Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
1 The Medium Access Control Sublayer Chapter 4. 2 The Medium Access Control Sublayer This chapter deals with broadcast networks and their protocols. In.
Multiple access What if multiple machines are sharing the same link?
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Wireless Medium Access Control Protocols
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Medium Access Control in Wireless Sensor Networks USC/ISI Technical Report ISI-TR-580, October 2003 Wei Ye and John Heidemann.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Medium Access Control Sublayer
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
CSC4220/6220 Computer Networks
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
Medium Access Control NWEN302 Computer Network Design.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 21 February 2005.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
Chapter 6 Multiple Radio Access
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
WLAN.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
5: DataLink Layer5-1 Slotted ALOHA Assumptions r all frames same size r time is divided into equal size slots, time to transmit 1 frame r nodes start to.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Wireless Sensor Networks 4. Medium Access
Chapter 12 Multiple Access
Services of DLL Framing Link access Reliable delivery
THE IEEE MAC SUB-LAYER – chapter 14
Chapter 12 Multiple Access
Overview Jaringan Komputer (3)
Chapter 12 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Data Communication Networks
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Presentation transcript:

Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless Sensor and Mesh Networks Mobile and Ad hoc Networks Adhoc Wireless MAC

Outline  Wireless MAC Issues  Hidden terminal problem  Exposed terminal problem  Capture  MAC Performance Metrics  Wireless MAC Classification  Distributed Wireless MAC Protocols  Aloha  Slotted Aloha  CSMA  CSMA/CA  MAC  DCF  Backoff  Hiper LAN MAC

Contention-based Protocols  ALOHA  Developed in the 1970s for a packet radio network by Hawaii University.  Whenever a terminal (MS) has data, it transmits. Sender finds out whether transmission was successful or experienced a collision by listening to the broadcast from the destination station. Sender retransmits after some random time if there is a collision.  Slotted ALOHA  Improvement: Time is slotted and a packet can only be transmitted at the beginning of one slot. Thus, it can reduce the collision duration.

Contention-based Protocols (Contd.)  CSMA (Carrier Sense Multiple Access)  Improvement: Start transmission only if no transmission is ongoing  CSMA/CD (CSMA with Collision Detection)  Improvement: Stop ongoing transmission if a collision is detected  CSMA/CA (CSMA with Collision Avoidance)  Improvement: Wait a random time and try again when carrier is quiet. If still quiet, then transmit  CSMA/CA with ACK  CSMA/CA with RTS/CTS

Contention-based Protocols (Contd.)  CSMA (Carrier Sense Multiple Access)  Improvement: Start transmission only if no transmission is ongoing  CSMA/CD (CSMA with Collision Detection)  Improvement: Stop ongoing transmission if a collision is detected  CSMA/CA (CSMA with Collision Avoidance)  Improvement: Wait a random time and try again when carrier is quiet. If still quiet, then transmit  CSMA/CA with ACK  CSMA/CA with RTS/CTS

Pure ALOHA (Collision Mechanism)  when frame first arrives - transmit immediately  collision probability increases:  frame sent at t 0 collides with other frames sent in [t 0 -1 and t 0 +1]

Pure ALOHA (Collision Mechanism)  collision probability increases:  frame sent at t 0 collides with other frames sent in [t 0 -1 and t 0 +1]

Slotted Aloha  all frames same size  time is divided into equal size slots (time to transmit 1 frame)  nodes start to transmit frames only at beginning of slots  nodes are synchronized  if 2 or more nodes transmit in slot, all nodes detect collision Assumptions Operation  when node obtains fresh frame, it transmits in next slot  no collision, node can send new frame in next slot  if collision, node retransmits frame in each subsequent slot with prob. p until success

Slotted Aloha  single active node can continuously transmit at full rate of channel  highly decentralized:  only slots in nodes need to be in sync  simple ProsCons  collisions, wasting slots  idle slots  nodes may spend more time to detect collisions, leaving lesser time to transmit packet  clock synchronization

Throughput Performance of Aloha

Carrier Sense Multiple Access  Max throughput achievable by slotted ALOHA is  CSMA gives improved throughput compared to ALOHA protocols.  Listens to the channel before transmitting a packet (avoids avoidable collisions).

