5/5/20151 Mobile Ad hoc Networks COE 549 Transmission Scheduling II Tarek Sheltami KFUPM CCSE COE www.ccse.kfupm.edu.sa/~tarek.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Lecture 9: Multiple Access Protocols
5/11/20151 Computer Networks COE 549 Random Access Tarek Sheltami KFUPM CCSE COE
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
5/21/20151 Mobile Ad hoc Networks COE 549 Capacity Regions Tarek Sheltami KFUPM CCSE COE
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 4 – Ethernet frame.
ECE358: Computer Networks Spring 2012
Mobile Ad hoc Networks COE 549 Delay and Capacity Tradeoffs II Tarek Sheltami KFUPM CCSE COE 8/6/20151.
8/7/2015 Mobile Ad hoc Networks COE 549 Routing Protocols II Tarek Sheltami KFUPM CCSE COE 1.
Ad Hoc Wireless Routing COS 461: Computer Networks
Improved results for a memory allocation problem Rob van Stee University of Karlsruhe Germany Leah Epstein University of Haifa Israel WADS 2007 WAOA 2007.
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Efficient Gathering of Correlated Data in Sensor Networks
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad- Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
10/5/20151 Mobile Ad hoc Networks COE 549 Topology Control Tarek Sheltami KFUPM CCSE COE
10/6/20151 Mobile Ad hoc Networks COE 549 Power Control Tarek Sheltami KFUPM CCSE COE
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Chapter 6 Multiple Radio Access
A Reservation-based TDMA Protocol Using Directional Antennas (RTDMA-DA) For Wireless Mesh Networks Amitabha Das and Tingliang Zhu, Nanyang Technological.
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
SEEDEX: A MAC protocol for ad hoc networks R. Rozovsky and P. R. Kumar ACM ACM MobiHoc 2001 speaker: Chien-Wen.
1 Gossip-Based Ad Hoc Routing Zygmunt J. Haas, Joseph Halpern, LiLi Cornell University Presented By Charuka Silva.
Priority Scheduling in Wireless Ad Hoc Networks Xue Yang and NitinVaidya University of Illinois at Urbana-Champaign.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
doc.: IEEE /183r0 Submission March 2002 David Beberman, Corporate Wave Net, Inc.Slide 1 Single Burst Contention Resolution “Wireless Collision.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad-Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu)
Dynamic TDMA Slot Assignment in Ad Hoc Network
Contention-based protocols with Reservation Mechanisms
SENSYS Presented by Cheolki Lee
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Net301 lecture9 11/5/2015 Lect 9 NET301.
Hidden Terminal Decoding and Mesh Network Capacity
TexPoint fonts used in EMF.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Data Communication Networks
Performance Evaluation of an Integrated-service IEEE Network
Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu)
Subject Name: Adhoc Networks Subject Code: 10CS841
Chapter 6 Multiple Radio Access.
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

5/5/20151 Mobile Ad hoc Networks COE 549 Transmission Scheduling II Tarek Sheltami KFUPM CCSE COE

Outline 5/5/20152  Five Phase Reservation Protocol  Scheduling  Coloring Scheme  Performance Evaluation Five-Phase Reservation Protocol (FPRP), C. Zhu and M. S. Corson, Wireless Networks 7, 371–384, , Kluwer Academic Publishers.

topologies (taken from FPRP)

4 Frame Format of FPRP

5 Format Frame Overview In each Reservation Frame (RF), reservations are made for the next K Information Frames (IF). Each of the N Reservation Slots (RS) of the reservation frame corresponds to one of the N Information Slots (IS) in each of the K Information Frames. Each of the N Reservation Slots consists of M Reservation Cycles, during which a transmission schedule is being built. Each of the M cycles consists of 5 phases. K, N, and M are global design parameters.

6 Phases of a Reservation Cycle 1)Reservation Request (RR) Phase. 2)Collision Report (CR) Phase.  Nodes report collisions that occurred in previous phase. 3)Reservation Confirmation (RC) Phase.  Nodes confirm their requests. 4)Reservation Acknowledgment (RA) Phase.  Nodes acknowledge reservation confirmations. 5)Packing and Elimination (PE) Phase.  Deadlocks are removed and tighter transmission schedules are encouraged.

