TDM-based Coordination Function (TCF) in WLAN for High Throughput Chaegwon Lim and Chong-Ho Choi School of Electrical Engineering and Computer Science.

Slides:



Advertisements
Similar presentations
Medium Access Issues David Holmer
Advertisements

Ethernet – CSMA/CD Review
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
1 «Performance Analysis for a New Medium Access Control Protocol in Wireless LANs» By YOUNGGOO KWON and YUGUANG FANG Presentation by Ampatzis Efthimios.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE Distributed Wireless LANs.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Available Bandwidth Estimation in IEEE Based Wireless Networks Samarth Shah, Kai Chen, Klara Nahrstedt Department of Computer Science University.
Jesús Alonso-Zárate, Elli Kartsakli, Luis Alonso, and Christos Verikoukis May 2010, Cape Town, South Africa, ICC 2010 Coexistence of a Novel MAC Protocol.
Contention Window Optimization for IEEE DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
802.11n MAC layer simulation Submitted by: Niv Tokman Aya Mire Oren Gur-Arie.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
Opportunistic Packet Scheduling and Media Access Control for Wireless LANs and Multi-hop Ad Hoc Networks Jianfeng Wang, Hongqiang Zhai and Yuguang Fang.
1 QoS Schemes for IEEE Wireless LAN – An Evaluation by Anders Lindgren, Andreas Almquist and Olov Schelen Presented by Tony Sung, 10 th Feburary.
On the Performance Behavior of IEEE Distributed Coordination Function M.K.Sidiropoulos, J.S.Vardakas and M.D.Logothetis Wire Communications Laboratory,
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Wireless LAN Simulation - IEEE MAC Protocol
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Opersating Mode DCF: distributed coordination function
PLANETE group, INRIA Sophia-Antipolis July 1, 2003 Adaptive Channel allocation for QoS Enhancement in IEEE Wireless LANs Presented by: Mohammad.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
A Virtual Collision Mechanism for IEEE DCF
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Link-Adaptable Polling-based MAC Protocol for Wireless LANs Byung-Seo Kim, Sung Won Kim, Yuguang Fang and Tan F. Wong Department of Electrical and Computer.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Distributed Call Admission Control for VoIP over WLANs based on Channel Load Estimation Paolo Dini, Nicola Baldo, Jaume Nin-Guerrero, Josep Mangues-Bafalluy,
On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Full auto rate MAC protocol for wireless ad hoc networks Z. Li, A. Das, A.K. Gupta and S. Nandi School of Computer Engineering Nanyang Technological University.
Chapter 6 Multiple Radio Access
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks
Access Delay Distribution Estimation in Networks Avideh Zakhor Joint work with: E. Haghani and M. Krishnan.
Planning and Analyzing Wireless LAN
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Rami Melhem Sameh Gobriel & Daniel Mosse Modeling an Energy-Efficient MAC Layer Protocol.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
EA C451 (Internetworking Technologies)
Topics in Distributed Wireless Medium Access Control
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
TCP - Part II Relates to Lab 5. This is an extended module that covers TCP flow control, congestion control, and error control in TCP.
Author: Giuseppe Bianchi
Performance Evaluation of an Integrated-service IEEE Network
Wireless LAN Simulation IEEE MAC Protocol
Chapter 6 Multiple Radio Access.
Infocom 2004 Speaker : Bo-Chun Wang
Wireless MAC Multimedia Extensions Albert Banchs, Witold Pokorski
Presentation transcript:

TDM-based Coordination Function (TCF) in WLAN for High Throughput Chaegwon Lim and Chong-Ho Choi School of Electrical Engineering and Computer Science and ASRI Seoul National University, Seoul, Korea IEEE Global Telecommunications Conference (Globecom) 2004 (Acceptance rate: 37.7%)

Overview Introduction Previous work Protocol Descriptions Performance Evaluation My Personal Comments Future work Conclusion

Introduction - 1 The demand for high throughput of IEEE is increasing as most applications require a wide bandwidth. However, the most popular protocol on IEEE networks, Distributed Coordination Function (DCF), cannot meet the expectation due to its contention-based nature.

