Initialization Protocols for IEEE 802.11 Based Ad Hoc Networks C. – S. Hsu and J. P. Sheu International Conference on Parallel and Distributed Systems.

Slides:



Advertisements
Similar presentations
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Advertisements

Medium Access Issues David Holmer
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
A Scalable MAC Protocol for Next-Generation Wireless LANs Zakhia (Zak) Abichar, J. Morris Chang, and Daji Qiao Dept. of Electrical and Computer Engineering.
A Multi-relay Cooperative Automatic Repeat Request Protocol in Wireless Networks Xin He and Frank Y. Li IEEE ICC 2010 Speaker: Huei-Rung Tsai.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE Distributed Wireless LANs.
Failure Detectors. Can we do anything in asynchronous systems? Reliable broadcast –Process j sends a message m to all processes in the system –Requirement:
Dynamic Bandwidth Scheduling for QoS Enhancement over IEEE WLAN Sangwook Kang, Sungkwan Kim, Mingan Wang, Sunshin An Korea University European Wireless.
Module C- Part 1 WLAN Performance Aspects
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
Slow Start Backoff Algorithm for Wireless Ad Hoc Networks Der-Jiunn Deng Department of Computer Science and Information Engineering National Changhua University.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
Wireless Networking So we talked about wired networks. What about wireless?
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
1 Introduction to Wireless Networks Michalis Faloutsos.
Address Auto-configuration in Mobile Ad Hoc Networks Current Approaches and Future Directions Date : 2005 / 1 / 20 Speaker : Xu Jia-Hao Advisor : Ke Kai-Wei.
1 A Bandwidth Allocation/Sharing/Extension Protocol for Multimedia Over IEEE Ad Hoc Wireless LANs IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS,
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
Wireless LAN Simulation - IEEE MAC Protocol
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
Performance Evaluation and Improvement of an Ad Hoc Wireless Network Takayuki Yamamoto Graduate School of Engineering Science, Osaka University, Japan.
1 Y-MAC: An Energy-efficient Multi-channel MAC Protocol for Dense Wireless Sensor Networks Youngmin Kim, Hyojeong Shin, and Hojung Cha International Conference.
Opersating Mode DCF: distributed coordination function
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
IEEE High Rate WPAN - MAC functionalities & Power Save Mode Mobile Network Lab. 정상수, 한정애.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
A QoS MAC Protocol for Differentiated Service in Mobile Ad Hoc Networks Chi-Hsiang Yeh, Tiantong You Queen’s University ICPP 2003’
Reliable MAC Layer Multicast in IEEE Wireless Networks Min-Te Sun, Lifei Huang, Anish Arora, Ten-Hwang Lai Department of Computer and Information.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Full auto rate MAC protocol for wireless ad hoc networks Z. Li, A. Das, A.K. Gupta and S. Nandi School of Computer Engineering Nanyang Technological University.
Chapter 6 Multiple Radio Access
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
IEEE WLAN.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up for Wireless Sensor Networks Zhihui Chen and Ashfaq Khokhar ECE Department, University.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Advanced Wireless Antonello Cruz FMAC/CSR: a Fair MAC Protocol for Wireless Ad-hoc Networks Zhifei Li Anil K. Gupta Sukumar Nandi.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet History –developed by Xerox PARC in mid-1970s –roots in Aloha packet-radio network –standardized by Xerox, DEC, and Intel in 1978 –similar to.
An efficient reliable broadcasting protocol for wireless mobile ad hoc networks Chih-Shun Hsu, Yu-Chee Tseng, Jang-Ping Sheu Ad Hoc Networks 2007, vol.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
2005/8/2NTU NSLAB1 Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up for Wireless Sensor Networks Zhihui Chen and Ashfag Khokhar ECE/CS.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
November 2000 Jin-Meng Ho, Texas InstrumentsSlide 1 doc.: IEEE /367 Submission p-DCF for Prioritized MAC Service Jin-Meng Ho, Sid Schrum, and.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
ADHOC MAC : a new, flexible and reliable MAC architecture for ad- hoc networks F. Borgonovo, A. Capone, M. Cesana, L. Fratta Dipartimento Elettronica e.
EA C451 (Internetworking Technologies)
Medium Access Control MAC protocols: design goals, challenges,
Dynamic TDMA Slot Assignment in Ad Hoc Network
Computer Communication Networks
Topics in Distributed Wireless Medium Access Control
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Introduction to Wireless Networks
Performance Evaluation of an Integrated-service IEEE Network
Wireless LAN Simulation IEEE MAC Protocol
Enhanced IEEE by Integrating Multiuser Dynamic OFDMA
Error Recovery Scheme for Scheduled Ack
Enhanced Backoff Scheme in CSMA/CA for IEEE
Chapter 6 Multiple Radio Access.
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Presentation transcript:

