Click to edit Master title style Click to add subtitle © 2009 Wichorus Inc. All rights reserved. Multi-hop Ad Hoc Wireless Communication Autoconf WG November.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Ad Hoc Wireless Media Access Protocols Mikko Raatikainen, TiTe 5.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol1 UC Berkeley WOW Wireless Token Ring Protocol (WTRP) A Medium Access Control Protocol for QoS.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
6/2/05CS118/Spring051 Chapter 6: Wireless and Mobile Networks r Cover the following sections only:  6.3: wireless LANs  6.5: mobility management:
MAC Protocol By Ervin Kulenica & Chien Pham.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
COMPUTER NETWORKS.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Ad Hoc Wireless Routing COS 461: Computer Networks
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
CIS 725 Wireless networks. Low bandwidth High error rates.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
Recitation 8 Wireless Networks. Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS),
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
A Reservation-based TDMA Protocol Using Directional Antennas (RTDMA-DA) For Wireless Mesh Networks Amitabha Das and Tingliang Zhu, Nanyang Technological.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
CCNA Guide to Cisco Networking Chapter 2: Network Devices.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Doc.: IEEE /0065r0 Submission January 2005 Bahareh Sadeghi, Intel CorpSlide 1 On Hidden and Exposed Terminal Problems Notice: This document has.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Joint Multi-Channel Link Layer and Multi-Path Routing Design for Wireless Mesh Networks Wai-Hong Tam and Yu-Chee Tseng National Chiao-Tung University,
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Biosimilar (Insulin) – Competitive Landscape and Market & Pipeline Analysis, 2016 DelveInsight’s, “Biosimilar (Insulin) – Competitive Landscape and Market. Request for sample of this research report:
Click to edit Master title style Click to add subtitle © 2008 Wichorus Inc. All rights reserved. CONFIDENTIAL - DO NOT DISTRIBUTE rfc3775bis Issues March.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
ADHOC MAC : a new, flexible and reliable MAC architecture for ad- hoc networks F. Borgonovo, A. Capone, M. Cesana, L. Fratta Dipartimento Elettronica e.
Outline What is Wireless LAN Wireless Transmission Types
The University of Adelaide, School of Computer Science
Kunal Amarnani, Ayush Bhardwaj, Angad Kumar Kapoor & Tejas Pargaonkar
Wireless LANs Wireless proliferating rapidly.
MACAW: A Media Access Protocol for Wireless LAN’s
TCP and MAC interplay in Wireless Ad Hoc Networks
LOAD SENSITIVE CONTENTION RESOLUTION MAC-PROTOCOL
Xors in the air Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Medard, Jon Crowcroft.
Multi-channel, multi-radio wireless networks
CS 457 – Lecture 7 Wireless Networks
Mobile ad hoc networking: imperatives and challenges
Multi-channel, multi-radio
Protocols.
Protocols.
Click to add master title
Presentation transcript:

Click to edit Master title style Click to add subtitle © 2009 Wichorus Inc. All rights reserved. Multi-hop Ad Hoc Wireless Communication Autoconf WG November 9, 2009

Click to edit Master title style 2 © 2009 Wichorus Inc. All rights reserved. draft-baccelli-multi-hop-wireless-communication-03 Informational document Intended to motivate design decisions about address architecture and guide exploration of solution space Wireless media are not at all new What assumptions should guide protocol design? Asymmetry, Time-Variation, and Non-Transitivity  What’s a “neighbor”?  Synonyms?: is reachable from, “can hear”, “has a link”, … Radio Range and Wireless Irregularities

Click to edit Master title style 3 © 2009 Wichorus Inc. All rights reserved. Asymmetry, Time-Variation, and Non-Transitivity Terminology: let’s use “A can hear B” Suppose node A can hear node B. Then it is possible that B cannot hear A. Suppose A can hear B at time t 0. Then at any later time t 1 it is possible that A can no longer hear B. Suppose A can hear B and B can hear node C. Then it is possible that C cannot hear A and A cannot hear C. BA

Click to edit Master title style 4 © 2009 Wichorus Inc. All rights reserved. Hidden Terminals It is possible for a node B to detect carrier quiescence around node A even though A is receiving a packet from another neighbor C. Then node C is, from the standpoint of node B, a hidden terminal. Node A may suffer data loss if B transmits. A C B

Click to edit Master title style 5 © 2009 Wichorus Inc. All rights reserved. Exposed Terminals Node A might be unable to send a packet to node B because of an unrelated packet transmission between two other nodes C and D. Node A is then an “exposed terminal”. This can happen even if B and D could both safely receive transmissions from A and C respectively. ACBD 

Click to edit Master title style 6 © 2009 Wichorus Inc. All rights reserved. MAC layer support For , these problems can be almost (but not quite) completely eliminated by RTS/CTS. Too bad those signals are often administratively disabled.  Bandwidth, bandwidth, bandwidth For other wireless media, scheduling is imposed possibly along with statutory access controls IP typically does not assume responsibility for preventing hidden terminals / exposed terminals  “Best effort”  retransmissions “O.K.” [??]

Click to edit Master title style 7 © 2009 Wichorus Inc. All rights reserved. Time variations MAC layer may not help here at all (might even make things worse) IP has to be resilient against unpredictable invalidation of link connectivity status  Beacons, path breakage updates, keepalives Probably best to minimize global state, use distributed algorithms mostly relying on local state

Click to edit Master title style 8 © 2009 Wichorus Inc. All rights reserved. Conclusions Wireless media are not at all new - but they are not very similar to Ethernet Hidden terminals, exposed terminals, time variations, asymmetries are quite well understood IP achieved worldwide proliferation based on designs suitable for Ethernet But this means it’s required to “think different” to enable IP over wireless to be successful Should this draft become WG Informational doc?