DETERMINATION OF THE TOPOLOGY OF HIGH SURVIVAL HF RADIO COMMUNICATION NETWORK Andrea Abrardo.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

System’s generalities and structure of the final report Cesidio Bianchi. INGV.
Rome, February 14, 2013 Status of the Project Report on the first year activities With the support of the Prevention, Preparedness and Consequence.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
Combating the effects of Hidden Terminals in Multi Channel MAC Protocols Mthulisi Velempini.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
5/11/20151 Computer Networks COE 549 Random Access Tarek Sheltami KFUPM CCSE COE
Investigating Mac Power Consumption in Wireless Sensor Network
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
An Energy-efficient MAC protocol for Wireless Sensor Networks
Napoli - 21 February 2004 – Simone Merlin SLIDE 1 Analysis of the hidden terminal effect in multi-rate IEEE b networks Simone Merlin Department of.
Focused Beam Routing protocol for Underwater Acoustic Networks Josep Miquel Jornet Montana, Milica Stojanovic, Michele Zorzi, Proc. WuWNet 2008.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
TiZo-MAC The TIME-ZONE PROTOCOL for mobile wireless sensor networks by Antonio G. Ruzzelli Supervisor : Paul Havinga This work is performed as part of.
MAC Protocol By Ervin Kulenica & Chien Pham.
MAC Reliable Broadcast in Ad Hoc Networks Ken Tang, Mario Gerla University of California, Los Angeles (ktang,
On the Performance Behavior of IEEE Distributed Coordination Function M.K.Sidiropoulos, J.S.Vardakas and M.D.Logothetis Wire Communications Laboratory,
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Debate 1 - Defense Joseph Camp Anastasios Giannoulis.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
MAC Protocols and Security in Ad hoc and Sensor Networks
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He.
1 Chap. 4 Data link layer 3. 2 MAC(medium access control) model MAC  If two nodes are transmitted simultaneously, collision of two frames is occurred.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
IEEE WLAN.
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
Planning and Analyzing Wireless LAN
A new Cooperative Strategy for Deafness Prevention in Directional Ad Hoc Networks Andrea Munari, Francesco Rossetto, and Michele Zorzi University of Padova,
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Improving the scalability of MAC protocols in Wireless Mesh Networks Mthulisi Velempini (Mr.)
Medium Access Control in Wireless networks
Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002.
doc.: IEEE /183r0 Submission March 2002 David Beberman, Corporate Wave Net, Inc.Slide 1 Single Burst Contention Resolution “Wireless Collision.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Exploring Random Access and Handshaking Techniques in Large- Scale Underwater Wireless Acoustic Sensor Networks Peng Xie and Jun-Hong Cui Computer Science.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
© Saravanan Kandasamy, Ricardo Morla, and Manuel Ricardo,INESC Porto 1 Improving the Performance of IEEE802.11s Networks using Directional Antennas over.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
TCP and MAC interplay in Wireless Ad Hoc Networks
Investigating Mac Power Consumption in Wireless Sensor Network
Cooperative AP Discovery
Presentation transcript:

DETERMINATION OF THE TOPOLOGY OF HIGH SURVIVAL HF RADIO COMMUNICATION NETWORK Andrea Abrardo.

Outline 2SWING Final Meeting | CNIT - Pisa, Italy13/12/ Communications requirements 2.The physical topology of connections envisaged in the SWING project 3.Higher layer requirements 4.Identification of MAC techniques and possible scenarios 5.Comparisons 6.Looking forward

Communications requirements ECIs send data only to their home CGAs (ECIs to ECIs communication is not required, not even within the same area). More than one ECI belonging to the same area, i.e., connected to the same CGA, may transmit at same time. Communication between different CGAs must be permitted. The major part of network traffic is confined within each area, i.e., ECIs to CGAs communications. Accordingly, the probability of concurrent transmissions of ECIs (either belonging to the same area or not) is greater than that of CGAs. 3SWING Final Meeting | CNIT - Pisa, Italy13/12/2013

HYBRID TREE/MESH TOPOLOGY 4SWING Final Meeting | CNIT - Pisa, Italy13/12/2013 The choice of the topology has a direct impact on the design of higher layer protocols, and vice versa.

