Subject Name: Adhoc Networks Subject Code: 10CS841

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Medium Access Issues David Holmer
1 Chapter 6: MAC Protocols for Ad-Hoc Wireless Networks  Introduction  Issues  Design Goals  Classifications  Contention-based Protocols  Contention-based.
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Nov 2011 Neng Xue Tianxu Wang.
Avoiding Head of Line Blocking in Directional Antenna Vinay Kolar, Sameer Tilak, Dr. Nael Abu-Ghazaleh.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Medium Access Control Sublayer
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
1 MAC Protocols that use Directional Antennnas. 2 Directional Antenna  Directional communication  Less Energy in the wrong direction Better Spatial.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi- Channel Hidden Terminals Using a Single Transceiver (MMAC) Paper by Jungmin So and Nitin Vaidya.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
Priority Scheduling in Wireless Ad Hoc Networks Xue Yang and NitinVaidya University of Illinois at Urbana-Champaign.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
Ad hoc network notes MAC Protocols for Ad-Hoc Wireless Networks
ECE 256, Spring 2009 __________ Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver __________________.
Medium Access Control in Wireless networks
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Dept. of Computer.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
MAC Protocols for Sensor Networks
Wireless Sensor Networks 4. Medium Access
MAC Protocols that use directional Antennas
ICUPC’98 Jing Deng and Zygmunt J. Hass
MARCH: Media Access with Reduced Handshake
Outline What is Wireless LAN Wireless Transmission Types
A Power Control MAC Protocol for Ad Hoc Networks
Wireless MAC.
Lab 7 – CSMA/CD (Data Link Layer Layer)
Contention-based protocols with Reservation Mechanisms
Wireless LANs Wireless proliferating rapidly.
Topics in Distributed Wireless Medium Access Control
SENSYS Presented by Cheolki Lee
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
Multi-channel, multi-radio wireless networks
Channel Allocation (MAC)
Net301 lecture9 11/5/2015 Lect 9 NET301.
CS 457 – Lecture 7 Wireless Networks
MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Provision of Multimedia Services in based Networks
Goal Control the amount of traffic in the network
The Medium Access Control Sublayer
Wireless LAN Simulation IEEE MAC Protocol
EEC-484/584 Computer Networks
Outline 1. INTRODUCTION 2. PRELIMINARIES 3.THE PROPOSED PROTOCOL
Multi-channel, multi-radio
Spectrum Sharing in Cognitive Radio Networks
Subject Name: Adhoc Networks Subject Code: 10CS841
of the IEEE Distributed Coordination Function
Is the MAC sufficient for wireless high speed mesh LANs?
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Presentation transcript:

Subject Name: Adhoc Networks Subject Code: 10CS841 Prepared By: Kavyashree.C Department: CSE Date : 20/1/2015 2/15/2019

Topic Details Introduction Contention-based protocols with scheduling mechanisms MAC Protocols with Directional Antennas Other MAC Protocols 2/15/2019

Introduction Contention-based protocols with scheduling mechanisms Node scheduling is done in a manner so that all nodes are treated fairly and no node is starved of bandwidth. Scheduling-based schemes are also used for enforcing priorities among flows whose packets are queued at nodes. Some scheduling schemes also consider battery characteristics. 2/15/2019

DPS: Distributed Priority Scheduling and MAC in Ad Hoc Networks Achievable by QoS-sensitive MAC and network layer scheduling Distributed scheduling problem with local information. Basic mechanisms: 1.Piggyback information 2.Head-of-line (HoL) packet as the packet with the highest priority (lowest index) 3.RTS, CTS : carry current packet info 4.DATA, ACK: carry next head-of-line info 2/15/2019

2/15/2019

Distributed Wireless Ordering Protocol (DWOP) DWOP based on the DSP, ensure that packet access the medium according to the order specified by an ideal reference schedule such as FIFO. Each node builds up a scheduling table (ST) ordered according to the overheard arrival times according to the overheard arrival times. A node is made eligible to contend for the channel only if its locally queued packet has a smaller arrival time compared to all other arrival times in its ST Scheduling problems: Information asymmetry and Perceived collisions 2/15/2019

Distributed Wireless Ordering Protocol (DWOP) Information asymmetry: a transmitting node might not be aware of the arrival times of packets queued at another node which is not within its transmission range –Solution: a receiver find that the sender is transmitting out of order, an out-of-order notification is piggy-backed by the receiver on the control packet (CTS/ACK)backed by the receiver on the control packet(CTS/ACK) •Perceived collisions: the ACK packet collides at the node, the corresponding entry in the ST will never be removed –Solution: when a node observes that its rank remains fixed while packets whose PR are below the priorityof its packet are being transmitted, it deletes the oldest entry from its ST 2/15/2019

