802.11: Performance Reference: “Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks”; Xu, S.; Saadawi, T. IEEE Communications.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine.
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Medium Access Issues David Holmer
Contents IEEE MAC layer operation Basic CSMA/CA operation
Both RTS and CTS contains: The address of the sender The address of the receiver The sizeof the intended data short message size contention concentrated.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 TCP over Wireless (I) some slides adapted, notably from tutorial by Nitin Vaidya.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Collisions & Virtual collisions in IEEE networks Libin Jiang EE228a Communication Networks.
1 Introduction to Wireless Networks Michalis Faloutsos.
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Sep 12, 2002Wireless Networking Seminar1 Does IEEE Work Well in Multi-hop Wireless Network? Author: Shugong Xu, Tarek Saadawi City University of.
CIS 725 Wireless networks. Low bandwidth High error rates.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
Data Link Layer We have now discussed the prevalent shared channel technologies  Ethernet/IEEE  Wireless LANs (802.11) We have now covered chapters.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Effects of Multi-Rate in Ad Hoc Wireless Networks
Chapter 6 Multiple Radio Access
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
IEEE WLAN.
Recitation 8 Wireless Networks.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Planning and Analyzing Wireless LAN
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
WLAN.
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
2005/12/14 1 Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness Xin Yu Department of Computer Science.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
Topics in Distributed Wireless Medium Access Control
MACAW: A Media Access Protocol for Wireless LAN’s
Introduction to Wireless Networks
The Impact of Multihop Wireless Channel on TCP Performance
Study on multi-hop ad hoc networks
Wireless LAN Simulation IEEE MAC Protocol
Chapter 6 Multiple Radio Access.
Presentation transcript:

802.11: Performance Reference: “Does the IEEE MAC protocol work well in multihop wireless ad hoc networks”; Xu, S.; Saadawi, T. IEEE Communications Magazine, Volume: 39 Issue: 6, June 2001; Page(s): 130 –137 (802.11PE-1.pdf)

2 IEEE MAC Protocol DCF :Distribution Coordination Function –Basically a CSMA/CA mechanism –1. A station wanting to transmit senses the medium. If the medium is busy, it defers. If the medium is free for a specified time called DIFS (distributed interframe space), the station is allowed to transmit. –2. The receiving station checks the CRC of the received frame and sends an ACK packet (denoted by M-ACK in the paper) –3. If the sender does not receive the M-ACK, it retransmit the frame until it receives an M-ACK or throws it away after a given number of retransmissions (standard: a maximum of 7 retransmissions are allowed before the frame is dropped)

3 Hidden Node Problem Two stations colliding due to not hearing each other Reduce colliding probability from hidden nodes –1. A station wanting to transmit a packet first transmits a short control packet called request to send (RTS), which includes the Src, Dst, and Dur of the intended packet and ACK transaction –2. The Dst station responds (if the medium is free) with a response control packet called clear to send (CTS), which includes the same Dur information –3. All other stations receiving either the RTS and/or the CTS set their virtual CS (carrier sense) indicator, called a network allocation vector (NAV), for the given Dur and use this information together with the physical CS when sensing the medium

4 Exposed Node Problem Hidden node (H) –One that is within the interfering range of the intended destination (R) but out of the sensing range of the sender (S) Exposed node (E) –One that is within the sensing range of the sender but out of the interfering range of the destination H R S < interfering range > sensing range E S R > interfering range < sensing range

5 Simulation Environment Using NS2 network simulator Wireless link bandwidth: 2 Mbps Transmission radius: 250m Distance btw two neighboring nodes: 200m Nodes are static Using TCP traffic –Carry large file transfers (infinite backlog: the TCP sender always has data to send out)

6 Simulation Environment (cont) In each node –has a queue (called IFQ) for packets awaiting transmission by the network interface that holds up to 50 packets –IFQ is managed in a drop tail fashion DSR routing protocol was used

