1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks 4th Week (Part I) 09.05.2007 Faisal Aslam.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 8th Lecture Christian Schindelhauer.
Multiple access What if multiple machines are sharing the same link?
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 9th Lecture Christian Schindelhauer.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Medium Access Control in Wireless Sensor Networks USC/ISI Technical Report ISI-TR-580, October 2003 Wei Ye and John Heidemann.
Medium Access Control for Ad Hoc Wireless Networks: A Survey S. Kumar, V. Raghavan, J. Deng Ad Hoc Networks 4 (2006)
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
1 MAC Layer Design for Wireless Sensor Networks Wei Ye USC Information Sciences Institute.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Medium Access Control Sublayer
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
1 Radio and Medium Access Control 2 Radio Properties.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
: Data Communication and Computer Networks
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 21 February 2005.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
1 Power-Aware Routing in Mobile Ad Hoc Networks S. Singh, M. Woo and C. S. Raghavendra Presented by: Shuoqi Li Oct. 24, 2002.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 MAC Protocols that use Directional Antennnas. 2 Directional Antenna  Directional communication  Less Energy in the wrong direction Better Spatial.
Chapter 6 Multiple Radio Access
MAC Protocol for PAN. 2 Medium Access Control (MAC) Controlling when to send a packet and when to listen for a packet are perhaps the two most important.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Wireless Sensor Networks 4. Medium Access
Data link layer divided into two functionality-oriented sublayers
Medium Access Control MAC protocols: design goals, challenges,
Wireless Sensor Networks 4. Medium Access
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Data Communication Networks
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Presentation transcript:

1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks 4th Week (Part I) Faisal Aslam and Chia Ching Ooi

Mobile Ad Hoc Networks th Week (Part I) - 2 Responsibilities of MAC  Facilitate single-hop communication –No routing here –Some broadcast!  Sharing the medium –May perform carrier sense No one else is sending Not all MAC protocol use it –May exchange control packets Tell other I am going to send Inform receiver –What if collision occurs? Keep sending might not be a good idea!

Mobile Ad Hoc Networks th Week (Part I) - 3 Responsibilities of MAC  Error detection and correction –Cyclic redundancy checks, Parity schemes  Flow control Do not send fast enough  Power management Manage power while doing above all Sleep management Reduce idle listening  Idle listening state, a sensor node continuously listens to the medium to look for any possible traffic when nothing is being send.  Mobility issues

Mobile Ad Hoc Networks th Week (Part I) - 4 Classification of MAC schemes Medium Access Control Contention Free or Schedule based (polling, Token Based, TDMA, CDMA, FDMA, etc) Contention Based Reservation/Collision Resolution Random Access Use of Control Packets (MACA, MACAW, etc.) Use of Control Packets and Carrier Sensing (FAMA, CSMA/CA, , etc) Carrier Sensing (CSMA, etc.) Non-Carrier Sensing (ALOHA, Slotted ALOHA, etc.)

Mobile Ad Hoc Networks th Week (Part I) - 5 Schedule- vs. contention- based MACs  Schedule-based MAC –A schedule exists, regulating which participant may use which resource at which time (TDMA component) –Typical resource: frequency band in a given physical space (with a given code, CDMA) –Schedule can be fixed or computed on demand Usually: mixed – difference fixed/on demand is one of time scales –Usually, collisions, overhearing, idle listening no issues –Disadvantage: time synchronization!  Contention-based protocols –Risk of colliding packets is deliberately taken –Hope: coordination overhead can be saved, resulting in overall improved efficiency –Mechanisms to handle/reduce probability/impact of collisions required –Usually, randomization used somehow

Mobile Ad Hoc Networks th Week (Part I) - 6 ALOHA  The simplest possible medium access protocol: Just talk when you feel like it (no carrier sense) If message collide then try again  Formally: Whenever a packet should be transmitted, it is transmitted immediately  Introduced in 1985 by Abrahmson et al., University of Hawaii  Goal: Use of satellite networks Packets are transmitted at arbitrary times

