MACA-BI(MACA By Invitation) A Wireless MAC Protocol for High Speed ad hoc Networking 컴퓨터 및 정보통신공학과 200730038 김 연주.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Università degli Studi di Firenze 08 July 2004 COST th MCM - Budapest, Hungary 1 Cross-layer design for Multiple access techniques in wireless communications.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
A Transmission Control Scheme for Media Access in Sensor Networks Lee, dooyoung AN lab A.Woo, D.E. Culler Mobicom’01.
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Nov 2011 Neng Xue Tianxu Wang.
Earl1 MACA-BI(MACA By Invitation) A Receiver Oriented Access Protocol for Wireless Multihop Network F. Talucci, M. Gerla, and L. Fratta Proceedings of.
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Ad Hoc Wireless Media Access Protocols Mikko Raatikainen, TiTe 5.
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
Reversing the Collision Avoidance Handshake in Wireless Networks J.J. Garcia-Luna-Aceves and Makis Tzamaloukas Computer and Communications.
A Transmission Control Scheme for Media Access in Sensor Networks Presented by Jianhua Shao.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Department of Electrical and Computer Engineering The Ohio State University1 Evaluation of Intersection Collision Warning System Using an Inter-vehicle.
Chapter 5 outline 5.1 Introduction and services
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
: Data Communication and Computer Networks
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
A Directional MAC Protocol for Practical Smart Antennas Yuya Takatsuka, Katsushiro Nagashima, Masaki Bandai and Takashi Watanabe Shiuzoka University GLOBECOM’06.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
1 Performance Analysis of the Distributed Coordination Function under Sporadic Traffic joint work with C.-F. Chiasserini (Politecnico di Torino)
Multi-Channel MAC for Ad Hoc Networks: Handling Multi- Channel Hidden Terminals Using a Single Transceiver (MMAC) Paper by Jungmin So and Nitin Vaidya.
Versatile Low Power Media Access for Wireless Sensor Networks Sarat Chandra Subramaniam.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
ECE 256, Spring 2009 __________ Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver __________________.
WLAN.
Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using Snooping Myunghwan Seo, Yonggyu Kim, and Joongsoo.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
A Cooperative Multi-Channel MAC Protocol for Wireless Networks IEEE Globecom 2010 Devu Manikantan Shila, Tricha Anjali and Yu Cheng Dept. of Electrical.
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
0.1 IT 601: Mobile Computing MAC Protocols Prof. Anirudha Sahoo IIT Bombay.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray,Jeffrey B. Carruthers and David Starobinski WCNC 2003.
Power-Efficient Rendez- vous Schemes for Dense Wireless Sensor Networks En-Yi A. Lin, Jan M. Rabaey Berkeley Wireless Research Center University of California,
1 Effectiveness of Physical and Virtual Carrier Sensing in IEEE Wireless Ad Hoc Networks Fu-Yi Hung and Ivan Marsic WCNC 2007.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
MAC Protocols for Sensor Networks
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
MAC Protocols for Sensor Networks
ICUPC’98 Jing Deng and Zygmunt J. Hass
SENSYS Presented by Cheolki Lee
TCP and MAC interplay in Wireless Ad Hoc Networks
CS 457 – Lecture 6 Ethernet Spring 2012.
Outline 1. INTRODUCTION 2. PRELIMINARIES 3.THE PROPOSED PROTOCOL
Presentation transcript:

MACA-BI(MACA By Invitation) A Wireless MAC Protocol for High Speed ad hoc Networking 컴퓨터 및 정보통신공학과 김 연주

목차 ■ 논문 소개 ■Introduction ■MACA-BI Illustrated ■Collisions in MACA-BI ■Predicting Traffic ■MACA-BI Performance ■Conclusion

논문 소개

논문 소개 ■Introduction to MACA-BI ■Show that MACA-BI outperforms other multiple access protocol in high speed

Introduction

Introduction (1/3) ■MACA Solves the hidden terminal problem Outperforms CSMA in a Wireless multi-hop network ■MACA with Carrier Sensing (FAMA-NTR) Can perform almost as well as CSMA in a single-hop wireless network ■FAMA-PJ, CARMA Achieve better performance at high load ■MACAW Five-way handshake Overhead cause low channel utilization! TX-RX turn-around time, preamble bits, control bits, checksum bits

Introduction (2/3) ■In order to better appraise the turn-around overhead, every transmission should be delayed by TX to RX turn-around time to give a chance to the previous transmitter to switch to receive mode. ■The relative impact of turn-around time becomes more critical at high channel speed and low propagation delays. So turn-around time is important role in future high speed, indoor wireless LANs and, more generally, multihop ad hoc networks!!

