1 A Bandwidth Allocation/Sharing/Extension Protocol for Multimedia Over IEEE 802.11 Ad Hoc Wireless LANs IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS,

Slides:



Advertisements
Similar presentations
A Bandwidth Allocation/Sharing/Extension Protocol for Multimedia Over IEEE Ad Hoc Wireless LANs Shiann-Tsong Sheu and Tzu-fang Sheu IEEE JOURNAL.
Advertisements

IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Contents IEEE MAC layer operation Basic CSMA/CA operation
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE Distributed Wireless LANs.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Dynamic Bandwidth Scheduling for QoS Enhancement over IEEE WLAN Sangwook Kang, Sungkwan Kim, Mingan Wang, Sunshin An Korea University European Wireless.
Presented by Scott Kristjanson CMPT-820 Multimedia Systems Instructor: Dr. Mohamed Hefeeda 1 Cross-Layer Wireless Multimedia.
Jesús Alonso-Zárate, Elli Kartsakli, Luis Alonso, and Christos Verikoukis May 2010, Cape Town, South Africa, ICC 2010 Coexistence of a Novel MAC Protocol.
Module C- Part 1 WLAN Performance Aspects
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
A Bandwidth Allocation/Sharing/Extension Protocol for Multimedia Over IEEE Ad Hoc Wireless LANs Παρουσίαση : Τσιπουρίδου Δέσποινα Shiann-Tsong Sheu,
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Ncue-csie1 A QoS Guaranteed Multipolling Scheme for Voice Traffic in IEEE Wireless LANs Der-Jiunn Deng 、 Chong-Shuo Fan 、 Chao-Yang Lin Speaker:
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
IEEE Wireless LAN: Capacity Analysis and Protocol Enhancement F. Cali, M. Conti, E. Gregori IEEE Wireless LAN: Capacity Analysis and Protocol.
1 QoS Schemes for IEEE Wireless LAN – An Evaluation by Anders Lindgren, Andreas Almquist and Olov Schelen Presented by Tony Sung, 10 th Feburary.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Lecture #2 Chapter 14 Wireless LANs.
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
IEEE High Rate WPAN - MAC functionalities & Power Save Mode Mobile Network Lab. 정상수, 한정애.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
1 Chapter 8 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3.
Chapter 6 Multiple Radio Access
Submission doc.: IEEE /569r1 November 2001 M. Benveniste -- AT&T Labs, ResearchSlide 1 An Access Mechanism for Periodic Contention-Free Sessions.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
MAC for WLAN Doug Young Suh Last update : Aug 1, 2009 WLAN DCF PCF.
Design and Implementation of a Reservation-based MAC Protocol for Voice/Data over IEEE Ad-Hoc Wireless Networks Shiann-Tsong Sheu, Tzu-Fang Sheu.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
November 2000 Jin-Meng Ho, Texas InstrumentsSlide 1 doc.: IEEE /367 Submission p-DCF for Prioritized MAC Service Jin-Meng Ho, Sid Schrum, and.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Improved IEEE PCF performance using silence detection and cyclic shift on stations polling E. Ziouva and T. Antonakopoulos IEE Proceedings-Communications,
EA C451 (Internetworking Technologies)
An Access Mechanism for Periodic Contention-Free Sessions
Chapter 2 Wireless LANS and PANS
Chapter 6 Medium Access Control Protocols and Local Area Networks
Wireless LAN Simulation IEEE MAC Protocol
of the IEEE Distributed Coordination Function
CSE 313 Data Communication
Enhanced Backoff Scheme in CSMA/CA for IEEE
Chapter 6 Multiple Radio Access.
Infocom 2004 Speaker : Bo-Chun Wang
Presentation transcript:

1 A Bandwidth Allocation/Sharing/Extension Protocol for Multimedia Over IEEE Ad Hoc Wireless LANs IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 19, NO. 10, OCTOBER 2001 第六組

2 Outline Introduction DBASE protocol Performance Evaluation Conclusion

3 Introduction The IEEE wireless local area networks (WLAN) standard includes a basic distributed coordination function (DCF) and an optional point coordination function (PCF). The PCF is a polling-based protocol, which is not designed for the distributed environment. In this paper, we will propose a new distributed bandwidth allocation/sharing/extension (DBASE) protocol to support both asynchronous and multimedia traffics over IEEE ad hoc WLAN where no fixed access point coordinates accesses.

