Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Università degli Studi di Firenze 08 July 2004 COST th MCM - Budapest, Hungary 1 Cross-layer design for Multiple access techniques in wireless communications.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
Ethernet – CSMA/CD Review
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Earl1 MACA-BI(MACA By Invitation) A Receiver Oriented Access Protocol for Wireless Multihop Network F. Talucci, M. Gerla, and L. Fratta Proceedings of.
Wireless Medium Access Control Protocols
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
Wireless Medium Access Control Protocols A Survery by Ajay Chandra V. Gummalla and John O. Limb.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
Reversing the Collision Avoidance Handshake in Wireless Networks J.J. Garcia-Luna-Aceves and Makis Tzamaloukas Computer and Communications.
Wireless Medium Access Control Protocols A Survery by Ajay Chandra V. Gummalla and John O. Limb.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
1 Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Monday March 12, 2007 Acknowledgement:
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Wireless Transmission Fundamentals (Physical Layer) Professor Honggang Wang
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
ECE 4450:427/527 - Computer Networks Spring 2015
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Chapter 6 Multiple Radio Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
WLAN.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
0.1 IT 601: Mobile Computing MAC Protocols Prof. Anirudha Sahoo IIT Bombay.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Signal Propagation Basics
MAC Protocols for Sensor Networks
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
Presenter: Gurjot Singh
MAC Protocols for Sensor Networks
Wireless Sensor Networks 4. Medium Access
Outline What is Wireless LAN Wireless Transmission Types
Medium Access Control MAC protocols: design goals, challenges,
Communication Networks: Technology & Protocols
Wireless LANs Wireless proliferating rapidly.
High Speed LANs – Ethernet and Token Ring
Channel Allocation (MAC)
CS 457 – Lecture 7 Wireless Networks
He Xiaoben Further study of multi-hop communications - modeling the hidden terminal problem He Xiaoben
Subject Name: Adhoc Networks Subject Code: 10CS841
Chapter 6 Multiple Radio Access.
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless Sensor and Mesh Networks Mobile and Ad hoc Networks Adhoc Wireless MAC

Outline  Wireless MAC Issues  Hidden terminal problem  Exposed terminal problem  Capture  MAC Performance Metrics  Wireless MAC Classification  Distributed Wireless MAC Protocols  Aloha  Slotted Aloha  CSMA  CSMA/CA  MAC  DCF  Backoff  Hiper LAN MAC

Reading Resources  C. K. Toh, Ad Hoc Mobile Wireless Networks, “Chapter 4 – Ad Hoc Wireless Media Protocols”, Prentice Hall  Bob O’Hara and Al Petrick, IEEE Handbook: A Designer’s Companion, IEEE Press, 1999  Jochen Schiller, Mobile Communications Section 7.3, Addison-Wesley, 2000.

Further Reading  Lots of MAC protocols published in Mobicom, Infocom, Globecom, Mobihoc, WCNC, VTC, etc.  CSMA: L. Kleinrock and F. A. Tobagi, “Packet Switching in Radio Channels: Part I – Carrier Sense Multiple Access Modes and Their Throughput Delay Characteristics, IEEE Trans. On Communications, Vol. COM-23, No. 12, Dec. 1975, pp  MACA: P. Karn, “MACA – A New Channel Access Protocol for Packet Radio”, ARRL/CRRL Amateur Radio 9 th Computer Networking Conference, 1990, pp

Further Reading  FAMA: C. L. Fullmer and J. J. Garcia-Luna_Aceves, “Floor Acquisition Multiple Access (FAMA) for Packet-Radio Networks”, Proceedings of ACM Sigcomm’95, Cambridge, MA, Aug. 1995, pp  MACAW: V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, “MACAW: A Media Access Protocol for Wireless LANs”, Proceedings of ACM Sigcomm’94, London, UK, Sept. 1994, pp  IEEE Computer Society LAN/MAN Standards Committee, “Wireless LAN Medium Access Protocol (MAC) and Physical Layer (PHY) Specifications, “IEEE Std ”

Introduction  Multiple access control channels  Each Mobile Station (MS) is attached to a transmitter / receiver which communicates via a channel shared by other nodes  Transmission from any MS is received by other MSs in the neighborhood

Introduction (Contd.)  Multiple access issues  Wireless Channel (Wireless medium) is shared among multiple neighboring nodes  If more than one MS transmit at a time on the shared media, a collision occurs  How to determine which MS can transmit?

