1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, 2005. Speaker: Han-Tien Chang.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks 4th Week (Part I) Faisal Aslam.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
1 Introduction to Wireless Networks Michalis Faloutsos.
Distance ADaptive (DAD) Broadcasting for Ad Hoc Networks.
MIMO and TCP: A CASE for CROSS LAYER DESIGN Soon Y. Oh, Mario Gerla Computer Science Dept. University of California, Los Angeles {soonoh,
Sep 12, 2002Wireless Networking Seminar1 Does IEEE Work Well in Multi-hop Wireless Network? Author: Shugong Xu, Tarek Saadawi City University of.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Chapter 5 outline 5.1 Introduction and services
Wireless LAN Simulation - IEEE MAC Protocol
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
MAC Protocols and Security in Ad hoc and Sensor Networks
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Addressing Deafness and Hidden Terminal Problem in Directional Antenna Based Wireless Multi-hop Networks Anand Prabhu Subramanian and Samir R. Das {anandps,
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
TRANSMISSION POWER CONTROL FOR AD HOC WIRELESS NETWORKS: THROUGHPUT, ENERGY AND FAIRNESS Lujun Jia; Xin Liu; Noubir, G.; Rajaraman, R.; Wireless Communications.
Effects of Multi-Rate in Ad Hoc Wireless Networks
Throughput and fairness in a hybrid channel access scheme for ad hoc networks Yu Wang and J.J. Garcia-Luna-Aceves IEEE WCNC 2003 Speaker : earl.
A Power Saving MAC Protocol for Wireless Networks Technical Report July 2002 Eun-Sun Jung Texas A&M University, College Station Nitin H. Vaidya University.
An Energy Efficient MAC Protocol for Wireless LANs Eun-Sun Jung Nitin H. Vaidya IEEE INFCOM 2002 Speaker :王智敏 研二.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
1 MAC Protocols that use Directional Antennnas. 2 Directional Antenna  Directional communication  Less Energy in the wrong direction Better Spatial.
Full auto rate MAC protocol for wireless ad hoc networks Z. Li, A. Das, A.K. Gupta and S. Nandi School of Computer Engineering Nanyang Technological University.
IEEE WLAN.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
Planning and Analyzing Wireless LAN
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
A new Cooperative Strategy for Deafness Prevention in Directional Ad Hoc Networks Andrea Munari, Francesco Rossetto, and Michele Zorzi University of Padova,
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Khaled Hatem Almotairi and Xuemin (Sherman) Shen IEEE Globecom 2010 Speak: Huei-Rung, Tsai Symmetrical Power Control for Multi- channel Multi-hop Wireless.
ECE 256, Spring 2009 __________ Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver __________________.
Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using Snooping Myunghwan Seo, Yonggyu Kim, and Joongsoo.
Medium Access Control in Wireless networks
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
1 Effectiveness of Physical and Virtual Carrier Sensing in IEEE Wireless Ad Hoc Networks Fu-Yi Hung and Ivan Marsic WCNC 2007.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
A Bidirectional Multi-channel MAC Protocol for Improving TCP Performance on Multihop Wireless Ad Hoc Networks Tianbo Kuang and Carey Williamson Department.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
A Power Control MAC Protocol for Ad Hoc Networks
Wireless LAN Simulation IEEE MAC Protocol
User Cooperation for Improving Spatial Spectral Utilization in Multhop Wireless Networks March 1, 2006 Chansu Yu 3/1/2006 NEONet 2006.
Presentation transcript:

1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang

2 Outline Introduction Related Work IEEE MAC Protocol BASIC Power Control Protocol Proposed Power Control MAC Protocol Performance Evaluation Conclusions Comments

3 Introduction Wireless hosts are usually powered by batteries which provide a limited amount of energy. Power saving Enter a doze state by powering off its wireless network interface Power control suitably vary transmit power to reduce energy consumption used to improve spatial reuse of the wireless channel

4 Introduction (cont’d) A simple power control protocol has been proposed based on an RTS–CTS based IEEE network [1,6,10,15]. RTS and CTS are transmitted using the highest power level DATA and ACK are transmitted using the minimum power level necessary for the nodes to communicate Increases collisions and degrades network throughput In this paper, they present a new power control protocol which does not degrade throughput. [1] S. Agarwal, S. Krishnamurthy, R.H. Katz and S.K. Dao, Distributed power control in ad-hoc wireless networks, in: Proc. PIMRC01 (2001). [6] J. Gomez, A.T. Campbell, M. Naghshineh and C. Bisdikian, Conserving transmission power in wireless ad hoc networks, in: Proc. ICNP’01 (November 2001). [10] P. Karn, MACA – a new channel access method for packet radio, in: Proc. 9th ARRL Computer Networking Conference (1990). [15] M.B. Pursley, H.B. Russell and J.S.Wysocarski, Energy-efficient transmission and routing protocols for wireless multiple-hop networks and spread-spectrum radios, in: Proc. EUROCOMM 2000 (2000) pp. 1–5.

5 Related Work Power control mechanism be incorporated into the IEEE RTS–CTS handshake is proposed in [10,15]. Node A, to specify its current transmit power level in the transmitted RTS Allows receiver node B to include a desired transmit power level in the CTS sent back to A. On receiving the CTS, node A then transmits DATA using the power level specified in the CTS. Maintain a desired signal-to-noise ratio of node B.