Initialization Protocols for IEEE Based Ad Hoc Networks C. – S. Hsu and J. P. Sheu International Conference on Parallel and Distributed Systems (ICPADS), Dec Speaker: Chien-Wen Chang

Outline Introduction Preliminaries Leader Election and Initialization Protocols Simulation Results Conclusion Discussion

Introduction The leader can serve as a coordinator a relay point a reporter The initialization protocol can assign each host a unique id two contention-based protocols

Preliminaries(1) The Nakano-Olariu Protocols Type 1: with the collision detection capability do the Initialization Protocol Type 2: without the collision detection capability do the Leader Election Protocol elect a leader to serve as a detector

Preliminaries(2) The Leader Election Protocol by contention probability: ½, ¼, …… do until a host is declared as a leader

Preliminaries(3) The Initialization Protocol Type 1: with the collision detection and the number of host in advance Type 2: without the later knowledge Type 1: get their ids by contention n-m+1 as its id probability: 1/m, m is the number of hosts without ids

Preliminaries(4) Type 2: by contention partition tree {a, b, c, d} {a, d} {b, c} {d}{a}{b, c} {b} {c} Ø

Leader Election and Initialization Protocols Two efficient protocols protocol 1 the number of hosts is known in advance protocol 2 without the knowledge of the number of hosts For single-hop MANET

Protocol 1 (1) The Leader Election Protocol elect a leader to serve as coordinator help to initialize a MANET follows a DCF procedure to contend as a leader CW is set according to the number of hosts will not contend again until election round is over

Protocol 1 (2) The Leader Election Protocol (cont.) flow chart of one election round Ha: the host first broadcast its MAC address successfully

Protocol 1 (3) other hosts Ha Sets backoff timer no leader and backoff timer has expired broadcasts its MAC addr. receives the ack ? waits for ack waits SIFS and announces itself as the new leader the Leader Election Protocol is completed YES NO Set backoff timer backoff timer has expired and receive the Ha ’ s MAC addr. return ack (broadcast the Ha ’ s MAC addr.) no collision ? YES NO wait for the Ha ’ s announce contend to re-broadcast its MAC addr. at the next election round contend to re-broadcast the ack at the next election round if all hosts failed to return ack

Protocol 1 (4) Example 8 hosts: A, B, C, D, E, F, G, H CW: 8 ST (backoff time slot) the backoff timers of hosts B, C: 0 ST F: 2 ST A, E: 3 ST D, H: 4 ST G : 6 ST

Protocol 1 (5) DIFSDIFS BCBC DIFSDIFS F DIFSDIFS AEAE DIFSDIFS DHDH DIFSDIFS G SIFSSIFS F (co mp let e) backoff time slot (broadcasts F ’ s MAC addr. successfully) contend to serve as leadercontend to broadcast the ack F announces itself as the leader G sends ack successfully

Protocol 1 (6) The Initialization Protocol with the help of leader CW is set as described above follows DCF to send a request id message to leader be repeatedly executed until all hosts have got ids exception r 1 : the number of hosts without ids before executing the protocol r 2 : the number of hosts without ids after executing the protocol

Protocol 1 (7) Example 4 hosts: A, B, C, D Host A is the leader with id=1 CW: 2 ST (backoff time slot); 1 ST in the second round the backoff timers of hosts B: 2 ST; 1 ST in the second round C: 0 ST D: 2 ST; 0 ST in the second round

Protocol 1 (8) DIFSDIFS C SIFSSIFS Id (=2) DIFSDIFS BDBD DIFSDIFS D SIFSSIFS Id (=3) DIFSDIFS B SIFSSIFS Id (=4) backoff time slot |--First round --|-- Second round --| Host A broadcasts C ’ s id(2) mess. successfully) send the request id mess. successfully B, D reset their backoff timer collision of two request id mess. send the request id mess. successfully

Protocol 2 (1) follow the same protocol described in Protocol 1 The Leader Election Protocol exception First, the CW value is predetermined the rule of setting the CW value be doubled until 256

Protocol 2 (2) The Initialization Protocol exception First, the CW value is also predetermined After a round, the CW value is set according to the estimated number of hosts without ids

Simulation Results(1) develop a simulator using C transmission rate: 2M bits/sec DIFS: 50  s SIFS: 10  s ST: 20  s the number of hosts: 20~100

Simulation Results(2) proposed protocols K: with the knowledge of the number of hosts U: without it

Simulation Results(3)

Simulation Results(4)

Simulation Results(5)

Conclusion proposed two Leader Election Protocols and Initialization Protocols The first Protocols for IEEE based single-hop MANETs more efficient than Nakano-Olariu Protocols can be easily implemented in IEEE based WaveLAN cards

Discussion Simulation results In single-hop with multiple channels Tone for leader ’ s ack for omitting The Leader Election Protocols In multihop MANETs