Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱 2015/10/11.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
QoS in Mobile Ad Hoc Networks
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Medium Access Issues David Holmer
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Priority Queuing Achieving Flow ‘Fairness’ in Wireless Networks Thomas Shen Prof. K.C. Wang SURE 2005.
Investigating Mac Power Consumption in Wireless Sensor Network
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 QoS Schemes for IEEE Wireless LAN – An Evaluation by Anders Lindgren, Andreas Almquist and Olov Schelen Presented by Tony Sung, 10 th Feburary.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
Medium Access Control for Ad Hoc Wireless Networks: A Survey S. Kumar, V. Raghavan, J. Deng Ad Hoc Networks 4 (2006)
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Capacity of Ad Hoc Networks Quality of Wireless links Physical Layer Issues The Channel Capacity Path Loss Model and Signal Degradation MAC for.
Chapter 5 outline 5.1 Introduction and services
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
MAC Protocols and Security in Ad hoc and Sensor Networks
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Company LOGO Provision of Multimedia Services in based Networks Colin Roby CMSC 681 Fall 2007.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
指導教授:許子衡 教授 報告學生:馬敏修 2010/5/ Introduction 2.Multi-Channel MAC Protocol 3.CMMP(Clustering-Based Multi-Channel MAC Protocol ) 4.Evaluation and Analysis.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Chapter 6 Multiple Radio Access
IEEE WLAN.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Medium Access Control protocols for ad hoc wireless networks: A survey
WLAN.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Wireless MAC.
Medium Access Control MAC protocols: design goals, challenges,
Contention-based protocols with Reservation Mechanisms
SENSYS Presented by Cheolki Lee
Provision of Multimedia Services in based Networks
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing IEEE Standard.
Subject Name: Adhoc Networks Subject Code: 10CS841
Investigating Mac Power Consumption in Wireless Sensor Network
Presentation transcript:

Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱 2015/10/11

QoS-aware MAC protocols Issues affecting QoS ◦ Several issues:  the service model  routing strategies  admission control  resource reservation  signaling techniques  MAC protocols 2015/10/12

QoS-aware MAC protocols ◦ Need to be considered in the context of providing QoS in ad hoc wireless networks. ◦ Signaling is used in order to negotiate, reserve, maintain and free up resources, and is one of the most complicated aspects of the network. 2015/10/13

QoS-aware MAC protocols It should be performed reliably (including topology changes) with minimum overhead. The MAC protocol should address issues caused by node mobility and unreliable time- varying channel. 2015/10/14

QoS-aware MAC protocols Review of selected QoS-aware MAC protocols ◦ MAC is a lower level function and needs to be closely integrated with upper layers such as the network layer for routing. Since centralized control is not available. ◦ it is difficult to maintain information about connections and reservations 2015/10/15

QoS-aware MAC protocols ◦ A common, globally synchronous slotted TDM frame is defined among clusters. ◦ The other option is to use asynchronous approaches that do not require global time synchronization 2015/10/16

QoS-aware MAC protocols ◦ Real-time MAC (RT-MAC)  In IEEE protocol, packets that have missed their deadlines are still retransmitted, even though they are not useful any more. This causes bandwidth and resources to be wasted  When an rt packet is queued for transmission, a timestamp is recorded locally in the node indicating the time by when the packet should be transmitted. The sending node checks whether a packet has expired at three points 2015/10/17

DCF with priority classes ◦ That supports priority based access for different classes of data ◦ The basic idea is to use a combination of shorter IFS or waiting times and shorter backoff time value ◦ While normal nodes wait for the channel to remain idle after DIFS interval before they transmit data, a higher priority node waits for only PIFS. 2015/10/18

Enhanced DCF ◦ It has been developed as a part of the hybrid coordination function (HCF) of IEEE e ◦ proposed a fully distributed Virtual MAC (VMAC) scheme that supports service differentiation, radio monitoring, and admission control for delay-sensitive and best- effort traffic. 2015/10/19

Black burst (BB) contention Normal data nodes use a longer interframe spacing than rt nodes. Instead of sending their packets when the channel becomes idle for a predetermined amount of time, rt nodes jam the channel with pulses of energy (which are termed the black bursts) 2015/10/110

Elimination by sieving (ES-DCF) and deadline bursting (DB-DCF) that offer guaranteed time bound delivery for rt traffic, by using deterministic collision resolution algorithms. The ES-DCF has three phases of operation— elimination, channel acquisition and collision resolution. In elimination phase, every node is assigned a grade based on the deadlines and priority of its packets 2015/10/111