2/15/2019

MAC Protocols with Directional Antennas •Advantages –Reduced signal interference, increase system throughput, and improved channel reuse •Assumptions –Only one radio transceiver can transmit and receive only one packet at any given time –M directional antennas, each antennas having a conical radiation pattern, spanning an angle of 2π/M radians –Adjacent antennas never overlap •If a node transmits when all its antennas are active, then the transmission’s radiation pattern is similar to that of an omni-directional antennas 2/15/2019

2/15/2019

2/15/2019

DBTMA: Directional Busy Tone-Based MAC Protocol Adapt the DBTMA protocol for use with directional antennas. •Directional Antenna –N antenna elements, a sector = 360/N –Unicast: only a single antenna element –Broadcast: all the antenna elements •Protocol: sender transmits RTS in all directions receiver sends back CTS to the sender with the direction of maximum power and turns on the BTr in the direction to the sender sender turns on the BTtin the direction of receiver and transmits data packet 2/15/2019

2/15/2019

2/15/2019

Directional MAC Protocols for Ad Hoc Wireless Networks D-MAC: assume each node knows about the location ofneighborsIn the first directional MAC scheme (DMAC-1) –Directional RTS (DRTS)omni-directional CTS (OCTS)Directional DATA (DDATA)Directional ACK(DACK) –May increase the probability of control packet collisions –(if node E send a packet to node A,it will collide the OCTS or DACK)OCTS or DACK) •In the second directional MAC scheme (DMAC-2) –Both the directional RTS (DRTS) and omni-directional RTS (ORTS) transmissions are used •Reduced control packet collisions •Rules for using DRTS and ORTS: –ORTS: none of the directional antennas are blocked –DRTS : otherwise –Another packet called directional wait-to-send (DWTS) is used in this scheme 2/15/2019

2/15/2019

2/15/2019

Other MAC Protocols MMAC: Multi-Channel MAC Protocol •Assumptions: –No dedicated control channel –N channels for data transmission –Each node maintains a data structure called Preferable ChannelList (PCL) •Three types for channels: –High preference channel (HIGH): the channel is selected by the current node and is used by the node –Medium preference channel (MID): a channel which is free and is not being currently used –Low preference channel (LOW): such a channel is already being used in the transmission range of the node by other neighboring nodes 2/15/2019

2/15/2019

2/15/2019

MCSMA: Multi-Channel CSMA MAC Protocol Select an idle channel randomly and employ the notion of soft channel reservation • Assumptions – N channel: bandwidth = W/N, W is the total bandwidth for communication • An idle node (which is not transmitting packets) continuously monitors all the N channels monitors all the N channels – Idle state: total received signal strength (TRSS) <sensing threshold (ST) – Maintain a free-channels list • Channel selection protocol: – if free-channels list is empty then wait for long inter-frame space time (LIFS) + back-off period – if the channel remains idle start transmitting on this channel – if free-channels list is non-empty then first checks whether the channel it used for its most recent successful transmission in the list – then use this channel for its new transmission else in the free-channels is randomly chosen 2/15/2019

PCM: Power Control MAC Protocol • The PCM allows nodes to vary their transmission power levels on a per packet basis • BASIC scheme – RTS and CTS are transmitted with maximum power pmax – The RTS is received at the receiver with signal level pr – the receiver calculate the desired power level p based on the – the receiver calculate the desired power level p desired based on the received power level pr, the transmitted power level pmax, and the noise level at receiver • In the second method, when the source receives the CTS (in maximum power) packet, it calculates p desired as follows: pdesired= ( pmax/ pr) x Rxthreshx c, where Rxthresh is the minimum necessary received signal strength and c is the constant – Drawbacks: May the probability of collision 2/15/2019

2/15/2019

2/15/2019

RBAR: Receiver-Based Autorate Protocol Rate Adaptation Mechanism – run at the receiver instead of being located at the sender – consist of channel quality estimation and rate selection • Rate selection is done during RTS-CTS packet exchange • The RTS and CTS packets carry the chosen modulation rate and the size of the data packet, instead of the duration of the size of the data packet, instead of the duration of the reservation • The rate chosen by the sender and receiver are different 2/15/2019

2/15/2019

ICSMA: Interleaved Carrier-Sense Multiple Access Protocol Efficiently overcomes the exposed terminal problem – Node C is called a send-exposed node, and node E is called a receiver-exposed node • The total available bandwidth is split into two equal channels (say, channel 1 and channel 2) • The handshaking process is interleaved between the two channels • The handshaking process is interleaved between the two channels – Sender uses a channel (channel 1 ) to send RTS and DATA while receiver uses another channel (channel 2) to send CTS and ACK • A node hear RTS in a particular channel and do not hear CTS on the other channel, it can send RTS in the same channel • A node hear CTS in a particular channel and do not hear RTS on the other channel, it can send CTS in the same channel 2/15/2019

2/15/2019

2/15/2019

Thank You 2/15/2019