Mobile Ad Hoc Networks th Week (Part I) - 7 ALOHA – Analysis  ALOHA advantages –Trivially simple –No coordination between participants necessary  ALOHA disadvantages –Collisions can and will occur – sender does not check channel state –Sender has no (immediate) means of learning about the success of its transmission – link layer mechanisms (ACKs) are needed ACKs can collide as well 

Mobile Ad Hoc Networks th Week (Part I) - 8 A slight improvement: Slotted ALOHA  ALOHA’s problem: Long vulnerability period of a packet  Reduce it by introducing time slots – transmissions may only start at the start of a slot –Slot synchronization is assumed to be “somehow” available  Result: Vulnerability period is halved, throughput is doubled

Mobile Ad Hoc Networks th Week (Part I) - 9 Carrier Sense Multiple Access With Collision Detection  Carrier Sense Multiple Access (CSMA) –Sense the medium –If not free wait for till it is free Transmit  Carrier Sense Multiple Access With Collision Detection (CSMA/CD) –Sense the medium –If not free Backoff random amount of time Check medium again,  if free then transmit.  Otherwise Backoff again

Mobile Ad Hoc Networks th Week (Part I) - 10 Problem for MAC protocol  In any wireless communication interface is at receiver and not at sender  Hidden Terminal –Node A is sending data to B –Node C perform carrier sense Finds medium free. –Node C start sending to B –B had collision  Exposed terminal –Node B is sending data to A –Node C performs carrier sense Finds medium occupied Hence node C do not send data to D –Sending data to D was safe ABC ABCD

Mobile Ad Hoc Networks th Week (Part I) - 11 Multiple Access with Collision Avoidance (MACA)  Sender B asks receiver C whether C will be able to receive a transmission Request to Send (RTS)  “A” overhear B’s RTS. It waits until Data should have been recieved.  Receiver C if agrees to receive, sends out a Clear to Send (CTS)  “D” overhear CTS. It wait until data should have been received. CTS has length of data specified inside it. ABCD NAV indicates busy medium RTS CTS Data NAV indicates busy medium

Mobile Ad Hoc Networks th Week (Part I) - 12 MACA and Hidden Terminal Problem  MACA Solves Hidden terminal Problem? –Yes during data but not during RTC/CTS –In figure “C” has become hidden terminal and cannot hear first RTS due to CTS. It is because of this later CTS collide with data.

Mobile Ad Hoc Networks th Week (Part I) - 13 MACA and Exposed Terminal Problem  “A” overhear RTS.  Waits until CTS  Medium busy because of the Data.  Based on information in RTS. –“A” now know that it could send during data transmission.  Exposed Terminal solved? –(Answer in Exercise!) ABCD NAV indicates busy medium RTS CTS Data NAV indicates busy medium

Mobile Ad Hoc Networks th Week (Part I) - 14 MACA Wireless (MACAW)  Uses RTS-CTS-DS-DATA-ACK  Acknowledgement (ACK) –If data is received –No ACK, data is Resend  DS (Data sending) –To tell that CTS is received. ABCD NAV indicates busy medium RTS CTS Data NAV indicates busy medium

Mobile Ad Hoc Networks th Week (Part I) - 15 Power-aware MAC Protocol  MANET nodes are battery powered –Energy conservation –Efficient power utilization  Principles of power conservation –Collisions avoidance: retransmission is expensive –Transceiver modes: Standby mode vs. Active mode –Lower power mode: based on distance to destination node  Protocol implementation –Power management: alternating sleep and wake cycles –Power control: variation in transmission power

Mobile Ad Hoc Networks th Week (Part I) - 16 Motivation ModelTransmitReceiveStandby GEC Plessey DE GHz 1.8 W0.6 W0.05 W Lucent’s 15 dBm 2.4 GHz Wavelan radio 1.75 W1.475W0.08 W

Mobile Ad Hoc Networks th Week (Part I) - 17 PAMAS  Raghavendra & Singh (1998) –Power Aware Medium Access Control with Signaling –PAMAS = MACA + Separate Signaling Channel  Signaling and data channel –Combine busy tone with RTS/CTS –Results in detailed overhearing avoidance, does not address idle listening  Sleep and awake modes –Node powers off its data channel if busy tones is heard and it is neither the sender nor the receiver of the transmission

