MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 2007. 5. 23 성 백 동

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
How Effective is the IEEE RTS/CTS Handshake in Ad Hoc Networks Kaixin Xu,Mario Gerla, Sang Bae IEEE Globecom 2002.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Nov 2011 Neng Xue Tianxu Wang.
Earl1 MACA-BI(MACA By Invitation) A Receiver Oriented Access Protocol for Wireless Multihop Network F. Talucci, M. Gerla, and L. Fratta Proceedings of.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Ad Hoc Wireless Media Access Protocols Mikko Raatikainen, TiTe 5.
Receiver-Initiated Channel Hopping (RICH) Makis Tzamaloukas Computer and Communications Research Group (CCRG)
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
An Energy-efficient MAC protocol for Wireless Sensor Networks
Reversing the Collision Avoidance Handshake in Wireless Networks J.J. Garcia-Luna-Aceves and Makis Tzamaloukas Computer and Communications.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
MAC Reliable Broadcast in Ad Hoc Networks Ken Tang, Mario Gerla University of California, Los Angeles (ktang,
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
DETERMINATION OF THE TOPOLOGY OF HIGH SURVIVAL HF RADIO COMMUNICATION NETWORK Andrea Abrardo.
Using Directional Antennas for Medium Access Control in Ad Hoc Networks MOBICOM 2002 R. Roy Choudhury et al Presented by Hyeeun Choi.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱 2015/10/11.
A Medium Access Control Protocol with Reliable Multicast Support for Wireless Networks Thesis defense of: Vikram Shankar Advising Committee: Dr. Sandeep.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Addressing Deafness and Hidden Terminal Problem in Directional Antenna Based Wireless Multi-hop Networks Anand Prabhu Subramanian and Samir R. Das {anandps,
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
1 Power-Aware Routing in Mobile Ad Hoc Networks S. Singh, M. Woo and C. S. Raghavendra Presented by: Shuoqi Li Oct. 24, 2002.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Effects of Multi-Rate in Ad Hoc Wireless Networks
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
1 MAC Protocols that use Directional Antennnas. 2 Directional Antenna  Directional communication  Less Energy in the wrong direction Better Spatial.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Planning and Analyzing Wireless LAN
A new Cooperative Strategy for Deafness Prevention in Directional Ad Hoc Networks Andrea Munari, Francesco Rossetto, and Michele Zorzi University of Padova,
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Evaluation of ad hoc routing over a channel switching MAC protocol Ethan Phelps-Goodman Lillie Kittredge.
Medium Access Control protocols for ad hoc wireless networks: A survey
ECE 256, Spring 2009 __________ Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver __________________.
Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using Snooping Myunghwan Seo, Yonggyu Kim, and Joongsoo.
Tsung-Chin Shih 、 Tsung-Chin Shih 、 Shun-Ren Yang National Tsing Hua University, Hsinchu, Taiwan, R.O.C. IEEE IWCMC 2011 A Cooperative MAC Protocol in.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
Shou-Chih Lo and Chia-Wei Tseng National Dong Hwa University A Novel Multi-channel MAC Protocol for Wireless Ad Hoc Networks VTC 2007-spring.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
SENSYS Presented by Cheolki Lee
TCP and MAC interplay in Wireless Ad Hoc Networks
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
Presentation transcript:

MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동

Agenda Abstract Introduction Related work Sender-Initiated MAC Protocols Receiver-Initiated MAC Protocols The MARCH Procotol The Overhearing Mechanism MARCH Illustration Perframance Evaluation End-to-End Throughput End-to-End Delay Conclusion 2

Abstract MARCH utilizes the broadcast characteristics of an omnidirectional antenna to reduce the number of control message RTS-CTS handshake is used only by the first hop of a route  collision is reduced and channel throughput is increased 3

Introduction A multihop wireless ad hoc network consists of mobile hosts(MHs) equipped with radio devices to cooperatively form a communication network MHs  may not be within transmission range of each other  Can build a connection through other MHs Need to MAC protocol Use a common radio channel to communicate with one another CSMA  Simple  hidden terminal problem  Degrades performance 4

Introduction Other protocols  Developed various MAC protocol with an additional control handshake before data transmission  sender-initiated protocols  receiver-initiated protocols less control overhead is required Outperform sender-initiated protocol but vulnerable MARCH(Multiple Access with ReduCed Handshake)  combines the advantages of both sender- and receiver-initiated protocols  reduces the number of handshakes  Outperform sernder-initiated protocol 5

Related work Sender-Initiated MAC Protocols MACA(Multiple Access Collision Avoidance)  Use a request-response dialogue to solve the HTM problem  Request-to-send(RTS) and Clear-to-send(CTS) MACAW  Improvement of MACA  Use more handshakes to handle problems associated with control packet collision FAMA(Floor Acquisition Multiple Access)  Improve MACA  Adds carrier sensing capability in order to reduce the possibility of collision Performance is quite limited when the traffic load is high  high probability of control packet collision  A lot of reTX and lowering the channel throughput 6

