ADHOC – MAC : a new, flexible and reliable MAC architecture for ad-hoc networks F. Borgonovo, A. Capone, M. Cesana, L. Fratta Dipartimento Elettronica.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Introduction to MS-Aloha R. Scopigno, Networking Lab – 1.
Distributed Assignment of Encoded MAC Addresses in Sensor Networks By Curt Schcurgers Gautam Kulkarni Mani Srivastava Presented By Charuka Silva.
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
Urban Multi-Hop Broadcast Protocol for Inter-Vehicle Communication Systems Δημόκας Νικόλαος Data Engineering Laboratory, Aristotle University of Thessaloniki.
MAC Protocols for VANETsAlexandru Oprea16 th February 2010 MAC Protocols for VANETs Alexandru Oprea Department of Computer Science University of Freiburg.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
Switching When we have a lot of devices that want to communicate, how do we set up connections between them?
ISCC Antalya, 2003WTRP1 UC Berkeley WOW Wireless Token Ring Protocol (WTRP) Performance Comparison with IEEE Mustafa Ergen, Duke Lee, Raja Sengupta,
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
Prof.R.K.NADESH;SITE;VIT MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals:
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
TiZo-MAC The TIME-ZONE PROTOCOL for mobile wireless sensor networks by Antonio G. Ruzzelli Supervisor : Paul Havinga This work is performed as part of.
Medium Access Control Sublayer
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chapter 5 outline 5.1 Introduction and services
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
1 Network Administration Module 3 ARP/RARP. 2 Address Resolution The problem Physical networks use physical addresses, not IP addresses Need the physical.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Hybrid Indirect Transmissions (HIT) for Data Gathering in Wireless Micro Sensor Networks with Biomedical Applications Jack Culpepper(NASA), Lan Dung, Melody.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Wireless Networks: Physical and Link Layers Wired Typically point-to- point connections Interference effects are not significant Not power constrained.
Design and Implementation of a Reservation-based MAC Protocol for Voice/Data over IEEE Ad-Hoc Wireless Networks Shiann-Tsong Sheu, Tzu-Fang Sheu.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
TG4e doc.: IEEE e September 2008 W.-C. Jeong Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Cluster-Adaptive Two-Phase Coding Multi-Channel MAC Protocol (CA-TPCMMP) for MANETs 1 Lili Zhang, 1 Boon-Hee Soong, and 2 Wendong Xiao 1 School of Electrical.
Broadcast-and-select networks. Each node is usually attached to two fibers: one to transmit, one to receive W WDM channels are available Tx and Rx operate.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
ADHOC MAC : a new, flexible and reliable MAC architecture for ad- hoc networks F. Borgonovo, A. Capone, M. Cesana, L. Fratta Dipartimento Elettronica e.
Wireless LAN By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal
Communication Networks: Technology & Protocols
Contention-based protocols with Reservation Mechanisms
Channel Allocation (MAC)
Net301 lecture9 11/5/2015 Lect 9 NET301.
THE IEEE MAC SUB-LAYER – chapter 14
Performance Evaluation of an Integrated-service IEEE Network
7- chapter Seven Local Area Networks (LAN)
Subject Name: Adhoc Networks Subject Code: 10CS841
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Presentation transcript:

ADHOC – MAC : a new, flexible and reliable MAC architecture for ad-hoc networks F. Borgonovo, A. Capone, M. Cesana, L. Fratta Dipartimento Elettronica e Informazione Politecnico di Milano

2 No fixed infrastructure Limited propagation range Need for terminal relaying/routing Ad-Hoc Networks

3 Traffic control Entertainment Internet access Inter-vehicles ad-hoc Networks Speed poses stringent requirements No centralized operation

4 not completely solved by IEEE (CSCA) MAC problem: Hidden terminal MAC problem: Hidden terminal Impact on : –radio access –local broadcast

5 unsolved by IEEE (RQS/CLS) MAC problems: exposed terminal Impact on efficiency since parallel transmissions can be prevented

6 how to chose bridges MAC problems: broadcast service Tree-based protocols not applicable due to dynamic topology Flooding highly inefficient with high degree of connectivity (n transmissions instead of 1)

7 ADHOC MAC Features: Layer two connectivity information Access to a reliable single-hop broadcast QoS support for different applications Efficient point-to-point communication (parallel transmissions) Efficient multi-hop broadcast

8 Time slotted channel (eg, using GPS time synch) Basic Channel (BCH) Each active terminal owns a slot (Basic Channel) It periodically transmits channel status information in it Slots are grouped into virtual frames (VF) of length N Transmissions are received by all terminals within one hop range ADHOC MAC terminal j terminal i terminal k BCH is established using the Reliable Reservation ALOHA protocol

