Selecting Transmit Powers and Carrier Sense Thresholds in CSMA Jason Fuemmeler, Nitin Vaidya, Venugopal Veeravalli ECE Department & Coordinated Science.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Mitigating Deafness in Multiple Beamforming Antennas
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Medium Access Issues David Holmer
Fundamentals of Computer Networks ECE 478/578
How Effective is the IEEE RTS/CTS Handshake in Ad Hoc Networks Kaixin Xu,Mario Gerla, Sang Bae IEEE Globecom 2002.
SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
5/11/20151 Computer Networks COE 549 Random Access Tarek Sheltami KFUPM CCSE COE
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
Doc.: IEEE Amin Jafarian, Newracom 1 CCA Regime Evaluation Revisited March 2015 NameAffiliationsAddressPhone Amin
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
1 Using Multiple Channels and Spatial Backoff to Improve Wireless Network Performance Nitin Vaidya University of Illinois at Urbana-Champaign
IEEE Wireless LAN: Capacity Analysis and Protocol Enhancement F. Cali, M. Conti, E. Gregori IEEE Wireless LAN: Capacity Analysis and Protocol.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Doc.: IEEE /0861r0 SubmissionSayantan Choudhury Impact of CCA adaptation on spatial reuse in dense residential scenario Date: Authors:
Doc.: IEEE r1 Amin Jafarian, Newracom 1 CCA Regime Evaluation Revisited March 2015 NameAffiliationsAddressPhone Amin
MIMO and TCP: A CASE for CROSS LAYER DESIGN Soon Y. Oh, Mario Gerla Computer Science Dept. University of California, Los Angeles {soonoh,
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Packet Loss Characterization in WiFi-based Long Distance Networks Authors : Anmol Sheth, Sergiu Nedevschi, Rabin Patra, Lakshminarayanan Subramanian [INFOCOM.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
A Multichain Backoff Mechanism for IEEE WLANs Alkesh Patel & Hemant Patel ECE 695 – Leading Discussion By : Shiang- Rung Ye and Yu-Chee Tseng.
Opersating Mode DCF: distributed coordination function
CCH: Cognitive Channel Hopping in Vehicular Ad Hoc Networks Brian Sung Chul Choi, Hyungjune Im, Kevin C. Lee, and Mario Gerla UCLA Computer Science Department.
MAC Protocols and Security in Ad hoc and Sensor Networks
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
Joint PHY-MAC Designs and Smart Antennas for Wireless Ad-Hoc Networks CS Mobile and Wireless Networking (Fall 2006)
Addressing Deafness and Hidden Terminal Problem in Directional Antenna Based Wireless Multi-hop Networks Anand Prabhu Subramanian and Samir R. Das {anandps,
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
1 MAC Protocols for Wireless Networks: Interaction between Physical Layer and MAC Nitin H. Vaidya University of Illinois at Urbana-Champaign
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
TRANSMISSION POWER CONTROL FOR AD HOC WIRELESS NETWORKS: THROUGHPUT, ENERGY AND FAIRNESS Lujun Jia; Xin Liu; Noubir, G.; Rajaraman, R.; Wireless Communications.
1 Interplay of Spatial Reuse and SINR-determined Data Rates in CSMACA-based, Multi-hop, Multi- rate Wirless Networks Ting-Yu Lin and Jennifer C. Hou Department.
1 MAC Protocols that use Directional Antennnas. 2 Directional Antenna  Directional communication  Less Energy in the wrong direction Better Spatial.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Doc.: IEEE /0523r0 Submission April 2014 Imad Jamil (Orange)Slide 1 MAC simulation results for Dynamic sensitivity control (DSC - CCA adaptation)
Doc.: IEEE r0 Amin Jafarian, Newracom 1 CCA Revisit May 2015 NameAffiliationsAddressPhone Amin
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
Planning and Analyzing Wireless LAN
Doc.: IEEE / ax Submission Eduard Garcia-Villegas Drivers of the dynamic CCA adaptation Authors: Nov Date:
THROUGHPUT ANALYSIS OF IEEE DCF BASIC IN PRESENCE OF HIDDEN STATIONS Shahriar Rahman Stanford Electrical Engineering
A new Cooperative Strategy for Deafness Prevention in Directional Ad Hoc Networks Andrea Munari, Francesco Rossetto, and Michele Zorzi University of Padova,
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
How Physical Carrier Sense Affects System Throughput in IEEE Wireless Networks Zheng Zeng, Yong Yang and Jennifer C. Hou Department of Computer.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
1 Effectiveness of Physical and Virtual Carrier Sensing in IEEE Wireless Ad Hoc Networks Fu-Yi Hung and Ivan Marsic WCNC 2007.
DOTS: A Propagation Delay-aware Opportunistic MAC Protocol for Underwater Sensor Networks IEEE ICNP 2010 (18.2%) Youngtae Noh, Mario Gerla (UCLA, CS) Paul.
Performance Enhancement of Multirate IEEE WLANs with Geographically Scattered Stations 1 Duck-Yong Yang, 2 Tae-Jin Lee, 3 Kyunghun Jang, 3 Jin-Bong.
Power Controlled Dual Channel (PCDC) Medium Access Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz IEEE INFOCOM 2003 Speaker: Chien-Wen.
MAC Protocols for Sensor Networks
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
A Power Control MAC Protocol for Ad Hoc Networks
Cognitive Link Layer for Wireless Local Area Networks
Topics in Distributed Wireless Medium Access Control
Channel Allocation (MAC)
On the Physical Carrier Sense in Wireless Ad-hoc Networks
Presentation transcript:

Selecting Transmit Powers and Carrier Sense Thresholds in CSMA Jason Fuemmeler, Nitin Vaidya, Venugopal Veeravalli ECE Department & Coordinated Science Lab University of Illinois at Urbana-Champaign WICON 2006 Boston, MA August 3, 2006 Funded in part by NSF and by a NSF Graduate Research Fellowship

Medium Access Control  The wireless channel  All nodes share same medium  Nodes can interfere with one another  Channel can support multiple transmissions if separated in space (spatial reuse)  Medium Access Control (MAC) is needed to use the channel effectively  Question: How can we design MAC protocols to maximize spatial reuse?

Power Control  Power control can be used to increase spatial reuse  MAC protocols utilizing power control must perform a balancing act  Must maintain desired SINR at each receiver  Need interference margin at each receiver to maintain this SINR  Increasing transmit power increases interference margin  But increasing transmit power increases interference to other transmissions

Previous Research  PCMA [Monks01]  Busy tones sent on out-of-band channel to communicate current interference margins  PCDC, POWMAC [Muqattash03, Muqattash04]  Control frames sent at maximum power to communicate information about transmission powers and interference margins  Transmission power selection strategies in these protocols left unjustified

Previous Research  CS Threshold Selection in [Zhu04]  Does not address selection of transmit powers  In our work, we address both transmit power and carrier sense threshold selection in the IEEE protocol

Physical Carrier Sensing  We primarily consider physical carrier sensing  How it works:  Node is allowed to transmit only if channel is idle  Channel assumed to be idle only if total power seen at its location is less than carrier sense (CS) threshold  Idle channel should mean that transmitting will not cause a collision

A Two-Link Setup A B D C power distance S CS Threshold

A Two-Link Setup A B D C power distance S I

Analytical Results  Collisions are doubly bad  Waste channel resources now  Waste channel resources upon retransmission  Intuitively, to prevent collisions  large transmit power => small CS threshold  Analysis of collision prevention yields that the product of the transmit power and the CS threshold should remain constant throughout the network  Bounds the amount of interference one link can pose to another

Notation  p t : transmit power  p cs : carrier sense threshold  g: channel gain on the link  γ: required SINR  η: thermal noise  β: the constant product  k: number of worst-case interferers assumed

The Equations

The Role of k  Analysis uses collocation approximation  A potential interferer sees same gain to both transmitter and receiver  The value of k accounts for:  The local topology around the link  Any error introduced by the collocation approximation  For k sufficiently large, collisions will be prevented on the link

ns-2 Simulation Setup  PHY layer was modified to be more accurate  RTS/CTS disabled – physical carrier sensing dominant  η set to 0 to explore upper limit in spatial reuse  UDP traffic, heavily loaded  Topologies consisting of randomly placed links

Sample Topology

Schemes Considered  Fixed Rx Power  Power at receiver held constant, CS threshold a free parameter  Fixed Tx Power  Transmit power held constant, CS threshold a free parameter  Static k  Our scheme with β held constant, k a free parameter  Dynamic k (next slide)

Dynamic k Scheme  Each link adjusts its value of k dynamically  Uses transmission failures as feedback  Attempts to find minimum value of k such that collisions are prevented on that link  Minimum k Minimum transmit power  Algorithm used is heuristic

Throughput Comparisons

Fairness Issues  Our scheme does lead to some unfairness  Links with high CS thresholds get to transmit more often  In general, short links are given preference  Could perhaps mitigate unfairness by having short links voluntarily lower CS threshold  Fairness Measure:

Fairness Comparisons

Conclusions  Analyzed collision prevention conditions  Concluded that product of transmit power and CS threshold should remain constant throughout network  Simulation results indicate increased spatial reuse

Future Research  More detailed simulations  Comparisons with non based schemes  Understand interactions with virtual carrier sensing  Better justified algorithm for adjustment of k  Mitigation of unfairness

The End Thanks for you attention! Questions?