A Multichain Backoff Mechanism for IEEE 802.11 WLANs Alkesh Patel & Hemant Patel ECE 695 – Leading Discussion By : Shiang- Rung Ye and Yu-Chee Tseng.

Slides:



Advertisements
Similar presentations
PHY-MAC Dialogue with Multi-Packet Reception Workshop on Broadband Wireless Ad-Hoc Networks and Services 12 th -13 th September 2002 ETSI, Sophia Antipolis,
Advertisements

IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Medium Access Issues David Holmer
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Contents IEEE MAC layer operation Basic CSMA/CA operation
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
1 «Performance Analysis for a New Medium Access Control Protocol in Wireless LANs» By YOUNGGOO KWON and YUGUANG FANG Presentation by Ampatzis Efthimios.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE Distributed Wireless LANs.
Module C- Part 1 WLAN Performance Aspects
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
Evaluate IEEE e EDCA Performance Tyler Ngo CMPE 257.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Teknik Akses Jaringan Carrier Sense Pertemuan 12 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
Opersating Mode DCF: distributed coordination function
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
A Virtual Collision Mechanism for IEEE DCF
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Company LOGO Provision of Multimedia Services in based Networks Colin Roby CMSC 681 Fall 2007.
On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control Sub Layer
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
Service differentiation mechanisms for IEEE based wireless networks § Srikant Kuppa & Ravi Prakash Distributed Systems Laboratory The University.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Ethernet. Ethernet (802.3) 1-persistent CSMA, CD, binary exponential backoff Carrier sense: station listens to channel first. 1-persistent: If idle, station.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
THROUGHPUT ANALYSIS OF IEEE DCF BASIC IN PRESENCE OF HIDDEN STATIONS Shahriar Rahman Stanford Electrical Engineering
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
November 2000 Jin-Meng Ho, Texas InstrumentsSlide 1 doc.: IEEE /367 Submission p-DCF for Prioritized MAC Service Jin-Meng Ho, Sid Schrum, and.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Network System Lab. Sungkyunkwan Univ. Differentiated Access Mechanism in Cognitive Radio Networks with Energy-Harvesting Nodes Network System Lab. Yunmin.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
ECEN “Mobile Wireless Networking”
EA C451 (Internetworking Technologies)
Lab 7 – CSMA/CD (Data Link Layer Layer)
Topics in Distributed Wireless Medium Access Control
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Net301 lecture9 11/5/2015 Lect 9 NET301.
IEEE : Wireless LANs ALOHA, Slotted ALOHA
Provision of Multimedia Services in based Networks
Author: Giuseppe Bianchi
Performance Evaluation of an Integrated-service IEEE Network
연구 목표 Idle Sense: An Optimal Access Method for High Throughput and Fairness in Rate Diverse Wireless LANs. M. Heusse, F. Rousseau, R. Guillier, and A.
of the IEEE Distributed Coordination Function
Enhanced Backoff Scheme in CSMA/CA for IEEE
Chapter 6 Multiple Radio Access.
Presentation transcript:

A Multichain Backoff Mechanism for IEEE WLANs Alkesh Patel & Hemant Patel ECE 695 – Leading Discussion By : Shiang- Rung Ye and Yu-Chee Tseng

Background WLAN is emerging as a promising technology. MAC plays an important role on efficient and fair use of the wireless medium. MAC plays an important role on efficient and fair use of the wireless medium. Multiple Access Scheme (CSMA) require station to sense carries on the wireless channel before transmitting

Related Work MILD increases the contention window by 1.5 times when collision occurs & decreases the contention window by 1 when transmission succeed In high traffic load this increases collusion probability and decreases throughput DCF of IEEE is a variant of persistent CSMA If medium is busy, transmission defer until the medium becomes idle If medium is busy, transmission defer until the medium becomes idle Physical Carrier Sense  Physical layer Physical Carrier Sense  Physical layer Virtual Carriers Sense  MAC Virtual Carriers Sense  MAC

Concept/Idea MCB – Multi Chain Backoff MCB – Multi Chain Backoff Enables station to adapt to different congestion level Enables station to adapt to different congestion level No restriction on number of contending stations No restriction on number of contending stations High throughput and fair channel access High throughput and fair channel access

MCB Algorithm During back off period station shall detect any collision event by other station Collision flag f col is used to record whether frame collision occurs on the wireless channel f col set to 1 if a station itself experiences a collision or medium is busy – Collision/Transmission occurring with other station f col set to 1 if a station itself experiences a collision or medium is busy – Collision/Transmission occurring with other station f col set to 0 after successful transmission. Backoff counter reaches 0, the station transmit data. f col set to 0 after successful transmission. Backoff counter reaches 0, the station transmit data.

MCB Algorithm Figure 1: The transition diagram of MCB. The j- th backoff stage of chain i is denoted by (i, j) in the figure

MCB Algorithm w i : The minimum contention window of chain i m i : The maximum back off stage of chain i u i : The transition probability from chain i to chain i+1 v i : The transition probability from chain i to chain i -1

Performance Analysis Saturation Throughput S (i, j, k) The station is in stage j of chain i & has a backoff value k. (i, j, k) The station is in stage j of chain i & has a backoff value k. T  Probability that station will transmit in a randomly chosen backoff slot T  Probability that station will transmit in a randomly chosen backoff slot Xi  Probability that a station will detect at least one collision during backoff period Xi  Probability that a station will detect at least one collision during backoff period

Performance Analysis Expressing collision probability can be expressed by T Now the saturation throughput can be obtained by Now the saturation throughput can be obtained by P tr  Probability that transmission occurs randomly P tr  Probability that transmission occurs randomly P s  Probability that transmission succeeds in a backoff slot P s  Probability that transmission succeeds in a backoff slot T s  Time require for frame exchange T s  Time require for frame exchange T c  Length of a colliding duration T c  Length of a colliding duration

Performance Evaluation Performance opposed to MILD, DCF, GDCF, EIED Comparison of saturation throughput & fairness index FI is bounded in the interval [0,1] Algorithm is fair as its FI is close to 1 Optimal value of u and v when they are the same

Fig 3: The optimal u and v with frame size 1024

Fig 4: The ratio of optimal u and v under different n and c

Fig 5: Saturation throughput under different u and v with a frame size of 1024 bytes

Fig 6: Saturation throughput under different u and v with a frame size of 128 bytes

Fig 7: Saturation throughput versus frame sizes

Fig 8: Throughput of MCB with u and v which are chosen for n=6 and n=46

Fig 9: Fairness Index

Fig 10: Saturation throughput of MCB and GDCF with frame size 128 bytes

Fig 11: Saturation throughput of MCB and GDCF with frame size 1024 bytes

Fig 12: Fairness index of MCB and GDCF with frame size 1024 bytes

Fig 13: Saturation throughput of MCB, IEEE , and MILD

Fig 14: Saturation throughput of MCB and EIED(x, y) with fixed y=2 Fig 15: Throughput of MCB and EIED(x, y) with fixed x =2 Fig: 14 Fig: 15

Fig 15: Throughput of MCB and EIED(x, y) with fixed x=2

Fig 16: Fairness index of MCB and EIED (x, y) with fixed x = 2

Conclusion MCB algorithm explores the possibility of using multiple backoff chains Considering collision event offers To choose a proper chain for transmission To choose a proper chain for transmission Capability of switching to different backoff chain Capability of switching to different backoff chain High throughput then any existing algorithms High throughput then any existing algorithms Fair access to the wireless channel Fair access to the wireless channel How to apply Multichain concept to an error- prone wireless channel to resolve the issue would be the next step in future development