Introduction - 2 Collision resolution scheme in DCF, the Binomial Exponential Backoff (BEB), doubles the size of the contention window up to a maximum value (1024) when there is a collision. A significant number of redundant idle slots are introduced due to successive collisions before a successful data transmission. Therefore, the actual throughput is far below the theoretical one.

Introduction - 3 Factors considered in IEEE networks’ performance analysis:  The number of active stations.  Bit Error Rate (BER)  Contention window (CWin) size… The number of active stations is directly related to the competition level in seizing the radio resource. This germinates the idea of TCF.

Introduction - 4 Assumptions:  Propagation delay is negligible.  all stations are within the radio transmission range  no hidden node. TCF uses information on the number of active stations explicitly to eliminate the contention period in DCF of IEEE It makes each station adjust the starting time of its radio transmission according to the number of active stations in order to avoid collisions.

Introduction - 5 It can be employed in both infrastructure and ad hoc modes and implemented distributively. The overall throughput is improved as it  is always higher than that of DCF  approaches the maximum throughput as the number of active stations increases. It also guarantees fairness among active stations.

Previous work Kwon et al. proposed a fast collision recovery (FCR) algorithm. FCR uses a smaller sized contention window (CW) and reduces the value of backoff counter (BC) exponentially when idle slots are detected consecutively for a fixed number of times. Whenever a station detects the transmission of another station, it increases the value of its CW and picks the value of BC randomly.

Protocol Specification – Terminology (1) Service Period (SP)  A period during which each active station transmits frames in round-robin manner. Join Period (JP)  New stations can join during this period.  The duration of JP (AD) is fixed and known to all stations.

Protocol Specification – Terminology (2) Backoff Counter (BC)  It linearly depends on the number of active stations.  It is decreased by one for each DIFS (50 microsec) after a successful transmission or for each ACKTimeout after sending a data frame or for each idle slot time (20 microsec) after DIFS or ACKTimeout.  The station transmits data when the BC becomes zero DATADIFSACKSIFS DATAACK timeout Slot 1 Slot Slot 1 Slot BC:

Protocol Specification – Terminology (3) The Number of Active Stations (NS)  It increments NS by one when it detect a transmission  Each station sets the NS to zero when the BC is reset.

Protocol Specification – State Transition Diagram

Protocol Specification – STANDBY State (1) When a station enters the STANDBY state, it estimates the number of active stations by just counting the number of transmissions between two consecutive JPs. How can a station to identify a JP ?  If it detects idle time that is equal to AD, it assumes that this instant is the end of the JP. New node’s view AD=5 SPJP SP

Protocol Specification – STANDBY State (2) The station sets its NS as the number of active stations and updates NS continuously until it enters the JOIN state. If a station in this state has data to send and knows the number of active stations, it enters the JOIN state at the end of the JP. New node’s view SPJP SP JP

The end of the JP AD = 5 The time duration of the column where all square are white = SlotTime (20 microsec) The time duration of the column containing a grey sqaure = T data + SIFS (10 microsec) + T ack + DIFS (50 microsec) if successful = T data + ACKTimeout (30 microsec) otherwise Protocol Specification – STANDBY State (3)

Protocol Specification – JOIN State (1) Immediately after the end of the current JP, the station sets  BC = NS + X where X = 0,1, …, AD-1 Purpose: avoid collisions among several new stations  NS = 0 The station updates NS continuously until BC becomes 0.

Protocol Specification – JOIN State (2)

Protocol Specification – JOIN State (3) Once a station receives ACK in JP, it jumps to the ACTIVE state. BC and NS are reset:  BC = NS AD – X Purpose: A slot alignment operation to ensure that there are no idle slots in between active stations.  NS = 0 The latest station which enters the ACTIVE state becomes the last sender in the SP.

Protocol Specification – JOIN State (4) Service Period

Protocol Specification – JOIN State (5) More than one new stations

Protocol Specification – JOIN State (6) If the number of stations in the JOIN state is greater than AD, they will compete with each other to occupy one of AD slots during JP. New stations which failed to transmit a data frame during the JP return to a STANDBY state.

Protocol Specification – ACTIVE State An ACTIVE station uses two variables, BC and NS, to transmit a data frame without contention. After transmitting a data frame, it  sets BC to (NS + AD) and  resets NS to zero

Protocol Specification – ACTIVE State

The ACTIVE state is composed of two sub- states: ACTIVE1 and ACTIVE2.

