THROUGHPUT ANALYSIS OF IEEE 802.11 DCF BASIC IN PRESENCE OF HIDDEN STATIONS Shahriar Rahman Stanford Electrical Engineering

Slides:



Advertisements
Similar presentations
A Bandwidth Allocation/Sharing/Extension Protocol for Multimedia Over IEEE Ad Hoc Wireless LANs Shiann-Tsong Sheu and Tzu-fang Sheu IEEE JOURNAL.
Advertisements

Medium Access Issues David Holmer
Fundamentals of Computer Networks ECE 478/578
How Effective is the IEEE RTS/CTS Handshake in Ad Hoc Networks Kaixin Xu,Mario Gerla, Sang Bae IEEE Globecom 2002.
SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,
Modeling and Throughput Analysis for SMAC Ou Yang
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
Module C- Part 1 WLAN Performance Aspects
College of Engineering Optimal Access Point Selection and Channel Assignment in IEEE Networks Sangtae Park Advisor: Dr. Robert Akl Department of.
A New Approach for Accurate Modelling of Medium Access Control (MAC) Protocols Presenter: Moshe Zukerman ARC Centre for Ultra Broadband Information Networks.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Evaluate IEEE e EDCA Performance Tyler Ngo CMPE 257.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
WiFi Models EE 228A Lecture 5 Teresa Tung and Jean Walrand
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
1 Expected Data Rate (EDR): An Accurate High-Throughput Path Metric For Multi- Hop Wireless Routing Jun Cheol Park Sneha Kumar Kasera.
QoS of Voice over with NS simulator Prepared by: Yoshpa Benny Shraer Alexander Vainer Albert Instructors: Prof. Reuven Cohen Mr. Itai Dabran.
On the Performance Behavior of IEEE Distributed Coordination Function M.K.Sidiropoulos, J.S.Vardakas and M.D.Logothetis Wire Communications Laboratory,
Elec 599 Report: Modeling Media Access in Embedded Two-Flow Topologies of Multi-hop Wireless Networks Jingpu Shi Advisor: Dr. Edward Knightly Department.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
A Multichain Backoff Mechanism for IEEE WLANs Alkesh Patel & Hemant Patel ECE 695 – Leading Discussion By : Shiang- Rung Ye and Yu-Chee Tseng.
Opersating Mode DCF: distributed coordination function
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
PLANETE group, INRIA Sophia-Antipolis July 1, 2003 Adaptive Channel allocation for QoS Enhancement in IEEE Wireless LANs Presented by: Mohammad.
A Virtual Collision Mechanism for IEEE DCF
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
IEEE Journal on Selected Areas in Communications
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Selecting Transmit Powers and Carrier Sense Thresholds in CSMA Jason Fuemmeler, Nitin Vaidya, Venugopal Veeravalli ECE Department & Coordinated Science.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
An End-to-end Approach to Increase TCP Throughput Over Ad-hoc Networks Sarah Sharafkandi and Naceur Malouch.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Modeling the performance of DCF in mesh networks Andrew Symington, DNA Group.
On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.
Packet Dispersion in IEEE Wireless Networks Mingzhe Li, Mark Claypool and Bob Kinicki WPI Computer Science Department Worcester, MA 01609
Hybrid OFDMA/CSMA Based Medium Access Control for Next- Generation Wireless LANs Yaser Pourmohammadi Fallah, Salman Khan, Panos Nasiopoulos, Hussein Alnuweiri.
1 Performance Analysis of the Distributed Coordination Function under Sporadic Traffic joint work with C.-F. Chiasserini (Politecnico di Torino)
The Delay Distribution of IEEE e EDCA and DCF IPCCC 2006 April , Phoenix, Arizona Paal E. Engelstad UniK / Telenor R&D Olav.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Priority Scheduling in Wireless Ad Hoc Networks Xue Yang and NitinVaidya University of Illinois at Urbana-Champaign.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
Planning and Analyzing Wireless LAN
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
WLAN.
Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using Snooping Myunghwan Seo, Yonggyu Kim, and Joongsoo.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
On the Performance Characteristics of WLANs: Revisited S. Choi, K. Park and C.K. Kim Sigmetrics 2005 Banff, Canada Presenter - Bob Kinicki Presenter -
An Opportunistic Directional MAC Protocol for Multi-hop Wireless Networks with Switched Beam Directional Antennas Osama Bazan and Muhammad Jaseemuddin.
Performance Enhancement of Multirate IEEE WLANs with Geographically Scattered Stations 1 Duck-Yong Yang, 2 Tae-Jin Lee, 3 Kyunghun Jang, 3 Jin-Bong.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
Presented by Hoang Nguyen
He Xiaoben Further study of multi-hop communications - modeling the hidden terminal problem He Xiaoben
Author: Giuseppe Bianchi
Performance Evaluation of an Integrated-service IEEE Network
Enhanced IEEE by Integrating Multiuser Dynamic OFDMA
of the IEEE Distributed Coordination Function
Network Research Center Tsinghua Univ. Beijing, P.R.China
Enhanced Backoff Scheme in CSMA/CA for IEEE
Presentation transcript:

THROUGHPUT ANALYSIS OF IEEE DCF BASIC IN PRESENCE OF HIDDEN STATIONS Shahriar Rahman Stanford Electrical Engineering

Outline of Talk  DCF Protocol Overview  Problem with DCF Basic Access  Modeling Hidden Stations  DCF Throughput Models  Simulation Results  Discussions & Conclusion  Future Work  Q&A

IEEE DCF  operates on DSSS, FHSS or IR PHY  MAC provides CSMA/CA through NAV (~’CS’)  Basic & RTS/CTS accesses  Congestion, timing and backoff mechanisms  On modeling DCF -> Bianchi; Wu, et. al.

