Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Contents IEEE MAC layer operation Basic CSMA/CA operation
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 «Performance Analysis for a New Medium Access Control Protocol in Wireless LANs» By YOUNGGOO KWON and YUGUANG FANG Presentation by Ampatzis Efthimios.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
MAC Protocol By Ervin Kulenica & Chien Pham.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Wireless Application Protocol
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
IEEE High Rate WPAN - MAC functionalities & Power Save Mode Mobile Network Lab. 정상수, 한정애.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 05. MAC and Physical Layers.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sub Layer
Multiple Access.
1 Kyung Hee University Chapter 12 Multiple Access.
Chapter 6 Multiple Radio Access
LOCAL AREA NETWORKS. CSMA/CA In a wired network, the received signal has almost the same energy as the sent signal because either the length of the cable.
1 Kyung Hee University Chapter 12 Multiple Access.
Token-DCF, COMSNET(2013) -> MOBICOM(2014). Introduction ▣ To improve standard MAC protocol of IEEE for WLAN. ▣ S-MAC, A-MAC, SPEED-MAC, and etc.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Design and Implementation of a Reservation-based MAC Protocol for Voice/Data over IEEE Ad-Hoc Wireless Networks Shiann-Tsong Sheu, Tzu-Fang Sheu.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
CSMA/CD Simulation Carrier Sense Multiple Access (CSMA), although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency: When.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
MAC Protocols for Sensor Networks
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Data link layer divided into two functionality-oriented sublayers
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Chapter 12 Multiple Access
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Data Communication Networks
Wireless LAN Simulation IEEE MAC Protocol
CSE 313 Data Communication
Chapter 6 Multiple Radio Access.
Presentation transcript:

Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

ABSTRACT The issues in wireless n/w to be considered are: Bandwidth utilization, cell capacity, propagation delay, power efficiency and quality of service of MAC Layer. IEEE Specifications for WLANs use CSMA/CD scheme. This scheme is successful due to its simplicity but inefficient in utilizing the physical bandwidth. Many satellite networks have used Demand assignment multiple access-TDMA(DAMA- TDMA) where time slots are allocated dynamically.

ABSTRACT In this paper, a variation of this protocol has been proposed called Demand Based Bandwidth Assignment (DBBA) Protocol. Main challenge that this protocol resolves is to avoid collision to the maximum extent during the demand request contention period. To analyze DBBA, a test bench has been developed to simulate traffic.

ABSTRACT Based on simulation result, it has been observed that the proposed DBBA protocol has higher bandwidth utilization, supports larger no. of stations in one cell, lesser propagation delay, more power efficient and the ability to provide better QOS. Since there is no collision the efficiency of the system can be increased without affecting the overall throughput of the system.

1.INTRODUCTION IEEE supports up to 54Mbps of raw physical data. This is much higher compared to the 10Mbps wired networks and significantly smaller than 100 Mbps and Gigabit networks. It uses Aloha protocol to share the wireless medium. The drawback of this protocol being that it cannot work under high traffic load. Wireless media being highly bandwidth and power limited, a TDMA solution may help to increase the utilization of the channel bandwidth. The disadvantage of TDMA, being that the time slots are fixed and could limit the no. of nodes.

1.INTRODUCTION DAMA-TDMA has been used by many satellite networks where the time slots are allocated dynamically. We propose a variation of this protocol in this paper called the Demand Based Bandwidth Assignment (DBBA) protocol. One of the challenges faced by this protocol is to avoid collision completely during the demand request contention period. The performance of this protocol can be assessed with throughput, latency and collision and the QOS capabilities can be compared with the existing ones.

1.INTRODUCTION Time stamp based simulation is devised. The simulator generates packets at random time of random length. The scheduler processes and provides the packet transmission, collision and delay details to the monitor program. The monitor program collects the statistics to generate the simulation results at the end of the simulation run.

2.IEEE MAC PROTOCOL IEEE MAC uses CSMA/CA scheme. Full duplex solution is very expensive in wireless medium and so NIC cards are half duplex. Therefore MAC layer depends on acknowledgement packet to determine collision. The received station have to send an acknowledge packet before stipulated time interval after completion of the transmission. If the transmitting node does not receive the acknowledge packet within the timeout period, it assumes that the packet did not reach the destination and retransmits the packet.

2.IEEE MAC PROTOCOL The utilization of the bandwidth is very low due to MAC layer constraints. If the no. of nodes increases, the collision probability increases and lowers the overall network bandwidth. The latency of the packets depends on traffic conditions and cannot guarantee bandwidth to any node.

2.1 MAC LAYER According to IEEE , stations access the channel using a basic access method, or an optional four way handshake access method with an additional Request-To –Send/Clear-To- Send (RTS/CTS) message exchange shown in fig1. Under the basic access method, the station when ready for a new data frame transmission senses the channel status. If the channel is found to be busy, the station defers its transmission and continues to sense the channel until it is ideal. After the channel is idle for a specified period of time called the Distributed Interframe space (DIFS) period, the station chooses a random number as a Back off timer.

2.1 MAC LAYER

The time immediately after the DIFS Time period is slotted. The Backoff timer is decreased by one for each idle slot, stopped if the channel is sensed busy, and then reactivated if the channel is idle again and remains idle for more than a DIFS Time duration. When the Backoff timer reaches zero, the data frame is transmitted.

