1 «Performance Analysis for a New Medium Access Control Protocol in Wireless LANs» By YOUNGGOO KWON and YUGUANG FANG Presentation by Ampatzis Efthimios.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Contents IEEE MAC layer operation Basic CSMA/CA operation
Ethernet – CSMA/CD Review
Achieving Quality of Service in Wireless Networks A simulation comparison of MAC layer protocols. CS444N Presentation By: Priyank Garg Rushabh Doshi.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
Contention Window Optimization for IEEE DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.
Module C- Part 1 WLAN Performance Aspects
School of Information Technologies TCP Congestion Control NETS3303/3603 Week 9.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Evaluate IEEE e EDCA Performance Tyler Ngo CMPE 257.
Slow Start Backoff Algorithm for Wireless Ad Hoc Networks Der-Jiunn Deng Department of Computer Science and Information Engineering National Changhua University.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
1 QoS Schemes for IEEE Wireless LAN – An Evaluation by Anders Lindgren, Andreas Almquist and Olov Schelen Presented by Tony Sung, 10 th Feburary.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
A Multichain Backoff Mechanism for IEEE WLANs Alkesh Patel & Hemant Patel ECE 695 – Leading Discussion By : Shiang- Rung Ye and Yu-Chee Tseng.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
Opersating Mode DCF: distributed coordination function
PLANETE group, INRIA Sophia-Antipolis July 1, 2003 Adaptive Channel allocation for QoS Enhancement in IEEE Wireless LANs Presented by: Mohammad.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
A Virtual Collision Mechanism for IEEE DCF
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Transport over Wireless Networks Myungchul Kim
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Chapter 6 Multiple Radio Access
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
IEEE WLAN.
Access Delay Distribution Estimation in Networks Avideh Zakhor Joint work with: E. Haghani and M. Krishnan.
TCP: Transmission Control Protocol Part II : Protocol Mechanisms Computer Network System Sirak Kaewjamnong Semester 1st, 2004.
1 CS 4396 Computer Networks Lab TCP – Part II. 2 Flow Control Congestion Control Retransmission Timeout TCP:
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Medium Access Control in Wireless networks
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Congestion Control 0.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
EA C451 (Internetworking Technologies)
Medium Access Control MAC protocols: design goals, challenges,
Lab 7 – CSMA/CD (Data Link Layer Layer)
Topics in Distributed Wireless Medium Access Control
Multiple Access Mahesh Jangid Assistant Professor JVW University.
IEEE : Wireless LANs ALOHA, Slotted ALOHA
Transport Layer Unit 5.
Data Communication Networks
Performance Evaluation of an Integrated-service IEEE Network
Wireless LAN Simulation IEEE MAC Protocol
Computer Networks Protocols
Enhanced Backoff Scheme in CSMA/CA for IEEE
Chapter 6 Multiple Radio Access.
Transport Layer 9/22/2019.
Presentation transcript:

1 «Performance Analysis for a New Medium Access Control Protocol in Wireless LANs» By YOUNGGOO KWON and YUGUANG FANG Presentation by Ampatzis Efthimios

2 Presentation Scheduling 1.Introduction and Backrounds 2.Fast Collision Resolution Algorithm 3.Performance Evaluation of FCR 4.Conclusions

3 Why choosing a Contention Based MAC Protocol for WLANs? Combination of efficient sharing to limited spectrum resources and simplicity in implementation. Incorporating Carrier Sense Multiple Access as well as handshaking mechanisms for collision avoidance (CA) Provides high throughput, low latency and fairness in performance, using an FCR algorithm.

4 Notes to be taken in consideration Wireless Medium/Channel causes severe degradation on the performance of Transport Layer due to low bandwidth and high error rate. Degradation due to the characteristics incorporated by the physical layer The encapsulation of packets, in MAC Layer may cause many retransmissions of segments. MAC Layer overheads usually cause additional collisions and delays. During RTO (retransmission time out) intervals TCP operations (ack signals) cannot be carried out and performance degradates.

5 What this scheme include/incorporate? IP of the network layer is prevalently cooperating with TCP and UDP in order to support: 1.Transparency in data transfer 2.Flow and congestion control 3.Ordering and receiving data 4.ACK signals * note TCP, UDP run above MAC Layer

6 Deficiency in WLANs 1.Packet Collisions due to the increasement of active users. 2.Deferring Stations are likely to collide again in the future. 3.Wasted idle slots due to back offs in each contention cycle. * deferring stations are those that attempting to transmit, have faced a collision and backed off

7 IEEE MAC protocol A packet transmission is considered to be successful if only destination station answers back with an «ack» signal. A carrier sense mechanism is used to check the medium status. If the medium is idle, transmission may proceed. If the medium is busy the station will defer until a number of idle time slots is being detected (DIFS). Then, the station takes a back off time period, based on the current Contention Window size. Backoff Time (BT)=Random( uniform distribution) *aSlottTime The choice is over the interval [0,CW-1].

8 The back off time period will be decreased by a time slot, if only there is an idle time slot detected. When this period reach zero, transmission begins. After a SIFS time if an ack signal arrive then transmission is complete. Then the contention window size has it’s minimum value. In case that there is no ack signal the CW size will be increased in order to obtain a higher probability to transmit successfully the segment. The increment of CW size from it’s min value to its max, will take place in a BEB way. * BEB stands for binary exponential back off *note MAC protocol is based on CSMA/CA mechanism

9 Transport Layer Provides end-to-end communication services Flow control, error recovery, ack signals, mult/demultiplexing sessions. Incorporates two protocols: TCP (transmission control protocol) UDP (user datagram protocol)

10 Transmission Control Protocol Provides reliability for each end host. Retransmits the segments that had no ack signal response within RTO interval. It controls new packets’ transmission, taking into consideration the amount of data, receiver’s buffering capabilities, network congestion and packet loss. Including mechanisms that allow multiple transmission before the ack signals arrive back to the sender. In case that a packet gets lost, mechanisms of packet retrieval are activated.