Wireless Medium Access Control: Why?  Access Control protocols define rules for orderly access to the shared medium  Fairness in sharing  Efficient sharing of bandwidth  Need to avoid packet collisions at the receiver due to interference  Different types:  Contention protocols resolve a collision after it occurs or try to avoid it. These protocols execute a collision resolution protocol after each collision  Conflict-free protocols (e.g., TDMA, FDMA, CDMA) ensure that a collision can never occur.  Mobility  Energy Constraints  Wireless MACs have been studied heavily since 1970s

Channel Sharing Techniques

Classification of Wireless MAC Protocols

Wireless MAC Issues  Wireless medium makes the MAC design more challenging than the wire-line networks.  The three important issues are: 1.Half Duplex operation –> Either send or receive but not both at a given time 2.Time varying channel 3.Burst channel errors

Wireless MAC Issues (Contd.) 1. Half Duplex Operation  In wireless, Its difficult to receive data when the transmitter is sending the data, because:  When node is transmitting, a large fraction of the signal energy leaks into the receiver path  The transmitted and received power levels can differ by orders of magnitude  The leakage signal typically has much higher power than the received signal -> “Impossible to detect a received signal, while transmitting data”  Collision detection is not possible, while sending data  CSMA/CD (Ethernet MAC) cannot be used as it is

Wireless MAC Issues (Contd.) 1. Half Duplex Operation (Contd.)  As collision cannot be detected by the sender, all proposed protocols attempt to minimize the probability of collision -> Focus on collision avoidance

Wireless MAC Issues (Contd.) 2. Time Varying Channel  Three mechanisms for radio signal propagation (T. Rappaport’s book)  Reflection – occurs when a propagating wave impacts upon an object that has very large dimensions than the wavelength of the radio wave e.g. reflection occurs from the surface of the earth and from buildings and walls  Diffraction – occurs when the radio path between the transmitter and the receiver is obstructed by a surface with sharp edges  Scattering – occurs when the medium through which the wave travels consists of objects with dimensions smaller than the wavelength of the wave.

Wireless MAC Issues (Contd.) 2. Time Varying Channel (Contd.)  The received signal by a node is a superposition of time- shifted and attenuated versions of the transmitted signals ➔ The received signal varies with time  The time varying signals (time varying channel) phenomenon also known as multipath propagation  The rate of variation of channel is determined by the coherence time of the channel  Coherence time is defined as time within which the received signal strength changes by 3 dB

Wireless MAC Issues (Contd.) 2. Time Varying Channel (Contd.)  When a node’s received signal strength drops below a certain threshold the node is said to be in fade  Handshaking is widely used strategy to ensure the link quality is good enough for data communication  A successful handshake between a sender and a receiver (small message) indicates a good communication link

Wireless MAC Issues (Contd.) 3. Burst Channel Errors  As a consequence of time varying channel and varying signals strengths errors are introduced in the transmission (Very likely)  For wire-line networks the bit error rate (BER) is typically i.e. the probability of packet error is small  For wire-line networks the errors are due to random noise  For wireless networks the BER is as high as  For wireless networks the errors are due to node being in fade as a result errors occur in a long burst  Packet loss due to burst errors - mitigation techniques  » Smaller packets  » Forward Error Correcting Codes  » Retransmissions (ACKs)

Location Dependent Carrier Sensing  In free space signal decays with the square of distance  Implication is that the carrier sensing becomes a function of the position of the receiver relative to the transmitter  In wireless medium due to multi-path propagation, the signal strength decays according to a power law with distance  Only nodes within a specific radius of the transmitter can detect the carrier on the channel

