Spring 2005UCSC CMPE2571 CMPE 257: Wireless and Mobile Networking SET 3a: Medium Access Control Protocols.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Medium Access Issues David Holmer
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
KAIST Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks Suho Yang (CS710: November 4, 2008) Kyle Jamieson, Hari Balakrishnan, Y.C. Tay LNCS.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Nov 2011 Neng Xue Tianxu Wang.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Module C- Part 1 WLAN Performance Aspects
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Network Technology CSE Network Technology CSE3020 Week 9.
Analyzing Multi-channel MAC Protocols for Underwater Sensor Networks Presenter: Zhong Zhou.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3d: Medium Access Control Protocols.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
Spring 2005CMPE2571 CMPE 257: Wireless and Mobile Networking SET 3b: Medium Access Control Protocols.
On the Performance Behavior of IEEE Distributed Coordination Function M.K.Sidiropoulos, J.S.Vardakas and M.D.Logothetis Wire Communications Laboratory,
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
DETERMINATION OF THE TOPOLOGY OF HIGH SURVIVAL HF RADIO COMMUNICATION NETWORK Andrea Abrardo.
Elec 599 Report: Modeling Media Access in Embedded Two-Flow Topologies of Multi-hop Wireless Networks Jingpu Shi Advisor: Dr. Edward Knightly Department.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
Opersating Mode DCF: distributed coordination function
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
1 Performance Analysis of the Distributed Coordination Function under Sporadic Traffic joint work with C.-F. Chiasserini (Politecnico di Torino)
Chapter 6 Multiple Radio Access
Angular MAC: a framework for directional antennas in wireless mesh networks Erdem Ulukan and Özgür Gürbüz Faculty of Engineering and Natural Sciences,
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
IEEE WLAN.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Planning and Analyzing Wireless LAN
THROUGHPUT ANALYSIS OF IEEE DCF BASIC IN PRESENCE OF HIDDEN STATIONS Shahriar Rahman Stanford Electrical Engineering
Universität Karlsruhe Institut für Telematik ECE 591
Enhancing Wireless Networks with Directional Antenna and Multiple Receivers Chenxi Zhu, Fujitsu Laboratories of America Tamer Nadeem, Siemens Corporate.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
WLAN.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Exploring Random Access and Handshaking Techniques in Large- Scale Underwater Wireless Acoustic Sensor Networks Peng Xie and Jun-Hong Cui Computer Science.
TCP and MAC interplay in Wireless Ad Hoc Networks
On the Physical Carrier Sense in Wireless Ad-hoc Networks
He Xiaoben Further study of multi-hop communications - modeling the hidden terminal problem He Xiaoben
Performance Evaluation of an Integrated-service IEEE Network
Chapter 6 Multiple Radio Access.
Presentation transcript:

Spring 2005UCSC CMPE2571 CMPE 257: Wireless and Mobile Networking SET 3a: Medium Access Control Protocols

Spring 2005UCSC CMPE2572 MAC Protocol Topics n Modeling and performance analysis of collision avoidance MAC protocols

Spring 2005UCSC CMPE2573 MAC Protocols n Contention based MAC protocols: p Collision avoidance (CA) with CSMA to combat the ``hidden terminal’’ problem. p Include IEEE , FAMA, RIMA, etc. n Schedule based MAC protocols: p Collision free p Require time-slotted structure

Spring 2005UCSC CMPE2574 Contention-based MAC protocols n Focus on sender-initiated MAC: IEEE and its variants. n Most work is simulation based, some analytical work is confined to single-hop networks. n Interaction between spatial reuse and CA needs closer investigation.

Spring 2005UCSC CMPE2575 Analytical Work n Takagi and Kleinrock [TK84] use a simple network model to derive the optimal transmission range of ALOHA and CSMA protocols for multi-hop networks. (An interesting read.)TK84 n Wu and Varshney [WV99] use this model to derive the throughput of non-persistent CSMA and some busy tone multiple access (BTMA) protocols.WV99 n We [WG02] follow Takagi and Wu’s line of modeling to analyze collision avoidance MAC protocols in multi-hop ad hoc networks.WG02

Spring 2005UCSC CMPE2576 Preliminaries for Markov Regenerative Processes n Limiting probability of state j : n Steady-state probability of state j (R(j)): Def: The (long-run) proportions of transition into state j. n D(j): Mean time spent in state j per transition. n Theorem to calculate P(j): n Throughput

Spring 2005UCSC CMPE2577 Analytical Modeling n Network model p Nodes are randomly placed according to 2-dimensional Poisson distribution: where i is the # of nodes, S is the size of an area and λ is the density. Note: λS is the average # of nodes. p Each node has equal transmission and reception range R. p The average number of competing stations within a station’s transmission and reception range R is N.

