1 POWMAC: A Single-Channel Power-Control Protocol for Throughput Enhancement in Wireless Ad Hoc Network Alaa Muqattash and Marwan Krunz The University.

Slides:



Advertisements
Similar presentations
Vivek Jain, Anurag Gupta Dharma P. Agrawal
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
5/11/20151 Computer Networks COE 549 Random Access Tarek Sheltami KFUPM CCSE COE
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Jesús Alonso-Zárate, Elli Kartsakli, Luis Alonso, and Christos Verikoukis May 2010, Cape Town, South Africa, ICC 2010 Coexistence of a Novel MAC Protocol.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
CMPE 257 Spring CMPE 257: Wireless and Mobile Networking Spring 2005 Topology/Power Management.
Distance ADaptive (DAD) Broadcasting for Ad Hoc Networks.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
MAC Protocol By Ervin Kulenica & Chien Pham.
Using Directional Antennas for Medium Access Control in Ad Hoc Networks MOBICOM 2002 R. Roy Choudhury et al Presented by Hyeeun Choi.
Capacity of Ad Hoc Networks Quality of Wireless links Physical Layer Issues The Channel Capacity Path Loss Model and Signal Degradation MAC for.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Opersating Mode DCF: distributed coordination function
CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for Advanced Topics in Wireless.
MAC Protocols and Security in Ad hoc and Sensor Networks
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
1 CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Department of Electrical and Computer Engineering The Unniversity.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
A Medium Access Control Protocol with Reliable Multicast Support for Wireless Networks Thesis defense of: Vikram Shankar Advising Committee: Dr. Sandeep.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
Addressing Deafness and Hidden Terminal Problem in Directional Antenna Based Wireless Multi-hop Networks Anand Prabhu Subramanian and Samir R. Das {anandps,
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
TRANSMISSION POWER CONTROL FOR AD HOC WIRELESS NETWORKS: THROUGHPUT, ENERGY AND FAIRNESS Lujun Jia; Xin Liu; Noubir, G.; Rajaraman, R.; Wireless Communications.
Effects of Multi-Rate in Ad Hoc Wireless Networks
Reliable MAC Layer Multicast in IEEE Wireless Networks Min-Te Sun, Lifei Huang, Anish Arora, Ten-Hwang Lai Department of Computer and Information.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
1 MAC Protocols that use Directional Antennnas. 2 Directional Antenna  Directional communication  Less Energy in the wrong direction Better Spatial.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Chapter 6 Multiple Radio Access
A Reservation-based TDMA Protocol Using Directional Antennas (RTDMA-DA) For Wireless Mesh Networks Amitabha Das and Tingliang Zhu, Nanyang Technological.
DRP: An Efficient Directional Routing Protocol for Mobile Ad Hoc Networks Hrishikesh Gossain Mesh Networks Product Group, Motorola Tarun Joshi, Dharma.
A High-Throughput MAC Protocol for Wireless Ad Hoc Networks Wanrong Yu, Jiannong Cao, Xingming Zhou, Xiaodong Wang, Keith C. C. Chan, Alvin T. S. Chan,
IEEE WLAN.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up for Wireless Sensor Networks Zhihui Chen and Ashfaq Khokhar ECE Department, University.
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Khaled Hatem Almotairi and Xuemin (Sherman) Shen IEEE Globecom 2010 Speak: Huei-Rung, Tsai Symmetrical Power Control for Multi- channel Multi-hop Wireless.
Throughput-Oriented MAC for Mobile Ad Hoc Networks with Variable Packet Sizes Fan Wang, Ossama Younis, and Marwan Krunz Department of Electrical & Computer.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
A Cooperative Multi-Channel MAC Protocol for Wireless Networks IEEE Globecom 2010 Devu Manikantan Shila, Tricha Anjali and Yu Cheng Dept. of Electrical.
Centralized Transmission Power Scheduling in Wireless Sensor Networks Qin Wang Computer Depart., U. of Science & Technology Beijing Edward Y. Hua Wireless.
CDMA Based MAC Protocol for Wireless Ad Hoc Networks Alaa Mouquatash & Marwan Krunz Presentation by: Moheeb Abu-Rajab.
Fen Hou 、 Lin X. Cai, University of Waterloo Xuemin Shen, Rutgers University Jianwei Huang, Northwestern University IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Structure-Free Data Aggregation in Sensor Networks.
DOTS: A Propagation Delay-aware Opportunistic MAC Protocol for Underwater Sensor Networks IEEE ICNP 2010 (18.2%) Youngtae Noh, Mario Gerla (UCLA, CS) Paul.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
Shou-Chih Lo and Chia-Wei Tseng National Dong Hwa University A Novel Multi-channel MAC Protocol for Wireless Ad Hoc Networks VTC 2007-spring.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Power Controlled Dual Channel (PCDC) Medium Access Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz IEEE INFOCOM 2003 Speaker: Chien-Wen.
12.Nov.2007 Capacity of Ad Hoc Wireless Networks Jinyang Li Charles Blake Douglas S. J. De Coutu Hu Imm Lee Robert Morris Paper presentation by Tonio Gsell.
Net 435: Wireless sensor network (WSN)
<month year> <doc.: IEEE doc> January 2013
<month year> <doc.: IEEE doc> January 2013
Presentation transcript:

