Topology Considerations on Contention-based Directional MAC Simulation

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Doc.: IEEE /0796r0 SubmissionSlide 1 July 2009 W. Y. Lee et. al Contention-based Directional MAC Protocols: A Survey Date: Authors:
Mitigating Deafness in Multiple Beamforming Antennas
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine.
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
On Reservation-Based MAC Protocol for IEEE Wireless Ad Hoc Networks With Directional Antenna Author : Jin-Jia Chang, Student Member, IEEE Wanjiun.
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3d: Medium Access Control Protocols.
Avoiding Head of Line Blocking in Directional Antenna Vinay Kolar, Sameer Tilak, Dr. Nael Abu-Ghazaleh.
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
1 Introduction to Wireless Networks Michalis Faloutsos.
Outline What is an ad hoc network Smart Antenna Overview
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
MIMO and TCP: A CASE for CROSS LAYER DESIGN Soon Y. Oh, Mario Gerla Computer Science Dept. University of California, Los Angeles {soonoh,
Using Directional Antennas for Medium Access Control in Ad Hoc Networks MOBICOM 2002 R. Roy Choudhury et al Presented by Hyeeun Choi.
August 8, 2015 Computer Networks COE 549 Directional Antennas for Ad- hoc Networks Tarek Sheltami KFUPM CCSE COE
Doc.: IEEE /0797r2 SubmissionSlide 1 July 2009 W. Y. Lee et. al Topology Considerations on Contention- based Directional MAC Simulation Date:
MAC Protocols and Security in Ad hoc and Sensor Networks
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
Addressing Deafness and Hidden Terminal Problem in Directional Antenna Based Wireless Multi-hop Networks Anand Prabhu Subramanian and Samir R. Das {anandps,
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Multi-Channel MAC for Ad Hoc Networks: Handling Multi- Channel Hidden Terminals Using a Single Transceiver (MMAC) Paper by Jungmin So and Nitin Vaidya.
Angular MAC: a framework for directional antennas in wireless mesh networks Erdem Ulukan and Özgür Gürbüz Faculty of Engineering and Natural Sciences,
Doc.: IEEE c Submission January, 2006 Chun-Ting Chou, PhilipsSlide 1 NOTE: Update all red fields replacing with your information;
Priority Scheduling in Wireless Ad Hoc Networks Xue Yang and NitinVaidya University of Illinois at Urbana-Champaign.
Enhancing Wireless Networks with Directional Antenna and Multiple Receivers Chenxi Zhu, Fujitsu Laboratories of America Tamer Nadeem, Siemens Corporate.
Wireless Sensor Networks M Homework #2. IEEE MAC Protocol - Star topology – Part I Consider a square area equipped with 30 nodes distributed.
A new Cooperative Strategy for Deafness Prevention in Directional Ad Hoc Networks Andrea Munari, Francesco Rossetto, and Michele Zorzi University of Padova,
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Using Directional Antennas for Medium Access Control in Ad Hoc Networks Romit Roy Choudhury, Xue Yang, Ram Ramanathan. and Nitin H. Vaidya University of.
A Deafness Free MAC Protocol for Ad Hoc Networks Using Directional Antennas Jia Feng, Pinyi Ren, and Shuangcheng Yan Department of Electronic Engineering.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
1 Effectiveness of Physical and Virtual Carrier Sensing in IEEE Wireless Ad Hoc Networks Fu-Yi Hung and Ivan Marsic WCNC 2007.
An Opportunistic Directional MAC Protocol for Multi-hop Wireless Networks with Switched Beam Directional Antennas Osama Bazan and Muhammad Jaseemuddin.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Dept. of Computer.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
MAC Protocols for Sensor Networks
Media Access Methods MAC Functionality CSMA/CA with ACK
MAC Protocols that use directional Antennas
ICUPC’98 Jing Deng and Zygmunt J. Hass
Outline What is Wireless LAN Wireless Transmission Types
A Power Control MAC Protocol for Ad Hoc Networks
Wireless LANs Wireless proliferating rapidly.
Distributed Medium Access Control in Wireless Networks
Topics in Distributed Wireless Medium Access Control
Energy Efficiency in HEW
Open Loop vs Closed Loop SU-MIMO for 11ay
TCP and MAC interplay in Wireless Ad Hoc Networks
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
Routing with Directional Antennas
Ad Hoc Networks - Performance
On the Physical Carrier Sense in Wireless Ad-hoc Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Utilizing Directional Antennas in Ad Hoc Networks (UDAAN)
Introduction to Wireless Networks
The Impact of Multihop Wireless Channel on TCP Performance
Wireless LAN Simulation IEEE MAC Protocol
Subject Name: Adhoc Networks Subject Code: 10CS841
January, 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Medium Access Control (MAC) in Wireless.
Outline 1. INTRODUCTION 2. PRELIMINARIES 3.THE PROPOSED PROTOCOL
Directional Antennas for Wireless Networks
doc.: IEEE <doc#>
Performance Implications of DCF to ESS Mesh Networks
Performance Implications of DCF to ESS Mesh Networks
Outdoor Mesh MAC Protocol Issues & Considerations
Performance Implications of DCF to ESS Mesh Networks
HEW Beamforming Enhancements
Presentation transcript:

