09-11-2012 Rome, February 14, 2013 Status of the Project Report on the first year activities With the support of the Prevention, Preparedness and Consequence.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Review of Topology and Access Techniques / Switching Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
System’s generalities and structure of the final report Cesidio Bianchi. INGV.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Review of Topology and Access Techniques / Switching Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
A Transmission Control Scheme for Media Access in Sensor Networks Lee, dooyoung AN lab A.Woo, D.E. Culler Mobicom’01.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Doc.: IEEE /1019r1 Submission July 2011 MediaTek, Inc Slide 1 Supporting Large Number of STAs in ah Date: Authors:
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
MAC Protocol By Ervin Kulenica & Chien Pham.
On the Performance Behavior of IEEE Distributed Coordination Function M.K.Sidiropoulos, J.S.Vardakas and M.D.Logothetis Wire Communications Laboratory,
DETERMINATION OF THE TOPOLOGY OF HIGH SURVIVAL HF RADIO COMMUNICATION NETWORK Andrea Abrardo.
Rome, February 14, 2013 Status of the Project Report on the first year activities With the support of the Prevention, Preparedness and Consequence.
Wireless LAN Simulation - IEEE MAC Protocol
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Opersating Mode DCF: distributed coordination function
PLANETE group, INRIA Sophia-Antipolis July 1, 2003 Adaptive Channel allocation for QoS Enhancement in IEEE Wireless LANs Presented by: Mohammad.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
Voice Capacity analysis over Introducing VoIP and WLans IEEE based Wireless Local Area Networks (WLANs) are becoming popular While WLANs.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
1 Performance Analysis of the Distributed Coordination Function under Sporadic Traffic joint work with C.-F. Chiasserini (Politecnico di Torino)
A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Reporter: Yanlin Peng Wenrui Zhao, Mostafa Ammar, College of Computing,
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Chapter 6 Multiple Radio Access
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Planning and Analyzing Wireless LAN
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Improving the scalability of MAC protocols in Wireless Mesh Networks Mthulisi Velempini (Mr.)
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laborartory.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Exploring Random Access and Handshaking Techniques in Large- Scale Underwater Wireless Acoustic Sensor Networks Peng Xie and Jun-Hong Cui Computer Science.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Topics in Distributed Wireless Medium Access Control
The Impact of Multihop Wireless Channel on TCP Performance
Performance Evaluation of an Integrated-service IEEE Network
Wireless LAN Simulation IEEE MAC Protocol
Enhanced IEEE by Integrating Multiuser Dynamic OFDMA
Chapter 6 Multiple Radio Access.
Presentation transcript:

Rome, February 14, 2013 Status of the Project Report on the first year activities With the support of the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme European Commission - Directorate-General Home Affairs

Summary  Network Issues  MAC Techniques  HFTP  DCHF  Possible Scenarios (Logical Topology)  Token passing  Contention based  Mixed  Comparison between HFTP and DCHF  Model  Analytical Results  SWING simulations  Voice transmission  Data transmission  Conclusions CNIT-Siena

Considering the topology of the high-survival HF radio network, and according to its general requirements and communication scenarios, each ECI only communicates with its home CGA. This means that ECI to ECI communication is not required (even within the same area), and data exchange between different areas involves just CGA-to-CGA communication. Consequently, single-hop communication is always considered and no routing functionalities are really needed. In this case, the main network issues concern Medium Access Control (MAC) layer aspects, which are crucial to allow possible concurrent transmissions in the system. Network issues CNIT-Siena

MAC Techniques HFTP Wireless Token Ring Protocol  WTRP is a token bus protocoll, derived from IEEE 802.4;  Efficient medium access control in hevily loaded networks  Appropriate for networks that experience significant packet loss rates and relatevely long link turnaround times;  SOLLICIT_SUCCESSOR and SET_SUCCESSOR mechanism for dropping and adding nodes to the network  Token Relay  Merging Rings DCHF Distributed Coordination Function  Contention-based scheme based on the popular wireless MAC protocol, IEEE DCF with some features incorporated from MACAW (Multiple Access with Collision Avoidance for Wireless);  Physical carrier sensing and the DIFS delay are not used;  After successful channel acquisition, the backoff range is halved rather than reset to the minimum;  Data packets carry the size of the sending node’s contention window, which is then used by all nodes. CNIT-Siena

Possible scenarios Token passing Scenario In this scenario, each node that needs to transmit (either ECI or CGA), waits for token reception. Upon receiving the token, it is allowed to try to transmit its packet for a limited time interval (usually set long enough for the specific network), before releasing the token. In the considered solution, the token passes through all nodes of the network by means of a logical ring covering the entire network. CNIT-Siena

Possible scenarios Contention based Scenario This scenario does not need the design of any logical ring. Indeed, in this case we assume that every node uses a DCHF MAC scheme to get channel access. More precisely, the transmitting node senses the channel and establishes a connection, either using a RTS/CTS procedure or not, with the receiving node. CNIT-Siena