A Problem with DCF Basic  2-way handshaking  Assumes that there is no other transmission during this slot!!!  What if there is a hidden station??? A BCD

Saturation Throughput Model  Bianchi provides a saturation throughput model based on a Markov model of backoff mechanism- P success E[P] P idle  + P success T s + P collision T c  P idle = 1- P tr and P success = P tr P s  P collision = P tr (1 - P s )  P tr = 1 – (1 –  ) n and P s = n  (1 –  ) n-1 /P tr  T s and T c measures time durations of a successful transmission and collided transmission S =

Hidden Station Model - Static  Kleinrock and Tobagi’s hearing graph  Each station can hear some and not others => Pr(reachable) with assumption static => no transition  Generalize this to an n-station WLAN and decompose into a k-group reachability graph- P r(n) =  (N r(j) /N t(j) ) / k  Take average stations per group => expected number of hidden stations in the network 1, 23, 4 5 (a)(b)(c)

Hidden Station Model - Dynamic  Extend static model and allow transitions between k states, over n stations? => adjacency graph  Pr(reachable->reachable) => use control parameter,   Pr(hidden->*) = 1/l, Pr(reachable->hidden) = (1-  )/(l-1)  Balance equations: P r(j) + (1 – l) P h(j) = 1 (1 -  )/(1 - l) P r(j) = (1/l) P h(j)  Solve to get:P r(j) = 1 / (1 + l(1 –  )) 12 k k-state Markov chain Adjacency graph

Our Throughput Model - Saturation  Worst case throughput loss => hidden stations always transmit  P tr = 1; P s = N re  (1 –  ) Nre-1  This changes throughput to- P s E[P]/(P s T s + P coll T c )  I also changed T c to include ACK_Timeout- DIFS+E[P]+SIFS+ACK_..  Huge degradation of throughput for either static or dynamic WLANs  Will see simulations agree

Our Throughput Model – Finite Load(1)  Similar grouping into k groups, but now with identical loads, i individually and   i = per group  Packet from a group must be successful both from its group and all other groups-  Further, transmission probabilities from k contending groups consisting some stations each  Plug P s and P tr into throughput equation  Can be used for both basic and RTS/CTS

Our Throughput Model – Finite Load(2)  Now have hidden groups, but assume same rate per group persists (i.e. allow only same rate within group)  Extend the previous P s and P tr to separate out reachable and hidden stations, in adjacency graph, i.e.,  Assumption that reachable >= hidden. Is it valid?  It is not obvious how to calculate . One idea may be from scheduler’s history at stations  Certainly justifies RTS/CTS, MACAW, DCF+, etc.

Simulation Topology & Traffic <=250m >250m  Simulations in ns-2  914MHz Lucent WaveLAN DSSS PHY  Omni-antenna with 250m range  Modified CMU scene generator to create hidden stations, static topology, random pause time  Modified CMU traffic generator for variable packet size, intervals  RTS threshold => 3000 bytes  1028 bytes (8224 bits) packets  Inter-packet gap = 0 (saturation) and 1/rate (finite load)  CBR traffic over UDP links  Script to calculate various throughputs from trace

Saturation Simulation Results  Simulated with certain percentage hidden stations for 5, 10, 20, 50 stations  Results agree with model to some extent  Differences can be attributed to hidden stations may not always have packets (as assumed in the model)  Still need to experiment with  and simulate finite load throughput

Discussions & Conclusion  Hidden station models are sophisticated and can be used in many applications involving “carrier sense”  Saturation throughput model is valid and should be considered as an extension to Bianchi’s DCF model  Proposed finite load model is computationally expensive and needs further simplification. Finite load throughput model is an important step towards a general model of DCF and its derivatives  Though simulations are limited, it provides some degree of validation to the throughput models  It was a worthwhile investigation indeed helping me taking EE384* skills to different areas in networking

Summary & Future Work  Summarized prior art in DCF throughput and hidden station modeling  Developed static and dynamic hidden station models for DCF  Developed a finite load throughput model for DCF  Integrated hidden station models for different types of loads  Showed limited simulation and …  Fixed relationships among reachable/hidden stations  Finite load validation with CBR traffic (per group)  Finite load validation with VBR traffic, e.g. Bernoulli IID, exponential, bursty,..  Scheduling packets in fixed src-dst pairs in multi- channel medium, e.g. iSLIP wireless networks

Q&A Simulation scripts, code, topologies, traffic pattern files can be found at- THANK YOU