Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Tamer Nadeem Dept. of Computer Science Lec #5: Advanced MAC Schemes Dual Busy Tone & Collision.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Towards Collision Detection in Wireless Networks Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi.
Medium Access Issues David Holmer
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Wireless Medium Access Control Protocols
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Tamer Nadeem Dept. of Computer Science Lec #7: MAC Multi-Rate.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
: Data Communication and Computer Networks
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Multiple Access.
Chapter 6 Multiple Radio Access
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
ICUPC’98 Jing Deng and Zygmunt J. Hass
TCP and MAC interplay in Wireless Ad Hoc Networks
CS 457 – Lecture 6 Ethernet Spring 2012.
Services of DLL Framing Link access Reliable delivery
CSMA/CN: Carrier Sense Multiple Access with Collision Notification
Chapter 6 Multiple Radio Access.
Presentation transcript:

Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Tamer Nadeem Dept. of Computer Science Lec #5: Advanced MAC Schemes Dual Busy Tone & Collision Notification

Page 2 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks * Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks * (Z. Haas and J. Deng) * Slides adapted from Z. Haas This paper completely solves hidden and exposed terminal problems

Page 3 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Key Idea & Goals & Main Results Key idea:  Continuously protect data packet transmission  Use out-band channels to distribute information Goals  Solve hidden & exposed terminal problems Main Results  DBTMA: two out-of-band busy tones & RTS  Completely solve hidden & exposed terminal problems

Page 4 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Related Works  BTMA (Busy Tone Multiple Access, F. A. Tobagi & L. Kleinrock 1975):  Using two channels: data channel & control channel  A control center - basestation  When base station senses the transmission of a terminal, it broadcasts a busy tone signal to all terminals, keeping them (except the current transmitter) from accessing the channel  RI-BTMA (Receiver-Initiated Busy Tone Multiple Access, C. Wu & V. O. K. Li 1987)  Time is slotted (similar to slotted ALOHA & need time clock synchronization)  A packet preamble is sent to intended receiver by the transmitter  Receiver sets up an out-of-band busy tone and waits for the data  When sensing busy tone, transmitter sends the data packet  FAMA (Floor Acquisition Multiple Access, C. L. Fuller & J.J Garecia-Luna-Aceves 1995)  FAMA-NPC (NPC = on-persistent packet sensing) oMACA  FAMA-NCS (NCS non-persistent carrier sensing) oSensing carrier before sending RTS If clear, sends RTS Otherwise, waiting a random time, sensing carrier again oCTS is more larger than RTS

Page 5 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing DBTMA Two narrow-bandwidth tones BTt (Transmitter Busy Tone) Set up by the node which has data to send Stop when completing transmitting RTS BTr (Receiver Busy Tone) Set up by the node which receives RTS Stop when completely receives the data packet All nodes sensing any busy tone are not allowed to send RTS Any node sensing no busy tone is allowed to transmit RTS CA DATA RTS DATA RTS B

Page 6 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Functionalities of Busy Tones BTr (set up by receiver)  Notifying the RTS sender that RTS has been received and channel has been acquired  Announcing to its neighbor nodes that it is receiving data packet and they should refrain from accessing the channel BTt (set up by sender)  Providing protection for the RTS packet

Page 7 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Seven DBTMA Operation States IDLE  Node with on packets to send stays in IDLE state CONTEND  Node has data to send but it is not allowed to send RTS, it stays in CONTEND state S_RTS  Node sending RTS is in S_RTS state S_DATA  Node sending data is in S_DATA state WF_BTR  RTS packet sender waiting for the ACK from its intended receiver is in WF_BTR state WF_DATA  Receiver waiting for DATA is in WF_DATA state WAIT  Node send out RTS and senses BTr and waits a mandatory time, it is WAIT state

Page 8 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Finite State Machine of DBTMA

Page 9 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing More Details for DBTMA When A has data to send Senses BTt and BTr If both are clear Turns on BTt Sends out RTS and enters S_RTS state Turns off BTt at the end of RTS transmission and gets out S_RTS state Sets a timer for expected BTr and enters WF_BTR state If BTr is sensed, enters WAIT state and waits for tmw, then enters S_DATA state and sends data packet Otherwise, timer goes to zero, A goes to IDLE state Enters IDLE state Otherwise Sets a random timer and goes to CONTENT state If BTt or BTr is still sensed when timer goes to zero, A goes to IDLE state Otherwise, A turns on BTt and enters S_RTS state and sends out RTS if no any busy tone signal is sensed