Topology Considerations on Contention-based Directional MAC Simulation July 2009 Topology Considerations on Contention-based Directional MAC Simulation Date: 2009-07-14 Authors: W. Y. Lee et. al

July 2009 Impact of Topology on Simulation of Contention-based Directional MAC (1/2) Topology and Service Scenario of Directional MAC observes different behaviors in simulation. For example, CRTS and CRCM have been tested under different topology. G Jakllari, J Broustis, T Korakis,S V. Krishnamurthy, and L Tassiulas, "Handling Asymmetry in Gain in Directional Antenna Equipped Ad Hoc Networks," Proc. IEEE 16th International Symposium on PIMRC, pp.1284-1288, 2005 M Takata, M Bandai and T Watanabe, "MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks," Proc. IEEE Goblecom 2007, pp.620-625, 2007 CRCM CRTS Randomly distributed 100 Nodes in 1500x1500m 1 2 3 4 <4 nodes in linear topology> <Randomly distributed topology> Slide 2 W. Y. Lee et. al 2

July 2009 Impact of Topology on Simulation of Contention-based Directional MAC (1/2) We observe the throughput performance of the two is reversed with different topology => Hence, a standardized approach is necessary. CRCM CRTS <4 node in linear topology> <Randomly distributed topology> Slide 3 W. Y. Lee et. al 3

Three Performance Indices need to be analyzed July 2009 Three Performance Indices need to be analyzed Deafness problem (e.g., deafness ratio) Hidden node problem (e.g., failure rate due to hidden nodes) Spatial reuse W. Y. Lee et. al

Deafness Problem Definition: deafness occurs if a device does not answer an RTS message addressed to it. Consequences: originator of the RTS will try more RTSs while increasing contention window, during which messages toward other devices are subject to be blocked. Two examples

Deafness Example #1 Assume 3 nodes. July 2009 1 2 A 4 3 1 2 1 2 X B 4 Slide 6 W. Y. Lee et. al 6

Deafness Example #1 Node A has a data to send B. A sends DRTS. July 2009 Deafness Example #1 Node A has a data to send B. A sends DRTS. A 1 2 4 3 DRTS X 1 2 4 3 B 1 2 4 3 W. Y. Lee et. al

Deafness Example #1 Node B responds with DCTS. July 2009 1 2 A DCTS 4 3 DCTS X 1 2 4 3 B 1 2 4 3 Slide 8 W. Y. Lee et. al 8

July 2009 Deafness Example #1 Other beams except one in communication are blocked. A 1 2 4 3 In Communication X 1 2 4 3 B 1 2 4 3 Slide 9 W. Y. Lee et. al 9

July 2009 Deafness Example #1 Now, node X has a data to send A, it will send DRTS to A. (node A is deaf now.) A 1 2 4 3 Deafness DRTS X 1 2 4 3 B 1 2 4 3 Slide 10 W. Y. Lee et. al 10

Deafness Example #2 Four nodes. Now, node S has a data to send D. July 2009 Deafness Example #2 Four nodes. Now, node S has a data to send D. A 1 2 4 3 D 1 2 4 3 B 1 2 4 3 S 1 2 4 3 W. Y. Lee et. al

