Earl1 MACA-BI(MACA By Invitation) A Receiver Oriented Access Protocol for Wireless Multihop Network F. Talucci, M. Gerla, and L. Fratta Proceedings of.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Receiver Initiated MAC protocols Prof. Marco Aurélio Spohn DSC/UFCG
How Effective is the IEEE RTS/CTS Handshake in Ad Hoc Networks Kaixin Xu,Mario Gerla, Sang Bae IEEE Globecom 2002.
MACA-BI(MACA By Invitation) A Wireless MAC Protocol for High Speed ad hoc Networking 컴퓨터 및 정보통신공학과 김 연주.
Both RTS and CTS contains: The address of the sender The address of the receiver The sizeof the intended data short message size contention concentrated.
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Nov 2011 Neng Xue Tianxu Wang.
Hai-Heng Ng, Wee-Seng Soh, Mehul Motani National University of Singapore IEEE GLOBECOM 2008.
Ad Hoc Wireless Media Access Protocols Mikko Raatikainen, TiTe 5.
Receiver-Initiated Channel Hopping (RICH) Makis Tzamaloukas Computer and Communications Research Group (CCRG)
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
1 Introduction to Wireless Networks Michalis Faloutsos.
Reversing the Collision Avoidance Handshake in Wireless Networks J.J. Garcia-Luna-Aceves and Makis Tzamaloukas Computer and Communications.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
The Effect of Exerting Adequate Persistence in Collision Avoidance Protocols J.J. Garcia-Luna-Aceves and Makis Tzamaloukas {jj, Computer.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Using Directional Antennas for Medium Access Control in Ad Hoc Networks MOBICOM 2002 R. Roy Choudhury et al Presented by Hyeeun Choi.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
A Medium Access Control Protocol with Reliable Multicast Support for Wireless Networks Thesis defense of: Vikram Shankar Advising Committee: Dr. Sandeep.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Energy Efficient MAC Protocols For Ad Hoc Networks by Vanitha SivaSubramaniam Distributed System Design Professor: Dr. Wu Jie 4/10/2003.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
A Directional MAC Protocol for Practical Smart Antennas Yuya Takatsuka, Katsushiro Nagashima, Masaki Bandai and Takashi Watanabe Shiuzoka University GLOBECOM’06.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Reliable MAC Layer Multicast in IEEE Wireless Networks Min-Te Sun, Lifei Huang, Anish Arora, Ten-Hwang Lai Department of Computer and Information.
Throughput and fairness in a hybrid channel access scheme for ad hoc networks Yu Wang and J.J. Garcia-Luna-Aceves IEEE WCNC 2003 Speaker : earl.
Wireless MAC Protocols Presenter: George Nychis Xi Liu.
Computer Networking Lecture 6 – MAC. 2 Readings [E.2] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang. MACAW: A Media Access Protocol for.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi- Channel Hidden Terminals Using a Single Transceiver (MMAC) Paper by Jungmin So and Nitin Vaidya.
Full auto rate MAC protocol for wireless ad hoc networks Z. Li, A. Das, A.K. Gupta and S. Nandi School of Computer Engineering Nanyang Technological University.
Mohamed Elhawary Computer Science Department Cornell University PERCOM 2008 Zygmunt J. Haas Electrical and Computer Engineering Department Cornell University.
Chih-Min Chao and Yao-Zong Wang Department of Computer Science and Engineering National Taiwan Ocean University, Taiwan IEEE WCNC 2010 A Multiple Rendezvous.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
WLAN.
Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using Snooping Myunghwan Seo, Yonggyu Kim, and Joongsoo.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
0.1 IT 601: Mobile Computing MAC Protocols Prof. Anirudha Sahoo IIT Bombay.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray,Jeffrey B. Carruthers and David Starobinski WCNC 2003.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
DOTS: A Propagation Delay-aware Opportunistic MAC Protocol for Underwater Sensor Networks IEEE ICNP 2010 (18.2%) Youngtae Noh, Mario Gerla (UCLA, CS) Paul.
PAC: Perceptive Admission Control for Mobile Wireless Networks Ian D. Chakeres Elizabeth M. Belding-Royer.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
A Bidirectional Multi-channel MAC Protocol for Improving TCP Performance on Multihop Wireless Ad Hoc Networks Tianbo Kuang and Carey Williamson Department.
5/12/2005doc.: IEEE /0334 Submission Ripple: A Distributed Medium Access Protocol for Wireless Mesh Network Presented at the IEEE802.11, ,
MAC Protocols for Sensor Networks
TCP and MAC interplay in Wireless Ad Hoc Networks
Outline 1. INTRODUCTION 2. PRELIMINARIES 3.THE PROPOSED PROTOCOL
Wireless LAN Protocols
Presentation transcript:

earl1 MACA-BI(MACA By Invitation) A Receiver Oriented Access Protocol for Wireless Multihop Network F. Talucci, M. Gerla, and L. Fratta Proceedings of IEEE PIMRC'97 (Personal, Indoor and Mobile Radio Communications-1997) Speaker: Earl Kuo

earl 2 Outline Introduction Related Work MACA illustrated MACA-BI illustrated Collisions in MACA-BI Simulation Conclusion

earl 3 Introduction Tx-Rx turn-around time (the transition time from transmit to receive state)