Location Dependent Carrier Sensing (Contd.)  Location Dependent Carrier Sensing results in three types of nodes that protocols need to deal with:  Hidden Nodes  Even if the medium is free near the transmitter, it may not be free near the intended receiver  Exposed Nodes  Even if the medium is busy near the transmitter, it may be free near the intended receiver  Capture  Capture occurs when a receiver can cleanly receive a transmission from one of two simultaneous transmissions

Hidden Node/Terminal Problem  A hidden node is one that is within the range of the intended destination but out of range of sender  Node B can communicate with A and C both  A and C cannot hear each other  When A transmits to B, C cannot detect the transmission using the carrier sense mechanism ➔ C falsely thinks that the channel is idle  If C transmits, collision will occur at node B

Hidden Node Problem  Will collide with Transmission from A at B

Exposed Node Problem  An exposed node (C) is one that is within the range of the sender but out of range of destination

Exposed Node Problem (Contd.) 1. Consider the case that node B is attempting to transmit to A 2. Node C can hear the transmission from B. When C senses the channel it finds the channel to be busy. 3. However, any transmission by C cannot reach A (not in range), hence does not interfere with any reception at A.

Exposed Node Problem (Contd.) 4. In theory C can therefore have a parallel transmission with any node that cannot hear the transmission from B, i.e. out of range of B. 5. But C will not transmit to any node because its an exposed node. Exposed nodes waste bandwidth.

Exposed Terminal Problem

Capture  Capture is said to occur when a receiver can cleanly receive a transmission from one of two simultaneous transmissions both within its range

Capture (Contd.)  Assume node A and D transmit simultaneously to B. The signal strength received from D is much higher than that from A, and D’s transmission can be decoded without errors in presence of transmissions from A.  D has captured A  Capture is unfair because it gives preference to nodes that are closer to the receiver  It may improve protocol performance

Outline  Wireless MAC Issues  Hidden terminal problem  Exposed terminal problem  Capture  MAC Performance Metrics  Wireless MAC Classification  Distributed Wireless MAC Protocols  Aloha  Slotted Aloha  CSMA  CSMA/CA  MAC  DCF  Backoff  Hiper LAN MAC

MAC Performance Metrics  There are hundreds of MAC protocols proposed for wireless networks.  We need performance metrics so that we can compare one protocol with the other  The key metrics are:  Delay  Throughput  Fairness  Stability  Robustness against channel fading  Power Consumption  Support for multimedia

MAC Performance Metrics (Contd.)  Delay  Defined as the average time spent by a packet in the MAC queue, i.e. from the instance it is en-queued till its transmission is complete  Sensitive to traffic characteristics, so two MAC protocols should be compared under identical traffic conditions  Throughput  Fraction of channel capacity used for data transmissions  MAC need to maximize throughput while keeping the access delay to minimum

MAC Performance Metrics (Contd.)  For a P bits message size, on a channel of capacity C bits/sec, T seconds are elapsed,  So throughput of the channel is P TC  Fairness  When all nodes are treated equally, and no node is given preference  Leads to fair sharing of bandwidth  Traffic with different priorities can bias this definition  For multimedia traffic, usually the MAC is considered fair when (voice, data, video) get their allocated bandwidth η =η =

MAC Performance Metrics (Contd.)  Stability  System needs to be stable if instantaneously high load is seen by the MAC  Robustness against channel fading  Wireless channel is time varying and error prone  Fading may make channel unusable for short durations  MAC needs to work reliably while channel in fade  Power Consumption  Wireless nodes have limited battery power -> MAC should conserve energy

MAC Performance Metrics (Contd.)  Support for multimedia  MAC should support multimedia applications (voice, video, data)  Multimedia data implies data with real-time constraints  By using priorities and scheduling – delay can be controlled and/or guaranteed

Assignment #3  Go through the research papers listed in the “Further Reading Slides” and re-write their abstracts in your own words

Q&A ??