Reversing the Collision Avoidance Handshake in Wireless Networks J.J. Garcia-Luna-Aceves and Makis Tzamaloukas Computer and Communications.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Receiver Initiated MAC protocols Prof. Marco Aurélio Spohn DSC/UFCG
Ethernet – CSMA/CD Review
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
1 Dual Busy Tone Multiple Access (DBTMA) : A Multiple Access Control Scheme for Ad Hoc Networks Z. Haas and J. Deng IEEE Trans. on Communications June,
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Earl1 MACA-BI(MACA By Invitation) A Receiver Oriented Access Protocol for Wireless Multihop Network F. Talucci, M. Gerla, and L. Fratta Proceedings of.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Wireless Medium Access Control Protocols
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Ad Hoc Wireless Media Access Protocols Mikko Raatikainen, TiTe 5.
Receiver-Initiated Channel Hopping (RICH) Makis Tzamaloukas Computer and Communications Research Group (CCRG)
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
1 Introduction to Wireless Networks Michalis Faloutsos.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
The Effect of Exerting Adequate Persistence in Collision Avoidance Protocols J.J. Garcia-Luna-Aceves and Makis Tzamaloukas {jj, Computer.
1 Collision-Free Asynchronous Multi-Channel Access in Ad Hoc Networks IEEE Globecom 2009, Hawaii University of California Santa Cruz* Palo Alto Research.
MAC Protocol By Ervin Kulenica & Chien Pham.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Elec 599 Report: Modeling Media Access in Embedded Two-Flow Topologies of Multi-hop Wireless Networks Jingpu Shi Advisor: Dr. Edward Knightly Department.
Data Link Layer IS250 Spring 2010
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Wireless Switch Protocol 課程 : 行動計算 學號 :M 學生 : 陳德翰.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
A Medium Access Control Protocol with Reliable Multicast Support for Wireless Networks Thesis defense of: Vikram Shankar Advising Committee: Dr. Sandeep.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
1 Power-Aware Routing in Mobile Ad Hoc Networks S. Singh, M. Woo and C. S. Raghavendra Presented by: Shuoqi Li Oct. 24, 2002.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Throughput and fairness in a hybrid channel access scheme for ad hoc networks Yu Wang and J.J. Garcia-Luna-Aceves IEEE WCNC 2003 Speaker : earl.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Wireless MAC Protocols Presenter: George Nychis Xi Liu.
Computer Networking Lecture 6 – MAC. 2 Readings [E.2] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang. MACAW: A Media Access Protocol for.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Chapter 6 Multiple Radio Access
SEEDEX: A MAC protocol for ad hoc networks R. Rozovsky and P. R. Kumar ACM ACM MobiHoc 2001 speaker: Chien-Wen.
Mohamed Elhawary Computer Science Department Cornell University PERCOM 2008 Zygmunt J. Haas Electrical and Computer Engineering Department Cornell University.
Zhong Zhou +, Zheng Peng +, Jun-Hong Cui +, Zaihan Jiang * Handling Triple Hidden Terminal Problems for Multichannel MAC in Long-Delay Underwater Sensor.
Chih-Min Chao and Yao-Zong Wang Department of Computer Science and Engineering National Taiwan Ocean University, Taiwan IEEE WCNC 2010 A Multiple Rendezvous.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
WLAN.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
0.1 IT 601: Mobile Computing MAC Protocols Prof. Anirudha Sahoo IIT Bombay.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
MAC Protocols for Ad Hoc Wireless Networks
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
Exploring Random Access and Handshaking Techniques in Large- Scale Underwater Wireless Acoustic Sensor Networks Peng Xie and Jun-Hong Cui Computer Science.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
MAC Protocols for Sensor Networks
Wireless Sensor Networks 4. Medium Access
Wireless LAN Simulation IEEE MAC Protocol
Presentation transcript:

Reversing the Collision Avoidance Handshake in Wireless Networks J.J. Garcia-Luna-Aceves and Makis Tzamaloukas Computer and Communications Research Group (CCRG) Computer Engineering Department Jack Baskin School of Engineering University of California Santa Cruz, CA 95064

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas2 Presentation Outline n Sender-Initiated Collision Avoidance Protocols n Motivation n Polling Issues n Correct Collision Avoidance n RIMA protocols n Throughput and Delay Analysis n Conclusions

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas3 Sender-Initiated Protocols n SRMA (Kleinrock and Tobagi, August ‘76) n MACA (Karn, April ‘90) n MACAW (Bharghavan, Demers, Shenker and Zhang, August ‘94) n FAMA (Garcia-Luna-Aceves and Fullmer, September ‘97) n IEEE (July ‘97)

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas4 Motivation n The recipient of data packet is the point of interest n Recast the collision avoidance dialogues so that the receiver, sender or both can have control of the dialogue n Provide equal or better throughput than any sender-initiated IEEE like MAC protocol n Be applicable to multi-channel frequency-hopping or direct- sequence spread-spectrum radios n To date no receiver-initiated MAC protocol ensures correct collision avoidance n The receivers poll the senders

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas5 Ensuring Correct Collision Avoidance n First receiver-initiated MAC protocol was MACA-BI (Talucci and Gerla): – a node sends a DATA packet if it has previously received an RTR – a polled node can send a DATA packet either to the polling node or to any other neighbor – does not guarantee correct floor acquisition