1 POWMAC: A Single-Channel Power-Control Protocol for Throughput Enhancement in Wireless Ad Hoc Network Alaa Muqattash and Marwan Krunz The University of Arizona Selected Areas in Communications, IEEE Journal 2005 Presenter: Han-Tien Chang

2 Outline Introduction Related Work The POWMAC Protocol Performance Evaluation Conclusion and Future Work Comments

3 Introduction Mobile ad hoc networks (MANETs) Many extensive research efforts are being dedicated to MANETs Challenges Provide high-throughput, reliable, and low complexity wireless access to mobile terminals IEEE Ad Hoc mode (the de facto MAC protocol) Use RTS/CTS-based MAC protocol to resolve channel contention But it can be overly conservative, leading to an unnecessary reduction in network throughput.

4 Introduction (cont’d) Inefficiency of the classic RTS/CTS approach Dashed circles: maximum transmission range Dotted circles: minimum transmission range

5 Introduction (cont’d) Transmission power control Proceed simultaneously if terminals are able to select their TPs appropriately improve network throughput by means of increasing the channel spatial reuse In this paper proposes that A single-channel, single-transceiver power control approach providing a significantly higher network throughput than the IEEE scheme

6 Related Work Throughput-oriented TPC schemes [23] [24] [40] Broadcasting collision avoidance information (CAI) over a separate control channel Via busy-tones, RTS/CTS exchange Design problems with these schemes Assume that channel gain is to be the same for the control channel and data channel Assume that transmit on one channel and receive on the other simultaneously Two transceivers, increase complexity and cost Two channel protocol is not backward-compatible with the IEEE standard Do not provide reliability (protect the reception of ACK)

7 The POWMAC Protocol Assumptions The channel gain is stationary for the duration of a few control and one data packet transmission periods The gain between two terminals is the same in both directions The radio interface can provide the MAC layer with the average power of a received control signal as well as the average interference power IEEE RTS/CTS-based protocol

8 The POWMAC Protocol (cont’d) Overview of POWMAC Not use the control packets to silence neighboring terminals CAI is inserted in the control packets and is used in conjunction with the received signal strength of these packets dynamically bound the TP of potentially interfering terminals in the vicinity of a receiving terminal The required TP of a data packet is computed at the packet’s intended receiver, according to a predetermined “maximum load factor” This approach is to allow for some interference tolerance at receiver So that multiple interference-limited transmissions can simultaneously take place in the neighborhood of receiver

9 The POWMAC Protocol (cont’d) Some control packets are transmitted at an adjustable power level CTS and Decide-to-Send (DTS) packets (newly) Reach all and only potentially interfering terminals Improve the spatial reuse and reduce collisions Access window (AW) After terminals exchange their control packets, they refrain from transmitting their data packets for a certain duration Allows several pairs of neighboring terminals to exchange their control packets such that (interfering) data transmissions can proceed simultaneously

10 The POWMAC Protocol (cont’d) Transmission: A  B RTS: Max Power CTS: Adjustable Power DTS: Adjustable Power F E B A D C

11 The POWMAC Protocol (cont’d) The RTS/CTS exchange allows terminals A and B to agree on the TP of the ensuing data packet Terminal B sends CTS to A inform potentially interfering nodes (e.g. E) of the power that they can use without disturbing the scheduled reception of the data packets at B. Then, terminal A sends DTS to B for confirming inform A’s neighbors of the power level that A intends to use for its data transmission A’s neighbors (i.e. D) can determine whether or not they can receive a data packet from some other terminal (e.g. C) simultaneously while A is transmitting to B. DTS provides a way to inform potentially interfering terminals (e.g. D) of the power that they can use without disturbing the reception of the Ack packet at A.

12 The POWMAC Protocol (cont’d) Load control a concept that allows a prospective receiver to determine the appropriate TP for its upcoming data reception Load factor at terminal i, denoted by ξ (i) a measure of the activity in terminal i’s neighborhood. where P (i) MAI is the current multi-access interference (MAI) at receiver I  in this paper, the term MAI will be used to refer to interference from unintended signals that are spread using the same spreading code

13 Transmission of a packet from j to I The minimum TP that is needed to achieve the target bit error rate is d ij be the distance between i and j, μ* be the SINR threshold required to achieve a target bit error rate (BER) at receiver I where G ji = k/d n ij is the channel gain from terminal j to terminal I More capacity can be achieved by increasing ξ (i) (i.e., allowing larger P (i) MAI ) Limitation on the maximum power that can be used by terminals in the 2.4 GHz spectrum (e.g., 1 Watt for devices). The POWMAC Protocol (cont’d)