Deafness Example #2 Four nodes. Now, node S has a data to send D. July 2009 Deafness Example #2 Four nodes. Now, node S has a data to send D. A 1 2 4 3 D 1 2 4 3 B 1 2 4 3 S 1 2 4 3 DRTS Slide 12 W. Y. Lee et. al 12

Deafness Example #2 Nodes A and B overhear the DRTS from S. July 2009 Deafness Example #2 Nodes A and B overhear the DRTS from S. Nodes A and B block their beams 3 and 4, respectively. A 1 2 4 3 D 1 2 4 3 B 1 2 4 3 S 1 2 4 3 DRTS Slide 13 W. Y. Lee et. al 13

Deafness Example #2 Node D responds with DCTS. July 2009 Deafness Example #2 Node D responds with DCTS. Node B overhears the DCTS and blocks beam 2. A 1 2 4 3 D 1 2 4 3 B 1 2 4 3 S 1 2 4 3 DCTS Slide 14 W. Y. Lee et. al 14

Deafness Example #2 Nodes S and D are in communication. July 2009 A 1 4 3 D 1 2 4 3 B 1 2 4 3 S 1 2 4 3 In Communication Slide 15 W. Y. Lee et. al 15

Deafness Example #2 Now, B has a data to A, so it sends DRTS to A. July 2009 Deafness Example #2 Now, B has a data to A, so it sends DRTS to A. But, node A’s beam 3 is blocked (Another deafness problem). Deafness A 1 2 4 3 D 1 2 4 3 DRTS B 1 2 4 3 S 1 2 4 3 DCTS Slide 16 W. Y. Lee et. al 16

July 2009 Hidden Terminal W. Y. Lee et. al

Hidden Terminal Problem Definition: hidden terminal problem occurs if another device interfere on-going communication by causing collision. Consequences: throughput of on-going communication is degraded. Two examples

Hidden Terminal Example #1 Assume nodes sense carrier omni-directionally. Sensing Range D C B A Slide 19 W. Y. Lee et. al

Hidden Terminal Example #1 Now, node B has a data to A D C B A Slide 20 W. Y. Lee et. al

Hidden Terminal Example #1 Node B has a data to A DRTS D C B A Slide 21 W. Y. Lee et. al

Hidden Terminal Example #1 Node B changes it receiving antenna mode to directional one. D C B A Slide 22 W. Y. Lee et. al

Hidden Terminal Example #1 Node A sends back to B with DCTS. DCTS D C B A Slide 23 W. Y. Lee et. al

Hidden Terminal Example #1 Node A turns its receiving antenna mode to directional one, and communication is going on. In Communication D C B A Slide 24 W. Y. Lee et. al

Hidden Terminal Example #1 Now, node D has a data to send C. But, D’s RTS accidentally reaches to node A’s receiving range due to some channel conditions. In Communication D C B A Collision Slide 25 W. Y. Lee et. al

Hidden Terminal Example #2 July 2009 Hidden Terminal Example #2 4 nodes Node A has a data to B. S 1 2 4 3 D 1 2 4 3 A 1 2 4 3 B 1 2 4 3 Slide 26 W. Y. Lee et. al 26

Hidden Terminal Example #2 July 2009 Hidden Terminal Example #2 Node A sends DRTS to B. S 1 2 4 3 D 1 2 4 3 A 1 2 4 3 DRTS B 1 2 4 3 W. Y. Lee et. al

Hidden Terminal Example #2 July 2009 Hidden Terminal Example #2 Node B responds with DCTS. S 1 2 4 3 D 1 2 4 3 A 1 2 4 3 DCTS B 1 2 4 3 Slide 28 W. Y. Lee et. al 28

Hidden Terminal Example #2 July 2009 Hidden Terminal Example #2 Nodes A and B are in communication. S 1 2 4 3 D 1 2 4 3 A 1 2 4 3 In Communication B 1 2 4 3 Slide 29 W. Y. Lee et. al 29

Hidden Terminal Example #2 July 2009 Hidden Terminal Example #2 Now, node S has a data to send D, so it sends DRTS to D. S 1 2 4 3 D 1 2 4 3 DRTS A 1 2 4 3 In Communication B 1 2 4 3 Slide 30 W. Y. Lee et. al 30