4 DBASE protocol For simplicity, a station with real-time (nonreal-time) traffic is denoted as rt-station ( nrt-station) throughout this paper. The priority IFS (PIFS) is used by the rt-frames, such as reservation frame (RF) and the request to send (RTS) of voice/video packets in DBASE protocol. we will describe the access procedures for transmitting nrt-packets and rt-packets separately in an ad hoc network.

5 DBASE protocol (cont.) A. The Access Procedure for Asynchronous Data Stations The basic access method for nrt-stations is based on the conventional DCF. The data backoff time (DBT) is derived by DBT=rand(a,b)*Slot_time b=b min *2 r < b max

6 DBASE protocol (cont.) B. The Access Procedures for Real-Time Stations In DBASE, every rt-station needs build and maintain a ReSerVation Table (RSVT). This table records the information of all rt-stations that have finished the reservation procedure successfully. The way of a new rt-station contending for the medium is by first issuing the RTS packet to join the ReSerVation Table (RSVT) and reserve its needed bandwidth.

7 DBASE protocol (cont.) In order to maintain the correct access sequence, each rt-station needs to be equipped with a sequence ID (SID) register and an active counter (AC). The SID register is used to record the access order among all active rt-stations and the AC counter is used to record the number of active rt- stations. In the following four subsections, we will describe how the rt-stations reserve, allocate, share and extend the bandwidth.

8 DBASE protocol (cont.) 1) Reservation Procedure: If STA RT intends to start a session at time t, it will first monitor the channel for detecting the RF in the interval (t, t+D max ), where D max means the smallest maximal tolerance delay among all multimedia sessions. The RF is a broadcast frame and is used to announce the beginning of contention free period (CFP). The RF is sent by the first active rt-station (with SID=1) in the RSVT, which has the responsibility to initiate the CFP periodically.

9 DBASE protocol (cont.) This particular rt-station is named as contention free period generator (CFPG) throughout this paper. Normally, a new active rt-station STA will receive the RF frame in the interval (t, t+D max ) if there is any active rt-station already reserved the bandwidth. Otherwise, it means that there is no active rt- station and station STA will be the first one. The real-time backoff time (RBT) of a rt-station is defined as RBT=rand(c,d)*Slot_time

10 DBASE protocol (cont.) If RBT reaches zero, STA will transmit its RTS to the destination to setup a connection. If no collision occurs, the rt-station, which sent RTS frame, will receive the CTS frame within SIFS, and then it will become the CFPG. Meanwhile, it sets both its SID and AC to one and transmits the RF frame and its rt-packet right away. The length of the first rt-packet following the RTS of each session is limited as the average length decided by its traffic type.

11 DBASE protocol (cont.) If collision occurs when transmitting the RTS, the P-persistent scheme is used to decide whether the collided stations insist on accessing channel in the next Slot_time. The collided rt-station will retransmit the RTS in the following Slot_time with a probability p. With a probability q=1-p, it will defer at least one Slot_time and contend at the next real-time contention window. That is, the deferred one will recalculate the RBT, named as RBTP, by RBTP=rand(c+1,d)*Slot_time

12 DBASE protocol (cont.) If a new active rt-station (STA ) detects the RF frame in the interval (t, t+D max ), it knows that at least one active rt-station already reserved the bandwidth. To avoid disturbing the rt-stations access channel in the CFP, a new rt-station that wants to join into the RSVT by contention must wait until the CFP finishes. If the channel idles a Slot_time during CFP, it implies a rt-station disconnects session and the CFP should be decreased accordingly.

13 DBASE protocol (cont.) After the CFP finishes, STA RT follows the backoff scheme to contend for its reservation by sending a RTS as mentioned above. Until the RBT becomes zero, STA RT will send its RTS. If no collision occurs, the content of AC will be increased by one and the SID of STA RT is set as the content of AC. Based on this access procedure, every rt-station will increase their AC by one as soon as it listens a CTS.