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas6 Ensuring Correct Collision Avoidance n At time t0, nodes a and d send RTRs to b and e; at time t1 both b and e send DATA to c resulting in a collision abc d e t0 RTR to bRTR to e DATA to c t1 DATA to c

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas7 Ensuring Correct Collision Avoidance n At time t0, node a sends an RTR to b; at time t1, b sends DATA to a; at time t2 < t1 + , c sends an RTR to d; at time t3, d sends DATA to c; if data packets last longer than  + 3  the DATA from b and d collide at c abcd t0 RTR DATA t1 DATA t2 t3

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas8 Ensuring Correct Collision Avoidance n With RIMA-SP correct floor acquisition is guaranteed: – the polled node transmits a DATA packet only to the polling node – a collision avoidance period of  seconds is required at a polled node prior to answering an RTR; we have shown that  =  – an additional control signal is introduced; we call this signal No-Transmission-Request (NTR)

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas9 RIMA-SP illustrated RTR ZX XZ data RTR ZX XZ BACKOFF RTR ZX NTR ZX RTR data Successful handshake Colliding RTRs Hidden node interference

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas10 RIMA-SP timing diagrams RTR Waiting period DATA X Z RTRNTR BACKOFF X Z interference RTR collision X Z channel BACKOFF Node X sends an RTR and after  seconds receives a DATA packet Nodes X and Z send RTRs within  seconds and therefore a collision occurs Due to interference from node Z, node X sends an NTR to stop the handshake Noise detected at Z

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas11 Polling Issues n When to poll: whether or not the polling rate is independent of the data rate at polling nodes – independent polling – data driven polling n To whom: whether the poll is sent to a particular neighbor or to all neighbors; for dense networks a schedule must be provided to the poll recipients n How: whether the polling packet asks for permission to transmit as well

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas12 RIMA Protocols n Polling done with RTR (Request-To-Receive) packet n Three Receiver Initiated Medium Access (RIMA) protocols defined based on the type of polling: – RIMA-SP: A simple poll receiver initiated protocol (only the receiver sends data in a successful busy period) – RIMA-DP: A dual poll receiver initiated protocol (2 data packets are sent in the same successful busy period) – RIMA-BP: A broadcast poll receiver initiated protocol (the RTR is sent to everybody)

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas13 RIMA-DP illustrated RTR ZX XZ CTS data ZX RTR ZX XZ data ZX RTR ZX XZ BACKOFF RTR ZX NTR ZX data Success 1 Success 2 Failure 1 Failure 2

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas14 RIMA-DP timing diagrams RTRNTR Noise detected at Z BACKOFF X Z interference RTR Waiting period DATA CTS X Z RTR Waiting period DATA X Z RTR collision X Z channel BACKOFF Node X sends an RTR and after  seconds receives a DATA packet and then sends its DATA Node X sends an RTR and node Z replies with a CTS; node X sends its DATA Nodes X and Z send RTRs within  seconds and therefore a collision occurs Due to interference from node Z, node X sends an NTR to stop the handshake DATA

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas15 RIMA-BP illustrated RTR X Z ZX BACKOFF RTR ZX XZ RTSdata ZX RTR ZX Y XZ RTS NTR Z Y X RTS Success 1 Failure 1 Failure 2

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas16 RIMA-BP timing diagrams RTR collision X Z channel BACKOFF RTR Waiting period DATARTS X Z RTR RTS X Z Y collision NTR Node X sends an RTR; node Z responds with a RTS and after  seconds sends its DATA Node X sends an RTR; nodes Z and Y send an RTS within  seconds; node X sends an NTR to stop the handshake Nodes X and Z send RTRs within  seconds and therefore a collision occurs

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas17 Throughput Analysis Model n fully-connected network of N nodes n single, unslotted channel, error-free n the size for an RTR, RTS and CTS is  seconds; the size for a data packet is  seconds n the turn-around time is considered to be part of the duration of control and data packet n the propagation delay of the channel is  seconds n a polled node receiving an RTR always has a data packet to send n the probability that the packet is addressed to the polling node is 1/N

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas18 Throughput Analysis n 500 Byte data packets; 1Mbps network speed; maximum distance between nodes is 1 mile; on the left a 10 node network; on the right a 50 node network

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas19 Delay Analysis 500 Byte data packets; 1Mbps network speed; maximum distance between nodes is 1 mile

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas20 Heavy Traffic Approximation n MACA-BI analysis assumes that there is always a DATA packet after a successful poll n To present a fair comparison between MACA-BI and RIMA protocols we analyze a heavy load approximation where there is always a DATA packet to be sent after receiving an RTR

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas21 Throughput Analysis n 500 Byte data packets; 1Mbps network speed; maximum distance between nodes is 1 mile; network of 50 nodes; heavy load approximation throughput: any polled node always has data to send to any polling node

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas22 Conclusions n RIMA protocols provide correct collision avoidance in the presence of hidden terminals n The throughput achieved with RIMA-DP is higher than any other sender initiated MAC protocol for fully connected networks n RIMA-DP achieves higher throughput than all other collision avoidance protocols in fully-connected networks under heavy load approximation n Relative differences in performance remain the same in networks with hidden terminals

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas23 Simulation Results Base N1 N2 B1 B2 N1 (a) (b) (c) Base

MobiCom '99, August JJ. Garcia-Luna-Aceves and A. Tzamaloukas24 Simulation Results