Hidden Terminal Example #2 July 2009 Hidden Terminal Example #2 Node D responds with DCTS. S 1 2 4 3 D 1 2 4 3 DCTS A 1 2 4 3 In Communication B 1 2 4 3 Slide 31 W. Y. Lee et. al 31

Hidden Terminal Example #2 July 2009 Hidden Terminal Example #2 Nodes S and D are in communication. S 1 2 4 3 D 1 2 4 3 In Communication A 1 2 4 3 In Communication B 1 2 4 3 Slide 32 W. Y. Lee et. al 32

Hidden Terminal Example #2 July 2009 Hidden Terminal Example #2 Further, nodes A and B complete their communication. S 1 2 4 3 D 1 2 4 3 In Communication A 1 2 4 3 Communication completed B 1 2 4 3 Slide 33 W. Y. Lee et. al 33

Hidden Terminal Example #2 July 2009 Hidden Terminal Example #2 Again, node A has a data to D. S 1 2 4 3 D 1 2 4 3 In Communication A 1 2 4 3 Now, A has a data to D B 1 2 4 3 Slide 34 W. Y. Lee et. al 34

Hidden Terminal Example #2 July 2009 Hidden Terminal Example #2 Node A sends DRTS to D since A did not hear previous DRTS from S nor DCTS from D. S 1 2 4 3 D 1 2 4 3 In Communication A 1 2 4 3 DRTS B 1 2 4 3 Slide 35 W. Y. Lee et. al 35

Hidden Terminal Example #2 July 2009 Hidden Terminal Example #2 Collision due to unheard RTS/CTS. Collision S 1 2 4 3 D 1 2 4 3 In Communication A 1 2 4 3 DRTS B 1 2 4 3 Slide 36 W. Y. Lee et. al 36

Spatial Reuse Benefit from directivity of directional antennas. Two examples

Spatial Reuse July 2009 D 1 2 4 3 E 1 2 4 3 F 1 2 4 3 A 1 2 4 3 B 1 2 C 1 2 4 3 W. Y. Lee et. al

Spatial Reuse July 2009 1 2 D 4 3 1 2 A 4 3 1 2 B 4 3 1 2 S 4 3 W. Y. Lee et. al

An Example of Topology in Simulation July 2009 An Example of Topology in Simulation W. Y. Lee et. al

Scenarios (Conference Room) July 2009 Scenarios (Conference Room) Deafness Example#1 W. Y. Lee et. al

Scenarios (Conference Room) July 2009 Scenarios (Conference Room) Antenna blocked Deafness Example #2 W. Y. Lee et. al

Scenarios (Conference Room) July 2009 Scenarios (Conference Room) Hidden Terminal Problem Example#1 W. Y. Lee et. al

Scenarios (Conference Room) July 2009 Scenarios (Conference Room) Communication Completed Hidden terminal example #2 W. Y. Lee et. al

Scenarios (Conference Room) July 2009 Scenarios (Conference Room) Spatial reuse W. Y. Lee et. al

Scenarios (Conference Room) July 2009 Scenarios (Conference Room) W. Y. Lee et. al

July 2009 References [1] R. R. Choudhury, X. Yang, R. Ramanathan and NH Vaidya, “On designing MAC protocols for wireless networks using directional antennas,” IEEE Trans. Mobile Computing, Volume 5, Issue 5, May 2006, pp.477 – 491 [2] R.R. Choudhury, X. Yang, N.H. Vaidya, and R. Ramanathan, “Using Directional Antennas for Medium Access Control in Ad Hoc Networks,” Proc. ACM MobiCom, June 2002 [3] M. Takata, M. Bandai and T. Watanabe, "MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks," Proc. IEEE GLOBECOM, pp.620- 625, 2007 [4] G. Jakllari, J. Broustis, T. Korakis,S V. Krishnamurthy, and L. Tassiulas, "Handling Asymmetry in Gain in Directional Antenna Equipped Ad Hoc Networks," Proc. IEEE 16th International Symposium on PIMRC, pp.1284-1288 Slide 47 W. Y. Lee et. al 47