Page 10 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing More Details for DBTMA When B receives RTS, B turns on BTr and sets a timer for expected data packet and enters WF_DATA state If B has not received data packet before timer goes to zero  B turns off BTr and goes to IDLE state Otherwise, B receives data packet and turns off its BTr when completely getting the data packet  When BTr sensed by any Other Node which is in S_RTS state, the node aborts it RTS and goes to IDLE state

Page 11 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Time Diagram of DBTMA RTS DATA A B BTr of B BTt of A tmw RTS C

Page 12 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Channel Throughputs of DBTMA (Single Broadcast Region) Capacity = 1 Mbps Data packet = 4096 b RTS = 200 b 20 nodes in 50 by 50 m^2 Radio transmission range = 35m Maximum propagation delay = 0.12

Page 13 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Impact of Busy Tone Detection Delay RTS DATA A B BTr of B BTt of A tmw C Busy Tone Detection Delay

Page 14 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Performance Analysis (single broadcast domain case) Assumptions: A lot of nodes and all nodes are in the same broadcast domain No channel fading, capture effect Packet collisions are the only reason for packet errors Data processing time and transmit/receive turn around time are negligible Bandwidth consumption of busy tones is negligible compared with data channel

Page 15 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Channel Throughput (ad-hoc network) Capacity = 1 Mbps Data packet = 4096 b RTS = 200 b Radio transmission range = 2 km Propagation delay = 6.7

Page 16 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Comparisons of Channel Throughput Capacity = 256 kbps Data packet = 4096 b RTS = 200 b Each node are 6 km from each other Propagation delay = 20

Page 17 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Comparison of Different Length of Control Packet Full connected network Every node randomly choose its destination for each generated data packet Capacity = 1 Mbps Data packet size =4096 b 20 nodes in 50 by 50 m^2 Radio transmission range = 35 m Propagation delay = 0.12

Page 18 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Network Utilization of DBTMA in Multi-Hop Networks 50 nodes in 400 by 400 m^2 Radio transmission range = 100 m RTS size = 200 b Packet size = 4096 b Capacity = 1 Mbps Propagation delay = 0.33 Packet arrival at each node is Poisson distributed Each node randomly selects a neighbor as the destination of each packet Modified DBTMA 4.2 FAMA-NCS 2.4 DBTMA 5.7 RI-BTMA 4.8 MACA 2.2

Page 19 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 19 Summary DBTMA does solve hidden & exposed terminal problems DBTMA is based on the idea presented in RI-BTMA Some idea  Using some kind of out-of-band control channel to propagate some info to achieve some performance targets

Page 20 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Towards Collision Detection in Wireless Networks* Towards Collision Detection in Wireless Networks* (Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi) * Slides adapted from Souvik Sen

Page 21 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 21 Collision in Wireless Networks T1RT2 t0t0 t1t1 ACK Timeout Retransmit time Collision

Page 22 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 22 Collision in Wireless Networks T1RT2 Collision t0t0 t1t1 Retransmit time Not Efficient! T1 should have stopped right after collision ACK Timeout

Page 23 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 23 Collision in Wired Networks ✦ Transmitter aborts transmission on collision ✦ Transmitter senses the signal while transmitting ✦ If (sensed != transmitted), abort T1RT2 Collision Ethernet BUS Collision Detection (CSMA/CD)

Page 24 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 24 Is CSMA/CD Beneficial in Wireless? R2 Collision Detected Collision T2 T1 R1 T3 R3 Dont Transmit!

Page 25 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 25 Is CSMA/CD Beneficial in Wireless? R2 Collision Detected T2 T1 R1 T3 R3 Dont Transmit! Abort Tx! Collision

Page 26 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 26 Is CSMA/CD in Wireless Beneficial? R2 Collision Detected T2 T1 R1 T3 R3 Channel free now

Page 27 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 27 Is CSMA/CD in Wireless Beneficial? R2 Collision Detected T2 T1 R1 T3 R3 CSMA/CD frees the channel for other transmissions CSMA/CD frees the channel for other transmissions Lets Transmit!