11 Transmission Control Protocol There exist a mechanism of slow start when a packet loss occurs, fact that damage the end-to- end throughput. Fast retransmit and fast recovery have been proposed to speed up the recovery of the connection. Indicative ack responses have been adopted in order to point to the next packet expected to be sent (monitor duplicated ack signals). There is an upper limit of lost packets that don’t force the sender change in slow start mode. Thus Fast Recovery Mechanisms perform instead of slow start mode which ends up in data congestion.

12 User Data Protocol UDP is transaction oriented and not connection oriented as TCP. Connectionless. Minimizes overheads of the protocol mechanisms Delivery and duplicate protection are not assured. «Send and Pray» Protocol. UDP encapsulates raw IP datagrams and sending them in a «connectionless» way. Suitable for one request and one response. UDP can be considered to be a bit closer to the segment «format» and application process because of its clear functionality onto the segment of data.

13 Fast Collision Resolution Scheme Throughput Performance per Transmission Cycle E[Nc]: avg num of collisions E[Bc]: avg num of idle slots t s : time slot duration /m : avg packet length SIFS: short interframe space DIFS: distributed coordination interframe space ack :acknowledgment signal duration

14 MAC protocol design Best case scenario: «A successful packet transmission must be followed by another packet transmission without overheads». In this case E[Nc]=0, E[Bc]=0 which ends up to: Back off time Bi assignment, should be zero for transmission station and infinite for all other stations. This is the idea for perfect scheduling. The probability of packet transmission for station i would be:

15 The station i keeps it’s CW size (min value) and transmits again with p trans = 1. But, dominance of the medium by one single node must be prevented. In this case we reduce the amount of idle back off slots for the deferred stations and keep up fairness in the usage of the medium by inserting a fast back off timer reduction algorithm into the FCR. Generally p trans = 1/(Bi+1)

16 Operational Characteristics of a MAC protocol with high throughput and good fairness Small random back off timer for the station that just completes a successful transmission in a contention cycle. Large random back off timer for the stations that are deferred in the specific contention cycle. Adaptive assignment of back off timers according to stations current states. Transmitting or deferring. All deferred stations will give more time to the transmitting station to finish with back logged packets (net effect). Upper limit of successive transmissions by any node.

17 Special Topics in proposed “FCR” CW size for deferring changes whenever an idle slot is detected. Additional back off time regeneration for transmitting stations to avoid future collisions. Use much smaller minimum initial CW size and much larger maximum CW size than IEEE MAC. Reduce the back off timers exponentially when a prefixed number of idle slots are detected. When back of timers increase, the probability of collisions decrease. There is a maximum successive packet transmis- sion limit to keep good fairness. Fast Collision Resolution Algorithm

18 Detailed FCR algorithm Back off procedure Initial Decrement of Back off Time: BT new = BT old - aSlotTime If (minCW+1)*2-1 idle time slots being detected BT new = BT old -BT old /2 Transmission Failure (packet collision) If a station receive no ack signal the CW size will be increased and a new random back off time will be chosen: CW=min (max CW, CW*2) BT=uniform(0,CW-1)*aSlotTime

19 Successful packet transmission If a station receive an ack signal new CW,BT values will be assigned. CW=min (CW) BT=uniform(0,CW-1)*aSlotTime If the station reach the upper limit of successive transmissions then: CW=max (CW) BT=uniform(0,CW-1)*aSlotTime Deferring State CW= min (maxCW,CW*2) BT=uniform(0,CW-1)*aSlotTime

20 After a successful transmission, a station has the minimum CW size and smaller back off timer, hence higher probability to gain access of the medium. When a station reach the limit of successful transmission another station may win the contention by increasing it’s probability to gain medium access. If a good channel is being detected the modulation rate can be change in order to transmit more packets in the specific time period which is secured by Network Allocation Vector.

21 Performance Evaluation The parameters used in simulations based on the IEEE network configurations The packet lengths are geometrically distributed (best effort data trials) hence the probability: P [ PacketLength ] = q i-1 *(1-q), i>=1 Thus the avg transmission time for a packet length Mean (m) = t s /1-q (μs) t s = aSlotTime

22 For 50 and 100 stations the IEEE MAC algorithm shows very poor throughput performance because the number of collisions becomes higher as the number of active stations becomes larger. In the proposed FCR, future collisions can be prevented due to the increment of CW size (makes the probability of transmission lower of all the deferred stations by choosing properly CW sizes which is reflecting on BT period).

23 The proposed MAC protocol works well at saturated situation load. It also performs efficiently under light load conditions while providing high throughput as network loads increases. The number of stations hardly affects the performance of FCR. Adaptive characteristics of FCR in the medium access and medium status.

24 FCR resolves collisions faster than IEEE The delay to the proposed FCR is the time period from the time that the packet arrives from the higher layer to the MAC layer until it is successfully transmitted. No queuing delay because of no other packet generation till the complete transmission of the current one.

25 FCR improves the throughput of FTP connections about 15-35% and also fairness index.

26 Conclusions FCR algorithm: 1.Improves the performance (throughput, fairness, packet delivery ratio) of the transport layer by reducing the average number of wasted idle slots. 2.Preserves simplicity in implementation. 3.Supports TCP and UDP protocols of transport layer by evaluating the degree of fairness. 4.Also improves the performance at higher levels due to efficient collision resolution mechanisms. 5.Incorporates innovative ideas about CW sizes that are reflected in BT periods which in turn change the transmission probabilities to avoid future collisions.