Problems in Ad Hoc Channel Access

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
Combating the effects of Hidden Terminals in Multi Channel MAC Protocols Mthulisi Velempini.
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
Earl1 MACA-BI(MACA By Invitation) A Receiver Oriented Access Protocol for Wireless Multihop Network F. Talucci, M. Gerla, and L. Fratta Proceedings of.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Ad Hoc Wireless Media Access Protocols Mikko Raatikainen, TiTe 5.
Network Technology CSE Network Technology CSE3020 Week 9.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Introduction to Wireless Networks Michalis Faloutsos.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Efficient MAC Protocols for Wireless Sensor Networks
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Chapter 5 outline 5.1 Introduction and services
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
MAC Protocols and Security in Ad hoc and Sensor Networks
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱 2015/10/11.
A Medium Access Control Protocol with Reliable Multicast Support for Wireless Networks Thesis defense of: Vikram Shankar Advising Committee: Dr. Sandeep.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Mobile Routing protocols MANET
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
A Directional MAC Protocol for Practical Smart Antennas Yuya Takatsuka, Katsushiro Nagashima, Masaki Bandai and Takashi Watanabe Shiuzoka University GLOBECOM’06.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
1 MAC Protocols that use Directional Antennnas. 2 Directional Antenna  Directional communication  Less Energy in the wrong direction Better Spatial.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
WLAN.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
COSC 6590 Fall Multi-channel, multi-radio wireless networks.
MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Wireless Sensor Networks 4. Medium Access
Outline What is Wireless LAN Wireless Transmission Types
The University of Adelaide, School of Computer Science
Communication Networks: Technology & Protocols
Wireless LANs Wireless proliferating rapidly.
Multi-channel, multi-radio wireless networks
Computer Communication & Networks
MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Multiple Access Methods
Introduction to Wireless Networks
Wireless LAN Simulation IEEE MAC Protocol
Multi-channel, multi-radio
Subject Name: Adhoc Networks Subject Code: 10CS841
Wireless LAN Protocols
Presentation transcript:

Problems in Ad Hoc Channel Access Hidden Terminal Problem : Two nodes are said to be hidden from one another (out of signal range) when both attempt to send information to the same receiving node, resulting in a collision of data at the receiver node.

To avoid collision, all of the receiver's neighboring nodes need to be informed that the channel will be occupied. This can be achieved by reserving the channel using control messages, that is, using a handshake protocol. An RTS (Request To Send) message can be used by a node to indicate its wish to transmit data. The receiving node can allow this transmission by sending a grant using the CTS (Clear To Send) message.

Because of the broadcast nature of these messages, all neighbors of the sender and receiver will be informed that the medium will be busy, thus preventing them from transmitting and avoiding collision.

Exposed Node Problem Overhearing a data transmission from neighboring nodes can inhibit one node from transmitting to other nodes. This is known as the exposed node problem. An exposed node is a node in range of the transmitter, but out of range of the receiver. Leads to Wasted bandwidth.

Another solution : A mobile node using an omni-directional antenna can result in several surrounding nodes being "exposed," thus prohibiting them from communicating with other nodes. This lowers network availability and system throughput.

Alternatively, if directional antennas are employed, this problem can be solved. As in diagram node C can continue communicating with the receiving palm pilot device without impacting the communication between nodes A and B. The directivity provides spatial and connectivity isolation not found in omni-directional antenna systems

MAC protocol can be categorized as synchronous or asynchronous in operation, it can also be distinguished by who initiates a communication request

Receiver-Initiated MAC Protocols The receiver (node B) first has to contact the sender (node A), informing the sender that it is ready to receive data. This is a form of polling, as the receiver has no way of knowing for sure if the sender indeed has data to send.

This is also a passive form of initiation since the sender does not have to initiate a request. In addition, there is only one control message used, compared to the RTS-CTS approach

Sender-Initiated MAC Protocols Contrary to receiver-initiated MAC protocols, sender-initiated MAC protocols require the sender to initiate communications by informing the receiver that it has data to send. Examples of these sender-initiated protocols include MACA (Multiple Access with Collision Avoidance)

node A sends an explicit RTS message to node B (the receiver) to express its desire to communicate. Node B can then reply if it is willing to receive data from node A. If positive, it returns a CTS message to node A. Node A then subsequently proceeds to send data

Existing Ad Hoc MAC Protocols

Multiple Access with Collision Avoidance (MACA) MACA aims to create usable, ad hoc, single-frequency networks. MACA was proposed to resolve the hidden terminal and exposed node problems. It also has the ability to perform per-packet transmitter power control, which can increase the carrying capacity of a packet radio.

MACA uses a three-way handshake, RTS-CTS-Data. The sender first sends an RTS to the receiver to reserve the channel. This blocks the sender's neighboring nodes from transmitting. The receiver then sends a CTS to the sender to grant transmission.

This results in blocking the receiver's neighboring nodes from transmitting, thereby avoiding collision. The sender can now proceed with data transmission

MACA has power control features incorporated. The key characteristic of MACA is that it inhibits a transmitter when a CTS packet is overheard so as to temporarily limit power output when a CTS packet is overheard. This allows geographic reuse of channels.

For example, if node A has been sending data packets to node B, after some time, A would know how much power it needs to reach B. If node A overhears node B's response to an RTS (i.e., a CTS) from a downstream node C, A need not remain completely silent during this time. By lowering its transmission power from the level used to reach node B, node A can communicate with other neighboring nodes (without interfering with node B) during that time with a lower power.

In MACA, the slot time is the duration of an RTS packet. If two or more stations transmit an RTS concurrently, resulting in a collision, these stations will wait for a randomly chosen interval and try again.

Compared to CSMA, MACA reduces the chances of data packet collisions Compared to CSMA, MACA reduces the chances of data packet collisions. Since control messages (RTS and CTS) are much smaller in size compared to data packets, the chances of collision are also smaller.

MACA-BI (By Invitation) It uses only a two-way handshake. There is no RTS. Instead, the CTS message is renamed as RTR (Ready To Receive). In MACA-BI, a node cannot transmit data unless it has received an invitation from the receiver.

RTS-CTS handshake is now reduced to a single CTS (CTS-only) handshake after the first hop, and the reduction in the control overhead is hence a function of route length.