Does the IEEE 802.11 MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine.
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Medium Access Issues David Holmer
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Network Technology CSE Network Technology CSE3020 Week 9.
Re-routing Instability in IEEE Multi-hop Ad-hoc Networks Ping Chung Ng and Soung Chang Liew The 4th IEEE International Workshop on Wireless Local.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, Mario Gerla INFOCOM2003,
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
Collisions & Virtual collisions in IEEE networks Libin Jiang EE228a Communication Networks.
Networks: Wireless LANs1 Wireless Local Area Networks.
1 Introduction to Wireless Networks Michalis Faloutsos.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
MAC Reliable Broadcast in Ad Hoc Networks Ken Tang, Mario Gerla University of California, Los Angeles (ktang,
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
Sep 12, 2002Wireless Networking Seminar1 Does IEEE Work Well in Multi-hop Wireless Network? Author: Shugong Xu, Tarek Saadawi City University of.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
ECE 4450:427/527 - Computer Networks Spring 2015
Wireless LAN Simulation - IEEE MAC Protocol
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
A Medium Access Control Protocol with Reliable Multicast Support for Wireless Networks Thesis defense of: Vikram Shankar Advising Committee: Dr. Sandeep.
802.11: Performance Reference: “Does the IEEE MAC protocol work well in multihop wireless ad hoc networks”; Xu, S.; Saadawi, T. IEEE Communications.
A Bluetooth Scatternet-Route Structure for Multihop Ad Hoc Networks Yong Liu, Myung J. Lee, and Tarek N. Saadawi 2003 IEEE Journal on Selected Areas in.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Effects of Multi-Rate in Ad Hoc Wireless Networks
Full auto rate MAC protocol for wireless ad hoc networks Z. Li, A. Das, A.K. Gupta and S. Nandi School of Computer Engineering Nanyang Technological University.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Special Topics in Computer Engineering
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
A new Cooperative Strategy for Deafness Prevention in Directional Ad Hoc Networks Andrea Munari, Francesco Rossetto, and Michele Zorzi University of Padova,
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
WLAN.
Improving the scalability of MAC protocols in Wireless Mesh Networks Mthulisi Velempini (Mr.)
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
A Bidirectional Multi-channel MAC Protocol for Improving TCP Performance on Multihop Wireless Ad Hoc Networks Tianbo Kuang and Carey Williamson Department.
MAC Protocols for Sensor Networks
TCP and MAC interplay in Wireless Ad Hoc Networks
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Study on multi-hop ad hoc networks
Presentation transcript:

Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted from mnet.cs.nthu.edu.tw/paper/jbb/ pps)

Overview IEEE MAC Protocol The TCP Instability Problem and Analysis The Serious Unfairness and Analysis Conclusion

IEEE MAC Protocol – (1) IEEE MAC Protocol  is the standard for wireless LANs  combined network allocation vector (NAV) with clear channel assessment (CCA) to indicate the busy state of the medium.  using RTS/CTS scheme to reduce the probability of two stations colliding due to not hearing each other.

IEEE MAC Protocol – (2) Hidden terminal problem:  This will cause collision on data transmission. AC B

IEEE MAC Protocol – (3) Exposed terminal problem:  If these terminals are not minimized, the available bandwidth is underutilized. A C B D

IEEE MAC Protocol – (4) The IEEE MAC protocol in wireless mobile ad hoc networks, multihop connectivity is one of the most prominent features. Can the IEEE MAC Protocol Function Well in Multihop Networks?

IEEE MAC Protocol – (5) The serious problems encountered in an IEEE based multihop ad hoc networks:  The TCP Instability Problem.  The Serious Unfairness Problem. Authors concludes that the current version of this wireless LAN protocol does not function well in multihop ad hoc networks.

TCP Instability Problem – (1) The network topology: Interfering Range of node m 250 m

TCP Instability Problem – (2) The TCP session is the only traffic in the network with four hops from source 1 to destination SourceDestination

TCP Instability Problem – (3) If the network condition does not vary, the TCP throughput should stay stable within some range.

TCP Instability Problem – (4)

TCP Instability Problem – (5)

TCP Instability Problem – (6) Collision  Collision will occur in node 2 when nodes 1 and 4 is sending at the same time. Exposed Station  Node 2 has to defer when node 4 is sending SourceDestination

TCP Instability Problem – (7) Collision Exposed Terminal

TCP Instability Problem – (8)  Collision Node2 cannot receive RTS when node4 is sending (hidden terminal problem)  Exposed Station Problem Node2 cannot send back CTS even if it receives the RTS from node1 correctly. After failing to receive CTS from node2 seven times, a route failure event occurs SourceDestination

TCP Instability Problem – (9) By adjusting the Window size:

TCP Instability Problem – (10) Discussion:  The maximum number for possible back-to- back sending is four, greatly reduces possible that other nodes might fail to access the channel in seven tries SourceDestination

Serious Unfairness – (1) 2 TCP Connections  First session starts at 10.0s ( 6  4 )  Second session starts 20.0s later ( 2  3 ) SourceDestination Source

Serious Unfairness – (2) First session startSecond session start

Serious Unfairness – (3) The throughput of the first session is zero in most of its lifetime after the second session starts. There is not even a chance for it to restart. The loser session is completely shutdown even if it starts much earlier.

Serious Unfairness – (4)

Serious Unfairness – (5)

Serious Unfairness – (6) Discussion:  Node5 cannot reach node4 when Node2 is sending (collision) Node3 is sending ACK (defer) SourceDestination Source

Serious Unfairness – (7) Discussion:  TCP Instability / Unfairness Problem.  These MAC layer problem appear when the traffic load becomes large enough, even if the traffic is not from TCP

Conclusion The hidden terminal problem still exists in multihop networks. The exposed terminal problem will be more harmful in a multihop network and there is no scheme in IEEE standard to deal with this problem. The binary exponential backoff scheme always favors the latest successful node. It will cause unfairness.