0.1 IT 601: Mobile Computing MAC Protocols Prof. Anirudha Sahoo IIT Bombay.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Medium Access Issues David Holmer
1 Chapter 6: MAC Protocols for Ad-Hoc Wireless Networks  Introduction  Issues  Design Goals  Classifications  Contention-based Protocols  Contention-based.
Both RTS and CTS contains: The address of the sender The address of the receiver The sizeof the intended data short message size contention concentrated.
DPRMA (Distributed Packet Reservation Multiple Access)
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
Earl1 MACA-BI(MACA By Invitation) A Receiver Oriented Access Protocol for Wireless Multihop Network F. Talucci, M. Gerla, and L. Fratta Proceedings of.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Wireless Medium Access Control Protocols
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
1 Introduction to Wireless Networks Michalis Faloutsos.
Reversing the Collision Avoidance Handshake in Wireless Networks J.J. Garcia-Luna-Aceves and Makis Tzamaloukas Computer and Communications.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Wireless Communications
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Wireless MAC Protocols Presenter: George Nychis Xi Liu.
1 MAC Protocols that use Directional Antennnas. 2 Directional Antenna  Directional communication  Less Energy in the wrong direction Better Spatial.
Chapter 6 Multiple Radio Access
IEEE WLAN.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
Ad hoc network notes MAC Protocols for Ad-Hoc Wireless Networks
WLAN.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
MAC Protocols for Ad Hoc Wireless Networks
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Wireless Sensor Networks 4. Medium Access
Medium Access Control MAC protocols: design goals, challenges,
Wireless LANs Wireless proliferating rapidly.
MACAW: A Media Access Protocol for Wireless LAN’s
MACAW: A Media Access Protocol for Wireless LANs
TCP and MAC interplay in Wireless Ad Hoc Networks
Multiple Access, Collision Avoidance for Wireless LAN’s
MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Subject Name: Adhoc Networks Subject Code: 10CS841
Chapter 6 Multiple Radio Access.
Presentation transcript:

0.1 IT 601: Mobile Computing MAC Protocols Prof. Anirudha Sahoo IIT Bombay

0.2 ISSUES in Wireless MAC Bandwidth Efficiency –BW available is very limited –MAC should be designed such that the scarce bandwidth is utilized in an efficient manner Hidden and Exposed Node Problem Collision-prone shared channel –Multiple nodes may contend for the medium leading to collision –MAC should make sure that collision is minimized

0.3 ISSUES in Wireless MAC Mobility of Nodes –Control information exchanged may become useless due to mobility –MAC performance should be satisfactory when nodes are mobile Power consumption QoS support –Criticial for real time applications

0.4 –A and C cannot hear each other. –A sends to B, C cannot receive A. –C wants to send to B, C senses a “free” medium (CS fails) –Collision occurs at B. –A cannot receive the collision (CD fails). –A is “hidden” for C. Hidden Terminal Problem BAC

0.5 Exposed Terminal Problem –A starts sending to B. –C senses carrier, finds medium in use and has to wait for A->B to end. –D is outside the range of A, therefore waiting is not necessary. A B C D

0.6 Design Goals Available bandwidth should be utilized efficiently Fair allocation of bandwidth Control overhead should be kept low Should minimize the effect of hidden and exposed node Should be scalable to large network Should have power control mechanisms to manage energy consumption of the nodes

0.7 Classification of MAC protocols Contention-free –TDMA –FDMA –Polling Contention-based –MACA (Multiple Access Collision Avoidance) –MACAW

0.8 MACA Proposed as an alternative to the traditional CSMA CSMA senses the state of the channel only at the transmitter –Leads to hidden node problem Does not use carrier sensing –Nodes start transmitting after a random backoff MACA uses RTS and CTS to overcome hidden node problem and exposed node problem –Node which only hears CTS (but no RTS), stops from transmitting (hidden node) –Node which only hears RTS (but no CTS), is free to transmit (exposed node) –RTS and CTS carry the expected duration of data transmission When there is a collision, it uses binary exponential backoff (BEB) before retrying