Introduction (3/3) ■MACA-BI (MACA By Invitation) Reduces the turn-around time Two handshake Waits for an “Invitation” by the intended receiver in the form of an RTR (Ready to Receive) control packet

MACA-BI Illustrated

MACA-BI Illustrated (1/2) ■Three basic cycles of the MACA protocol “driven by the transmitter” The three-way handshake AB C RTS AB C CTS AB C DATA Blocked

MACA-BI Illustrated (2/2) ■Two basic cycles of the MACA-BI protocol The two-way handshake ■Node B does not have exact knowledge of packet arrival times at Node A ■The each data packet carries the information Backlog in transmitter: # of packet and their lengths, the average rate and future backlog ■Node A replies with the transmission of the requested number of packet and with new backlog information AB C RTR AB C DATA Blocked

Collisions in MACA-BI

Analysis of collision states (1/3) ■Examination 6 node hidden terminal configuration Identify possible collisions Node A and B issue RTRs at about the same time to different neighbors Only three possible combinations ■Two type of RTR collision Direct collision Between nodes within hearing distance (due to carrier sense failure) Indirect collision Between nodes hidden from each other and transmitting to a common neighbor

Analysis of collision states (2/3)

Analysis of collision states (3/3) ■If node receives the RTR packet, Knows the duration of the impending data packet data packet transmissions by its two-hop neighbors Is able to decide if its transmission can disturb its neighbors reception

Data collision free property (1/2) ■No collision among data packet in MACA-BI ■Direct collision among data packet A transmits data packet to B, then C cannot transmits data packet to B Only if C did not hear the RTR from B to A, C can transmit a data packet to D B transmitted RTR to A while C was transmitting-> impossible! B transmitted RTR to A while C was receiving a RTR from D -> impossible!

Data collision free property (2/2) ■Hidden terminal problem 은 여전히 control packet 을 방해 ■RTR 과 Data packet 간에 충돌 가능 ■Carrier Sensing 실패로 Control Packet 간에 충돌 가능 ■MACA-BI 는 이러한 충돌 가능성이 존재하지만, MACA 는 이 러한 충돌을 줄이려고 하지 않는다.

Comparing MACA & MACA-BI protocol states (1/4) ■Assume The channel is symmetric as in all other MACA protocols Control packet can be corrupted by noise Direction collision Indirection collision

Comparing MACA & MACA-BI protocol states (2/4) ■Direction Collision

Comparing MACA & MACA-BI protocol states (3/4) ■Indirection Collision

Comparing MACA & MACA-BI protocol states (4/4) ■If the protocols work properly, they are data collision free ■Cannot speculate a priori on the probability of each configuration, but can qualitatively say that introducing the third pass in the handshake (as MACA dose) does not reduce the dangerous situations ■ 프로토콜은 channel noise 나 fading 등으로 control packet 방 해를 받아 실패 할 수 있는데 MACA 가 MACA-BI 보다 훨씬 취약 !

Predicting Traffic

MACA-BI performance

MACA-BI performance (1/8) ■MACA-BI multi-hop network 는 시뮬레이션을 통해 조사 ■ 시뮬레이션 Four nodes 네트워크의 기본적인 기능, data link, MAC layer 는 구현 Routing 은 Bellman-Ford scheme 모든 node 는 size 50 의 buffer 를 공유 Data link layer 는 선택적인 반복을 가진 size 8 의 sliding window separate window 는 각 pair node 가 사용 Flow control 은 sliding window mechanism 을 통해 공급 Separate MAC protocol 시뮬레이션 모듈은 개발

MACA-BI performance (2/8) ■ 시뮬레이션 ( 계속 ) Neighbor with highest buffer occupancy is invited to transmit Channels are error free Packet transmission can collide due to the hidden terminal problem and the non negligible propagation delay 방해받은 packet 들은 sliding window mechanism 에 의해 재 전송 -> packet loss 는 오직 네트워크 레벨에서만 발생 FAMA-NTR 은 매 handshake 마다 하나의 data packet 을 전송 Floor 충돌이 반복되는 것을 막기 위해 Poisson process 를 가진 floor 로 node 들은 reschedule Datagram traffic 을 시뮬레이션하기 위해 Poisson process 를 가진 모 든 노드들에서 External packet 들 발생

MACA-BI performance (3/8) ■ 첫 번째 시뮬레이션 Null propagation time 의 1Mbps 의 링크 Control packet 4 bytes Data packet 1000bits Floor generation interval 2.5ms

MACA-BI performance (4/8)

MACA-BI performance (5/8) ■ 두 번째 시뮬레이션 유한한 propagation time 전송 범위 3 미터의 near-filed signal strength Four node 10Mbps channel speed Average floor generation interval 0.3ms Data packet size 53 bites Control packet size 4 bytes

MACA-BI performance (6/8)

MACA-BI performance (7/8)

MACA-BI performance (8/8)

Conclusion

Conclusion ■Eliminate RTS packet Reducing the overhead for each packet transmission Simplifying the implementation ■More robust to hidden terminal collision, direct collision and noise corruption ■Not very sensitive to the TX-RX turn-around time ■In simulation, shows its superiority

Q&A