7 Why TCP? TCP is the prevalent reliable transport protocol used in the internet today TCP can adapt to the network condition and do congestion control –It can use almost all the available bandwidth without causing congestion Introduction to TCP Reno –Window-based ACK-clocked flow control protocol –Additive-increase/multiplicative decrease strategy for changing windows according to net. conditions –Slow start (SS), Congestion avoidance (CA) –Fast retransmit, Fast recovery

8 TCP Instability Problem E.g. Single TCP connection (Node 1  Node 5) Figure 2

9 TCP Instability Problem (cont) Figure 2

10 TCP Instability Problem (cont) Figure 2

11 TCP Instability Problem (cont) In Figure 2-(a), –In the 120s lifetime of this connection, there are 20 times when the throughput reached or neared zero –In those 1.0s intervals, almost no TCP packets were successively received, which means that TCP performance degraded seriously –Every time after this, TCP restarted using slow start –Since only one connection exists in the experiment, this kind of pause is not expected The problem can be lessened or eliminated with a smaller maximum window size, Figures 2-(b), 2-(c)

12 TCP Instability Problem (cont) Reason –Due to one node failing to reach its adjacent node. This triggers a route failure –If this is an intermediated node, this node drops all queued packets (ACK in most cases) to that adjacent node and reports a route failure to the source (Here source means data packet source: either the TCP sender or receiver) –After the source receives this message, it starts route discovery. Before a route is found, no data packet can be sent out –Usually, this causes a timeout in the TCP sender. Then the TCP session has to wait before a route becomes available again

13 TCP Instability Problem (cont) (collision) 1460B / 2Mbps = sec TCP data TCP AckTCP dataTCP Ack Packets too short to be collided ? collisions Link breakage I think some events are skipped in tx of TCP-Ack

14 TCP Instability Problem (cont) Around 20s –Node 1 cannot reach node 2 –After node 1 tries to contact node 2 and fails seven times, the MAC layer reports a link breakage In Figure 3 –Data means TCP packet or TCP ACK packet –The collision and the exposed station problem in node 2 prevent node 1 from reaching node 2 –Since node 2 can sense node 4, it has to defer when node 4 is sending –The result is that node 2 cannot send back CTS even if it receives that RTS from node 1 correctly –After failing to receive CTS from node 2 seven times, node 1 quits and reports a link breakage to its upper layer. Then a route failure event occurs

15 TCP Instability Problem (cont) Note that, in a CS wireless network –The interfering range (and sensing range) is typically larger than the range at which receivers are willing to accept a packet from the same transmitter –WaveLAN wireless systems are engineered in this way –This is the reason a collision occurs at node 2 when nodes 1 and 4 are sending at the same time, even though node 4 cannot directly communicate with node 2. Node 2 is within the interfering range of node 4

16 TCP Instability Problem (cont) Summary –1. The exposed node problem and collisions prevent the intermediated node from reaching its next hop –2. The random backoff scheme used in the MAC layer makes this worse –3. For window_ = 4 (Figure 2-c), the maximum number for possible back-to-back sending is four. This greatly reduces the chance that other nodes might fail to access the channel in seven tries. Thus, no route failure occurs

17 Serious Unfairness Problem (cont) Unfairness problem –Results show that with the IEEE MAC layer, simultaneous TCP traffic may suffer from severe unfairness, even between connections with the same number of hops  Not the same as the former reported TCP unfairness problem, which is caused by the difference of TCP round-trip time –In the experiment, one TCP connection might be completely shut down even if it starts much earlier than the competing TCP traffic

18 Serious Unfairness Problem (cont) Neighboring node one-hop unfairness –Two TCP connections –The first starts at 10.0s, and the second 20.0s later (i.e. at 30.0s) –The first session: node 6  node 4 (2 hops) –The second session: node 2  node 3 (1 hop) –The whole experiment stops at 130.0s –Figure 4, Figure 5

