c, each RTS message takes c times longer duration than in the standard protocol. So, the probability that the intended receiver starts transmission during this period will increase with increase in c. As the number of nodes per sub-channel increases, this discrepancy is reduced and we can see that our proposed DCF can reduce collisions by up to 45%. Of course, the improvement is far less than that we have seen in the case of AP based operations of our DCF in our earlier paper, yet we can achieve a significant improvement. Hasan Shahid Ferdous, WCNC 2011

Backoff per Packet Hasan Shahid Ferdous, WCNC 2011 Let us consider the time wasted in backoff per contention cycle. As our protocol requires at least one RTS transmission from each sub-channel or a RTS_timeout to consider the end of a contention cycle, average duration of the backoff period is higher than that in the standard IEEE 802.11 DCF. But if we consider the amount of time wasted in backoff to transmit each RTS message successfully, we can find that the time wasted in our proposed DCF is very close to the standard protocol except for the case when the number of nodes per sub-channel is too low. Hasan Shahid Ferdous, WCNC 2011

Data Throughput Hasan Shahid Ferdous, WCNC 2011 Now the most important performance criteria – the throughput. This figure shows about the percentage of time slots carrying payload data, which is another way of calculating throughput. We can see that traditional IEEE 802.11 DCF uses the channel to carry payload data for only 43% of the total time on an average, whereas we can reach up to 51% using our proposed DCF for ad hoc operations. Though this improvement is less dramatic than in the case of AP based operations of our proposed DCF due to the factors discussed earlier, we can expect a throughput improvement of up to 20%. Hasan Shahid Ferdous, WCNC 2011

Average Packet Transmission Delay As our final performance measure, we consider average delay of packet transmission in this figure. Delay is measured from the time a packet is in the head of queue of its corresponding device to the time it is successfully transmitted, including retransmissions. The same anomaly as in the previous cases is seen here. When there are too few nodes per sub-channel, our proposed DCF performs worse than the standard IEEE 802.11 DCF. But for higher number of nodes per sub-channel, we can see that the average transmission delay decreases as we introduce sub-channelization. Increasing c does not reduce delay much, as we have explained in earlier that the probability of receiver end virtual collisions increases when we increase c. But yet, we can achieve up to 18% decrease in average delay with our proposed DCF. Hasan Shahid Ferdous, WCNC 2011

Summary and Future Goals Integrating OFDMA in IEEE 802.11 can substantially improve its performance. This paper completes our proposed system for both AP based and ad hoc operations. We are now working on incorporating OFDMA for finite load conditions. Optimally decide the number of sub-channels. Analyse performance for heterogeneous nodes. In this paper, we have extended our proposed DCF for ad hoc operations in a single cell wireless local area network. We have pointed the additional challenges that we had to face along with their remedies. We have shown that even for moderate number of users, our proposed DCF can overcome the overhead introduced by the protocol and can improve the performance of WLANs substantially. We are now working to develop a Markov chain model to find a complete analytical analysis of our proposed protocol for ad hoc operations. We are also working to incorporate our proposal for non-saturation performance analysis of IEEE 802.11. In that context, optimally deciding the number of sub-channels remain as a major research challenge. Hasan Shahid Ferdous, WCNC 2011

Thank You Hasan Shahid Ferdous, WCNC 2011