6 Related Work (cont’d) Transmit power is controlled according to packet size in [4,5]. IEEE may result in unfairness for nodes which use lower transmission power than their neighbor nodes. [14] propose a scheme to improve the fairness. Power Controlled Multiple Access (PCMA) protocol [12] PCMA uses two channels, one channel for “busy tones”, and the other for all other packets. [4] J.-P. Ebert, B. Stremmel, E. Wiederhold and A. Wolisz, An energyefficient power control approach for WLANs, Journal of Communications and Networks 2(3) (2000) 197–206. [5] J.-P. Ebert and A. Wolisz, Combined tuning of RF power and medium access control for WLANs, in: Proc. IEEE International Workshop on Mobile Multimedia Communications (MoMuC’99) (November 1999). [12] J.P. Monks, V. Bharghavan and W.M.W. Hwu, A power controlled multiple access protocol for wireless packet networks, in: Proc. INFOCOM 2001 (April 2001). [14] N. Poojary, S.V. Krishnamurthy and S. Dao, Medium access control in a network of ad hoc mobile nodes with heterogeneous power capabilities, in: Proc. IEEE International Conference on Communications (ICC 2001), Vol. 3 (2001) pp. 872–877.

7 250m 550m IEEE MAC Protocol Distributed Coordination Function Transmission Range Carrier sensing range Carrier sensing zone

8 IEEE MAC Protocol (cont’d) EIFS = SIFS+ DIFS+ [(8 * ACK-size)+PreambleLength+ PLCPHeaderLength] / BitRate  The EIFS interval begins following indication by the physical layer that the channel is idle after sensing of the erroneous frame.  The purpose of EIFS is to protect an ACK frame at the source node.

9 IEEE MAC Protocol (cont’d) Hidden terminal problem nodes in the receiver’s carrier sensing zone, but not in the sender’s carrier sensing zone or transmission range can cause a collision with the reception of a DATA packet at the receiver F Hidden node C D E B A

10 BASIC Power Control Protocol One simple solution As a modification to IEEE Transmit RTS and CTS at the highest possible power level Transmit DATA and ACK at the minimum power level necessary to communicate 1.A destination node receives an RTS, it responds by sending a CTS as usual (at power level p max ). 2.When the source node receives the CTS, it calculates p desired

11 BASIC Power Control Protocol (cont’d) Deficiency of the BASIC protocol The power control mechanism causes The transmission range and carrier sensing range become smaller. The data transmission cannot be detected by some nodes which may interfere the current transmission. More prone to collisions, degrading throughput (as shown in the later simulations)

12 BASIC Power Control Protocol (cont’d) 1.D sends RTS. 2.E sends CTS. 3.Data from D to E 4.ACK from E to D 5.H can hear CTS, but cannot hear data tx. 6.H will interfere the current transmission when H starts transmitting

13 Proposed Power Control MAC (PCM) Protocol The procedure used in PCM Source and destination nodes transmit the RTS and CTS using p max Nodes in the carrier sensing zone set their NAVs for EIFS duration when they sense the signal and cannot decode it correctly The source node may transmit DATA using a lower power level, similar to the BASIC scheme. To avoid a potential collision with the ACK (as discussed earlier) The source node transmits DATA at the power level p max, periodically. For just enough time so that nodes in the carrier sensing zone can sense it.

14 Proposed Power Control MAC Protocol (cont’d) The key difference between PCM and the BASIC scheme The PCM periodically increases the transmit power to p max during the DATA packet transmission. 15μs should be adequate for carrier sensing in [22] EIFS duration is set to 212μs using a 2 Mbps bit rate In PCM, a node transmits DATA at p max every 190μs for a 20μs duration. Thus, the interval between the transmissions at p max is 210μs, which is shorter than EIFS duration. [22] The Editors of IEEE , Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification (1997).

15 Proposed Power Control MAC Protocol (cont’d) The time of carrier sensing and increasing/decreasing output power The interval between the transmissions at p max The procedure graph of PCM

16 Performance Evaluation Simulated schemes BASIC, PCM, PCM40 and IEEE PCM40  increase the transmit power every 170μs for 40μs during DATA transmission Two metrics aggregate throughput over all flows in the network total data delivered per unit of transmit energy consumption (Mbits delivered per Joule)

17 Performance Evaluation (cont’d) Simulation model and topology Use ns-2 with CMU wireless extension All simulation results are the average of 30 runs. Each simulation runs for 20 seconds of simulation time. Topology Chain Topology  vary the distance from 40 m to 250 m Random topology: one hop flows Random topology: multi-hop flows

18 Performance Evaluation (cont’d) Chain Topology: varying node distance

19 Performance Evaluation (cont’d) Chain Topology: varying network load (one hop flow)

20 Performance Evaluation (cont’d) Random topology: network load / different 50 scenarios

21 Performance Evaluation (cont’d) Random topology: varying packet size (one hop flow) Random topology multi-hop flow

22 Conclusions Overcome the shortcoming of the BASIC power control protocol PCM achieves energy savings without causing throughput degradation One possible concern with PCM It requires a frequent increase and decrease in the transmit power which may make the implementation difficult. Future work includes the development of a power control MAC protocol that conserves energy while increasing spatial reuse.

23 Comments Find the deficiency of other works Improve the power control mechanism by a simple manner Various simulation scenarios to support the proposed mechanism