Protocol Specification – ACTIVE State When a station enters the ACTIVE state, it goes into the ACTIVE1 state.

Protocol Specification – ACTIVE State When the sender station notices a collision by observing the absence of ACK, the sender station goes into the ACTIVE2 state. It tries to send the data frame in the next SP.

Protocol Specification – ACTIVE State If a station in the ACTIVE2 state suffers from a collision again during the next SP, it enters the STANDBY state.

Protocol Specification – ACTIVE State When a station in the ACTIVE2 state sends a data frame successfully during the next SP, it goes into the ACTIVE1 state again.

Protocol Specification – ACTIVE State The reason for using two sub-states:  Provide TCF with more robustness for possible hidden stations or other stations which are not under TCF.

Protocol Specification – ACTIVE State If a station in the ACTIVE state has no more data to send, it will exit the ACTIVE state and transit to the STANDBY state.

Protocol Specification – ACTIVE State If several station exit concurrently, a station in the JOIN state may determine the start of JP incorrectly and may send a data frame during SP. It is possible that collisions may occur between stations in ACTIVE state and stations in the JOIN state NS=13 BC=13+5=18 JP SP New node’s view Active node’s view 5 active actions exit AD=5 SPJP SP NS=3, X = 2 BC=3+2-1=4

Protocol Specification – ACTIVE State Collision resolution scheme:  Stations in the ACTIVE1 state transit to the ACTIVE2 state.  Stations in the ACTIVE2 state transit to the STANDBY state.  Stations in the JOIN state return to the STANDBY state.

Protocol Specification – Deactivation

Performance Evaluation – Setup (1) Several simulations are performed using ns-2 (version 2.26) simulator TCF was compared with DCF and FCR. FCR (CW min =3) is selected because it is implemented distributively and provides high throughput due to a small CW min and exponential reduction of BC.

Performance Evaluation – Setup (2) All the b stations are in a region of 70 meters x 70 meters. The transmission range of each station is 100 meters. Each station always has enough data to send to one of the other stations selected randomly

Performance Evaluation - Setup (3) The bit error rate (BER) is 10 −5, which is the worst environment for an Orinoco PC card. The traffic sources send data at a constant bit rate (CBR) and the size of a data packet is 1000 bytes. Tricky setting! Time taken for simulations = 100 sec

Performance Evaluation – Overall Throughput (1) Obtain a maximum throughput of DCF as a reference point  There are two stations(a sender and a receiver).  The sender station always has data to send.  The propagation delay is negligble.  The wireless network is lossless.

Performance Evaluation – Overall Throughput (2) Obtain a maximum throughput of DCF  Expected time consumed to send a data frame successfully (T transmit ) = DIFS + T E[BC] +T data +SIFS + T ack where T E[BC] is the expected contention period,T data and T ack represent the transmission times of a data frame and an ACK respectively.  Throughput max = TotalUsefulDataSize / T transmit where T E[BC] is set to zero i.e T transmit = DIFS +T data +SIFS + T ack  Throughput max = Mbps

Performance Evaluation – Overall Throughput (3)

Performance Evaluation - Delay

where n is the number of active stations, and X i is the measured throughput of flow i. Performance Evaluation - Fairness

Performance Evaluation – Load Variation

My Personal Comments Simulation scenarios are not comprehensive.  The value of the constant bit rate (CBR) is not given in this paper. The value may be “tailor-made” to produce expected results. If the outgoing data arrival rate is much smaller than the data transmission rate, a sender needs to join and exit frequently. The overhead incurred may increase the delay and hence decrease the overall throughput.  Performance under variable bit rate (VBR) traffic is not evaluated. No analytical model.

Future work Extend the operation of TCF in the environment where there are hidden stations. Study delay-stringent versions of TCF to cope with VBR multimedia traffic.

Conclusions TCF is a simple and distributed MAC scheme for IEEE network to increase throughput using the information on the number of active stations. It eliminates the contention by increasing BC to exceed the number of active stations and giving each station the opportunity to transmit a data frame in a round robin fashion. It can be used in places where there is no hidden station such as conference rooms and coffee shops.