A Bandwidth Allocation/Sharing/Extension Protocol for Multimedia Over IEEE 802.11 Ad Hoc Wireless LANs Shiann-Tsong Sheu and Tzu-fang Sheu IEEE JOURNAL.

Slides:



Advertisements
Similar presentations
The Medium Access Control Sublayer
Advertisements

Chapter 14 무선 LAN (Wireless LAN).
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Advanced Piloting Cruise Plot.
Chapter 1 The Study of Body Function Image PowerPoint
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
1 Predictive Group Handover Scheme with Sub-Channel Borrowing for IEEE j- enabled Vehicular Networks Broadband Wireless Communication.
Page 1 Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc Networks Approximately Maximum Bandwidth Routing for Slotted Wireless Ad Hoc.
Doc.: IEEE /272a Submission June 2001 S. Choi, Philips Research Slide 1 Problems with IEEE (e) NAV Operation and ONAV Proposal Javier del.
Doc.: IEEE /037 Submission January 2001 Khaled Turki et. al,Texas InstrumentsSlide 1 Simulation Results for p-DCF, v-DCF and Legacy DCF Khaled.
Doc.: IEEE /037r1 Submission March 2001 Khaled Turki et. al,Texas InstrumentsSlide 1 Simulation Results for p-DCF, v-DCF and Legacy DCF Khaled.
Doc.: IEEE /301R0 Submission May 2002 Terry Cole, AMDSlide 1 A More Efficient Protection Mechanism Terry Cole AMD Fellow +1.
Speaker Fu-Yuan Chuang Advisor Ho-Ting Wu Date
1 The Case for Heterogeneous Wireless MACs Chun-cheng Chen Haiyun Luo Dept. of Computer Science, UIUC.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Year 6 mental test 5 second questions
Università degli Studi di Firenze 08 July 2004 COST th MCM - Budapest, Hungary 1 Cross-layer design for Multiple access techniques in wireless communications.
Streaming Video over the Internet
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine.
Richmond House, Liverpool (1) 26 th January 2004.
1 Quality of Service Issues Network design and security Lecture 12.
ABC Technology Project
VOORBLAD.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Squares and Square Root WALK. Solve each problem REVIEW:
Do you have the Maths Factor?. Maths Can you beat this term’s Maths Challenge?
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
© 2012 National Heart Foundation of Australia. Slide 2.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 6 Ethernet Fundamentals.
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 ETHERNET Derived From CCNA Network Fundamentals – Chapter 9 EN0129 PC AND NETWORK TECHNOLOGY.
Doc.:IEEE /223r1 Submission March 2002 J. del Prado and S. Choi, Philips Slide 1 CC/RR Performance Evaluation - Revisited Javier del Prado and.
Doc.: IEEE /080r1 Submission January 2001 Jie Liang, Texas InstrumentsSlide 1 Jie Liang Texas Instruments Incorporated TI Blvd. Dallas,
Doc.: IEEE /571r0 CC/RR Model and Simulations November, 2001 Matthew Sherman & Wei Lin, AT&T Labs - ResearchSlide 1 CC/RR Model and Simulations.
Chapter 5 Test Review Sections 5-1 through 5-4.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
1 S Digital Communication Systems Advanced Modulation and Random Access Techniques.
25 seconds left…...
Multistage Spectrum Sensing for Cognitive Radios UCLA CORES.
Week 1.
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
PSSA Preparation.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 16 Integrated Services Digital Network (ISDN)
QoS Provisioning in Wireless Mesh Networks
A Bandwidth Allocation/Sharing/Extension Protocol for Multimedia Over IEEE Ad Hoc Wireless LANs Παρουσίαση : Τσιπουρίδου Δέσποινα Shiann-Tsong Sheu,
Two Media Access Control Protocols (MAC) for Wireless Networks.
1 QoS Schemes for IEEE Wireless LAN – An Evaluation by Anders Lindgren, Andreas Almquist and Olov Schelen Presented by Tony Sung, 10 th Feburary.
1 A Bandwidth Allocation/Sharing/Extension Protocol for Multimedia Over IEEE Ad Hoc Wireless LANs IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS,
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Link-Adaptable Polling-based MAC Protocol for Wireless LANs Byung-Seo Kim, Sung Won Kim, Yuguang Fang and Tan F. Wong Department of Electrical and Computer.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Planning and Analyzing Wireless LAN
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Design and Implementation of a Reservation-based MAC Protocol for Voice/Data over IEEE Ad-Hoc Wireless Networks Shiann-Tsong Sheu, Tzu-Fang Sheu.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
MR2RP: The Multi-Rate and Multi-Range Routing Protocol for IEEE 802
Outline 1. INTRODUCTION 2. PRELIMINARIES 3.THE PROPOSED PROTOCOL
Presentation transcript:

