1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Medium Access Issues David Holmer
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
1 Chapter 6: MAC Protocols for Ad-Hoc Wireless Networks  Introduction  Issues  Design Goals  Classifications  Contention-based Protocols  Contention-based.
Both RTS and CTS contains: The address of the sender The address of the receiver The sizeof the intended data short message size contention concentrated.
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
Combating the effects of Hidden Terminals in Multi Channel MAC Protocols Mthulisi Velempini.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Wireless Medium Access Control Protocols
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
The Effect of Exerting Adequate Persistence in Collision Avoidance Protocols J.J. Garcia-Luna-Aceves and Makis Tzamaloukas {jj, Computer.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Opersating Mode DCF: distributed coordination function
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
A Medium Access Control Protocol with Reliable Multicast Support for Wireless Networks Thesis defense of: Vikram Shankar Advising Committee: Dr. Sandeep.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Tamer Nadeem Dept. of Computer Science Lec #5: Advanced MAC Schemes Dual Busy Tone & Collision.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Multiple Access.
Chapter 6 Multiple Radio Access
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
ICUPC’98 Jing Deng and Zygmunt J. Hass
TCP and MAC interplay in Wireless Ad Hoc Networks
Net301 lecture9 11/5/2015 Lect 9 NET301.
Wireless LAN Simulation IEEE MAC Protocol
Outline 1. INTRODUCTION 2. PRELIMINARIES 3.THE PROPOSED PROTOCOL
Chapter 6 Multiple Radio Access.
Presentation transcript:

1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June, 2002 This paper completely solves hidden and exposed terminal problems

2 Key Idea & Goals & Main Results  Key idea:  Use out-band channels to distribute information  Continuously protect data packet transmission  Goals  Solve hidden & exposed terminal problems  Main Results  DBTMA: two out-of-band busy tones & RTS MAC  Completely solve hidden & exposed terminal problems

3 Related Works  BTMA (Busy Tone Multiple Access, F. A. Tobagi & L. Kleinrock 1975):  Using two channels: data channel & control channel  A control center - basestation  When base station senses the transmission of a terminal, it broadcasts a busy tone signal to all terminals, keeping them (except the current transmitter) from accessing the channel  RI-BTMA (Receiver-Initiated Busy Tone Multiple Access, C. Wu & V. O. K. Li 1987)  Time is slotted (similar to slotted ALOHA & need time clock synchronization)  A packet preamble is sent to intended receiver by the transmitter  Receiver sets up an out-of-band busy tone and waits for the data  When sensing busy tone, transmitter sends the data packet  FAMA (Floor Acquisition Multiple Access, C. L. Fuller & J.J Garecia-Luna-Aceves 1995)  FAMA-NPC (NPC = on-persistent packet sensing) oMACA  FAMA-NCS (NCS non-persistent carrier sensing) oSensing carrier before sending RTS If clear, sends RTS Otherwise, waiting a ransom time, sensing carrier again

4 DBTMA  Two narrow-bandwidth tones  BTt Set up by the node which has data to send Stop when completing transmitting RTS  BTr Set up by the node which receives RTS Stop when completely receives the data packet  All nodes sensing any busy tone are not allowed to send RTS  Any node sensing no busy tone is allowed to transmit RTS CA DATA RTS DATA RTS B

5 Functionalities of Busy Tones  BTr (set up by receiver)  Notifying the RTS sender that RTS has been received and channel has been acquired  Announcing to its neighbor nodes that it is receiving data packet and they should refrain from accessing the channel  BTt (set up by sender)  Providing protection for the RTS packet

6 Seven DBTMA Operation States  IDLE  Node with on packets to send stays in IDLE state  CONTEND  Node has data to send but it is not allowed to send RTS, it stays in CONTEND state  S_RTS  Node sending RTS is in S_RTS state  S_DATA  Node sending data is in S_DATA state  WF_BTR  RTS packet sender waiting for the ACK from its intended receiver is in WF_BTR state  WF_DATA  Receiver waiting for DATA is in WF_DATA state  WAIT  Node send out RTS and senses BTr and waits a mandatory time, it is WAIT state

