RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Mitigating Deafness in Multiple Beamforming Antennas
Vivek Jain, Anurag Gupta Dharma P. Agrawal
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Medium Access Issues David Holmer
Both RTS and CTS contains: The address of the sender The address of the receiver The sizeof the intended data short message size contention concentrated.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Nov 2011 Neng Xue Tianxu Wang.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Wireless LAN Simulation - IEEE MAC Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
Addressing Deafness and Hidden Terminal Problem in Directional Antenna Based Wireless Multi-hop Networks Anand Prabhu Subramanian and Samir R. Das {anandps,
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
Recitation 8 Wireless Networks. Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS),
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Effects of Multi-Rate in Ad Hoc Wireless Networks
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi- Channel Hidden Terminals Using a Single Transceiver (MMAC) Paper by Jungmin So and Nitin Vaidya.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Recitation 8 Wireless Networks.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
Planning and Analyzing Wireless LAN
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Universität Karlsruhe Institut für Telematik ECE 591
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
WLAN.
Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using Snooping Myunghwan Seo, Yonggyu Kim, and Joongsoo.
Turkmen Canli ± and Ashfaq Khokhar* Electrical and Computer Engineering Department ± Computer Science Department* The University of Illinois at Chicago.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray,Jeffrey B. Carruthers and David Starobinski WCNC 2003.
2005/8/2NTU NSLAB1 Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up for Wireless Sensor Networks Zhihui Chen and Ashfag Khokhar ECE/CS.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
A Bidirectional Multi-channel MAC Protocol for Improving TCP Performance on Multihop Wireless Ad Hoc Networks Tianbo Kuang and Carey Williamson Department.
MAC Protocols for Sensor Networks
Medium Access Control MAC protocols: design goals, challenges,
TCP and MAC interplay in Wireless Ad Hoc Networks
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Wireless LAN Simulation IEEE MAC Protocol
Outline 1. INTRODUCTION 2. PRELIMINARIES 3.THE PROPOSED PROTOCOL
Presentation transcript:

RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering Boston University

Outline  I. Introduction  II. Problems Introduced by RTS/CTS Mechanism –RTS/CTS-induced Congestion –The Blocking Problem –The False Blocking Problem and its Propagation –Pseudo-Deadlock  III. RTS Validation

Outline (continued)  IV. Simulation –Simulation Models –Results  V. Summary  VI. Observations –Lack of mobility

MAC Protocols  Medium Access Control (MAC) protocols are critical to the performance of wireless networks  Though Carrier Sense Multiple Access (CSMA) is simple and scalable, it introduces the hidden and exposed receiver problems  MAC protocols evolving from CSMA attempt to resolve these problems while consequently introducing new problems

Keep in mind…  In wireless networks, only one node (transmitter) is allowed to transmit at any time within the range of a receiver  This implies that more than one transmitter can transmit within the range of each other as long as their receivers are not common and are not in range of each other

Hidden Receiver Problem  A neighboring node of a receiver is not able to detect transmission between a transmitter and the receiver  In this example, node C falsely assumes it can transmit to node D since node C cannot hear node A’s transmission to node B

Exposed Receiver Problem  A node hears an on-going transmission and falsely assumes it cannot transmit  In this example, node C falsely assumes it cannot transmit to node D since node C can hear node B’s transmission to A

RTS/CTS Mechanism  Multiple-Access with Collision Avoidance (MACA) is the first protocol to include RTS/CTS handshake mechanism used to combat the Hidden Receiver Problem  MACA for Wireless (MACAW) includes a MAC level acknowledgement (ACK)  IEEE standard uses CSMA along with a variant of MACAW

Problems Introduced by RTS/CTS  As the network load increases after a certain point, the throughput decreases to zero due to the increasing number of nodes that are unable to transmit a packet

RTS/CTS-induced Congestion  RTS/CTS-induced congestion is different from network-level congestion  Network-level congestion such as that which occurs in the TCP context is due to buffer overflow while RTS/CTS-induced congestion is related only to the MAC layer  It is desired to significantly reduce RTS/CTS-induced congestion to maximize throughput for high network loads

RTS/CTS Mechanism in IEEE  The deferral periods are managed by the Network Allocation Vector (NAV)

The Blocking Problem  A node is said to be blocked if it is prohibited from transmitting at a given instant  Neighbors of a blocked node are unaware of the fact that this node is blocked  Therefore, such a neighbor that intends to initiate data transmission will send in vain RTS packets without a response and will be forced to backoff  This is described as the blocking problem

The Blocking Problem

The False Blocking Problem and Its Propagation  An RTS packet destined to a blocked node forces every other node that receives the RTS to inhibit transmission though no DATA transmission will take place  This is called the false blocking problem  Not all nodes are falsely blocked, however, the RTS/CTS mechanism causes propagation of false blocking due to the reception of any RTS packet, even those that do not lead to DATA transmission

The False Blocking Problem

Pseudo-Deadlock  The propagation of the false blocking problem throughout a network can cause a potential deadlock if propagated in a circular path

Pseudo-Deadlock

RTS Validation  An attempt to prevent false blocking  Upon overhearing an RTS packet, a node that uses RTS Validation defers for RTS_Defer_Time until the corresponding DATA transmission is expected to begin  After RTS_Defer_Time, the node accesses the channel for next Clear-Channel Assessment Time (CCA_Time) while continuing to defer  After the node determines a busy channel, the node will defers normally according to the Requested_Defer_Time required by RTS, otherwise the node will no longer defer

RTS Validation Mechanism

RTS Validation  The likelihood of propagation of false blocking is reduced since the RTS_Defer_Time and CCA_Time together are smaller than the Requested_Defer_Time  RTS Validation is backward-compatible in that nodes that use RTS validation can communicate with nodes that do not use RTS Validation

Previous Work to Solve False Blocking  In MACAW, another packet called DATA_Send (DS) is sent in response to CTS right before DATA transmission  Another paper proposes the use of Negative CTS (NCTS)  Though these two approaches perform similarly to RTS Validation, they lack the backward-compatibility advantage of RTS Validation

Simulation  The authors implemented the RTS Validation scheme using an IEEE MATLAB based simulator called SimEleven (available at  SimEleven simulates a static two- dimensional network

Simulation Models

 Around each node, a circular region, called the footprint, exists which defines the transmission range of the node  2300 byte size packets are transmitted at 1-Mbps according to Poisson arrival processes independently generated at each node  Destinations are always one hop away and chosen at random  Collision-free DATA packet transmission based only on successful RTS/CTS exchange is assumed to remove the effect of packet loss on simulation results

Simulation Results

Simulation Results (continued)

Summary  RTS/CTS mechanism widely used in ad hoc networks to avoid collisions caused by hidden nodes, however, leads to false blocking  RTS Validation is a backward-compatible solution to solve false blocking, which could otherwise lead to pseudo-deadlocks due to propagation

Summary (continued)  A node that uses RTS Validation will defer only for a short time if no DATA transmission is expected  Simulation results show that RTS Validation improves network performance –Elimination of MAC-level congestion by stabilizing throughput at high loads –60% increase of peak throughput –Significant reduction of average delay

Questions?  Simulation did not consider mobile nodes but attempted to randomize transmission using probability formulas  Thank You, I’m Out  Presentation by Fred Sangokoya