7 Protocol Description 1. Reservation Request (RR) Phase: Nodes that want to make a reservation transmit a reservation request, with probability p. We discuss later how to select p. The rest of the nodes will either receive nothing, receive a single RR packet, or sense a collision. 2. Collision Report (CR) Phase: Any node that sensed a collision in previous phase transmits a CR packet. Not a problem if CR packets collide. Nodes that transmitted a RR packet but now receive a CR packet (or more) will remain quiet for the rest of the cycle. We totally solved the hidden terminal problem.

8 Protocol Description.. Some deadlocks are resolved: (Definition of deadlock: two nodes transmit to each other.) 3. Reservation Confirmation (RC) Phase: Potential transmitters that were not denied access in phase 2, now transmit an RC packet. RC packets never collide. Now their receivers will now that they must expect a packet. 4. Reservation Acknowledgment (RA) Phase: Scheduled receivers transmit RA packets.

9 Protocol Description.. These will probably collide (for example at scheduled transmitter, but that is acceptable.) Their neighbors will never compete again for the same slot. A few more deadlocks are resolved: 5. Packing and Elimination Phase: Packing packets are transmitted to notify nodes that there are three hops away from other transmitters:

Elimination packets are transmitted with probability p = 0.5, in an effort to resolve rest of deadlocks: Protocol Description..

11 Example: Tandem Network, Phases 1-5 I: idle B: blocked R: receive T: transmit r: receive a packet t: transmit a packet

12 General Network, Phase 1

13 General Network, Phase 2

14 General Network, Phase 3

15 General Network, Phase 4

16 General Network, Phase 5

17 General Network, Phase 5

18 After few reservation cycles

Number of reservation cycles M needed Because of the randomness of the protocol, it may take many cycles until no other node can be added to the set of transmitting nodes. In addition, nodes can not know when this occurs. In practice, node will execute a fixed, predetermined number of cycles, and will then move to the next reservation slot. At any given time, nodes try to guess how many nodes they are competing against, and try to optimize their value of p: If there were many collisions in previous cycles, competition was heavy, so nodes pick small values of p. If there were many idle slots, nodes pick larger values for p.

20 Number of Cycles Vs Slot Randomly created graphs with 100 nodes and 7 neighbors per node an the average. Once a node acquires a color, it stops contending. ANC: Average Number of Cycles needed so that maximum number of nodes are colored. FNC: Fixed Number of Cycles needed so that maximum number of nodes are colored with probability 99%.

After few reservations

22 Nodes can not know when all other nodes were assigned a color. The number of reservation slots has to be agreed beforehand. If N is too large, the last of them, and their associated information slots, are wasted. If N is too small, some nodes will never manage to acquire a color. In practice, we tolerate that with some small probability each node will not acquire a color. Number of reservation slots N needed

23 Number of nodes per slot ANT: Average number of transmitting nodes in each slot. Clearly, the slots toward the end are severely underutilized. How can we fix this?

24 Synchronization Contention packets only need to be a bit long. But guard times between packets are needed, to account for imperfect timing and signal propagation times. To minimize guard times, nodes need to have very accurate clocks with very little drift between them. One solution: use GPS. Without GPS, clock synchronization is a very hard distributed control problem..

25 Connection to graph coloring FPRP algorithm discovers in a distributed manner a coloring of the nodes of the graph, such that no two nodes with the same color are within two hops of each other. What is the minimum number of colors needed? This is an NP- complete problem. We want our algorithm to color the graph with few colors. Why? Let the degree of the graph be the maximum number of edges that a node can have. The degree of our tandem graph is 2. The degree of our general graph is 5 (node 6 has 5 neighbors). We need at least (degree+1) colors to paint the graph. (Why?) This is a tight lower bound, which we call the Degree Lower Bound.

26 Comparison between different coloring algorithms M and N are set very large. Size: number of nodes. DLB: Degree Lower Bound. RAND: Randomized and centralized algorithm. FPRP: Five-Phase Reservation Protocol. R: Parameter affecting average number of neighbors. In left table, R = 1.5. In right table, Size is set to 100.