Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, 2005. Speaker: Han-Tien Chang.

Similar presentations


Presentation on theme: "1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, 2005. Speaker: Han-Tien Chang."— Presentation transcript:

1 1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, 2005. Speaker: Han-Tien Chang

2 2 Outline Introduction Related Work IEEE 802.11 MAC Protocol BASIC Power Control Protocol Proposed Power Control MAC Protocol Performance Evaluation Conclusions Comments

3 3 Introduction Wireless hosts are usually powered by batteries which provide a limited amount of energy. Power saving Enter a doze state by powering off its wireless network interface Power control suitably vary transmit power to reduce energy consumption used to improve spatial reuse of the wireless channel

4 4 Introduction (cont’d) A simple power control protocol has been proposed based on an RTS–CTS based IEEE 802.11 network [1,6,10,15]. RTS and CTS are transmitted using the highest power level DATA and ACK are transmitted using the minimum power level necessary for the nodes to communicate Increases collisions and degrades network throughput In this paper, they present a new power control protocol which does not degrade throughput. [1] S. Agarwal, S. Krishnamurthy, R.H. Katz and S.K. Dao, Distributed power control in ad-hoc wireless networks, in: Proc. PIMRC01 (2001). [6] J. Gomez, A.T. Campbell, M. Naghshineh and C. Bisdikian, Conserving transmission power in wireless ad hoc networks, in: Proc. ICNP’01 (November 2001). [10] P. Karn, MACA – a new channel access method for packet radio, in: Proc. 9th ARRL Computer Networking Conference (1990). [15] M.B. Pursley, H.B. Russell and J.S.Wysocarski, Energy-efficient transmission and routing protocols for wireless multiple-hop networks and spread-spectrum radios, in: Proc. EUROCOMM 2000 (2000) pp. 1–5.

5 5 Related Work Power control mechanism be incorporated into the IEEE 802.11 RTS–CTS handshake is proposed in [10,15]. Node A, to specify its current transmit power level in the transmitted RTS Allows receiver node B to include a desired transmit power level in the CTS sent back to A. On receiving the CTS, node A then transmits DATA using the power level specified in the CTS. Maintain a desired signal-to-noise ratio of node B.

6 6 Related Work (cont’d) Transmit power is controlled according to packet size in [4,5]. IEEE 802.11 may result in unfairness for nodes which use lower transmission power than their neighbor nodes. [14] propose a scheme to improve the fairness. Power Controlled Multiple Access (PCMA) protocol [12] PCMA uses two channels, one channel for “busy tones”, and the other for all other packets. [4] J.-P. Ebert, B. Stremmel, E. Wiederhold and A. Wolisz, An energyefficient power control approach for WLANs, Journal of Communications and Networks 2(3) (2000) 197–206. [5] J.-P. Ebert and A. Wolisz, Combined tuning of RF power and medium access control for WLANs, in: Proc. IEEE International Workshop on Mobile Multimedia Communications (MoMuC’99) (November 1999). [12] J.P. Monks, V. Bharghavan and W.M.W. Hwu, A power controlled multiple access protocol for wireless packet networks, in: Proc. INFOCOM 2001 (April 2001). [14] N. Poojary, S.V. Krishnamurthy and S. Dao, Medium access control in a network of ad hoc mobile nodes with heterogeneous power capabilities, in: Proc. IEEE International Conference on Communications (ICC 2001), Vol. 3 (2001) pp. 872–877.

7 7 250m 550m IEEE 802.11 MAC Protocol Distributed Coordination Function Transmission Range Carrier sensing range Carrier sensing zone

8 8 IEEE 802.11 MAC Protocol (cont’d) EIFS = SIFS+ DIFS+ [(8 * ACK-size)+PreambleLength+ PLCPHeaderLength] / BitRate  The EIFS interval begins following indication by the physical layer that the channel is idle after sensing of the erroneous frame.  The purpose of EIFS is to protect an ACK frame at the source node.