CSMA Collision  Collision can still occur:  propagation delay means two nodes may not hear each other’s transmission  Collision:  entire packet transmission time wasted  Note:  role of distance & propagation delay in determining collision probability

Kinds of CSMA

Non Persistent CSMA Protocol  Non persistent CSMA Protocol:  Step 1: If the medium is idle, transmit immediately  Step 2: If the medium is busy, wait a random amount of time and repeat Step 1  Random back-off reduces probability of collisions  Waste idle time if the back-off time is too long

1-Persistent CSMA Protocol  1-Persistent CSMA Protocol:  Step 1: If the medium is idle, transmit immediately  Step 2: If the medium is busy, continue to listen until medium becomes idle, and then transmit immediately  There will always be a collision if two nodes want to retransmit (usually you stop transmission attempts after few tries)

p-Persistent CSMA Protocol  p-Persistent CSMA Protocol:  Step 1: If the medium is idle, transmit with probability p, and delay (for worst case propagation delay) for one packet with probability (1-p)  Step 2: If the medium is busy, continue to listen until medium becomes idle, then go to Step 1  Step 3: If transmission is delayed by one time slot, continue with Step 1  A good tradeoff between non-persistent and 1-persistent CSMA

How to select Probability p?  Assume that N nodes have a packet to send and the medium is busy  Then, N p is the expected number of nodes that will attempt to transmit once the medium becomes idle  If N p >1, then a collision is expected to occur Therefore, network must make sure that N p ≤1 to avoid collision, where N is the maximum number of nodes that can be active at a time

Throughput Comparison

Distributed MAC Protocols  Most distributed MAC protocols are based on the principle of carrier sensing & collision avoidance (CSMA/CA)  Hidden terminals play very dominant role in CSMA/CA based protocols  Collisions that occur at the destination may not be heard by the sender  Therefore receiver has to send some kind of feedback to sender

Distributed MAC – Hidden Node Problem  In the diagram simultaneous transmission will collide at B  Half duplex operation of wireless terminals, ➔ transmission and listening simultaneously is not possible.  A and C have no knowledge of this collision,  Two ways A & C can know that collision has occurred at B  1. A & C periodically stop transmission and listen for feedback from B  2. B uses out of band signaling to inform A & C

Collision Avoidance Techniques  First option is very difficult, second option is possible but (inefficient) because it requires additional channel  Two well know approaches of collision avoidance (CA)  Out-of-band approach  Hand shaking approach

CA with Out of Band Signaling  Busy Tone Multiple Access (BTMA) (Tobagi & Kleinrock, Haas) protocol uses out of band signaling to solve hidden terminal problem  Any node hearing ongoing transmission, transmits busy tone  All nodes hearing busy tone keep silent  All nodes in 2R radius of the transmitter keep silence (R – range)  Avoids interference from hidden terminals  Requires a separate channel for busy tone  Con: Eliminates hidden nodes, increases exposed nodes

CA with Out of Band Signaling  Receiver Initiated Busy Tone Multiple Access (RIBTMA) (S. Wu. & V.O.K. Li, 1988)  Only receiver transmits the busy tone  The receiver decodes the message and verifies the address that it is indeed the receiver  The nodes in the vicinity of the receiver (Radius R) are inhibited  Does not eliminate hidden terminal problem completely, but reduces the exposed nodes

CA with Control Handshaking – (MACA)  Alternative to carrier sensing i.e. does not use CSMA  Multiple Access with Collision Avoidance (MACA) uses three way handshake to avoid hidden terminal problem (Karn, 90)  When node B wants to send a packet to node C, node B first sends a Request-to-Send (RTS) to C  All nodes within one hop of the sending node hear the RTS and defer their transmissions.  On receiving RTS, node C responds by sending Clear-to-Send (CTS), provided node C is able to receive the packet  When a node (such as D) overhears a CTS, it keeps quiet for the duration of the transfer  Transfer duration is included in RTS and CTS both

Hidden Terminal Avoidance

MACA Examples  MACA avoids the problem of hidden terminals  A and C want to send to B  A sends RTS first  C waits after receiving CTS from B  MACA avoids the problem of exposed terminals  B wants to send to A, C to another terminal  now C does not have to wait for it cannot receive CTS from A

CA with Control Handshaking (MACAW)  Does not completely solve the hidden terminal problem but does prevent to a large extent  Enhancements to RTS-CTS control hand shaking and more complete single channel solutions [(MACAW (1997), Bhargavan] [Fullmer et al, (1995, 1997)]  MACA has no ACK but MACAW does  In these techniques tradeoff is in the overhead of handshaking and the number of hidden nodes removed

Reliability  Wireless links are prone to errors. High packet loss rate detrimental to transport-layer performance.  MACA delegates packet loss recovery to transport layer ➔ Higher delays  Better to perform at the MAC layer  Mechanisms needed to reduce packet loss rate experienced by upper layers

A Simple solution to Improve Reliability (MACAW)  When node B receives a data packet from node A, node B sends an Acknowledgement (ACK). This approach adopted in many protocols [Bharghavan94,IEEE ]  If node A fails to receive an ACK, it will retransmit the packet

The Incompleteness of the RTS-CTS method

Using a directional antenna to resolve the exposed node problem

Assignment #4  Go through the research papers highlighted with Yellow in today’s lecture and write their abstract and contribution in your own words.

Q&A ??