An SSCOP-based Link Layer Protocol for Wireless LANs Haoli Wang and Aravind Velayutham IEEE Global Telecommunications Conference 1-5 December, 2003 San.

Slides:



Advertisements
Similar presentations
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 14 Introduction to Computer Networks.
Advertisements

A feedback–based scheme for improving TCP performance in Ad Hoc Wireless Networks Group : Manish Mehta Aditya Barve.
Improving TCP over Wireless by Selectively Protecting Packet Transmissions Carla F. Chiasserini Michele Garetto Michela Meo Dipartimento di Elettronica.
ICSA341 Data Communications and Computer Networks 1 Data Link Control •General principles.
Flow and Error Control. Flow Control Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Wireless Networking So we talked about wired networks. What about wireless?
Chapter 9: Data Link Control Business Data Communications, 4e.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
SEPT, 2005CSI Part 2.2 Protocols and Protocol Layering Robert Probert, SITE, University of Ottawa.
Lect11.ppt - 03/15/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 11 Link-Level Flow and Error Control by Zornitza Genova Prodanoff.
Link-Level Flow and Error Control
Process-to-Process Delivery:
Chapter 5 outline 5.1 Introduction and services
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
Data Link Layer We have now discussed the prevalent shared channel technologies  Ethernet/IEEE  Wireless LANs (802.11) We have now covered chapters.
1 Chapter 16 Protocols and Protocol Layering. 2 Protocol  Agreement about communication  Specifies  Format of messages (syntax)  Meaning of messages.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 15.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
The Data Link Layer Goal –As reliable as possible, efficient communication Point-to-Point –single connection –bits arrive in order sent Not necessarily.
Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Raja Abdelmoumen, Mohammad Malli, Chadi Barakat PLANETE group, INRIA.
Error/Flow Control Modeling (ARQ Modeling). © Tallal Elshabrawy 2 Data Link Layer  Data Link Layer provides a service for Network Layer (transfer of.
Forward Error Correction vs. Active Retransmit Requests in Wireless Networks Robbert Haarman.
Data Link Layer: Data Link Control : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Forwarding Group Multicast Protocol (FGMP) for Multihop, Mobile Wireless Networks Speaker : Wilson Lai Date : Ching-Chuan Chiang, Mario Gerla.
11.1 Flow and Error Control Flow Control Error Control.
ENGS 112 Lecture 3 Packet Switching Chapter 3, Walrand WWW links, eg.
Telecommunications & Networking Lesson 3. ISO Open System Interconnect (OSI) Application Presentation Session Transport Network Data Link Physical Application.
1 Protocols and Protocol Layering. 2 Protocol Agreement about communication Specifies –Format of messages –Meaning of messages –Rules for exchange –Procedures.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Networking Lecture 16 – Reliable Transport.
Chapter 9: Data Link Control Business Data Communications, 4e.
Computer Communication & Networks
Chapter 9: Data Link Control
Data Link Layer Flow Control.
Data Link Layer - 3 Dr. Sanjay P. Ahuja, Ph.D.
Part III Datalink Layer 10.
Data link layer (LLC).
Chap. 4 Data link layer 2.
Instructor Mazhar Hussain
Flow Control.
Data Link Layer: Data Link Control
Rivier College CS575: Advanced LANs Chapter 6: Logical Link Control
Flow and Error Control.
Overview Jaringan Komputer (2)
Process-to-Process Delivery:
CS412 Introduction to Computer Networking & Telecommunication
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
CS4470 Computer Networking Protocols
Lecture 7 review Consider a link running the Go-Back-N protocol. Suppose the transmission delay and propagation delay are both 1ms, the window size is.
DATA COMMUNICATION Lecture-38.
Protocols and Protocol Layering
A simple network connecting two machines
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
July 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Modified Delayed (Dly) Acknowledgement for.
Computer Networks Protocols
Protocols and Protocol Layering
Chapter 9: Data Link Control
Error Checking continued
Presentation transcript:

An SSCOP-based Link Layer Protocol for Wireless LANs Haoli Wang and Aravind Velayutham IEEE Global Telecommunications Conference 1-5 December, 2003 San Francisco, USA

2 Outline Introduction Problems Solutions Proposed Protocol Analysis and Performance Conclusions Q&A

3 Introduction The IEEE MAC protocol It ’ s the standard for medium access in wireless LANs. It provides fast recovery from frame losses using a rapid link level positive acknowledgement scheme, generally an ACK frame.

4 Positive acknowledgement scheme Retransmission Sender Receiver ACK DATA ACK Timeout

5 Problems At a low error rate, the most of the frame transmissions are correct and the positive ACK scheme is inefficient. Since each data frame requires on ACK, the large traffic overhead of ACK transmission wastes the scarce bandwidth.

6 Solutions To use the negative ACK scheme, in order to reduce the amount of ACK traffic by the receiver only requests the retransmission of the lost frames. The proposed protocol is an adaptation of Service Specific Connection Oriented Protocol (SSCOP) that has already been implemented in ATM networks.

7 Proposed Protocol Basic operation USTAT operation POLL/STAT operation Timeout mechanisms POLL Timeout Data Timeout Determination of  value Buffer management Modified NAV value Frame formats

8 USTAT operation A receiver can detect a frame loss by checking the sequence number in the frame header. When a receiver detect a frame loss, it sends an Unsolicited Status (USTAT) control frame to the transmitter

9 Example of USTAT operation Frame loss Out-of-order frame Retransmission USTAT Sender Receiver

10 POLL/STAT operation After a transmitter sends out a specified number of data frames without acknowledgement, say , a POLL frame is sent out to the receiver. The receiver will report the status of the last  frames to the transmitter using a Status (STAT) frame.

11 Example of POLL/STAT operation STAT Sender Receiver POLL  = 3

12 Buffer management STAT Sender Receiver POLL Empty buffer USTAT Retransmission 7 8 Remove 8 from buffer

13 Analysis and Performance Advantages of the proposed protocol To reduce the acknowledgement traffic because of is the removal of ACK frame for each data frame transmissions. To eliminate of ACK timeout from Simulation result To compared the proposed protocol with IEEE The overhead The throughput

14 To reduce the ACK traffic

15 The occurrence of frame loss

16 The POLL/STAT overhead with increasing a  value

17 Total throughput with increase number of flows at frame loss rate = 0

18 Total throughput with increase number of flows at frame loss rate = 10%

19 Total throughput with increase number of flows at frame loss rate = 20%

20 Conclusions The performance improvement of the proposed protocol increases with increasing bit error rate. The other issues that will be improved buffer management for more link between transmitter and receiver

21 Q & A