9 9 IEEE 802.11 MAC Protocol (cont’d) Hidden terminal problem nodes in the receiver’s carrier sensing zone, but not in the sender’s carrier sensing zone or transmission range can cause a collision with the reception of a DATA packet at the receiver F Hidden node C D E B A

10 10 BASIC Power Control Protocol One simple solution As a modification to IEEE 802.11 Transmit RTS and CTS at the highest possible power level Transmit DATA and ACK at the minimum power level necessary to communicate 1.A destination node receives an RTS, it responds by sending a CTS as usual (at power level p max ). 2.When the source node receives the CTS, it calculates p desired

11 11 BASIC Power Control Protocol (cont’d) Deficiency of the BASIC protocol The power control mechanism causes The transmission range and carrier sensing range become smaller. The data transmission cannot be detected by some nodes which may interfere the current transmission. More prone to collisions, degrading throughput (as shown in the later simulations)

12 12 BASIC Power Control Protocol (cont’d) 1.D sends RTS. 2.E sends CTS. 3.Data from D to E 4.ACK from E to D 5.H can hear CTS, but cannot hear data tx. 6.H will interfere the current transmission when H starts transmitting

13 13 Proposed Power Control MAC (PCM) Protocol The procedure used in PCM Source and destination nodes transmit the RTS and CTS using p max Nodes in the carrier sensing zone set their NAVs for EIFS duration when they sense the signal and cannot decode it correctly The source node may transmit DATA using a lower power level, similar to the BASIC scheme. To avoid a potential collision with the ACK (as discussed earlier) The source node transmits DATA at the power level p max, periodically. For just enough time so that nodes in the carrier sensing zone can sense it.

14 14 Proposed Power Control MAC Protocol (cont’d) The key difference between PCM and the BASIC scheme The PCM periodically increases the transmit power to p max during the DATA packet transmission. 15μs should be adequate for carrier sensing in [22] EIFS duration is set to 212μs using a 2 Mbps bit rate In PCM, a node transmits DATA at p max every 190μs for a 20μs duration. Thus, the interval between the transmissions at p max is 210μs, which is shorter than EIFS duration. [22] The Editors of IEEE 802.11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification (1997).

15 15 Proposed Power Control MAC Protocol (cont’d) The time of carrier sensing and increasing/decreasing output power The interval between the transmissions at p max The procedure graph of PCM

16 16 Performance Evaluation Simulated schemes BASIC, PCM, PCM40 and IEEE 802.11 PCM40  increase the transmit power every 170μs for 40μs during DATA transmission Two metrics aggregate throughput over all flows in the network total data delivered per unit of transmit energy consumption (Mbits delivered per Joule)

17 17 Performance Evaluation (cont’d) Simulation model and topology Use ns-2 with CMU wireless extension All simulation results are the average of 30 runs. Each simulation runs for 20 seconds of simulation time. Topology Chain Topology  vary the distance from 40 m to 250 m Random topology: one hop flows Random topology: multi-hop flows

18 18 Performance Evaluation (cont’d) Chain Topology: varying node distance

19 19 Performance Evaluation (cont’d) Chain Topology: varying network load (one hop flow)

20 20 Performance Evaluation (cont’d) Random topology: network load / different 50 scenarios

21 21 Performance Evaluation (cont’d) Random topology: varying packet size (one hop flow) Random topology multi-hop flow

22 22 Conclusions Overcome the shortcoming of the BASIC power control protocol PCM achieves energy savings without causing throughput degradation One possible concern with PCM It requires a frequent increase and decrease in the transmit power which may make the implementation difficult. Future work includes the development of a power control MAC protocol that conserves energy while increasing spatial reuse.

23 23 Comments Find the deficiency of other works Improve the power control mechanism by a simple manner Various simulation scenarios to support the proposed mechanism


Download ppt "1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, 2005. Speaker: Han-Tien Chang."

Similar presentations


Ads by Google