Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Contents IEEE MAC layer operation Basic CSMA/CA operation
Both RTS and CTS contains: The address of the sender The address of the receiver The sizeof the intended data short message size contention concentrated.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Wireless Medium Access Control Protocols
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Introduction to Wireless Networks Michalis Faloutsos.
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
Recitation 8 Wireless Networks. Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS),
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Chapter 6 Multiple Radio Access
Recitation 8 Wireless Networks.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
WLAN.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
0.1 IT 601: Mobile Computing MAC Protocols Prof. Anirudha Sahoo IIT Bombay.
Wireless Media Access Protocols Hari Balakrishnan LCS and EECS Massachusetts Institute of Technology
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Wireless Sensor Networks 4. Medium Access
The University of Adelaide, School of Computer Science
Wireless LANs Wireless proliferating rapidly.
MACAW: A Media Access Protocol for Wireless LAN’s
MACAW: A Media Access Protocol for Wireless LANs
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Introduction to Wireless Networks
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Chapter 6 Multiple Radio Access.
Presentation transcript:

Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and effectively in a fair manner among the various nodes that require this resource.

What are the possible ways ? Fixed Allocation o TDMA, FDMA – allocate a share of the available bandwidth permanently to users. o Will soon run out of bandwidth – not scalable. Dynamic Allocation – Reservations o Difficult to do in a distributed setting. o Synchronization between nodes is extremely difficult. Random Access Methods o Popular ones used in networks – Aloha, CSMA-CD. o Carrier Sensing does not help as much. o Does not yield high throughput. Token Passing is not an option – really !

Physical Channel The wireless channel is harsh. Three kinds of effects that usually occur:  Attenuation due to path-loss  As radio transmission goes over a distance r, it is attenuated as 1/r 4. (The exponent could be different in different scenarios, but this is usually used.  Shadowing  Due to the presence of hills, other large objects. Usually lognormal.  Multi-path Fading  Due to the multi-path nature of channel.

Multi-Path Effects  Could cause a significant attenuation due to the destructive combination of signals.  Usually rate dependent.  For narrowband it causes what is called as “non-frequency selective fading – wipes out certain frequencies totally.  Usually follows a Rayleigh or Ricean distribution.  For broadband transmission causes spreading of signals – overlay of delayed signals – causes what is called as Inter Symbol Interference.

Some Key Concepts  COLLISIONS: When two or more transmissions are received at the same time, it is said that there is a collision at the receiver (Note that the two transmissions ought to be with the same frequency and at the same time.).  CAPTURE: If the signal strength of one of the signals is sufficiently larger than that of an other, this signal could potentially be captured at the receiver. The other signal is called “INTERFERENCE”.  CARRIER: Usually there is a high frequency carrier upon which the data is super-imposed (MODULATION).  For the purposes of this discussion we ignore capture and interference – only collisions.

CSMA – Carrier Sense Multiple Access  Every node senses the channel before initiating a transmission.  If it senses a carrier it defers transmission.  If it senses a busy channel, it backs-off in accordance to the exponential back-off scheme.  CSMA is popular – in many architectures such as in Ethernet.  Ability to detect collisions – CSMA CA.  However, in Wireless LANs and Ad hoc Networks this does not work very well.  Collision happens at receiver not transmitter  !

Hidden and Exposed Terminals A wants to transmit to B. C senses channel – no idea A is transmitting. C initiates transmission to F. Collision at B. – C and A are hidden from each other. A B C D F E D could potentially transmit to E but does not – senses A’s carrier. D is exposed to A. Loss in throughput.

A D C B RTS CTS MACA : Multiple Access with Collision Avoidance Exchange of two short messages – Request to Send (RTS), and Clear to Send (CTS). They are fixed size – when A wishes to transmit to B, it sends an RTS message. RTS message contains duration of proposed transmission If B knows that the channel is free, it responds with a CTS message. (CTS also contains duration of proposed communication) How does this help ?