7 Finite State Machine of DBTMA

8 More Details for DBTMA  When A has data to send while it is IDLE state  Senses BTt and BTr If both are clear –Turns on BTt –Sends out RTS and enters S_RTS state –Turns off BTt at the end of RTS transmission and gets out S_RTS state –Sets a timer for expected BTr and enters WF_BTR state »If BTr is sensed, enters WAIT state and waits for tmw, then enters S_DATA state and sends data packet »Otherwise, timer goes to zero, A goes to IDLE state –Enters IDLE state Otherwise –Sets a random timer and goes to CONTENT state »If BTt or BTr is still sensed when timer goes to zero, A goes to IDLE state »Otherwise, A turns on BTt and enters S_RTS state if no any busy tone signal is sensing  When B receives RTS, B turns on BTr and sets a timer for expected data packet and enters WF_DATA state  If B has not received data packet before timer goes to zero  B turns off BTr and goes to IDLE state Otherwise, B receives data packet and turns off its BTr when completely getting the data packet  When BTr sensed by any Other Node which is in S_RTS state, the node aborts it RTS and goes to IDLE state

9 Time Diagram of DBTMA RTS DATA A B BTr of B BTt of A tmw RTS C

10 Performance Analysis (single broadcast domain case)  Assumptions:  A lot of nodes and all nodes are in the same broadcast domain  No channel fading, capture effect  Packet collisions are the only reason for packet errors  Data processing time and transmit/receive turn around time are negligible  Bandwidth consumption of busy tones is negligible compared with data channel

11 Channel Throughputs of DBTMA Capacity = 1 Mbps Data packet = 4096 b RTS = 200 b 20 nodes in 50 by 50 m^2 Radio transmission range = 35m Maximum propagation delay = 0.12

12 Impact of Busy Tone Detection Delay RTS DATA A B BTr of B BTt of A tmw C Busy Tone Detection Delay

13 Channel Throughput (ad-hoc network) Capacity = 1 Mbps Data packet = 4096 b RTS = 200 b Radio transmission range = 2 km Propagation delay = 6.7

14 Comparisons of Channel Throughput Capacity = 256 kbps Data packet = 4096 b RTS = 200 b Each node are 6 km from each other Propagation delay = 20

15 Comparison of Different Length of Control Packet Full connected network Every node randomly choose its destination for each generated data packet Capacity = 1 Mbps Data packet size =4096 b 20 nodes in 50 by 50 m^2 Radio transmission range = 35 m Propagation delay = 0.12

16 Network Utilization of DBTMA in Multi-Hop Networks 50 nodes in 400 by 400 m^2 Radio transmission range = 100 m RTS size = 200 b Packet size = 4096 b Capacity = 1 Mbps Propagation delay = 0.33 \mu s Packet arrival at each node is Poisson distributed Each node randomly selects a neighbor as the destination of each packet Modified DBTMA 4.2 FAMA-NCS 2.4 DBTMA 5.7 RI-BTMA 4.8 MACA 2.2

17 Summary  DBTMA does solve hidden & exposed terminal problems  DBTMA is based on the idea presented in RI-BTMA  Some idea  Using some kind of out-of-band control channel to propagate some info to achieve some performance targets

18 DBTMA 2  Two narrow-bandwidth tones  BTt Set up by the node which has data to send –Increase the probability of successful RTS reception Stop when completing transmitting RTS  BTr Set up by the node which receives RTS –Acknowledge RTS reception –Provides continuous protection for the transmitted data packet Stop when completely receives the data packet  All nodes sensing any busy tone are not allowed to send RTS  Any node sensing no busy tone is allowed to transmit RTS CA DATA RTS DATA RTS B

19 Performance Analysis (cont)

20 DBTMA  Two narrow-bandwidth tones  BTt Set up by the node which has data to send –Increase the probability of successful RTS reception Stop when completing transmitting RTS  BTr Set up by the node which receives RTS –Acknowledge RTS reception –Provides continuous protection for the transmitted data packet Stop when completely receives the data packet  All nodes sensing any busy tone are not allowed to send RTS  Any node sensing no busy tone is allowed to transmit A B RTS DATA