0.9 Packet Transmission in MACA neighbor senderreceiver neighbor RTS CTS DATA

0.10 MACAW The binary exponential back off can starve the flows S1 and S2 have data to send Let us say S1 captures the channel S2 keeps sending RTS, but it gets collided. S2 increases backoff window. Gets blocked from transmitting longer period of time after every collision. R1R1 S1S1 S2S2 R2R2

0.11 Back off change in MACAW Send Back off counter value in the packet. Nodes receiving the packet use the backoff counter carried in the packet instead of that used in MACA –This mechanism make the BW allocation fair BEB (Binary Exponential Backoff) adjusts the back off counter very rapidly –After a successful Tx, the BO is reset to minimum –MACAW introduced multiplicative increase and Linear Decrease (MILD) Upon collision BO multiplied by 1.5 Upon successful transmission it is decreased by 1

0.12 Back off change in MACAW Per flow fairness is implemented –Each flow runs the back off algorithm. –Flow with minimum backoff value is chosen to send RTS

0.13 ACK packet in MACAW In MACA, there was no reliability at DLL, it was left to the higher layer to provide reliability MACAW introduced ACK packet for every Data packet –If ACK is not received, the sender reschedules the Data packet for transmission. Sender would send RTS Rcvr would send CTS (if Data pkt was lost) –Would send ACK if ACK was lost

0.14 DS packet in MACAW In MACA, an exposed node is free to transmit simultaneously when the source node is transmitting packets. –But RTS transmission by exposed node is useless, since the CTS reception will end in collision –So the source node sends a DS (Data Sending) msg which contains the duration of data transmission tells the exposed node that an RTS-CTS was successful, hence need to wait until DATA-ACK is done

0.15 DS packet in MACAW S1 is already sending data packets to R1 S2 sends RTS to R2, but when R2 sends CTS, it collides with data packet from S1 R1R2S2S1

0.16 RRTS Packet in MACAW S1 is already sending Data S2 sends RTS, but R2 does not respond with CTS, since it is a hidden node to S1 S2 does not know the duration of the Data transmission –Keeps on increasing BO counter and transmits RTS S2S1R1R2 RRTS

0.17 RRTS Packet in MACAW R2 contends for the medium on behalf of S2 –If it had received RTS from S2, then it waits for the next contention period and transmits RRTS –Node S2 on receiving RRTS, sends RTS to R2 and normal RTS-CTS-Data-Ack takes place

0.18 Busy Tone Multiple Access Protocols (BTMA) There are two transmission channels –A data channel and a control channel When a node is ready for transmission, it checks if the busy tone is active –If not, it turns on the busy tone and starts data transmission –Otherwise, it reschedules the packet after some random delay –Any other node which senses the carrier on the channel also transmits the busy signal –When a node is transmitting data, no node in the 2-hop neighborhood is permitted to transmit

0.19 BTMA N1 N2 Region in which Simultaneous transmissions are not possible when N1 is transmitting data Busy tone

0.20 BTMA Probability of Collision is very low But bandwidth utilization is very poor

0.21 MACA-By Invitation A receiver oriented protocol Reduces the number of control packets in MACA Receiver initiates data transmission by sending RTR (Ready to Receive) control packet to the sender Rcvr needs to estimate the avg. arrival rate of pkts at the sender –Data packets carry control information regarding backlogged flows sender, queue length –In case, sender does not get the RTR msg before a timeout period (e.g., wrong estimation of rate), then it can send the information in an RTS msg

0.22 Contention-Based Protocol with Reservation Nodes can reserve bandwidth Contention only occur during reservation phase Once reservation is successful, the node gets exclusive access to the reserved bandwidth

0.23 Distributed Packet Reservation Multiple Access Protocol (D-PRMA) TDMA based scheme The channel is divided into fixed equal sized frame Each frame consists of s slots and each slot consists of m mini-slots Each mini-slot has two control fields : RTS/BI (RTS with Busy Indication), CTS/BI A certain period of beginning of each mini slot is reserved for carrier sensing If a sender detects channel to be idle at the beginning of a slot (mini slot 1), it sends RTS in the RTS/BI part of the mini slot.

