Balancing the Hidden and Exposed Node Problems With Power Control In CSMA/CA-Based Wireless Networks Yihong Zhou and Scott M. Nettles Department of Electrical.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Medium Access Issues David Holmer
SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, Mario Gerla INFOCOM2003,
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
Napoli - 21 February 2004 – Simone Merlin SLIDE 1 Analysis of the hidden terminal effect in multi-rate IEEE b networks Simone Merlin Department of.
Collisions & Virtual collisions in IEEE networks Libin Jiang EE228a Communication Networks.
TCP with Adaptive Pacing for Multihop Wireless Networks Sherif M. EIRakabawy, Alexander Klemm, Christoph Lindemann University of Dortmund Germany Proceedings.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
MAC Protocol By Ervin Kulenica & Chien Pham.
MIMO and TCP: A CASE for CROSS LAYER DESIGN Soon Y. Oh, Mario Gerla Computer Science Dept. University of California, Los Angeles {soonoh,
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
ECE 4450:427/527 - Computer Networks Spring 2015
Wireless LAN Simulation - IEEE MAC Protocol
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Khaled Hatem Almotairi and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering University of Waterloo 200 University Avenue West Waterloo,
Naveen Santhapuri, Srihari Nelakuditi and Romit Roy Choudhury University of South Carolina Duke University WCNC 2008.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
1 Interplay of Spatial Reuse and SINR-determined Data Rates in CSMACA-based, Multi-hop, Multi- rate Wirless Networks Ting-Yu Lin and Jennifer C. Hou Department.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Full auto rate MAC protocol for wireless ad hoc networks Z. Li, A. Das, A.K. Gupta and S. Nandi School of Computer Engineering Nanyang Technological University.
Enhanced Slotted Aloha Protocols for Underwater Sensor Networks with Large Propagation Delay Kai Chen † Jianhua He § Yi Zhou ‡ Haibing Guan ‡ †School of.
Fundamentals of Computer Networks ECE 478/578
SEEDEX: A MAC protocol for ad hoc networks R. Rozovsky and P. R. Kumar ACM ACM MobiHoc 2001 speaker: Chien-Wen.
Mohamed Elhawary Computer Science Department Cornell University PERCOM 2008 Zygmunt J. Haas Electrical and Computer Engineering Department Cornell University.
A High-Throughput MAC Protocol for Wireless Ad Hoc Networks Wanrong Yu, Jiannong Cao, Xingming Zhou, Xiaodong Wang, Keith C. C. Chan, Alvin T. S. Chan,
Angular MAC: a framework for directional antennas in wireless mesh networks Erdem Ulukan and Özgür Gürbüz Faculty of Engineering and Natural Sciences,
Chih-Min Chao and Yao-Zong Wang Department of Computer Science and Engineering National Taiwan Ocean University, Taiwan IEEE WCNC 2010 A Multiple Rendezvous.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
Khaled Hatem Almotairi and Xuemin (Sherman) Shen IEEE Globecom 2010 Speak: Huei-Rung, Tsai Symmetrical Power Control for Multi- channel Multi-hop Wireless.
WLAN.
Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using Snooping Myunghwan Seo, Yonggyu Kim, and Joongsoo.
Turkmen Canli ± and Ashfaq Khokhar* Electrical and Computer Engineering Department ± Computer Science Department* The University of Illinois at Chicago.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
How Physical Carrier Sense Affects System Throughput in IEEE Wireless Networks Zheng Zeng, Yong Yang and Jennifer C. Hou Department of Computer.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray,Jeffrey B. Carruthers and David Starobinski WCNC 2003.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
1 Effectiveness of Physical and Virtual Carrier Sensing in IEEE Wireless Ad Hoc Networks Fu-Yi Hung and Ivan Marsic WCNC 2007.
DOTS: A Propagation Delay-aware Opportunistic MAC Protocol for Underwater Sensor Networks IEEE ICNP 2010 (18.2%) Youngtae Noh, Mario Gerla (UCLA, CS) Paul.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
Exploring Random Access and Handshaking Techniques in Large- Scale Underwater Wireless Acoustic Sensor Networks Peng Xie and Jun-Hong Cui Computer Science.
A Bidirectional Multi-channel MAC Protocol for Improving TCP Performance on Multihop Wireless Ad Hoc Networks Tianbo Kuang and Carey Williamson Department.
5/12/2005doc.: IEEE /0334 Submission Ripple: A Distributed Medium Access Protocol for Wireless Mesh Network Presented at the IEEE802.11, ,
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
ICUPC’98 Jing Deng and Zygmunt J. Hass
TCP and MAC interplay in Wireless Ad Hoc Networks
On the Physical Carrier Sense in Wireless Ad-hoc Networks
The Impact of Multihop Wireless Channel on TCP Performance
Wireless LAN Simulation IEEE MAC Protocol
Presentation transcript:

Balancing the Hidden and Exposed Node Problems With Power Control In CSMA/CA-Based Wireless Networks Yihong Zhou and Scott M. Nettles Department of Electrical and Computer Engineering The University of Texas at Austin WCNC 2005

outline Introduction Related work CSMA/CA-based physical model Power control schemes Simulation result Conclusion

Introduction Problems in MACs : The hidden node problem The exposed node problem Three Ranges Transmit range Carrier sense range Interference Range

Introduction Enhancing collisions is worse than limiting spatial reuse Main goal balance hidden nodes and exposed nodes

Related work Typical scheme Although the reduced transmit power reduces the exposed nodes, it greatly increases the hidden nodes.

CSMA/CA-based physical model

CSMA/CA-based physical model -- Physical Model When X transmits to Y TRx: Pr > thrd rx CSRx: Pr > thrd cs, defines the potential set of exposed nodes IRy:SIR < SIR cap, defines the potential set of hidden nodes

CSMA/CA-based physical model -- Physical Model Use free space propagation model and two-way ground model Transmit range Carrier sense range

CSMA/CA-based physical model -- Physical Model Interference Range d ir is determined by both d and Pt

CSMA/CA-based physical model -- The Relationship Between the Three Ranges

Power control schemes Strong Transmit Power:

Power control schemes Weak Transmit Power:

Power control schemes The Optimal Transmit Power MAC:

Power control schemes The Optimal Transmit Power MAC:

Power control schemes The Optimal Transmit Power MAC: Sending a RTS using P max Sending a CTS using P max The sender calculates the distance d by using Pr and P max The sender then calculates the P otp Sending the data packet using P otp An ACK using P otp

Simulation result Two Traffic Flows:

Simulation result Two Traffic Flows:

Simulation result Chain Topologies:

Simulation result Chain Topologies:

Simulation result Random Topologies:

conclusion This paper has better spatial reuse than and avoid problems with collisions that occur in other power control-based MACs.