A D C B RTS CTS Any station that hears the RTS message, defers all communication for some time until the associated CTS message has been finished. A CTS message defers communication for the duration of the time indicated in the CTS message. When A is transmitting data, C can go ahead and access the channel. What all could go wrong here ?

Node B’s CTS message may not be heard by A. B found that the channel was already busy. RTS packet might collide. If A does not receive a CTS, it times-out and schedules the packet for retransmission. MACA uses the binary exponential back-off algorithm to select the retransmission time. B’s CTS message collides at C. This would cause C to be unaware of the pending communication between nodes A and B. NOTE: MACA is used (with Modifications) in the WaveLAN cards. Some effects in MACA

RTS and CTS slot times (defined to be 30 bytes) form the basic slot size. If CTS is not heard, a station chooses a time that is uniformly distributed between 1 and BO (for Back-Off). What is BO ? If a CTS message is received then BO is set to BO min. If a CTS is missed, then, if the previous BO was BO old, the new BO, BO new is set to BO new = Min ( 2 x BO old, BO min ). BO min and BO max represent the minimum and maximum back-off intervals. Details of Exponential Back-Off, etc.

P. Karn, “MACA – A new channel access method for Packet Radio,” ARRL/CRRL/Amateur Radio 9 th Computer Networking Conference, September Notice that this was primarily meant for packet radio networks – relatively stationary. Mobility causes problems to some extent. Reference

Design Criteria The MAC protocol should yield the best possible network utilization. Yet, it should be fair – it should not be the case wherein one node could dominate the channel access and other nodes be starved. These are in some sense contradicting features. Studies by Bharghavan (UIUC) et al, lead to certain observations with regards to the features of MACA.

Unfairness due to Binary Exponential Back-Off Let us consider two nodes contending for channel bandwidth in some vicinity e.g. D  A and B  A. A B D E If both B  A and D  A require long term data transfer and both B and D are heavily loaded, then the one that starts earlier captures the channel. The other backs-off more and more. Similarly if one is heavily loaded say B  A and the other is not, B  A gets exclusive use until B is done. Again because D backs off more and more. Less Backed-Off Node Wins

MACAW Modification Include in packet header, the value of the back-off counter. Thus, whenever a node hears the packet, it copies the value indicated into its own back-off counter. Thus, each node in the range of the transmitting node has the same back-off counter. Really designed for Wireless LANs. Does not eliminate the problem here. Can you think why ?

MACAW also proposes to make the back-off more gentle ! The current scheme results in widely fluctuating oscillations. Thus, decrease by one at the receipt of a CTS rather than starting all over with BO min. Also, instead of doubling the time-out when a CTS is missed, change it to such that BO new = Min(1.5 BO old, BO max ). This helps in reducing number of fluctuations. They call this the “MILD” model.

Reliability in MACA Mobility (or fading) causes packets to be corrupted or lost. How is reliability ensured ? One could have reliability at the link level or end-to-end. In MACA, no concept of reliability at link level. If due to some reason packet is lost, MACA relies on a higher layer (TCP) to make the recovery. Link level recovery is good if the links are not that stable – wireless. In MACAW, an additional ACK message is included to provide link layer reliability.

Reliability in MACAW The authors amend the RTS-CTS exchange to include a fourth message which they call the ACK message. This provides some reliability – example if CTS message collides at C and it initiates a message at the same time as A does to B, then the data never reaches B. A B C D F E Note: Everything is asynchronous here. If ACK is not received due to data loss, reschedule retransmission. If data was indeed received and ACK lost, when RTS is sent for retransmission, reply with ACK. Back-off upon discovery of loss.

How does this change effect ? We said that while A  B, D could perform D  E. Ok in MACA – Exposed Terminal problem resolved ? Now, since DATA/ACK exchange occurs, CTS message from E could collide with a transmission from A (retransmissions allowed !). A B C D F E This results in increase in D’s back- off counter: more problems. Note that now, congestion occurs at both transmitter and receiver. D has to defer transmission while A  B is happening. But what if CTS is lost ? D has to sense for A’s carrier MACAW proposes a special,short DS (Data Sending) packet prior to data transmission.