A Bandwidth Allocation/Sharing/Extension Protocol for Multimedia Over IEEE Ad Hoc Wireless LANs Shiann-Tsong Sheu and Tzu-fang Sheu IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL 19. NO. 10. OCT Presented: Nov

2 Outline Introduction DBASE protocol Throughput analysis Performance evaluation Conclusions

3 Idea concepts The bandwidth allocation/sharing/extension protocol (DBASE) approach is proposed to support multimedia traffic over ad hoc networks. The basic concept is that each time real time station transmits packet it will also declare and reserve the needed bandwidth at the next contention free period (CFP). Every rt-station collects this information and then calculates its actual bandwidth at the next cycle.

4 Introduction As the speed and capacity of wireless LAN increases, so dose the demand for improving quality of service for real-time multimedia applications. The MAC is one of the most important issue to efficiently use wireless channel.

5 Assumptions The wireless channel is error-free. The propagation delay and state transition time are ignored. There are no hidden terminals and all stations in a WLAN can hear each other.

6 DBASE protocol For non-rt-stations, access method is the same with the conventional DCF. For rt-stations, access method contains all of the following procedures: - Reservation - Allocation - Sharing - Extension

7 Skeleton diagram RBT: Real time Backoff time DBT: Data Backoff time

8 Access approaches nrt-session D max Abbreviations - ReSerVation Table (RSVT) - Sequence ID (SID) and Active counter (AC) - D max interval - Reservation Frame (RF) - Contention Free Period Generator(CFPG) RF frame all rt-sessions MAC address Packet length Traffic type

9 Reservation procedure Every rt-session needs build and maintain a RSVT. RF must be sent in the time stamp t+D max if there is any session recorded in the RSVT.

10 Reservation procedure(cont d) nrt rt

11 Reservation procedure(cont d) Collision resolution for rt-stations: - P-persistent The rt-backoff time is defined as: If collision occurs, rt-station will retransmit the RTS in next slot with probability P, and in next backoff range in probability 1-P. The next backoff time is defined as:

12 Reservation procedure(cont d) Normal transmission c d P 1 - P After collision c+1 d

13 Allocation procedure Each station can only reserve the bandwidth less than average bandwidth requirement (ABR). Retransmission approach. Next Degree Extension Flag (used in extension procedure) Raise Degree (used in extension procedure)

14 Sharing procedure This procedure is to reallocate residual bandwidth for the overloaded rt-stations.

15 Extension procedure This procedure to solve the circumstance that the burst traffic arrives just after a rt-station has issued the ND for the next cycle. Extension Flag (EF) and Raise Degree (RD) are used here! Reschedule the SID in the beginning of the CFP.

16 Extension procedure(cont d) Next Current Raise

17 Extension procedure(cont d)

18 Extension procedure(cont d)

19 Retransmission scheme RTM: Retransmission Mapping frame

20 Throughput analysis Model for rt-station (P-persistent):

21 Throughput analysis(cont d) Model for nrt-station:

22 Throughput analysis(cont d) After the analysis, the normalized saturation throughput S is as:

23 Performance evaluation Traffic models and parameters for CBR and VBR are in Table II and Table III, respectively. Goodput and packet delay dropped probability (PDDP)

24 Performance evaluation (cont d) The estimated saturation capacity of the system can up to 112 sessions for CBR and up to 39 sessions for VBR

25 Performance evaluation(cont d)

26 Performance evaluation(cont d)

27 Conclusions The DBASE approach is proposed to support multimedia traffic over ad hoc networks. The RF frame would be a heavy overhead when lots of rt-stations recorded on it. The circumstance that the information in PF may influence to the neighbor BSS. The DBASE approach really likes the PCF!!