Reliable MAC Layer Multicast in IEEE 802.11Wireless Networks Min-Te Sun, Lifei Huang, Anish Arora, Ten-Hwang Lai Department of Computer and Information.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
How Effective is the IEEE RTS/CTS Handshake in Ad Hoc Networks Kaixin Xu,Mario Gerla, Sang Bae IEEE Globecom 2002.
Both RTS and CTS contains: The address of the sender The address of the receiver The sizeof the intended data short message size contention concentrated.
Duke Selfish MAC Layer Misbehavior in Wireless Networks Author: Pradeep Kyasanur and Nitin H. Vaidya Some slides are borrowed from the author and others.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
Wireless Medium Access Control Protocols
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Jesús Alonso-Zárate, Elli Kartsakli, Luis Alonso, and Christos Verikoukis May 2010, Cape Town, South Africa, ICC 2010 Coexistence of a Novel MAC Protocol.
Contention Window Optimization for IEEE DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.
Module C- Part 1 WLAN Performance Aspects
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Ncue-csie1 A QoS Guaranteed Multipolling Scheme for Voice Traffic in IEEE Wireless LANs Der-Jiunn Deng 、 Chong-Shuo Fan 、 Chao-Yang Lin Speaker:
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
An Energy-efficient MAC protocol for Wireless Sensor Networks
Distance ADaptive (DAD) Broadcasting for Ad Hoc Networks.
MAC Protocol By Ervin Kulenica & Chien Pham.
MAC Reliable Broadcast in Ad Hoc Networks Ken Tang, Mario Gerla University of California, Los Angeles (ktang,
Sep 12, 2002Wireless Networking Seminar1 Does IEEE Work Well in Multi-hop Wireless Network? Author: Shugong Xu, Tarek Saadawi City University of.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
CIS 725 Wireless networks. Low bandwidth High error rates.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
A Medium Access Control Protocol with Reliable Multicast Support for Wireless Networks Thesis defense of: Vikram Shankar Advising Committee: Dr. Sandeep.
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Min-Te Sun, Lifei Huang, Anish Arora, Ten-Hwang Lai Presented by Md Tareq Adnan CSE High Performance Computer Networks 1.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Performance Evaluation of Multiple Access Protocols for Ad hoc Networks Using Directional Antenna Tamer ElBatt, Timothy Anderson, Bo Ryu WCNC 2003, March.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Chih-Min Chao and Yao-Zong Wang Department of Computer Science and Engineering National Taiwan Ocean University, Taiwan IEEE WCNC 2010 A Multiple Rendezvous.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
WLAN.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
1/49 Power Management in IEEE Yu-Chee Tseng.
1/23 Power Management in IEEE Yu-Chee Tseng.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
Power Controlled Dual Channel (PCDC) Medium Access Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz IEEE INFOCOM 2003 Speaker: Chien-Wen.
A Bidirectional Multi-channel MAC Protocol for Improving TCP Performance on Multihop Wireless Ad Hoc Networks Tianbo Kuang and Carey Williamson Department.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Wireless LAN Simulation IEEE MAC Protocol
Presentation transcript:

Reliable MAC Layer Multicast in IEEE Wireless Networks Min-Te Sun, Lifei Huang, Anish Arora, Ten-Hwang Lai Department of Computer and Information Science The Ohio State University ICPP’02 Speaker: Chien-Wen Chang

2003/01/07 Outline  Introduction  Existing Multicast MAC Protocols  Problems with Existing Multicast MAC Protocols  Batch Mode Multicast MAC Protocol  Location Aware Multicast MAC Protocol  Simulation  Conclusion

2003/01/07 Introduction  many random access MAC protocols do not deal directly with multicast  There is no MAC-level recovery on multicast frame  treat broadcast as a special case of multicast  several higher layer protocols rely on reliable MAC layer multicast/broadcast  delivery acceptable quality of service in many applications

2003/01/07 Existing Multicast MAC Protocols(1)  In IEEE , the RTS/CTS extension is not used for broadcast/multicast  In [19] attempts to extend the IEEE broadcast/multicast protocol with RTS/CST  In [20] augments the MAC protocol in [19] with the NAK frame and additional rules  In [21] is introduced to provide a reliable broadcast MAC

2003/01/07 Existing Multicast MAC Protocols(2)  In [19]  the basic DCF MAC  adding the RTS/CTS handshaking  In [20], the Broadcast Support Multiple Access (BSMA)  adding NAK and the following rules  After the sender transmits a data frame, it waits for NAK  If a receiver does not receive the data frame after it transmitted the CTS frame, it transmits a NAK frame.

2003/01/07 Existing Multicast MAC Protocols(3)  In [21], the Broadcast Medium Window (BMW)  basic idea is to treat each broadcast request as multiple unicast requests.  Each unicast is processed using the reliable IEEE DCF MAC protocol  each node maintains three lists:  NEIGHBOR BUFFER  SEND BUFFER  RECEIVER BUFFER.

