The Effect of Exerting Adequate Persistence in Collision Avoidance Protocols J.J. Garcia-Luna-Aceves and Makis Tzamaloukas {jj, Computer.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Receiver Initiated MAC protocols Prof. Marco Aurélio Spohn DSC/UFCG
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Fundamentals of Computer Networks ECE 478/578
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
Earl1 MACA-BI(MACA By Invitation) A Receiver Oriented Access Protocol for Wireless Multihop Network F. Talucci, M. Gerla, and L. Fratta Proceedings of.
Wireless Medium Access Control Protocols
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
Receiver-Initiated Channel Hopping (RICH) Makis Tzamaloukas Computer and Communications Research Group (CCRG)
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Reversing the Collision Avoidance Handshake in Wireless Networks J.J. Garcia-Luna-Aceves and Makis Tzamaloukas Computer and Communications.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Hop reservation multiple access (HRMA) for multichannel packet radio networks Zhenyu Tang; Garcia-Luna-Aceves, J.J. Computer Communications and Networks,
1 Collision-Free Asynchronous Multi-Channel Access in Ad Hoc Networks IEEE Globecom 2009, Hawaii University of California Santa Cruz* Palo Alto Research.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
On the Performance Behavior of IEEE Distributed Coordination Function M.K.Sidiropoulos, J.S.Vardakas and M.D.Logothetis Wire Communications Laboratory,
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Chap 4 Multiaccess Communication (Part 1)
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Medium Access Control NWEN302 Computer Network Design.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
1 Poisson Random Process. 2 Mean and Variance Results You have to memorize these! You should be able to derive any of the above Exponential: Poisson:
Medium Access Control Sub Layer
Multiple Access.
Chapter 6 Multiple Radio Access
Mohamed Elhawary Computer Science Department Cornell University PERCOM 2008 Zygmunt J. Haas Electrical and Computer Engineering Department Cornell University.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
THROUGHPUT ANALYSIS OF IEEE DCF BASIC IN PRESENCE OF HIDDEN STATIONS Shahriar Rahman Stanford Electrical Engineering
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using Snooping Myunghwan Seo, Yonggyu Kim, and Joongsoo.
Medium Access Control in Wireless networks
0.1 IT 601: Mobile Computing MAC Protocols Prof. Anirudha Sahoo IIT Bombay.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray,Jeffrey B. Carruthers and David Starobinski WCNC 2003.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Exploring Random Access and Handshaking Techniques in Large- Scale Underwater Wireless Acoustic Sensor Networks Peng Xie and Jun-Hong Cui Computer Science.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Lab 7 – CSMA/CD (Data Link Layer Layer)
Medium Access Control Protocols
Net301 lecture9 11/5/2015 Lect 9 NET301.
He Xiaoben Further study of multi-hop communications - modeling the hidden terminal problem He Xiaoben
Chapter 6 Multiple Radio Access.
Presentation transcript:

The Effect of Exerting Adequate Persistence in Collision Avoidance Protocols J.J. Garcia-Luna-Aceves and Makis Tzamaloukas {jj, Computer and Communications Research Group (CCRG) Computer Engineering Department Jack Baskin School of Engineering University of California Santa Cruz, CA 95064

MOMUC '99, November JJ. Garcia-Luna-Aceves and A. E. Tzamaloukas2 Presentation Outline n Non-persistent collision avoidance protocols n Motivation n Limited persistence issues n Limited persistence protocols: – FAMA-LCS, RIMA-SPL, RIMA-DPL n Throughput analysis n Conclusions

MOMUC '99, November JJ. Garcia-Luna-Aceves and A. E. Tzamaloukas3 Non-persistent MAC Protocols n SRMA (Kleinrock and Tobagi, August ‘76) n MACA (Karn, April ‘90) n MACAW (Bharghavan, Demers, Shenker and Zhang, August ‘94) n FAMA (Garcia-Luna-Aceves and Fullmer, September ‘97) n IEEE (July ‘97) n RIMA (Garcia-Luna-Aceves and Tzamaloukas, August ‘99)