14 The POWMAC Protocol (cont’d) Load planning Imposing a maximum load factor (MLF), ξ max This ξ max is set at the design phase to reflect several goals, including throughput, network lifetime, etc to increase the spatial channel reuse, terminal j uses a TP that results in the MLF at terminal i. d max = maximum transmission range

15 The POWMAC Protocol (cont’d) Channel Access Mechanism Each terminal i maintains a Power Constrained List denoted by PCL(i) PCL(i) encodes i’s knowledge about other active terminals i.e., terminals that are receiving, transmitting, or scheduled to do either function in i’s vicinity  The address of terminal u.  The channel gain between terminals i and u (G ij )  The start time and duration of u’s activities as advertised by terminal u in its CTS or DTS packet.  The maximum tolerable interference (MTI) of terminal u, denoted by P (u) MTI during u’s data or Ack reception.  The TP that terminal u will use during its scheduled data or Ack transmission, advertised in terminal u’s CTS or DTS packet.

16 The POWMAC Protocol (cont’d) Let π i (u) be the maximum TP that terminal i can use without disturbing u’s reception. Let Ψ(i) be the set of terminals in i’s vicinity whose receptions overlap with i’s transmission Then the maximum allowable TP that terminal i can use without disturbing any of its neighbors

17 The POWMAC Protocol (cont’d) Master and slave terminals Terminal j is a master if it has a packet to send, its PCL is empty, and it does not sense any carrier signal.  j’s RTS packet announces the start of an AW (the size of this AW is also set by terminal j). k is a slave terminal if it is in the vicinity of a master terminal  terminal k may send an RTS message in any, but not the first, slot of the AW initiated by terminal j

18 The POWMAC Protocol (cont’d) Master Terminals If j does not sense a carrier, it sends an RTS message at P max, and includes in this packet the values of P (j) MAP and N (j) AW (the remaining number of slots in j’s AW) The power that terminal j is allowed to use to send to i was given by P (ji) POWMAC  If P (ji) POWMAC < P (ji) min then the MAI in the vicinity of terminal i is greater than the one allowed by the planned loading.  i responds with a negative CTS, informing j that it cannot proceed with its transmission  If P (ji) POWMAC > P (ji) min then calculating maximum additional interference power and distributing it

19 The POWMAC Protocol (cont’d) Maximum tolerable interference P (i) MTI that a single future interferer can add to terminal I When responding to j’s RTS, terminal i indicates in its CTS the power level P (ji) POWMAC that j must use for the data transmission. (DTS also includes P (ji) POWMAC ) Terminal i inserts P (i) MTI in the CTS message to inform its neighbors (P (j) MTI in DTS) The DTS packet in POWMAC also provides a mechanism to announce the success of the RTS/CTS exchange between j and i to those neighbors of j who have not heard i’s CTS.

20 The POWMAC Protocol (cont’d) Slave terminal Two “feasibility conditions” (FCs) that each slave terminal, say k, must fulfill for its activity  FC1 (Effect of terminal k’s transmission on the receptions in k’s neighborhood): Terminal k’s data or Ack transmission should not disturb already scheduled receptions in k’s vicinity.  FC2 (Effect of k’s neighbors’ transmissions on k’s reception): The additional interference due to already scheduled transmissions should not increase the load factor at terminal k above ξ max during terminal k’s data or Ack reception.

21 The POWMAC Protocol (cont’d) Delaying the transmission time of an Ack packet must be carefully coordinated between the the source and sink terminals Two “viability rules” (VRs) for changing the Ack transmission time:  VR1: Each terminal that wishes to fulfill its FCs (with respect to a certain neighboring activity) is allowed to increase the present value of τ (.) Ack, but not decrease it.  VR2: Each terminal computes τ (.) Ack, that fulfills its FCs with respect to a given neighboring activity in such a way that if τ (.) Ack, is later increased by the same terminal to accommodate another neighboring activity or is increased by the communication peer,

22 The POWMAC Protocol (cont’d) Source-Source Interaction:

23 The POWMAC Protocol (cont’d) Source-Sink Interaction:

24 Performance Evaluation Simulation Setup String topology B moves to C at 5m/s

25 Performance Evaluation (cont’d)

26 Performance Evaluation (cont’d) Random grid topologies 25 mobile terminals are placed within a square area of length 1500 meters Each terminal generates packets according to a Poisson process with rate λ The Random Waypoint model [10] is used for mobility, with a terminal speed that is uniformly distributed between 0 and 2 meters/sec

27 Performance Evaluation (cont’d) Random grid topologies

28 Performance Evaluation (cont’d) Cluster topologies an area of dimensions 600 × 600 (in meters). Sixteen terminals are split into 4 equal groups, each occupying a 100 × 100 square in one of the corners of the complete area. the destination is selected from the same cluster with probability 1 − p or from a different cluster with probability p.

29 Performance Evaluation (cont’d) Cluster topologies

30 Conclusion A single-transceiver circuitry, and it operates over a single channel for data and control packets POWMAC can improve the network throughput by up to 50% in random-grid topologies and much more than that in clustered topologies

31 Comments Detail and complete protocol design Great performance improvement