2003/01/07 Existing Multicast MAC Protocols(4)  NEIGHBOR BUFFER list contains the current neighbors.  SEND BUFFER list contains the ongoing broadcast messages.  RECEIVE BUFFER list contains the sequence numbers of the data frames received by the node.  based on RTS/CTS/DATA/ACK  serves the nodes in NEIGHBOR BUFFER list

2003/01/07 Problems with Existing Multicast MAC Protocols (1)  In [19]  the MAC protocol does not coordinate the transmission of CTS  an assumption is made in [19] that the sender’s radio has the Direct Sequence (DS) capture ability.  In [23] is reported that this probability quickly drops to 0.2 at the presence of more than 5 nodes

2003/01/07 Problems with Existing Multicast MAC Protocols (2)  In [20], BSMA  The additional NAK frame does not help resolve the collision of the CTS frame  In [21], BMW  BMW is inefficient for following reasons:  Contention phase u at least n contention phases for each multicast data frame u some other node wins the contention

2003/01/07 Problems with Existing Multicast MAC Protocols (3)  In [21], BMW (cont.)  Timeout  the prolonged multicast process can easily lead to a timeout in the higher layer

2003/01/07 Batch Mode Multicast MAC Protocol (1)  consolidate the n contention phases into one  the required time to serve a multicast can be greatly reduced  To achieve this goal,  coordinate the transmissions of the control frames  uses RTS frames to sequentially instruct CTS transmissions  uses RAK frames to coordinate the ACK transmissions

2003/01/07 Batch Mode Multicast MAC Protocol (2)  several advantages:  reduces the number of contention phases  does not modify any control frame format  co-exist with the other IEEE protocols

2003/01/07 Location Aware Multicast MAC Protocol(1)  When the size of S is large, it may be desirable to reduce S’s size  Find a cover set, S’, of S, and send RTS only to the addresses of nodes in S’  expect only those nodes in S’ to return a CTS and ACK  the sender is able to conclude that all nodes in S have received the multicast data frame

2003/01/07 Location Aware Multicast MAC Protocol(2)  To achieve the above goal  use the location information obtained by GPS  some theorems  location information  US Federal Communications Commissions (FCC) mandated wireless service carriers to provide the location service  including the location information in beacons

2003/01/07 Location Aware Multicast MAC Protocol(3)  some theorems  Theorem 1 Let S be the set of all intended receivers of the multicast data frame. In the Batch Mode Procedure(), suppose that the sender receives an ACK from every node in a subset S’ of S. A node p in S \ S’ is guaranteed to have received the data frame without collision if and only if S’ is a cover set of S.

2003/01/07 T d f c b e p Neighbors ={a,b, c, d, e, f, p} a S’={b, e, c} S\S’={p} S={b, e, c, p}

2003/01/07 Location Aware Multicast MAC Protocol(4)  some theorems (cont.)  Theorem 2 ([18]) The minimum cover set of a neighbor set S can be computed in O(n 4/3 ) time  Theorem 3 Let S be the set of all intended receivers of the multicast data frame. In the Batch Mode Procedure(), suppose that the sender receives an ACK from every node in a subset S ACK S’, where S’ is a cover set of S. Under the assumption that the primary transmission error is caused by collision, a node p in S\S’ is guaranteed to have received the data frame without collision if and only if A(p) A(S ACK )

2003/01/07 Location Aware Multicast MAC Protocol(5)  some theorems (cont.)  Theorem 4 Assume that all nodes have the same transmission radius R. Given a node p and a set of nodes C, if the union of the cover angles is p’s cover angle for the transmission area of p, A(p), is completely covered by C  angle-based scheme

2003/01/07 Location Aware Multicast MAC Protocol(6) Cover Angle of node p for node q ([α,β]) α β

2003/01/07 T d f c b e p S={b, e, c, p} a S’={b, e, c} S\S’={p} x y z t v doesn’t return ACK

2003/01/07 Location Aware Multicast MAC Protocol(7)  a refinement of the Batch Mode Multicast MAC protocol  MCS(S) the minimum cover set computation procedure  denote UPDATE(S, S’) the angle-based procedure  Batch Mode Procedure (S, S ACK ) => (MCS(S), S ACK )  S = UPDATE(S, S ACK ) S’ returns the set of nodes in S that are not completely covered by S ACK

2003/01/07 Simulation(1)

2003/01/07 Simulation(2)

2003/01/07 Simulation(3) A multicast message transmission is considered successful if the message reaches a certain percentage of the intended receivers

2003/01/07 Simulation(4)

2003/01/07 Simulation(5)

2003/01/07 Conclusion  co-exist with the current unreliable IEEE multicast MAC protocol  reduce the number of contention phases  decreases the average total time required to complete a multicast request  Future work  multicast MAC protocol that solves both the hidden and exposed terminal problems