Page 28 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Can we imitate CSMA/CD on Wireless?

Page 29 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 29 Practical Requirements? 1. Transmitter cannot detect collision Receiver needs to detect it Tx Rx Collision!

Page 30 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 30 Practical Requirements? 1. Transmitter cannot detect collision Receiver needs to detect it 2. Receiver needs to convey collision notification to the transmitter Tx Rx Collision!

Page 31 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Transmitter cannot detect collision Receiver needs to detect it 2. Receiver needs to convey collision notification to the transmitter 3. Transmitter needs an additional antenna To receive notification Tx Rx Collision! Practical Requirements?

Page 32 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 32 Overview MAC PHY CrossLayer MAC PHY CrossLayer Data Transmission (S1) S=S1 TxRx If Collision, Notify Tx If Notification, Abort Tx Notify Collision (S2)

Page 33 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 33 Overview S=S1+S2 MAC PHY CrossLayer MAC PHY CrossLayer Notify Collision (S2) Data Transmission (S1) S=S1 TxRx If Notification, Abort Tx If Collision, Notify Tx

Page 34 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 34 Two Key Challenges S=S1+S2 2. Detect Collision in real time 2. Detect Collision in real time 1. Find Notification on Listening Antenna 1. Find Notification on Listening Antenna MAC PHY CrossLayer MAC PHY CrossLayer Notify Collision (S2) Data Transmission (S1) TxRx If Notification, Abort Tx If Collision, Notify Tx

Page 35 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing CSMA/CN key idea: Correlation 2. Detect Collision in real time 2. Detect Collision in real time 1. Find Notification on Listening Antenna 1. Find Notification on Listening Antenna

Page 36 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 36 Challenge 1: Detecting Notification Hard to decode notification on same channel Self-signal too strong Let Tx and Rx share a unique signature Tx correlates with shared signature Detects collision notification, aborts Observe: No decoding, just correlate MAC PHY

Page 37 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 37 Notification Signature Correlation Self Signal Challenge 1: Detecting Notification

Page 38 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 38 Whenever there is a notification, there is a jump in correlation Whenever there is a notification, there is a jump in correlation Correlation Sample Number Challenge 1: Detecting Notification

Page 39 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 39 Data R Correlate (Sign(R1)) Sign(R1)Sign(R2) Collision T1 T2 R2 R1 Collision Correlation, Notification, and Abort

Page 40 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 40 Data R Sign(R1) Corr (Sign(R1)) Notification ! Stop Tx Collision T1 T2 R2 R1 Correlate (Sign(R1)) Sign(R1)Sign(R2) Collision Correlation, Notification, and Abort

Page 41 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 41 Performance Evaluation 7 node USRP testbed Zigbee CC2420 PHY Max data rate: 250Kbps Signature size: 5 bytes Compare with like and PPR PPR detects interfered portion of received packet Transmitter sends only the interfered portion

Page 42 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 42 Notification Detection at Tx Notification Signal << Self Signal How weak can the notification signal be? MAC PHY

Page 43 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 43 How weak the notification signal be? Signal power Self Signal Notification Signal } 18 dB ✔

Page 44 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 44 How weak the notification signal be? Signal power ✘ } 18 dB Self Signal Notification Signal

Page 45 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 45 Interference Detection at Rx Interference detection accuracy of 93% Receiver should detect interference quickly Quicker detection Faster Tx abortion MAC PHY

Page 46 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 46 Interference Detection: Speed CSMA/CN predicts collision within 7 bytes Bytes after interferer started

Page 47 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 47 Testbed Experimentation One link doing CSMA/CN CSMA/CN link has an exposed and hidden terminal Whenever CSMA/CN link fails due to interference CSMA/CN link stops Exposed terminal transmits reducing channel wastage

Page 48 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 48 Testbed Throughput PPR continues to transmit under collision, worse than CSMA/CN

Page 49 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 49 Traced Based Evaluation Upto 50% gain in per link throughput 50% Throughput in Kbps

Page 50 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing 50 Summary CSMA/CN imitates CSMA/CD in wireless Rx uses correlation to detect interference Tx uses correlation to detect notification Others can utilize freed-up channel

Page 51 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing Questions