Possible scenarios Mixed Scenario This scenario represents a compromise between the first two cases. In particular, we distinguish between two different kinds of communications: ECI-CGA and CGA- CGA. Assuming that heavy traffic conditions may occur only in the former case, we select a contention free mechanism for ECI-CGA communications and a contention- based scheme for CGA-CGA communications. CNIT-Siena

Comparison HFTPDCHF The performance of a MAC protocol could be analyzed by evaluating three main metrics: Average Latency per Packet: it is the total delay suffered by a packet from the time it arrives at a node until the time it gets transmitted on the channel. This metric identifies the responsiveness of the protocols for varying traffic conditions. Channel Utilization: it is the fraction of total time the channel is being utilized to transmit bits, and it is a measure of the efficiency of these protocols. Saturation Throughput: is measured under the condition that every node in the network constantly tries to send traffic. This metric measures how well the MAC protocol handles heavy traffic The network consists of N nodes Mean packet arrival rate: λ pck/s Mean service rate: μ pck/s Mathematical model - M/G/1 queue CNIT-Siena

Comparison ChanelServiceTime = T success + T fail (1/P success – 1) T success and T fail represent respectively the time taken for a successful transmission and the total time in case of failed channel acquisition; P success is the probability of successful acquisition of the same; T q is the time spent by a packet in node’s buffer, known as Queueing Delay; ρ is the traffic intensity. DCHF Tcycle is the average time taken for the token to complete one full rotation in the ring; Tq is the time spent by a packet in node’s buffer, known as Queueing Delay; Tpkt is the mean time taken to transmit one packet in the channel; Tt is the link turnaround time; b token is the dimension in bit of the token HFTP CNIT-Siena

Analytical results Input Data: N = 4; rate = 6400 bit/s DCHF packet = 30 bytes HFTP token = 40 bytes ACK = 30 bytes Packet = 320 bytes Link Turnaround = 1 ms CNIT-Siena

Analytical results Input Data: N = 4; rate = 6400 bit/s DCHF packet = 30 bytes HFTP token = 40 bytes ACK = 30 bytes Packet = 320 bytes Link Turnaround = 1 s CNIT-Siena

Input Data: N = 4; rate = 6400 bit/s DCHF packet = 30 bytes HFTP token = 40 bytes ACK = 30 bytes Packet = 320 bytes Analytical results CNIT-Siena

TRANSMISSIONPARAMETERINPUT Digital Voice Mode I Packet320 B Rate2634 b/s Digital Voice Mode II Packet320 B Rate5620 b/s Data Mode I Packet320 B Rate6400 b/s Data Mode II Packet1000 B Rate9600 b/s SWING Simulations The behavior of the analytical model has been evaluated for voice and data transmissions. The simulation results are obtained by implementing the mathematical model in Matlab ® for different values of the input parameters. CNIT-Siena

Conclusions In order to provide a complete design of the SWING system, we have investigated the requirements related to network layer operations. We highlighted that end-to-end communications in the SWING scenario are most of the times confined to single-hop communications, i.e., from ECIs to CGAs or among CGAs. Such consideration led us to focus our research activity on MAC layer aspects, which are crucial to allow possible concurrent transmissions in the system. Short link turnaround time: independently of the mode and type of data managed, the contention based technique DCHF shows better performance with respect to the contention free mechanism consequence of the introduction of an overhead in the token management heavier than the double handshake mechanism used for DCHF connection establishment. Long turnaround time: the HFTP exhibits improved performance than DCHF. The main reason for such a behavior lies in the different weight of the double handshake in DCHF, that causes a double turnaround, with respect to the token overhead, which is able to generate a single turnaround per passage/transmission. In HF communications the realization of a network with a long turnaround time is more feasible, we may conclude that a medium access control technique without contention based on a token protocol seems to be a suitable solution for the implementation of the SWING network. The use of a token-based mechanism to avoid contention might affect the delay in case of a single node transmission. SWING network topology: an internet failure caused by a terrorist attack will unlikely involve a single ECI and, rather, it will probably cause the contemporary access of several nodes to the SWING network. CNIT-Siena

Conclusions DeliverablesOwnerDeadlines 2 - Technical analysis of the communication problems related to the identification and designation of CIs in the interested area INGV M1 – M9 Sept 2012 Technical Report 3 - Determination of the topology of high survival radio communication network CNIT M1 – M9 Sept 2012 Technical Report 6 - Analysis of the existing architecture of HF communication based on internet protocol access with reference to the above considered infrastructures CNIT M1 – M6 Jun2012 Technical Report 8 - Definition of the high survival HF radio network technical requirements CNIT M1 – M6 Jun2012 Technical Report 9 - Radio network system designCNIT M1 – M12 Dec 2012 Technical Report