Spring 2005UCSC CMPE2578 Analytical Modeling n Key assumptions p Time slotted: each slot lasts . r We use the time-slotted system as an approximation. p Each node is ready to transmit independently in each time slot with probability p. p Each node transmits independently in each time slot with probability p’. p Heavy traffic assumption: All node always have packets to be sent. p Perfect collision avoidance (a FAMA property), later extended to imperfect collision avoidance

Spring 2005UCSC CMPE2579 Channel Model n Model the channel as a circular region where there are some nodes. n Nodes within the region can communicate with one another but have weak interaction with nodes outside the channel. n Channel status is only decided by the successful and failed transmissions of nodes in the region. n The radius of the circular region R’ is modeled by αR where ½<=α<=2 and there are in effect M = α 2 N nodes in the region.

Spring 2005UCSC CMPE25710 Channel Model n 4-state Markov chain Channel: A region within which all the nodes share the same view of busy/idle state and have weak interactions with nodes outside. long idle short1 short2 1 P IL 1 P IS1 P II 1 P IS2

Spring 2005UCSC CMPE25711 Channel Model n Calculate the duration of states and transition probabilities between states. n Calculate the long-term probability that the channel is in idle state and get the relationship between the average ready probability p and the average transmission probability p’ : p p’ = p  Prob{ the channel is sensed idle}. n p’ is more important here, because it is the actual transmission probability after collision avoidance and resolution.

Spring 2005UCSC CMPE25712 Channel States n Idle: the channel is sensed idle. n Long: the state when a successful four-way handshake is done. n Short1: the state when more than one node around the channel transmit RTS packets at the same time slot. n Short2: the state when one node around the channel initiates a failed handshake to nodes outside the region.

Spring 2005UCSC CMPE25713 n Idle to Idle p There are on average M nodes competing for the channel: p The prob. of having i nodes competing for the channel: p The average trans. prob. is that none of them transmits in the next slot: Transition Probabilities

Spring 2005UCSC CMPE25714 n Idle to Long p Let P s denote the prob. that a node starts a successful 4- way handshake at a time slot. p The transition happens if only one of i nodes initiates the above handshake while the other nodes do not transmit: Transition Probabilities

Spring 2005UCSC CMPE25715 n Idle to Short1 p Given i competing nodes, the prob. of more than one nodes competing in a time slot equals: 1- Prob.{no node transmits} – Prob. {only one node transmits}, i.e., p So the average transition prob. equals: n Idle to Short2 Transition Probabilities

Spring 2005UCSC CMPE25716 n Let denote the steady-state probs. of states Idle, Long, Short1 and Short2 respectively. n From the Channel Markov Chain, we have Transition Probabilities

Spring 2005UCSC CMPE25717 Channel Idle State n We can calculate the long-term prob. that the channel is found idle: n Then we obtain the relationship between p’ and p.

Spring 2005UCSC CMPE25718 Node Model n 3-state Markov chain We derive the saturation throughput with regard to p’ assuming that each node always has a packet to send. succeed wait fail 1 P WS P ww 1 P WF

Spring 2005UCSC CMPE25719 Nodal States n Wait : the state when the node defers for other nodes or backs off. n Succeed : the state when the node can complete a successful 4-way handshake. n Fail : the state when the node initiates an unsuccessful handshake.

Spring 2005UCSC CMPE25720 n Wait to Succeed p We first need to calculate P ws (r), the prob. that node x initiates a successful 4-way handshake with node y at a time slot given that they are apart at a distance r. (Details omitted here.) p The pdf of distance r follows: where we have normalized r with regard to R. p Then we have Transition Probabilities

Spring 2005UCSC CMPE25721 Transition and Steady-State Probabilities n Wait to Wait p The node does not initiate any transmission and there is no node around it initiating a transmission. n Let denote the steady-state probs. of states Succeed, Wait and Fail respectively. n From the Node Markov Chain, we have

Spring 2005UCSC CMPE25722 Steady-State Probabilities and Throughput n The steady-state prob. of Succeed p Please note, so we obtain another equation that links p s and p’ and can solve p s. (Ref Slide #17)Slide #17 n Then we can calculate throughput as follows:

Spring 2005UCSC CMPE25723 n Throughput Th which is a complex function of p’ and other variables. n No closed-form formulae can be given. However, Matlab or similar tools can be used to obtain the numerical results. An exercise: Reproduce the analytical results in [WG02].WG02 n We compare the performance of collision avoidance protocols with the ideal CSMA protocol (with a separate, perfect acknowledgment channel) reported in [WV99].WV99 Throughput Analysis

Spring 2005UCSC CMPE25724 Analytical Results n Throughput for long data packet: rts = cts = ack = 5 , data = 100 . Throughput still degrades fast despite moderate increase of N.