Mobile Ad Hoc Networks th Week (Part I) - 18 PAMAS

Mobile Ad Hoc Networks th Week (Part I) - 19 PAMAS  Procedure –Node A transmits RTS on signaling channel, does not sense channel –Node B receives RTS, sends CTS on signaling channel if it can receive and does not know about ongoing transmissions –B sends busy tone on signaling channel as it starts to receive data Time Signaling channel Data channel RTS A ! B CTS B ! A Data A ! B Busy tone sent by B

Mobile Ad Hoc Networks th Week (Part I) - 20 PAMAS: Already ongoing transmission  Suppose a node C in vicinity of A is already receiving a packet when A initiates RTS  Procedure –A sends RTS to B –C is sending busy tone (as it receives data) –CTS and busy tone collide, A receives no CTS, does not send data A B C ? Time Signaling channel Data channel RTS A ! B CTS B ! A No data! Busy tone by C Similarly: Ongoing transmission near B destroys RTS by busy tone

Mobile Ad Hoc Networks th Week (Part I) - 21  When does a node enter the power-off state? –Condition 1: The node has no packets for transmission and if a neighbor begins transmitting. –Condition 2: A neighbor node is transmitting and another is receiving packets at the same time (data channel is busy, it cannot transmit or receive a packet)  Duration of power-off state –Duration field in RTS frame –Probe message on signaling channel PAMAS: Power Conservation A B C A transmits to B A’s transmission to B is overheard by C and D D

Mobile Ad Hoc Networks th Week (Part I) - 22 PCM  Jung & Vaidya (2002) –Power Control MAC  Based on BASIC power control protocol (Gomez et al, 2001) –Varied transmission power Max. Power: RTS/CTS Min. Power required: Data & ACK

Mobile Ad Hoc Networks th Week (Part I) - 23 Problem of Using Different Transmit Power  Asymmetric situation causes collision –Node C starts transmitting to D as it does not sense transmission between A and B A B Low Transmit Power CD High Transmit Power

Mobile Ad Hoc Networks th Week (Part I) - 24 Solution: BASIC Protocol A B CD DATA ACK RTS CTS

Mobile Ad Hoc Networks th Week (Part I) - 25  Method 1: –Transmit Power of RTS is indicated in RTS –Gain can be computed based on both sender and receiver power of RTS –Signal-to-noise level is considered to compute transmit power level for DATA  Method 2: –CTS is sent at max. transmit power Transmit Power Level

Mobile Ad Hoc Networks th Week (Part I) - 26 Carrier Sensing vs. Transmission Range A B C DE Carrier Sensing Zone Transmission Range Carrier Sensing Range

Mobile Ad Hoc Networks th Week (Part I) - 27 Transmission Range ACK DATA Drawback of BASIC Protocol A D BC E F G H Carrier Sensing Zone for CTS Carrier Sensing Zone for RTS Transmission Range for CTS Transmission Range for RTS Carrier Sensing Zone for DATA Carrier Sensing Zone for ACK

Mobile Ad Hoc Networks th Week (Part I) - 28 PCM  RTS-CTS are transmitted at maximum power level  DATA are transmitted at minimum necessary power level BUT at the maximum level periodically  ACK are transmitted with minimum necessary power  Intervals between two adjacent electricity pulses are slightly shorter than EIFS 20μ s 15μ s 190μs

Mobile Ad Hoc Networks th Week (Part I) - 29 PCM  Highlights: –Comparable performance to IEEE –Less energy consumed than IEEE  Solve drawback of BASIC partly –Periodic use of Max Power for DATA –But does not completely prevent collision (collision with DATA)  Drawbacks –Accurate estimation of received packet signal strength (e.g. fading, shadowing makes it difficult) –Difficult implementation of frequent change of transmit power level

30 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Thank you! Mobile Ad Hoc Networks Faisal Aslam and Chia Ching Ooi 4th Week (Part I)