Need for some synchronization Let us look at two contending flows: A B C D If they are heavily loaded flows, one flow C  D may totally get the channel bandwidth. B does not respond since it has heard C’s CTS message. Now, unless A transmits an RTS in the small gap between the communications between D and C, it can never get the channel. Note data transfer takes a relatively long time. Furthermore, this would result in A backing off a lot. Lack of synchronization between when communication between D and C pauses. The magic RRTS message.

The RRTS Message Note – B knows when the gaps occur, although A does not. So why not B take an aggressive role ? B sends a RRTS – Request for Request to Send Message to A. A responds with RTS and communications continue. Stations overhearing RRTS (In our case C) defer transmissions for two slot periods – enough for an RTS CTS exchange. Does this solve all problems ? A B C D

A B C D Unfortunately, the answer is NO . Look at the above wherein C  D instead of vice versa. In this case C  D dominates the channel. A’s RTS arrives during data transfer from C to D in most cases and cannot even be heard by B..... unless it arrives in a gap during communication. The RRTS message does not help here !

Multicast or Broadcast Much more difficult. What do we do, we want multiple people to receive the packet upon broadcast. Unreliable is one option – akin to Aloha. We could use CSMA. MACAW suggests that we use an RTS immediately followed by data – at least receivers in range will defer transmissions noting that this is a multicast (as indicated in RTS). However, same flaws as CSMA. Open Problem – reliable broadcast/multicast.

Other problems with back-off A B C D A’s back-off timer is copied by B, which is copied by C, which is in turn copied by D. The propagation is not good  ! CTS failures may not be due to congestion; could be due to fading.

Reference Bhargavan, V., Demers, A., Shenker, S. and Zhang, L., “MACAW: A media access protocol for wireless LANs”, Proceedings of ACM SIGCOMM ’94, pp , ACM, 1994 Note that this paper has been written with Wireless LANs in mind.. but many concepts are applicable to ad hoc networks – so keep that in your mind when you read the paper.

The IEEE Protocol The IEEE MAC protocol derives from MACA [1] and MACAW [2]. It uses both a physical and a virtual carrier sense mechanism. It uses an RTS-CTS-DATA-ACK dialogue to accomplish data transmission. Each message in the dialogue contains duration information for the remainder of the dialogue.

The Distributed Coordination Function (DCF): Fundamental, contention-based access method. Implemented for use with both ad hoc and infrastructure networks. The Point Coordination Function (PCF): Optional, contention-free access method usable only on infrastructure networks. DCF utilizes an RTS-CTS exchange to reserve the channel prior to DATA transmission. Successful DATA transmission is followed by an ACK from the recipient. PCF requires one node to function as a polling master. This node is called the point coordinator (PC). The IEEE MAC layer

Virtual carrier sense implemented using a network allocation vector (NAV). The NAV at each node is set to indicate the remaining time before the medium is expected to become idle. The NAV is updated based on duration information contained in overheard messages. Actual carrier sense combines the NAV state, the node’s transmission status and the physical carrier sense indication from the physical layer. The DCF Carrier Sensing

Basic Medium Access under the DCF

Medium Access Issues in Heterogeneous Networks The existing medium access schemes typically assume homogeneous power capabilities, i.e. all nodes transmit at the same power level. The rapid spread of multifarious wireless network enabled devices jeopardizes this assumption. It is important to investigate if the MAC protocol in use unduly favors devices that can transmit at higher power levels.

Failure of RTS/CTS in Heterogeneous Network

Effects of range heterogeneity Significant degradation in throughput. One way of overcoming this is to flood (remember flooding ?) the CTS message within certain distance of the transmission. However, this does not help. Why ? A lot more messages – create more collisions and therefore a further degradation in throughput. Need for a more intelligent way of dissemination of control messages.

·Poojary, N., Krishnamurthy, S.V. and Dao, S, Medium Access Control in a Network of Ad Hoc Nodes with Heterogeneous Transmit Power Capabilities, Proceedings of ICC On my web site. Reference