Elimination by sieving (ES-DCF) and deadline bursting (DB-DCF) If it receives a CTS packet in return, the channel is considered acquired successfully. the third phase of collision resolution is initiated by sending out a BB 2015/10/112

Elimination by sieving (ES-DCF) and deadline bursting (DB-DCF) In the DB-DCF, the first phase is for BB contention wherein the lengths of the BB packets are proportional to the urgency (i.e., relative deadlines) of the rt packet. This is followed by phases for channel acquisition and collision resolution, which are similar to the corresponding phases in ES-DCF. 2015/10/113

Multiple access collision avoidance withpiggyback reservations (MACA/PR) nodes maintain a special reservation table. The first data packet in an rt data stream sets up reservations along the entire path by using the standard RTS–CTS approach. 2015/10/114

Neighboring nodes overhearing the data and ACK packets, become aware of the subsequent packet transmission schedule, and back off accordingly. Since there is no RTS–CTS exchange after the first data packet, collision prevention of rt packets is through the use of the reservation tables /10/115 Multiple access collision avoidance withpiggyback reservations (MACA/PR)

Asynchronous QoS enabled multi- hop MAC In the case of an nrt data transmission, the regular RTS–CTS–DATA–ACK sequence is employed between the sender and the receiver. The scheme requires every node to maintain two reservation tables, Rx RT and Tx RT. 2015/10/116

Asynchronous QoS enabled multi- hop MAC If a node receives an RTS, it performs the same checks before responding with a CTS packet. After a successful RTS–CTS exchange, data is sent out, and an ACK is expected. Both the receiver and transmitter nodes check their own tables, thereby eliminating the overhead of exchanging table information. 2015/10/117

Distributed fair scheduling (DFS) The DFS scheme to ensure that different flows sharing a common wireless channel are assigned appropriate bandwidth corresponding to their weights or priorities. A higher priority packet is assigned a smaller finish-tag and shorter backoff periods. 2015/10/118

Distributed fair scheduling (DFS) This approach ensures that any flow that has packets of higher priority will consistently have shorter backoff times, thereby achieving a higher throughput. 2015/10/119

Summary and future directions Summary and future directions A combination of control packets (e.g., RTS/ CTS/ACK) and carrier sensing (i.e., CSMA) has been found to reduce the probability of collisions caused by hidden terminals. As devices shrink in size, their ability to carry larger battery packs will diminish. 2015/10/120

Summary and future directions Use of power control schemes and directional antenna to increase channel reuse can improve the performance. Hidden/exposed terminal problems ◦ Most of the MAC schemes addressing the hidden terminal problem do not effectively treat the exposed terminal problem. ◦ introduction of ACK packet on the MAC layer prohibits the exposed terminals from reusing the channel. 2015/10/121

Summary and future directions Interference-limited model ◦ The transmission range of each node is usually assumed to be the same. The node will always overhear all transmissions sent within this range. Energy conservation ◦ Power conservation is another challenging aspect in ad hoc networks with mobile and battery operated devices (i.e., nodes). 2015/10/122

Summary and future directions Single channel vs. multiple channels ◦ Many MAC schemes employ certain control packets (such as RTS/CTS in MACA, FAMA, IEEE ) to negotiate the use of the channel before the data packet transmission starts. Multi-hop networks ◦ The information of the entire network is usually unknown before decisions can be made to start accessing the channel. 2015/10/123

Summary and future directions Fairness among competing nodes ◦ An extreme example is to always allow one node to use the shared channel, while keeping all other nodes waiting. Directional antennas ◦ In the future, applications are likely to require more and more bandwidth, and these ad hoc networks may well be part of our daily lives. 2015/10/124

Summary and future directions QoS issues ◦ With the widespread availability of portable computing devices, more and more applications are being designed for mobile use. ◦ Most schemes consider the wireless links between networks nodes as having constant characteristics (e.g., bandwidth and error rate). ◦ Widely varying QoS requirements will be needed in future. Bandwidth allocation, admission control, and traffic policing all need to be considered together to satisfy various QoS flows. 2015/10/125

Conclusion Most of these schemes, however, are not designed specially for networks with mobile nodes. On the other hand, the transaction time at the MAC layer is relatively short. The effect of mobility will become less significant as the available channel bandwidth continue to grow. Several international standards exist for MANETs, such as IEEE a, b, and g, HIPERNET, and Bluetooth. 2015/10/126