Higher layers requirements SWING requirements involving higher layer operations – Most of the times end-to-end communications are confined to single-hop communications, i.e., from ECIs to CGAs or among CGAs (MAC layer aspects) Considering these premises we provided: – MAC requirements – Identification of possible MAC techniques suitable for the SWING system – MAC protocols comparison 5SWING Final Meeting | CNIT - Pisa, Italy13/12/2013

MAC requirements Contention-based MAC protocols such as IEEE provide fast and efficient channel access in presence of light traffic. Contention-free protocols such as IEEE (token bus) achieve high efficiency under heavy loads, and provide bounded access time as well. One of the factors that influence the performance of MAC protocols for HF networks is the link turnaround time, i.e., the time it takes for a node to process a received packet and to send back a response. 6SWING Final Meeting | CNIT - Pisa, Italy13/12/2013

Identification of possible MAC techniques: Token Passing Token passing is a contention-free protocol where the nodes agree that only the node that currently holds a token is allowed to transmit. The HF Token Protocol (HFTP) is a token bus protocol, so each node can (nominally) send data directly to any or all other nodes (broadcast channel). Token passing is attractive for use in surface-wave naval high-frequency (HF) radio networks due to its potential for high throughput, fairness, and bounded access time. 7SWING Final Meeting | CNIT - Pisa, Italy13/12/2013

Identification of possible MAC techniques: Distributed Coordination for High Frequency (DCHF) DCHF is a contention-based scheme based on the popular wireless MAC protocol IEEE DCF. The main characteristics of DCHF are the lack of synchronization requirement and the possibility left to the nodes to join or leave the network, without any management overhead. DCHF uses only "virtual carrier sensing“ implemented through the exchange of RTS and CTS packets. 8SWING Final Meeting | CNIT - Pisa, Italy13/12/2013

Possible scenarios Considering the general comms requirements, and the characteristics of the two MAC schemes we propose 3 different solutions based on 3 different scenarios: 1.Token passing scenario: in this solution the logical ring is passed among all the nodes of the SWING network (both among ECIs and among CGAs). 2.Contention based scenario: all nodes belonging to SWING network apply DCHF MAC technique; every transmitting node senses the channel and then establishes a connection with the receiver. 3.Mixed scenario: in this case, we have a contention free access technique (i.e., HFTP) for inter-area communications, i.e., between ECIs and their home CGA, while for the global network (communication between CGAs) we consider a contention based access technique (i.e. DCHF). 9SWING Final Meeting | CNIT - Pisa, Italy13/12/2013

Token Passing scenario This solution allows every radio terminal to transmits its data without incurring in collisions. In case of heavy traffic, this procedure helps regulating the access to the channel avoiding collisions. On the other hand, for light traffic (i.e. only one ECI want to transmit to the respective CGA) this solution introduces a strong management overhead, which severely degrades the system performance. Do not recommended in presence of long turnaround times (due to long interleavers). 10SWING Final Meeting | CNIT - Pisa, Italy13/12/2013

Contention based Scenario Suitable for light traffic (no collisions). In presence of long turn around times it is necessary to avoid RTS/CTS: this is possible if each node lies in the interference region of each other (channel sensing is sufficient to avoid collisions). 11SWING Final Meeting | CNIT - Pisa, Italy13/12/2013

Mixed Scenario Whenever an ECI have to transmit a packet to its home CGA, it waits for the reception of the token that is continuously exchanged within the logical ring composed by one CGA and its connected ECIs. When a CGA receives the token, it starts the contention based procedure to submit a pending packet towards another CGA. In case no pending packet is present, the token is released, otherwise it is kept until packet transmission. 12SWING Final Meeting | CNIT - Pisa, Italy13/12/2013 Such a solution could efficiently manage the tradeoff between access time and system throughput.

Comparisons (Simulations) Comparisons 13SWING Final Meeting | CNIT - Pisa, Italy13/12/2013 Behavior of MAC techniques with turnaround of 1 s. Top: average latency per packet in DCHF (red) and HFTP (blue); Down: channel utilization in DCHF (red) and HFTP (blue). Simulated scenario

Comparisons (Simulations) Comparisons 14SWING Final Meeting | CNIT - Pisa, Italy13/12/2013 Throughput versus turn around: saturation traffic analysis.

Looking forward Include MAC protocols in the SWING system. Network layer issues: – In the present SWING scenario, network functionality can be regulated as a transparent bridge, without the need of additional overhead due to IP addresses. – However, scaling to larger networks with more complex topologies needs the introduction of routing algorithms. 15SWING Final Meeting | CNIT - Pisa, Italy13/12/2013