2.1 IEEE MAC PROTOCOL In the four-way handshaking access method, an additional operation is introduced on top of the basic access method before a data frame transmission taken place. When the Backoff timer of a station reaches zero, instead of transmitting the data frame as in the basic access method, the station with the four-way handshaking access method first transmits an RTS Frame too request for a transmission right. Upon receiving the RTS frame, the receiver replies with a CTS frame after SIFS period.

3.DBBA-MAC PROTOCOL The DBBA MAC protocol considers a network, which has a primary controller node and multiple station nodes. The DBBA frame is made of n time slots. There are four basic types of time slots: a: Beacon time slot. b:Demand request time slot. C: Demand Assignment time slot and d: Data Time slots. The controller broadcasts a beacon packet during the beacon time slot at the beginning of each frame. The beacon frame contains information about the network SSID,frame information and timeslot information.

3.DBBA-MAC PROTOCOL When a node wants to transmit, it sends a packet called the demand request packet to the controller during the demand request time slot. A demand request packet has information about the source node id, destination node id, date size and quality of service requirement. The controller processes all the requests and comes with the bandwidth assignment table. The next time slot is the Demand Assignment time slot. The controller broadcasts acknowledgement to all the accepted requests, requested during the Demand Request time slot.

3.1 FRAME STRUCTUTRE

3.1 FRAME STRUCTURE A typical duration of a frame ranges from 10 millisecond to 50ms. As shown in the diagram a frame has a beacon time slot, demand request time slot, bandwidth assignment time slot and n data time slots. The controller assigns special tome slots to every super frame, which could be between 500ms to 10 seconds. These special time slots allow the new users to enter the network and existing stations to acknowledge their presence. On powers up, the node tries to locate the controller. If it succeeds in finding the controller, it associates with the controller after successful authentication. If node fails to find the controller, it takes possession of being a controller in ad-hoc mode.

DBBA NETWORK SIMULATION MODEL

4.SIMULATION In order to assess the performance of the proposed DBBA protocol, a simulator has been devised. In this section the complete details about the simulator is provided. Simulation Model: The Scheduler, Modem and packet generator are three classes used to simulate the MAC protocol for IEEE Wireless Local Area Network.

4.SIMULATION Scheduler: Scheduler is the main truck of the simulator. Scheduler collects the desired transmission time from all stations. The modem in turn runs the required methods and submits the desired transmit times. The scheduler then determines the modem references, which has the lowest desired transmission time stamp. The scheduler detects for collision and then if it detects, it sends message to all stations about the collision and the duration of the collision.

4.SIMULATION Modem: Modem class depicts the behavior of stations. It gets information from the packet generator. Modems returns the packet timestamp, length, destination and other details to scheduler. If the packet is transmitted successfully, it gets a new packet from the packet generator. The modem waits for acknowledge of the transmitted packet from the scheduler. If the scheduler fails to give the acknowledge, the modem assumes that the packet has collided or has not reached the destination properly.

4.SIMULATION Packet Generator: Packet Generator Class depicts a user generating traffic data. Every modem will have one instance of the Packet generator class. The length of packet is generated using three uniform distribution packets. The three different types of data packets are small, medium and large packets.

4.2 FLOW CHART FOR DBBA NODE PROCESSING DATA Stations will ensure that channel is available before transmitting it. Every station other than the transmitting station will recompute the start of their packet transmission. The station does the following to simulate the condition. 1.Conputes the time at which the current packet will finish. 2.Adds the delay for acknowledgement. 3.Adds the random time to account for the back off time. 4.Submits the new desired time of transmission to the scheduler.

5.SIMULATION RESULT In this paper MAC was compared with a new protocol DBBA in terms of throughput,collisions,and average latency. In the 1 st set of experiments,the throughput and collisions of both and DBBA were studied with different no. of nodes.

5.SIMULATION RESULT According to figure, as the number of nodes increases the throughput of DBBA slightly increases due to higher traffic loads.

5.SIMULATION RESULT In the figure the number of collisions is 5 % to 8% lesser than as the number of nodes increases.

5.SIMULATION RESULT In the second set of experiments, the throughput and collisions of both and DBBA is studies withy different traffic loads. As shown in fig,the throughput of DBBA increases as traffic load increases, because it uses a TDMA frame with dynamic time slot allocation.

5.SIMULATION RESULT In this figure, the amount of collisions is 5% to 8% lesser than as the traffic load increases.

5.SIMULATION RESULT In the third set of experiments, the average latency of DBBA and is studied with increasing number of nodes and different traffic loads. As shown in fig, the delay is little more than the as the number of nodes increases with traffic load 0.8

5.SIMULATION RESULT In this figure, under different traffic load conditions, the average latency of DBBA protocols is higher than the other one.

6.CONCLUSION In this paper, a variation of Demand Assignment Multiple Access-TDMA protocol has been proposed called Demand Based Bandwidth Assignment(DBBA) protocol. It has been observed that the DBBA protocol has higher bandwidth utilization,supports larger number of stations in one cell,lesser propagation delay, more power efficient and the ability to provide better quality of service.

6.CONCLUSION Since there is no collision, the efficiency of the system can be increased without affecting the overall throughput of the system. Further to be considered are the allocation of dedicated slots for a complete session, which can reduce the delay for the constant bit rate services.