Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Medium Access Issues David Holmer
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 9th Lecture Christian Schindelhauer.
An Energy-efficient MAC protocol for Wireless Sensor Networks
1 Introduction to Wireless Networks Michalis Faloutsos.
TiZo-MAC The TIME-ZONE PROTOCOL for mobile wireless sensor networks by Antonio G. Ruzzelli Supervisor : Paul Havinga This work is performed as part of.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
Efficient MAC Protocols for Wireless Sensor Networks
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 21 February 2005.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Chapter 6 Multiple Radio Access
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Wireless Media Access Protocols Hari Balakrishnan LCS and EECS Massachusetts Institute of Technology
2005/8/2NTU NSLAB1 Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up for Wireless Sensor Networks Zhihui Chen and Ashfag Khokhar ECE/CS.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Contention-based protocols with Reservation Mechanisms
SENSYS Presented by Cheolki Lee
Net 435: Wireless sensor network (WSN)
Subject Name: Adhoc Networks Subject Code: 10CS841
Presentation transcript:

Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt

Introduction ■ Wireless Ad-Hoc Networks A network that is formed spontaneously by devices locating eachother, lacking any kind of fixed infrastructure. Characterised by their high volatility as it is envisaged that mobile devices are able to join and depart at any time. ■ Wireless MAC Protocols Allow for the efficient allocation of the limited resources of a shared medium, i.e. the RF Channels available in Wireless Ad-Hoc Networks

Wireless MAC Protocols for Ad-Hoc Networks ■ Wireless MAC Protocols for Ad-Hoc Networks differ from other Wireless MAC protocols There are no predefined base stations to co-ordinate channel access. Centralized MAC protocols will not work. ■ Major Problems in Ad-Hoc Networks Hidden Nodes Exposed Nodes

Hidden Nodes A A BC Node A Transmits a message to Node B Node C Cannot hear the transmission from Node ANode C Senses the Medium ?? Node C Thinks the Channel is IdleNode C Starts a Transmission X This Transmission Collides At Node BNode C is a Hidden Node to Node A A Hidden Node causes Collisions on Data Transmission

Exposed Nodes A BC Node B is Transmitting to Node A Node C Can Hear the Transmission from Node B to Node ANode C Senses the Channel ?? The Channel Appears Busy So Node C Doesn’t Transmit X A Transmission by Node C would not Reach Node A and hence would not Interfere with Data Reception at Node A Node C could therefore have a Parallel Conversation with Another Terminal Out of Range of Node B and in Range of Node C D Node C is an Exposed Node to Node B. If the Exposed Nodes are not Minimized, the Bandwidth is Underutilized.

MAC Protocols for Ad-Hoc Networks ■ MAC protocols for Ad Hoc networks can be divided into three different categories Contention Protocols Allocation Protocols Hybrid Protocols (which are protocols which combine elements of the two previous classes)

Contention Protocols ■ Contention protocols use an asynchronous, random-access style, of communication. ■ Contention protocols use direct competition between nodes to determine channel access rights. ■ Collisions during contention are resolved through randomized back off periods before retransmission. ■ Collision avoidance is key to the design of these protocols. ■ Contention protocols perform well at low traffic loads, when there are few collisions. ■ Protocol performance degrades as traffic load increases due to increasing numbers of collisions.

MACA ■ MACA Multiple access with collision avoidance uses a hand shaking protocol to avoid collisions. The hand shake dialogue alleviates the hidden node interference, whilst minimizing the number of exposed nodes. AB Node A sends a request to send (RTS) control packet RTS If Node B receives the control packet it responds with a clear to send (CTS) control packet CTS All Nodes within hearing distance of Node B will have heard its CTS response and will be silent to avoid data collision at Node B Node A Can now send data to Node B for However long the channel was acquired

MACAW ■ Similar to MACA Uses positive acknowledgement (ACK) to aid in the rapid retransmission of lost packets. To protect the ACK from collision the source transmits a data sending (DS) control packet to alert exposed nodes of its impending arrival. AB Data transmission from Node A to Node B finishesNode A sends a data sending (DS) control packet to alert exposed Nodes to impending data arrival at Node A DS Node B then sends an acknowledgement (ACK) control packet If it has correctly received data sent from Node A ACK

Allocation Protocols ■ Allocation protocols use a synchronous communication model. ■ Allocation protocols use a scheduling algorithm to map timeslots to nodes. These mappings define which node has access in a certain timeslot. ■ Allocation protocols have collision free transmission schedules. ■ Scheduling can be done on either a static or dynamic basis. ■ Allocation protocols perform well at medium to high traffic loads as all slots are likely to be utilized. ■ They perform poorly at low traffic loads as the slotted nature of the channel introduces an artificial delay, as not all slots are likely to be utilized.

Static Allocation Protocols ■ Static allocation protocols do not scale for large networks. They require a-priori knowledge of the global system parameters. ■ A simplistic TDMA static allocation protocol builds its schedules according to the number of nodes N in a network and then has a schedule of N timeslots, one for each node to transmit.

Dynamic Allocation Protocols ■ Five-Phase Reservation Protocol (FPRP) Designed to be Arbitrarily Scalable ■ Five Phases 1. Send a Request 2. Feedback provided by surrounding nodes 3. Reserve the slot on Success 4. All nodes within 2 hops of the source are notified of the reservation 5. Transmission ■ Advantages Collision Free Schedules ■ Disadvantages Large control overhead, compounded by lots of hardware switching from transmission to reception

Hybrid Protocols ■ Hybrid protocols are able to combine the performance capabilities of Contention protocols at low traffic loads, and scale to handle medium to high traffic loads in the way Allocation protocol based do.

■ AGENT Integrates the unicast capabilities of ADAPT with the multicast capabilities of ABROAD AGENT RTS CTS data packet 12N TDMA frame priority interval contention interval transmission interval Each Node is assigned a TDMA SlotIf a Node wishes to transmit in its slot it does a RTS/CTS handshake in the priority slot If there is no signaling in the priority interval Nodes can use the contention interval to contend for transmission On a multicast no CTS is returned, however if a reservation collision Is detected a Negative CTS (NCTS) sent. This avoids CTS collsions Data can then be sent in the transmission interval

Specialised MAC Protocols ■ S-MAC designed specifically for Ad-Hoc Sensor Networks ■ Different Design Criteria Minimise Energy Consumption Self Configuration Less importance placed on Fairness and Latency Avoid overhearing Node sleep cycle ■ Application importance is held above the performance of Individual nodes in the network ■ All Nodes in the network are assumed to be part of some grander scheme

Design Concerns ■ Synergy between the MAC Layer and the Routing Algorithm ■ Table Driven Routing Algorithms have been shown to be almost unaffected in efficiency by MAC layer changes ■ On Demand Routing protocols such as AODV, have been shown to be quite sensitive of the functionality of the MAC layer.

Future Directions ■ Exploring Synergy between MAC protocols and Routing Protocols ■ Exploring Location Aware MAC protocols and Routing ■ Exploring Location Information Storage ■ Exploring the Application layer ■ Exploring Commercial Models for the deployment of Ad-Hoc Networks