9 a distributed way to establish TDMA channels Reservation ALOHA kk+Nk+2N a slot successfully captured is periodically reserved (every N slots) until released

10 needs a centralized radio environment with central station feedback, so that all terminals “see” the same slot status: busy, free, collided Reservation ALOHA

11 operates in a distributed radio environment each terminal propagates slot status information (Frame Information) using BCH Reliable Reservation ALOHA FI

12 all active terminals transmit the Frame Information every N slots (within the virtual frame) FI specifies the status of the previous N slots (in the Sliding Virtual Frame) as observed by the terminal BUSY correct transmission FREE no transmission or collision Reliable Reservation ALOHA BBBB sliding frame N F F F F F F F F F Transmitting terminal

RR-ALOHA : Frame Information Transmissions

FI-5 FI-1 FI FI FI FI-6 R RRR R7 RR-ALOHA : slot status RESERVED if at least one FI says “BUSY” AVAILABLE otherwise A A A A Frame status processed by terminal 7 R FI-3

15 RR-ALOHA : access R RRR R A A A AA Frame Available slot AVAILABLE slots can be used: by a new active terminal (as in R-ALOHA ) by an already active terminal to increase its transmission bandwidth No Hidden-Terminal problem

16 RR-ALOHA : access The transmission is successful if the slot is coded as BUSY with the same station ID in all the received FI The ID of the slot “owner” must be included in the FI FI FI-7 Collisions

17 RR-ALOHA : access One terminal attempting access: Multiple terminals attempting access: All terminals in the same cluster recognize the transmission. All FIs will mark the slot as BUSY. All other terminals will receive FI with the slot marked as BUSY. The slot is declared RESERVED. Each terminal upon detecting collision leaves the slot as FREE. The slot remains AVAILABLE.

18 RR ALOHA : common frame a unique frame is established among non disjoint radio broadcast domains based on FIs transmitted by nodes in common

19 RR ALOHA : slot reuse ABCDABBCCD BABBBCAB A BABC AA Frame 1 CCBABCDBBCCAB BBC Frame 2 CCCDBCC CDDDBCD DCD Frame 3 Frame 1 Frame 2 Frame 3 23 transmissions in 13 slots

20 ADHOC MAC : Reserving additional bandwidth Each active station sets up and manages a BCH Payload can be transmitted in the BCH slots Additional available slots can be reserved for increasing transmission bandwidth (additional channels )

21 ADHOC MAC : Reserving additional bandwidth Using RR- ALOHA procedure on the AVAILABLE Slots Using estabilished BCH. New channel requests are signaled Possibility of priority management FI guarantees reservation collision detection

22 ADHOC MAC : Point-to-point channels To exploit slot reuse in the same or adjacent clusters (parallel transmissions) PTP flag is needed in the FI for each slot PTP flag is set by a terminal if: –The packet received is broadcast or –The packet is destined to the terminal itself A reserved slot can be accessed if: –The PTP flag is off in all received FI and –The FI received from the intended destination marks the slot FREE Due to concurrent access attempts: the transmission is successful if the slot is coded as BUSY in the FI of the destination terminal.

23 ADHOC MAC : Point-to-point channels

24 ADHOC MAC : Multi-hop Broadcast service Terminal i relays the broadcast packet received in slot k if and the following condition is not satisfied for all j from FIs

25 Multi-hop Broadcast mechanism ABCDABBCCD One terminal for each set AB, BC and CD is elected as relay terminal A B C

26 RR ALOHA PERFORMANCE Implementation overhead N slots >= M terminals (in the cluster) For inter-vehicles applications M=100 N=200 FI must contain: BUSY status (1 bit) Terminal temporary ID (8 bits) Priority field (2 bits) PTP service flag (1 bit) Overhead due to FI 2400 bits /slot Overhead due to other information 100 bits/slot Packet length 5000 bits Payload 2500 bits/slot in BCH At 10 Mbit/s frame duration 100 ms:25kb/s in BCH 5Mb/s for reservation

27 RR ALOHA PERFORMANCE Implementation overhead Overhead reduction: –Insert ID and priority information in the FI once every k frames –Used by the MAC in the access phase only and needed to be repeated for new active terminals –Ex: Add information once every 10 frames FI reduces to 400 bits 90% of the time 93% maximum efficiency with 5000 bits packets With reduced channel speed, 3.84 Mb/s (UTRA-TDD), packet length must be reduced to keep 100 ms frame

28 RR ALOHA PERFORMANCE Time responsiveness

29 Conclusions PROs –Suitable for highly variable ad-hoc net environment –Fast access to a reliable single-hop broadcast –Provision of different QoS according to applications needs –Parallel transmissions for point-to-point communications –Efficient multi-hop broadcast CONs –High overhead (25%) –Power saving is jeopardized by the need for the BCH