Spring 2005UCSC CMPE25725 Analytical Results n Throughput for short data packet: rts = cts = ack = 5 , data = 20 . RTS/CTS scheme performs only marginally better than CSMA.

Spring 2005UCSC CMPE25726 Predictions from the Analysis n RTS/CTS scheme outperforms CSMA protocol even when its overhead is rather high, showing the importance of CA in contention-based MAC. n CA becomes more and more ineffective when the number of competing nodes within a region increases, because the probability of transmission in each time slot is very small. n Due to ``hidden terminals,’’ the number of nodes that can be accommodated in a network is quite limited, much smaller than that in a single- hop network.

Spring 2005UCSC CMPE25727 Simulation Environment n GloMoSim 2.0 as the network simulator. n Nodes are distributed uniformly in concentric circles to approximate the Poisson distribution. n Each node chooses one of its neighbors randomly as the destination whenever a packet is generated. n Performance metrics are obtained from the innermost N nodes and averaged over 50 network topologies. n We vary N, the average number of competing nodes in a neighborhood, to change the contention level (neighbors and hidden nodes).

Spring 2005UCSC CMPE25728 Simulation Environments n 2Mbps channel with direct sequence spread spectrum (DSSS) parameters 10  s50  s 14-byte1460-byte14-byte20-byte SIFSDIFSACKdataCTSRTS 1s1s192  s20  s prop. delaysync. timeslot timecontention window

Spring 2005UCSC CMPE25729 Simulation Results n IEEE vs. analytical results: N = 3 The actual protocol operates in a region due to diff. net. topologies and dynamic trans. prob. avg. prob. range avg. throughput. range

Spring 2005UCSC CMPE25730 Simulation Results n IEEE vs. analytical results: N = 8 In some confs., the actual protocol performs higher, but on average it operates below what is predicted in the analysis.

Spring 2005UCSC CMPE25731 Simulation Results n IEEE MAC protocol has inherent fairness problem, which can lead to very high throughput in some configurations. n IEEE MAC protocol does not have perfect collision avoidance and cannot achieve the max throughput predicted in the analysis in most cases. n When network size increases, CA becomes less effective and increasing spatial reuse becomes more important.

Spring 2005UCSC CMPE25732 Summary n Collision avoidance is still very useful, especially in sparse networks. n Collision avoidance loses its effectiveness in dense networks: p More stringent multi-hop coordination p Reduced spatial reuse n The fairness problem which refers to the severe throughput degradation of some nodes is another actively pursued research topic.

Spring 2005UCSC CMPE25733 Suggested Work n Read the implementation of FAMA and IEEE MAC in GloMoSim (you may need to migrate FAMA from version of GloMoSim as FAMA is no longer included in newer versions of GloMoSim.) You can also use ns2 which is more up-to-date. n Evaluate the performance of FAMA and IEEE MAC in fully-connected networks, networks with an access point (AP) and multi-hop networks. n See how collision avoidance and spatial reuse can influence the actual protocol throughput and see if any improvement can be done. n Implement RIMA protocols and see if you can find sensible ways to decide some variables that are not specified in the RIMA protocols.

Spring 2005UCSC CMPE25734 References I n [IEEE99] IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std n [TK84] H. Takagi and L. Kleinrock, Optimal Transmission Range for Randomly Distributed Packet Radio Terminals, IEEE Trans. on Comm., vol. 32, no. 3, pp , n [WV99] L. Wu and P. Varshney, Performance Analysis of CSMA and BTMA Protocols in Multihop Networks (I). Single Channel Case, Information Sciences, Elsevier Sciences Inc., vol. 120, pp , n [WG02] Yu Wang and JJ, Performance of Collision Avoidance Protocols in Single-Channel Ad Hoc Networks, IEEE Intl. Conf. on Network Protocols (ICNP ’02), Paris, France, Nov