Presentation is loading. Please wait.

Presentation is loading. Please wait.

Doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area.

Similar presentations


Presentation on theme: "Doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area."— Presentation transcript:

1 doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [New Protocol to Solve the Deadlock of IEEE MAC] Date Submitted: [Sept. 2004] Source: [Liang Li, Xin Wang, Chenyang Yang, Zhijian Hu ] Company: [WXZJ Inc.] Address: [Building D, No.2, Shangdi XinXi Lu, Beijing, China ] Voice:[], Re: [ IEEE b ] Abstract:[This contribution proposes an enhanced MAC for TG4.] Purpose:[ Response to the call for proposal of IEEE b, Doc Number: b] Notice:This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P

2 doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 2 Proposal Enhance the IEEE CSMA/CA algorithm –Solving the deadlock problems –Achieving the High throughput –Keeping the High energy efficiency

3 doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 3 Deadlock in ad hoc The two nodes transmit the data to each other and are hard to receive the data from the other each other. Ref IEEE for the description of deadlock

4 doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 4 State Chart with current CSMA/CA Once one node enters this circle, it can not receive the data frames until it transmits the data successfully or abandons the transmission.

5 doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 5 The Deadlock in the States Viewpoint When a node is in State 1, it can’t receive the data from the nodes within State 2, nor it sends the ack to nodes within State 3. When a node is within State 2, it will make other nodes failed to contend the channel. When a node is within State 3, it can’t receive the data from the nodes in State 2.

6 doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 6 New CSMA/CA: Monitoring the Channel and Adding the Backoff Counter Set the node within State 1 and may monitor the channel and receive the data, then send the acknowledgement back. The backoff counter is introduced. The deadlock circle may be broken in such way.

7 doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 7 The Flowchart of the CSMA/CA

8 doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 8 The Simple Explanation to the New CSMA/CA Algorithm The node should decrease the backoff counter if the channel is idle, otherwise it should pause the decreasing of the backoff counter. When there is packet transmitting in the channel, the node who is in backoff state will detect a busy channel. The backoff counter of this node will not decrease in this period. When the packet has been received, the node will process the packet first and send back the ACK if necessary. Then the backoff counter will continue to decease since the channel is idle.

9 doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 9 The Multiple-Response of the Two Nodes (1)

10 doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 10 The Multiple-response of the Two Nodes (2) Node A & B begin the backoff procedure simultaneous. Node A finishes the backoff first and begins its transmission. Node B will receive the packet that transmitted by Node A and don’t decrease its own backoff counter. Node B send back the ACK after the receiving and enter the backoff state again.

11 doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 11 Simulation with new MAC Protocol (1) We test our new mac protocol in a linear ad hoc networks. The throughput and energy-efficiency have been tested. The throughput is defined as the end-to-end throughput when packets are transmitted in multihop.

12 doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 12 Simulation (2) : Throughput Because the new protocol can reduce the collision of the packet,the throughput of the new mac protocol has been improved dramatically.

13 doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 13 Simulation (3) : Energy Efficiency Because the new mac protocol can reduce the probability of the collision, the energy used for retransmission can be saved. Hence the energy efficiency of new man is better than the current ones.

14 doc.: IEEE b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 14 Conclusion The backoff counter is introduced to break the deadlock circle. Each node needs to monitor the coming data. This modification can improve the throughput of the network and achieve the better energy efficiency.


Download ppt "Doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area."

Similar presentations


Ads by Google