MOMUC '99, November JJ. Garcia-Luna-Aceves and A. E. Tzamaloukas4 Motivation n Improve performance achieved with non-persistent protocols at light-moderate loads: – reduced number of times a single node with a packet to send after sensing the channel busy must back off – smaller idle periods n Modify traditional persistent strategies: – node persists to transmit a packet only for a limited amount of time – reduced amount of contention when the channel becomes idle

MOMUC '99, November JJ. Garcia-Luna-Aceves and A. E. Tzamaloukas5 1-Persistent Carrier Sensing n Definition: Any node that has a local DATA packet to send will persist to sense the channel until no carrier is detected. At that time, with probability 1 the node will transmit the packet n Claim: Persisting over an entire DATA packet limits throughput ongoing transmission collision

MOMUC '99, November JJ. Garcia-Luna-Aceves and A. E. Tzamaloukas6 Limited Persistence Carrier Sensing DEFINITION: persistent carrier sensing up to  seconds after detecting carrier to limit contention n FAMA-LCS (Floor Acquisition Multiple Access with Limited-persistence Carrier Sensing) n RIMA-SPL (Receiver Initiated Multiple Access with Single Poll and Limited-persistence carrier sensing) n RIMA-DPL (Receiver Initiated Multiple Access with Dual Poll and Limited-persistence carrier sensing)

MOMUC '99, November JJ. Garcia-Luna-Aceves and A. E. Tzamaloukas7 FAMA-LCS

MOMUC '99, November JJ. Garcia-Luna-Aceves and A. E. Tzamaloukas8 RIMA-SPL

MOMUC '99, November JJ. Garcia-Luna-Aceves and A. E. Tzamaloukas9 RIMA-DPL

MOMUC '99, November JJ. Garcia-Luna-Aceves and A. E. Tzamaloukas10 Throughput Analysis Model n All the assumptions made for the analysis of non persistent protocols are valid here as well n Divide time into transmission periods (TP) n The type of a TP that follows another TP depends on the number of those persistent users waiting for the current TP to end TP1 TP0TP2 TP0 BusyIdle Busy 

MOMUC '99, November JJ. Garcia-Luna-Aceves and A. E. Tzamaloukas11 Throughput Analysis Model n Since we assume Poisson arrivals, what occurs in a given TP depends only on what happens in the previous TP n Define the state of the system at the beginning of a TP to be the type of that TP (i.e. state 0 is TP0) n These states correspond to a three-state Markov chain embedded at the beginning of the TP P P P P P P P P

MOMUC '99, November JJ. Garcia-Luna-Aceves and A. E. Tzamaloukas12 Throughput Analysis Model n fully-connected network of N nodes n single, unslotted channel, error-free n the size for an RTR, RTS and CTS is  seconds; the size for a data packet is  seconds n the turn-around time is considered to be part of the duration of control and data packet n the propagation delay of the channel is  seconds n a polled node receiving an RTR always has a data packet to send n the probability that the packet is addressed to the polling node is 1/N

MOMUC '99, November JJ. Garcia-Luna-Aceves and A. E. Tzamaloukas13 Throughput results n Throughput vs. offered load for 1Mbps channel and 500 bytes DATA packets; network of 10 nodes FAMARIMA-SP

MOMUC '99, November JJ. Garcia-Luna-Aceves and A. E. Tzamaloukas14 Throughput results n Throughput vs. offered load for 1Mbps channel and 500 bytes DATA packets for RIMA-DP; network of 10 nodes

MOMUC '99, November JJ. Garcia-Luna-Aceves and A. E. Tzamaloukas15 Conclusions n We present a first approach of limited persistence in collision- avoidance protocols n Variations of well-known non-persistent sender and receiver- initiated protocols were proposed to demonstrate the effects of applying limited persistence n Our performance analysis results showed considerable benefits when adopting a limited carrier sensing approach n Since all the protocols considered provide correct floor acquisition our results can be extrapolated to networks with hidden terminals