14 DBASE protocol (cont.) To prevent nrt-station’s transmissions from disturbing rt-station’s transmissions, the relationships among three spaces and two contention windows must satisfy the following two constraints: SIFS + Slot_time ≦ PIFS PIFS + Slot_time + max{RBT} ≦ DIFS + min{DBT}

15 DBASE protocol (cont.)

16 DBASE protocol (cont.)

17 DBASE protocol (cont.) 2) Allocation Procedure: The information of RSVT can be got and updated by the RF frame and by checking the duration field of MAC header in each MAC PDU (MPDU). The DBASE MAC header format:

18 DBASE protocol (cont.) To reduce the overhead of describing the length of required bandwidth, we let u(i) denote the unit bandwidth of the multimedia type i of a session. where UST is the unit slot time in system and CDR is the channel data rate.

19 DBASE protocol (cont.) Let MS(i) and ND(i), respectively, denote the minimum number of UST needed for an active session in every cycle and the required bandwidth degree of a session with service type i at the next cycle. We define

20 DBASE protocol (cont.) Let AVD(i) denote the average degree of a multimedia type i. The AVD(i) can be obtained from the ABR(i) (average bit rate) of multimedia type i. That is,

21 DBASE protocol (cont.) In DBASE, if the demand of each rt-station for bandwidth in the next cycle does not excess its average bandwidth requirement (ABR), the demanded bandwidth will be allocated. Otherwise, only the average bandwidth quota of its multimedia type will be first allocated. Therefore, the maximal bandwidth reserved for all active sessions in every CFP is the sum of AVDs of all active sessions, and simply described as the CFP max.

22 DBASE protocol (cont.) 3) Sharing Procedure: Before reallocating residual bandwidth for the overloaded rt-stations, every overloaded rt-station will first accumulate the spare bandwidth from those sessions whose ND requests are less than AVD. Let CD be the required bandwidth degree of a session in the current cycle, which is copied from the ND of the MPDU transmitted in the previous cycle. Let SS denote the number of USTs that can be shared by those rt-stations whose demanded degree excesses its AVD.

23 DBASE protocol (cont.) Therefore, we have The actual number of reserved unit slot (RS) for session in current cycle will be

24 DBASE protocol (cont.) 4) Extension Procedure: In the case that the burst traffic arrives just after a rt-station has issued the ND for the next cycle, the delay bound of the excess data may be violated. To solve this critical problem, the 1-bit extension flag (EF) in duration field of each MAC frame is used to indicate whether a rt-station needs more bandwidth than the amount that had been announced at previous cycle. If the EF is set, the following 4-bit raise degree (RD) will record the renewal demand at the current cycle.

25 DBASE protocol (cont.)

26 DBASE protocol (cont.)

27 DBASE protocol (cont.)

28 Performance Evaluation A. Traffic Models Voice Traffic Model (CBR):

29 Performance Evaluation (cont.) Video Traffic Model (VBR):

30 Performance Evaluation (cont.) Data Traffic Model: We assume that data packets arrive at each station following the Poisson process with the mean value λ=(λ nrt /N nrt ), where λ nrt is the total packet arrival rate of asynchronous traffic. The total data load can be estimated as ρ= λ nrt *E[T nrt payload ]. In simulations, the E[T nrt payload ] is set as 744μs.

31 Performance Evaluation (cont.)

32 Performance Evaluation (cont.) B. Performance Measurements Goodput Packet delay dropped probability (PDDP)

33 Performance Evaluation (cont.) C. Simulation Results

34 Performance Evaluation (cont.)

35 Performance Evaluation (cont.)

36 Performance Evaluation (cont.)

37 Performance Evaluation (cont.)

38 Performance Evaluation (cont.)

39 Performance Evaluation (cont.)

40 Performance Evaluation (cont.)

41 Performance Evaluation (cont.)

42 Performance Evaluation (cont.)

43 Performance Evaluation (cont.)

44 Conclusion In this paper, we proposed a distributed bandwidth allocation/sharing/extension protocol to support multimedia traffic over IEEE ad hoc WLAN. In DBASE, rt-stations can reserve and free channel resources dynamically. Simulation results shown that the proposed protocol can support multimedia services of either CBR or VBR in ad hoc WLAN. Simulation results also demonstrated that the DBASE performs very well and much better than the conventional IEEE standard with DCF.