earl 4 Related Work [8]L.Kleinrock and F.Tobagi. “Packet switching in radio channels : Part 1 carrier sense multiple-access modes and their throughput-delay characteristic.” IEEE Trans Comm COM-23 no 12: ,1975. [7]P. Karn. “MACA a new channel access method for packet radio” In 9th Computer Networking Conference, pages ARRL/CRRL Amateur Radio,1990.  solves hidden terminal problem [4]C.L. Fullmer and J. Garcia-Luna-Aceves. “Floor acquisition multiple access (FAMA) for packet-radio networks.” In SIGCOMM’9, pages ACM,August 1995.Cambridge, MA(USA).  extend MACA by adding carrier sensing

earl 5 MACA and MACA-BI illustrated

earl 6 MACA and MACA-BI illustrated SenderReceiver RTS CTS Data SenderReceiver RTR Data MACA protocol - three way handshake MACA-BI protocol - two way handshake

earl 7 MACA-BI illustrated

earl 8 MACA-BI illustrated (cont.) MACA-BI: The suppression of CTS packet is the main idea Is two way handshake protocol RTR (Ready to Receive)  Indicating the readiness to receive a certain number of packets assume that each data packet carries the information about the backlog in the transmitter (sender) From the backlog notification and from previous history (receiver)

earl 9 MACA-BI illustrated (cont.) SenderReceiver RTR Data MACA-BI protocol - two way handshake Reply with the requested and with the new backlog information Predict which neighbors have (how many) packets to send

earl 10 MACA-BI Specifications

earl 11 MACA-BI Specifications (cont.)

earl 12 MACA-BI Specifications (cont.) Status = remote Call receive

earl 13 RTR data RTR Wait(MAX(Pd+2*Tp,Timer) RTR Wait(Pd+2*Tp) s d o o

earl 14 MACA-BI Specifications (cont.) RTR to others  wait sender Data RTR receiver RTR to me overhear node Data

earl 15 Collisions in MACA-BI Data collision The channel is assumed to be noise free and symmetric Node A transmits a data packet to B and simultaneously, node C transmits a data packet to B or to D

earl 16 Collisions in MACA-BI C transmits a data packet to B.  This is impossible since node B can invite only one node at a time C transmits a data packet to D.  This can happen only if C did not hear the RTR from B to A B transmitted RTR to A while C was transmitting  This is impossible since transmission from C would have been heard from B, preventing its RTR transmission to A B transmitted RTR to A while C was receiving an RTR from D  This is impossible because the RTR from D would have conflicted (at node C) with RTR from B thus preventing the subsequent data transmission from C to D

earl 17 Simulation  single-hop case Data packet length=296 bytes Control packet length=20 bytes Propagation delay=54µs (radius =10 miles) Channel speed=10Mbps

earl 18 Simulation  multi-hop case (throughput)

earl 19 Simulation  multi-hop case (throughput)

earl 20 Simulation  multi-hop case (delay)

earl 21 Simulation  multi-hop case (delay)

earl 22 Conclusion A new multiple access protocol for wireless networks called MACA-BI has been presented Turn-around time overhead MACA functionality is preserved in MACA-BI MACA-BI is data collision free in the same sense as MACA MACA-BI is less vulnerable to control packet corruption than MACA

earl 23 Discussion About algorithm

earl 24 Thank you!!

earl 25 Status = remote Call receive

earl 26 MACA protocol The MACA protocol. (a) A sending an RTS to B.(b) B responding with a CTS to A.

earl 27 Source Destination Node in Transmission Range RTS NAV(RTS) NAV(CTS) CTS P T DATA P T Propagation time P T: Propagation time MACA protocol

earl 28 MACA-BI state diagram Passive Send RTR Remote RTR to me  transmit(data) Wait (random (Ts)) Send RTR  wait(2*Tp)

earl 29 Passive Send RTR Remote Wait (random (Ts)) Send RTR  wait(2*Tp) RTR to other  wait(Td+2*Tp) wait(Td+2*Tp)

earl 30 Passive Send RTR Remote Wait (random (Ts)) Send RTR  wait(2*Tp) RTR to other  wait(Td+2*Tp) Data  PCK to upper layers

earl 31 Passive Send RTR Remote Wait (random (Ts)) Send RTR  wait(2*Tp)

earl 32 Passive Send RTR Remote Wait (random (Ts)) Send RTR  wait(2*Tp) RTR to other  wait(Td+2*Tp) wait(Td+2*Tp)

earl 33 Passive Send RTR Remote Wait (random (Ts)) Send RTR  wait(2*Tp) RTR to other  wait(Td+2*Tp) wait(Td+2*Tp)

earl 34 Passive Send RTR Remote Wait (random (Ts)) Send RTR  wait(2*Tp) RTR to other  wait(Td+2*Tp) wait(Td+2*Tp)

earl 35 Passive Send RTR Remote Wait (random (Ts)) Send RTR  wait(2*Tp) RTR to other  wait(Td+2*Tp) wait(Td+2*Tp)

earl 36 Passive Send RTRRemote 1.RTR to me  transmit data 2.Data  PCK to upper layers 3.Error RTR to other  wait(Td+2*Tp) 1.Wait (random (Ts)) 2.RTR to others  wait(Max(Timer,Td+2*Tp)) 3.Data  PCK to upper layers  wait(Timer) 4.Default  wait(Timer) Send RTR  wait(2*Tp)

earl 37 Passive Send RTRRemote 1.RTR to me  transmit data 2.Data  PCK to upper layers 3.Error RTR to other  wait(Td+2*Tp) 1.Wait (random (Ts)) 2.RTR to others  wait(Max(Timer,Td+2*Tp)) 3.Data  PCK to upper layers  wait(Timer) 4.Default  wait(Timer) Send RTR  wait(2*Tp)

earl 38

earl 39