Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format.

Slides:



Advertisements
Similar presentations
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Advertisements

Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
TDMA Scheduling in Wireless Sensor Networks
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
5/5/20151 Mobile Ad hoc Networks COE 549 Transmission Scheduling II Tarek Sheltami KFUPM CCSE COE
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
1 Y-MAC: An Energy-efficient Multi-channel MAC Protocol for Dense Wireless Sensor Networks Youngmin Kim, Hyojeong Shin, and Hojung Cha International Conference.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 1 Presented by Fikret Sivrikaya Joint work with Costas Busch, Malik Magdon-Ismail,
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
A Multi-Channel MAC Protocol for Wireless Sensor Networks Chen xun, Han peng, He qiu-sheng, Tu shi-liang, Chen zhang-long The Sixth IEEE International.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
K. Banerjee, P. Basuchaudhuri, D. Sadhukhan and N. Das
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad- Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
A Simple Neighbor Discovery Procedure for Bluetooth Ad Hoc Networks Miklós Aurél Rónai and Eszter Kail GlobeCom 2003 Speaker: Chung-Hsien Hsu Presented.
Medium Access Control NWEN302 Computer Network Design.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Qingchun Ren and Qilian Liang Department of Electrical Engineering, University of Texas at.
Medium Access Control Sub Layer
Chapter 6 Multiple Radio Access
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol Kurtis Kredo II, Petar Djukic, Prasant Mohapatra IEEE INFOCOM 2009.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
TDMA scheduling algorithms for WSN Speaker: Chan-Yu Tsai Advisor: Dr. Ho-Ting Wu Date: 2015/5/6.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
Energy-Efficient Wake-Up Scheduling for Data Collection and Aggregation Yanwei Wu, Member, IEEE, Xiang-Yang Li, Senior Member, IEEE, YunHao Liu, Senior.
Thermal Detecting Wireless Sensor Network
Video Streaming Transmission Over Multi-channel Multi-path Wireless Mesh Networks Speaker : 吳靖緯 MA0G WiCOM '08. 4th International.
Dynamic Link Labels for Energy Efficient MAC Headers in Wireless Sensor Networks Sheng-Shih Wang Gautam Kulkarni, Curt Schurgers, and Mani Srivastava IEEE.
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad-Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
GholamHossein Ekbatanifard, Reza Monsefi, Mohammad H. Yaghmaee M., Seyed Amin Hosseini S. ELSEVIER Computer Networks 2012 Queen-MAC: A quorum-based energy-efficient.
1 Grid-Based Access Scheduling for Mobile Data Intensive Sensor Networks C.-K. Lin, V. Zadorozhny and P. Krishnamurthy IEEE International Conference on.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Junchao Ma +, Wei Lou +, Yanwei Wu *, Xiang-Yang Li *, and Guihai Chen & Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks + Department.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
IHP: Innovation for High Performance Microelectronics
Communication Networks: Technology & Protocols
Services of DLL Framing Link access Reliable delivery
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling
THE IEEE MAC SUB-LAYER – chapter 14
The Medium Access Control Sublayer
Speaker: Po-Hung Chen Advisor: Dr. Ho-Ting Wu 2016/10/12
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Presentation transcript:

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks Fikret Sivrikaya [Joint work with Costas Busch, Malik Magdon-Ismail, Bülent Yener] Rensselaer Polytechnic Institute

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 2 Outline  Introduction  Wireless Networks  Terms & Notations  MAC Protocols & Slot Assignment  Asynchronous Slot Assignment  Basic Approach  Problems & Remedies  ASAND Protocol  OPNET Modeler Implementation of ASAND  Simulation Results & Conclusion

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 3 Wireless Network Graphs Each node has a transmission range, which determines its neighbors Representation of the network as a graph same transmission power/range  symmetric links  undirected graph

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 4 Basic Terms & Notations…  k-neighborhood of a node v:  k (v)  k-neighborhood size of a node v:  k (v) = |  k (v)|  max k-neighborhood size (in the network):  k = max v  k (v)  n = number of nodes in the network 1-neighbors or “neighbors” of v 2-neighbors of v v

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 5 MAC (Medium Access Control) Protocols  Specify how nodes in a network access the shared communication channel.  Three main classes:  Contention-based  Contention-free  Limited-contention  Slot Assignment  Assign each node a time interval for channel access.  Mainly used for contention-free MAC protocols.  Existing approaches require a common view of time by all nodes, i.e. global time synchronization. frametime slot

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 6 Interference / Collisions Interference on node b (“Hidden terminal problem”) a b c a b a b cd Interference on node b a and b interfere and hear noise only Packets that suffered collisions should be re-sent. Ideally, we would want all packets to be sent collision- free, only once…

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 7 Static Slot Assignment  Because of the hidden terminal problem, a node may contend with any neighbor in its 2-neighborhood for channel access.  A static slot assignment protocol should assign each node a time interval that is guaranteed to be collision-free in its 2-neighborhood.

