On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.

Slides:



Advertisements
Similar presentations
Vivek Jain, Anurag Gupta Dharma P. Agrawal
Advertisements

Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Both RTS and CTS contains: The address of the sender The address of the receiver The sizeof the intended data short message size contention concentrated.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Duke Selfish MAC Layer Misbehavior in Wireless Networks Author: Pradeep Kyasanur and Nitin H. Vaidya Some slides are borrowed from the author and others.
1 «Performance Analysis for a New Medium Access Control Protocol in Wireless LANs» By YOUNGGOO KWON and YUGUANG FANG Presentation by Ampatzis Efthimios.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
CSMA/CA in IEEE Physical carrier sense, and Virtual carrier sense using Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK.
On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE Distributed Wireless LANs.
KAIST Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks Suho Yang (CS710: November 4, 2008) Kyle Jamieson, Hari Balakrishnan, Y.C. Tay LNCS.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Wireless Medium Access Control Protocols
Module C- Part 1 WLAN Performance Aspects
MULTI-BAND CSMA/CA- BASED COGNITIVE RADIO NETWORKS Jo Woon Chong, Youngchul Sung, and Dan Keun Sung School of EECS KAIST IWCMC
Evaluate IEEE e EDCA Performance Tyler Ngo CMPE 257.
Analyzing Multi-channel MAC Protocols for Underwater Sensor Networks Presenter: Zhong Zhou.
IMA Wireless Workshop 6/05 – 1 Wireless Local Area Network Simulation Abstract: We describe a software system that simulates wireless local area networks.
Doc.: IEEE Submission 15 November 2005 Analysis of CAP of IEEE Superframe Iyappan Ramachandran University of Washington November 15, 2005.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
TDM-based Coordination Function (TCF) in WLAN for High Throughput Chaegwon Lim and Chong-Ho Choi School of Electrical Engineering and Computer Science.
1 QoS Schemes for IEEE Wireless LAN – An Evaluation by Anders Lindgren, Andreas Almquist and Olov Schelen Presented by Tony Sung, 10 th Feburary.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Model and tools. Traffic Model Poisson law – Napoléon worries about the statistics of horse accidents of his generals – Poisson confirms these are unfrequent.
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
A Multichain Backoff Mechanism for IEEE WLANs Alkesh Patel & Hemant Patel ECE 695 – Leading Discussion By : Shiang- Rung Ye and Yu-Chee Tseng.
Opersating Mode DCF: distributed coordination function
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Wen-Hwa Liao, Wen-Chin Chung Tatung University, Taiwan CMC2009 (International Conference on Communications and Mobile Computing)
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
R ANDOM A CCESS N ETWORKS CSMA F AMILIES 1. References Chapter 9 of the book. Throughput Analysis for Persistent CSMA Systems, HIDEAKI TAKAGI AND LEONARD.
1 Performance Analysis of the Distributed Coordination Function under Sporadic Traffic joint work with C.-F. Chiasserini (Politecnico di Torino)
2008/11/051 Adaptive Fuzzy Controlled Sliding Backoff Scheme for Optimal Fair Access Wireless Networks Authors: M. R. M. Rizk et al Present by: Chien-Chia.
Dynamic Data Rate and Transmit Power Adjustment in IEEE Wireless LANs Pierre Chevillat, Jens Jelitto, and Hong Linh Truong IBM Zurich Research Laboratory.
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol Kurtis Kredo II, Petar Djukic, Prasant Mohapatra IEEE INFOCOM 2009.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
Access Delay Distribution Estimation in Networks Avideh Zakhor Joint work with: E. Haghani and M. Krishnan.
Token-DCF, COMSNET(2013) -> MOBICOM(2014). Introduction ▣ To improve standard MAC protocol of IEEE for WLAN. ▣ S-MAC, A-MAC, SPEED-MAC, and etc.
THROUGHPUT ANALYSIS OF IEEE DCF BASIC IN PRESENCE OF HIDDEN STATIONS Shahriar Rahman Stanford Electrical Engineering
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Submission doc.: IEEE 11-14/0866r0 July 2014 Johan Söder, Ericsson ABSlide 1 Traffic modeling and system capacity performance measure Date:
Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using Snooping Myunghwan Seo, Yonggyu Kim, and Joongsoo.
Seungnam Yang, Kyungsoo Lee, Hyundoc Seo and Hyogon Kim Korea University VTC Spring 2008 SPLASH: a Simple Multi-Channel Migration Scheme for IEEE
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
實驗三 媒體存取協定模擬 教師: 助教: 1998/10/19 High Speed Network Lab. Department of Computer Information Science, NCTU.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
An Opportunistic Directional MAC Protocol for Multi-hop Wireless Networks with Switched Beam Directional Antennas Osama Bazan and Muhammad Jaseemuddin.
DDMAC: Dynamic Delayed Medium Access Control (MAC) Protocol with Fuzzy Technique for Wireless Body Area Network By: Ido Polak Netanel Ring.
ICUPC’98 Jing Deng and Zygmunt J. Hass
IEEE Protocol: Design and Performance Evaluation of An Adaptive Backoff Mechanism JSAC, vol.18, No.9, Sept Authors: F. Cali, M. Conti and.
MACAW: A Media Access Protocol for Wireless LAN’s
Multiple Access, Collision Avoidance for Wireless LAN’s
Frederico Calì Marco Conti Enrico Gregori Presented by Andrew Tzakis
of the IEEE Distributed Coordination Function
Presentation transcript:

On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003

Outline Introduction Introduction Related Work Related Work SBA (Sensing Backoff Algorithm) SBA (Sensing Backoff Algorithm) Performance Evaluation Performance Evaluation Conclusions Conclusions

Introduction Two fundamental characteristics of a good backoff algorithm Two fundamental characteristics of a good backoff algorithm High channel throughput High channel throughput Low delay Low delay Fairness among competing nodes should also be considered Fairness among competing nodes should also be considered

Related Work(1) Binary exponential backoff (BEB) Binary exponential backoff (BEB)

Related Work(2) AB CW=B min =7 AB CW=B min =15 AB CW=B min =7CW=B min =255 ………

Related Work(3) Multiplicative increase linear decrease (MILD), introduced in MACAW Multiplicative increase linear decrease (MILD), introduced in MACAW

Related Work(4) MILD MILD Maintains a backoff interval for each stream instead of each node Maintains a backoff interval for each stream instead of each node Improves the fairness performance Improves the fairness performance

Related Work(5) MILD still has 2 disadvantages MILD still has 2 disadvantages Backoff interval stored into the transmitted packets increases the overhead and the probability of packet collision Backoff interval stored into the transmitted packets increases the overhead and the probability of packet collision Backoff intervals migrate to the whole network, the channel throughput in these areas will be degraded Backoff intervals migrate to the whole network, the channel throughput in these areas will be degraded

SBA(1) α( > 1) θ( < 1) β( steps) γ( transmission time of a packet

SBA(2) Assumptions Assumptions N nodes within the transmission range of each other ( N <= 100 ) N nodes within the transmission range of each other ( N <= 100 ) Packet collisions are the only source of packet error Packet collisions are the only source of packet error Transmission can be overheard by other nodes Transmission can be overheard by other nodes Packets should be transmitted in turn Packets should be transmitted in turn All nodes have the same CW min and CW max All nodes have the same CW min and CW max

SBA(3) T f : duration of faild period T f : duration of faild period I : idle period I : idle period T s : success busy period T s : success busy period U : utilization period U : utilization period

SBA(4) Within, the mean interarrival time at each node is B/2, where B is a fixed backoff interval Within, the mean interarrival time at each node is B/2, where B is a fixed backoff interval Prob{ A node starts transmission in } = 2 / B * Prob{ A node starts transmission in } = 2 / B * P s = Prob{ None of the other nodes transmit in γ} = P s = Prob{ None of the other nodes transmit in γ} =

SBA(5) By approximating the arrivals of all nodes by a Poisson arrival process, the total arrival rate is N * 2 / B, so the average idle time is By approximating the arrivals of all nodes by a Poisson arrival process, the total arrival rate is N * 2 / B, so the average idle time is

SBA(6) The average failed period can be expressed as The average failed period can be expressed as

SBA(7) Applying the above 3 equations into channel model, the channel throughput as a function of N and B can be obtains Applying the above 3 equations into channel model, the channel throughput as a function of N and B can be obtains

SBA(8) To find the optimum B(B opt ), must be solved numerically To find the optimum B(B opt ), must be solved numerically B opt (N) = 4Nγ B opt (N) = 4Nγ

SBA(9)

SBA(10)

SBA(11)

SBA(12)

SBA(13) Based on the above calculation of the optimum backoff intervals, we can find the optimum values of (α, β, and γ) Based on the above calculation of the optimum backoff intervals, we can find the optimum values of (α, β, and γ) (α, β, γ) = (1.2, 0.8, 0.93) (α, β, γ) = (1.2, 0.8, 0.93)

Performance Evaluation(1)

Performance Evaluation(2)

Performance Evaluation(3)

Performance Evaluation(4)

Performance Evaluation(5)

Conclusions SBA operates close to the optimum, maximizing the network throughput with fair access from active nodes, without the precise knowledge of the number of active nodes SBA operates close to the optimum, maximizing the network throughput with fair access from active nodes, without the precise knowledge of the number of active nodes SBA can also be extended to other types of MAC schemes SBA can also be extended to other types of MAC schemes

Thank you