0.24 D-PRMA (Cont’d) The rcvr node sends CTS in the CTS/BI of the same mini-slot. If the sender node receives the CTS successfully, then it gets reservation for the current slot and can use the remaining mini slots (2 to m). Otherwise it continues contention process through subsequent mini slots

0.25 D-PRMA (Cont’d) Slot 1Slot 2Slot s Mini slot 1Mini slot 2Mini slot m RTS/BICTS/BI (Frame Structure of D-PRMA)

0.26 Collision Avoidance Time Allocation Protocol (CATA) Based on two basic principles: –Receiver of a flow inform the potential source nodes about the reserved slot on which it is currently receiving packets Similarly, the source node should inform the potential destination node about interference in the slot –Use of negative ACK for reservation requests and control packet transmissions at the beginning of each slot, for distributing slot reservation information to senders of broadcast or multicast sessions

0.27 CATA (Cont’d) Time is divided into equal sized frames and each frame consists of S slots. Each slot is divided into 5 minislots –First 4 minislots used for transmitting control packets and are called control minislots (CMS) –The 5 th slot is called the Data Minislot (DMS) Much longer than CMS

0.28 CATA (Cont’d) Slot 1Slot 2Slot S (Frame Structure of CATA) CMS1CMS2CMS3CMS4DMS

0.29 CATA (Cont’d) Each rcvr node which receives data in DMS of current slot, sends slot reservation (SR) packet during CMS1 –Informs other neighboring senders about currently active reservation Every sender that transmits data in DMS, sends RTS in CMS2 –When received (or collides with other RTS) by neighboring nodes, the neighbors understand that someone is scheduled to transmit in DMS

0.30 CATA (Cont’d) If a sender wants to reserve DMS slot, it first checks that CMS1 slot is idle –Sends RTS in CMS2 –Rcvr should send CTS in CMS3 –the reservation is then successful Sender sends data in DMS –Once reservation is successful in a slot, from next slot sender and rcvr do not send anything in CMS3, but sender sends not-to-send (NTS) during CMS4

0.31 CATA (Cont’d) NTS is a negative ACK –any potential broadcast or multicast source which detects NTS (or noise) during CMS4, understand that the reservation is made by someone else and hence no broadcast or multicast is done in the slot –If CMS4 was idle, then broadcast/multicast source starts transmitting

0.32 References P. Karn, “MACA – A New Channel Access Method for Packet Radio”, Proc. Of ARRL/CRRL Amateur Radio Networking Conference, 1990, pp , September V. Bharghavan, A. Demers, S. Shenker, L. Zhang, “MACAW: A Media Access Protocol for Wireless LANs”, Proc. Of ACM SIGCOMM 1994, pp , August F. A. Tobagi and L. Kleinrock, “Packet Switching in Radio Channels: Part II – The Hidden Terminal Problem in Carrier Sense Multiple Access and Busy Tone Solution”, IEEE Transactions on Communications, vol. 23, no. 12, pp , December 1975.

0.33 References F. Talucci and M. Gerla, “MACA-BI (MACA by Invitation) : A Wireless MAC Protocol for High Speed Ad Hoc Networking”, Proc. Of IEEE ICUPC 1997, vol. 2, pp , October S. Jiang, J. Rao, D. He, and C. C. Ko, “A Simple Distributed PRMA for MANETs”, IEEE Transactions on Vehicular Technology, vol. 51, no. 2, pp , March Z. Tang and J. J. Garcia-Luna-Aceves, “A Protocol for Topology-Dependent Transmission Scheduling in Wireless Networks”, Proc. Of IEEE WCNC 1999, vol. 3, no. 1, pp , September 1999.