Related work Receiver-Initiated MAC Protocols reduce the number of control packets MACA-BI(MACA By Invitation)  Based on the prediction  predict the packet arrival time at its neighboring MHs  send ready-to-receive (RTR) packets RIMA(Receiver Initiated Multiple Access)  Improved MACA-BI  Employs a new packet arrival prediction method  Assumes that all MHs have the same packet arrival rate.  When an MH receives a data packet, it assumes that its neighboring MH also receives a data packet.  It then sends an RTR packet to invite the neighboring MH to transmit. Reduce control overhead  if the data packet arrival at a sender can be correctly predicted by its receiver 7

The MARCH Protocol reduced the amount of control overhead. Operates without resorting to any traffic prediction Exploits the broadcast characteristic of omnidirectional antennas to reduce the number of required handshakes Approach An MH has knowledge of data packet arrival at its neighboring MHs from the over heard CTS packet. It can then initiate an invitation for the data to be relayed 8

The MARCH Protocol The Overhearing Mechanism The overheard CTS 1 packet can be used to convey the information of a data packet arrival at MH B to MH C Figure shows the new handshake process through the route RTS-CTS handshake reduced to a single CTS(CTS-only) handshake after the first hop Reduction in the control overhead is a function of the route length Ad hoc route of L hops  The number of handshakes needed to send a data packet from the source to destination  2L in MACA, L in MACA-BI, and (L+1) in MARCH  If L is large, MARCH will have very similar number of handshakes as in MACA_BI 9

The MARCH Protocol 10 The RTS-CTS handshake in MACA The proposed handshake mechanism in MARCH protocol

The MARCH Protocol MARCH Illustration Include information in an CTS/RTS packet  The MAC address of the sender and the receiver  The route identification number(RT ID ) Assume  each MH keeps sensing the channel and will not transmit until the channel is free 11

The MARCH Protocol Two routes - can be established through an appropriate routing protocol Route 1 consists of MH A, MH B, MH C, MH D Route 2 includes MH Y, MH C, and MH Z MH Z will overhear the CTS 2 packet To avoid MH Z misinterpreting it and initiating an unnecessary CTS- only handshake The MAC Layer has access to tables that maintain information on the routes the node participates Consult to understand if it should respond to a control msg to certain route MARCH does not participate in routing, nor makes any decisions about the data packets exchanged in the network layer 12

Two overlapping routes in an ad hoc mobile network The MARCH Protocol 13 X A BC Z D Y RTS 1 CTS 1 CTS 2 Overhear CTS2 To avoid MH Z misinterpreting, the RT ID method Include Timer T W Route 1 Route 2

Performance Evaluation Test environment Simulations using the OPNET tool Compared the performance( throughput, overhead and delay) of MARCH with MACA Neighboring MHs are separated by 10 m Each MH is within the tx range of its upstream and downstream MH2 The channel is considered to be error free and its capacity is 1Mbps Data size = 2048 bits Control packet size = 128 bits Generate data packets according to a Poissaon process with an arrival rate varying from 10 pkt/sec to 350 pkt/sec The TX-RX/RX-TX turn-around time of a radio transceiver is 25 usec and the length of a time slot is 1 usec 14

Network topology Performance Evaluation 15 1 Route 1 Route m

Performance Evaluation End-to-End Throughput Under high traffic load, MARCH achieves about 66% improvement when compared to MACA  The reduced handshake mechanism MH 2 must content with MH 1 and MH 3 for the channel  It is difficult for MH 2 to forward data packet to MH 3  RTS packets transmitted by MH2 may collide at MH3, with other packets coming from MH7, MH4, or MH8  In MARCH  Transmissions between MH2 and MH3 The CTS packets from MH3 may only collide with RTS packets from MH1 16 End-to-End Throughput Performance

Performance Evaluation The control overhead associated with each protocol in MACA  when the traffic load is greater than 50 pkt/sec, control packet collisions result in a lot of reTX  an increase in control overhead in MARCH  has a lower probability of control packet collision  Its control overhead is much less than MACA at all traffic loads 17 Route Control Overhead

Performance Evaluation End-to-end Delay Under light traffic load, the delay in MARCH is higher than MACA  The reduced handshake mechanism introduces an extra delay close to the packet inter-arrival time at each intermediate MH As the traffic load increases beyond 50 pkt/sec  the delay in MACA grows significantly when compared to MARCH since control packet collisions cause a lot of queuing delay at MH 2 and MH 7  Packet queueing due to collisions does not happen in MARCH until the traffic load is above 100 pkt/sec 18 End-to-End Delay

Conclusion MARCH improves throughput, delay, and control overhead performance by reducing the number of handshakes Exploits the fact that control messages are overheard by neighbors  More deterministic and does not resort to network prediction The concepts can be applied to other multi-channel MAC protocols to further improve their communication performance 19