19 Serious Unfairness Problem (cont)

20 Serious Unfairness Problem (cont) Figure 4 –The first session has a throughput of around 450Kbps after starting from 10.0s –However, it is completely forced down after the second session starts at 30.0s –In most of its lifetime after 30.0s, the throughput of the first session is zero –There is not even a chance for it to restart –The aggregate throughput of these two TCP connections completely belongs to the second session- around 920Kbps in the lifetime from 30.0s to 130.0s

21 Serious Unfairness Problem (cont)

22 Serious Unfairness Problem (cont) Figure 5 (W1 run) –Unlike the TCP instability problem, the unfairness problem cannot be eliminated by adjusting the maximum window size (window_) of TCP –Check some of the TCP packet events in the W1 run (Figure 6)

23 Serious Unfairness Problem (cont)

24 Serious Unfairness Problem (cont)

25 Serious Unfairness Problem (cont) Figure 7 –After 30.07s, no TCP packet of the first session is delivered successively from source node 6 to the receiver –The packet with sequence number 2164 never arrives at the destination (node 4), although it is retransmitted 10 times –Note that in NS2, the TCP packet size is fixed in one connection, and the sequence number here is counted in packets instead of bytes –Table 1: condensed version of the simulation packets traces

26 Serious Unfairness Problem (cont) No route available (route failure) TCP packet expired during DSR route re-discovery Simulation finished

27 Serious Unfairness Problem (cont) Table 1 –The reason for the first TCP packet drop is the route failure in node 5 (Since no node moves in the simulation, the route failure seems very strange) –Before a route to node 4 is found again, the TCP source retransmits the TCP packet after timeout. They are queued in the IFQ of node 6, waiting for forwarding. This is why we see several TCP packets expired and dropped –Unfortunately, the TCP packet never reaches node 4 after 30.07s, even after a route to node 4 becomes available. This is because a route failure happens again very soon

28 Serious Unfairness Problem (cont) The cause of route failure –The problem is rooted in the MAC layer –Node 5 cannot reach node 4 –After node 5 tries to contact node 4 and fails seven times, the MAC layer reports a link breakage –See Figure 8, it is clear that the major cause of node 5 failing to reach 4 is collision –Since node 5 can sense node 3, it has to defer when node 3 is sending, so it can only send out a RTS when node 3 is not sending. The result is that node 5 cannot send back CTS even if it receives the RTS correctly (But, this is not the main reason of the link breakage)

29 Serious Unfairness Problem (cont) TCP data TCP Ack TCP data TCP Ack TCP data TCP Ack Collide with TCP data Collide with RTS

30 Serious Unfairness Problem (cont) Figure 8 –Five MAC packets dropped at node 4 –Four of them are caused by collisions with the TCP data packet from node 2 –One is caused by collision with the RTS control packet from node 2 –The only chance for node 5 to access the channel to node 4 is by sending out an RTS before node 2 sends out an RTS. Note that this must be after node 3 finishes sending back the data packet (TCP_ACK). The time window opening for node 5 to access the channel is very small

31 Serious Unfairness Problem (cont) –Also, because the binary exponential backoff scheme in the MAC layer always favors the last succeeding station (node 2 in this case), node 5 hardly wins the contention –After seven failures, it will quit and report a link breakage to its upper layer. Then a route failure event occurs –Main reason: Node 4 is within the interfering range of node 2  MAC layer does not function well in multi-hop wireless links

32 Discussion & Related Works TCP traffic shows the problems existing in the MAC layer very clearly Current MAC protocol has the following problems: –1. The hidden node problem still exists in multi- hop networks  The sufficient condition for not having hidden nodes is: any station that can possibly interfere with the reception of a packet from node A to B is within the sensing range of A. This condition cannot be true in a multi-hop network –2. No scheme in the standard to deal with the exposed node problem, which will be more harmful in a multi-hop network

33 Discussion & Related Works (cont) –3. For carrier sensing, the sensing range (and interfering range) is typically larger than the communication range  The larger interfering range makes the hidden node problem worse  The larger sensing range intensifies the exposed node problem –4. The binary exponential backoff scheme always favors the latest successful node  This will cause unfairness, even when this protocol is not used in multi-hop network