Tackling Exposed Node Problem in IEEE 802.11 Mac Deepanshu Shukla (01329004) Guide: Dr. Sridhar Iyer.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Mitigating Deafness in Multiple Beamforming Antennas
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Special Topics in Wireless Networking: MAC design and cross-layer issues.
Networks: Wireless LANs1 Wireless Local Area Networks.
How Effective is the IEEE RTS/CTS Handshake in Ad Hoc Networks Kaixin Xu,Mario Gerla, Sang Bae IEEE Globecom 2002.
Combating the effects of Hidden Terminals in Multi Channel MAC Protocols Mthulisi Velempini.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Wireless Networking So we talked about wired networks. What about wireless?
Networks: Wireless LANs1 Wireless Local Area Networks.
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
1 Introduction to Wireless Networks Michalis Faloutsos.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
Supporting Concurrent Transmissions in Multi- Hop Wireless Networks Arup Acharya Archan Misra Sorav Bansal IBM Research Sep 3, 2002.
1 Collision-Free Asynchronous Multi-Channel Access in Ad Hoc Networks IEEE Globecom 2009, Hawaii University of California Santa Cruz* Palo Alto Research.
MAC Protocol By Ervin Kulenica & Chien Pham.
IEEE Wireless Communication Magazine Design and Performance of an Enhanced IEEE MAC Protocol for Multihop Coverage Extension Frank H.P. Fitzek, Diego.
Using Directional Antennas for Medium Access Control in Ad Hoc Networks MOBICOM 2002 R. Roy Choudhury et al Presented by Hyeeun Choi.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
MAC Protocols and Security in Ad hoc and Sensor Networks
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
Recitation 8 Wireless Networks. Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS),
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Effects of Multi-Rate in Ad Hoc Wireless Networks
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Recitation 8 Wireless Networks.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Planning and Analyzing Wireless LAN
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
ECE 256, Spring 2009 __________ Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver __________________.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
CIS 6930 Powerline Communications Special Issues (c) 2013 Richard Newman.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Balancing the Hidden and Exposed Node Problems With Power Control In CSMA/CA-Based Wireless Networks Yihong Zhou and Scott M. Nettles Department of Electrical.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray,Jeffrey B. Carruthers and David Starobinski WCNC 2003.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
FD-MMAC: Combating Multi-channel Hidden and Exposed Terminals Using a Single Transceiver Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, and Swetha Shivaramaiah.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
MACA-P: a MAC for concurrent transmissions in multi-hop wireless networks IEEE PerCom’03 Arup Acharya1, Archan Misra1, Sorav Bansal2 Speakrer:earl.
MAC Protocols for Sensor Networks
Outline What is Wireless LAN Wireless Transmission Types
Wireless LANs Wireless proliferating rapidly.
Mobile Communications Chapter 3 : Media Access
Outline 1. INTRODUCTION 2. PRELIMINARIES 3.THE PROPOSED PROTOCOL
Presentation transcript:

Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer

Wireless LAN  Physical layer impact Impact of Interference range  Hidden Terminal Problem  Exposed Node

Physical Layer  Medium Communicate over a medium significantly less reliable than wired PHYs. Medium is a scarce commodity Lack full connectivity  Transmission Have time-varying and asymmetric propagation properties Due to propagation limits, collision may not be ‘sensed’ by some nodes  Fix Range Have Carrier sense threshold and Receive threshold If packet below receive threshold, it is marked as in error and passed to MAC. Packets below carrier sense threshold are ignored by PHY layer

Effect of Interference Range Transmission from 1  2 will fail

Hidden Terminal Problem A B C  Hidden terminals A and C cannot hear each other. A sends to B, C cannot receive A. C wants to send to B, C senses a “free” medium (CS fails) Collision occurs at B. A cannot receive the collision (CD fails). A is “hidden” for C.  Solution? Hidden terminal is peculiar to wireless (not found in wired) Need to sense carrier at receiver, not sender! “virtual carrier sensing”: Sender “asks” receiver whether it can hear something. If so, behave as if channel busy.

Exposed Node Scenario

Exposed Terminal Problem  Exposed terminals A starts sending to B. S1 senses carrier, finds medium in use and has to wait for A  B to end. D is outside the range of A, therefore waiting is not necessary. A and C are “exposed” terminals.  A->B and S2->anyNode transmissions can be parallel; no collisions  NOT allowed under IEEE Refer figure 3.2

Effect of RTS/CTS on NAV Timing info contained in RTS 3*SIFS+Packet Time+2*RTS_TX_Time

Proposed Solution  Maintain neighborhood information  Identify Exposed Node  Process timing information  Synchronize ACK  Schedule DATA transmission

Identify Exposed Nodes  Node hears RTS corresponding DATA

Process Timing Info  Upon hearing RTS Record Recv. Time  Upon hearing DATA Record Recv. Time  Calculate “Propagation Delay” Difference of the advertised time and actual time.  Calculate following expected time of ACK time required for DATA Delay required to synchronize ACK

Transmit DATA  Is Exposed Node?YES  Does network Layer has data?YES  Check the Size of DATA Is it less than the ongoing data size?YES  Check the Destination of DATA Is it Broadcast?NO Addressed to already busy node?NO  Calculate the time of transmission of ACK (from RTS duration and propagation delay)  Schedule DATA packet transmission after the calculated delay

Modification to packets  RTS Requires no change  CTS / ACK IEEE CTS does not have TA (Transmitter's Address) Added to maintain neighborhood information  DATA Add “isExposed ”, 1- bit flag No such bit in IEEE

Simulation Topologies Node, single hop5 Node, multi hop

Simulation Results Multi hop Scenario – 5 NodesSingle hop Scenario – 6 Nodes

Limitation of algorithm  Reverse exposed node  Effect of interference range

Related Work - MACAP  Introduce a ‘Control Phase’  Use additional control packet RTS’  Add 2-byte fields T ACK, T DATA to RTS & CTS and “inflexible bit” to RTS

Conclusion  Exposed nodes play a major role bandwidth underutilization, especially in case of multi hop scenario, as shown by the performance increase.  The Medium lays down various constraints and coming up with optimum PHY layer parameters is important.  The increase in performance is substantial to further investigate this problem in case of “Reverse Exposed” nodes

Thank you.