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 8 Asynchronous Slot Assignment 213 ii  2134  2134  213 ii   We propose a new protocol that does not require global clock synchronization.  Each node locally discretizes its local time.  The number of slots in a time frame, called the frame size and denoted by , is set to 2  2 .  Having the same frame size at all nodes ensures that overlapping time slots remain the same .  When   2  2, we show [JDC’07] that all nodes obtain a conflict-free slot within 2  log n time slots, with probability at least 1−1/n.  The clock skew may have a small effect, which can be addressed by introducing safety gaps within slots to tolerate a given amount of clock drift.

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 9 ASAND – Basic Approach Select random slot  Transmit beacon at  Conflict Listen for  slots Obtain slot  Report conflicts between neighbors YESNO   Ready Nonready

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 10 ASAND – Basic Approach w u v   Schedule nodes’ transmission times so that neighbor nodes do not transmit at the same time.  Repeatedly select a random time slot until it is collision-free in the 2- neighborhood.

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 11 ASAND – Conflict Reporting  The 2-hop neighbors u and v are unaware that they have selected conflicting time slots (their transmissions collide on w).  Having observed a collision in its local time t, node w transmits at time t+ , creating a spurious conflict with both u and v.  This is called conflict reporting  essentially reduces a conflict between hidden terminals to a conflict between neighbor nodes.  After t+ , u and v will be forced to select new slots

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 12 Problem: Chains of Conflict Reports a g b e c h f d t+t+ a g b e c h f d t+2  a g b e c h f d t Observing a collision Transmitting  Chain of messages goes on indefinitely and makes the time slot  useless in this neighborhood.  Nodes involved in the chain waste energy.  Continuous collisions impose a problem for algorithm termination. a g b e c h f d t+3 

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 13  Upon detecting a collision at time t;  report the collision at t+  with probability p report.  otherwise, listen for collisions again at t+  (with prob. 1  p report,).  If a collision is detected again at t+ , then report it at t+2  with probability 2  p report …  In general, after c consecutive collisions, report with probability c p report …  A slot conflict is always reported after at most 1/ p report frames.  To obtain a slot, a node has to transmit 1/ p report times in that slot. Remedy: Probabilistic Conflict Reporting Example: (p report = 0.2)

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 14 ASAND Protocol v node i:  xwiu At algorithm termination, a node discovers its neighbors and a local schedule of their channel access times:

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 15 An OPNET Implementation of ASAND

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 16  When a node transmits, it must be able to detect simultaneous transmissions of neighbor nodes.  Divide each slot into 4 log n +8 mini slots.  Generate a binary sequence b of 4 log n +8 bits based on unique node id.  Transmit in mini slot j only if b u ( j) = 1.  Guarantees that each transmitting node can detect other transmissions during its current slot. Collision Detection u v

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 17 Collision Detection 1  shift  log n shift = log n + 1 shift = log n + 2 log n + 3  shift  2log n + 2 shift = 2log n + 3 X = id u Y = id v l = |id u | = log n

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 18 Collision Detection – OPNET Implementation

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 19 The Effect of Collision Reporting Probability, p report

Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format without the prior written consent of OPNET Technologies, Inc. Used with permission of the Author. 20 References & Further Information  [JDC’07] C. Busch, M. Magdon-Ismail, F. Sivrikaya and B. Yener, “Contention-Free MAC Protocols for Asynchronous Wireless Networks,” to appear in the Journal of Distributed Computing (JDC). Available at  [DISC’04] C. Busch, M. Magdon-Ismail, F. Sivrikaya, B. Yener, “Contention-Free MAC protocols for Wireless Sensor Networks,” In proceedings of the 18th International Conference on Distributed Computing (DISC 2004), Amsterdam, The Netherlands, pp , October  Research with OPNET Program at RPI:  Model files also available at the OPNET Contributed Models depot: Fikret Sivrikaya -