Presentation is loading. Please wait.

Presentation is loading. Please wait.

Doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area.

Similar presentations


Presentation on theme: "Doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area."— Presentation transcript:

1 doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [New Protocol to Solve the Deadlock of IEEE802.15.4 MAC] Date Submitted: [Sept. 2004] Source: [Liang Li, Xin Wang, Chenyang Yang, Zhijian Hu ] Company: [WXZJ Inc.] Address: [Building D, No.2, Shangdi XinXi Lu, Beijing, China 100085 ] Voice:[], E-Mail:[liang_1@yahoo.com] Re: [ IEEE 802.15.4b ] Abstract:[This contribution proposes an enhanced MAC for TG4.] Purpose:[ Response to the call for proposal of IEEE 802.15.4b, Doc Number: 15-04-0366-00-004b] Notice:This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15.

2 doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 2 Proposal Enhance the IEEE802.15.4 CSMA/CA algorithm –Solving the deadlock problems –Achieving the High throughput –Keeping the High energy efficiency

3 doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 3 Deadlock in ad hoc The two nodes transmit the data to each other and are hard to receive the data from the other each other. Ref IEEE802.15-04- 0366 for the description of deadlock

4 doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 4 State Chart with current CSMA/CA Once one node enters this circle, it can not receive the data frames until it transmits the data successfully or abandons the transmission.

5 doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 5 The Deadlock in the States Viewpoint When a node is in State 1, it can’t receive the data from the nodes within State 2, nor it sends the ack to nodes within State 3. When a node is within State 2, it will make other nodes failed to contend the channel. When a node is within State 3, it can’t receive the data from the nodes in State 2.

6 doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 6 New CSMA/CA: Monitoring the Channel and Adding the Backoff Counter Set the node within State 1 and may monitor the channel and receive the data, then send the acknowledgement back. The backoff counter is introduced. The deadlock circle may be broken in such way.

7 doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 7 The Flowchart of the CSMA/CA

8 doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 8 The Simple Explanation to the New CSMA/CA Algorithm The node should decrease the backoff counter if the channel is idle, otherwise it should pause the decreasing of the backoff counter. When there is packet transmitting in the channel, the node who is in backoff state will detect a busy channel. The backoff counter of this node will not decrease in this period. When the packet has been received, the node will process the packet first and send back the ACK if necessary. Then the backoff counter will continue to decease since the channel is idle.

9 doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 9 The Multiple-Response of the Two Nodes (1)

10 doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 10 The Multiple-response of the Two Nodes (2) Node A & B begin the backoff procedure simultaneous. Node A finishes the backoff first and begins its transmission. Node B will receive the packet that transmitted by Node A and don’t decrease its own backoff counter. Node B send back the ACK after the receiving and enter the backoff state again.

11 doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 11 Simulation with new MAC Protocol (1) We test our new mac protocol in a linear ad hoc networks. The throughput and energy-efficiency have been tested. The throughput is defined as the end-to-end throughput when packets are transmitted in multihop.

12 doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 12 Simulation (2) : Throughput Because the new protocol can reduce the collision of the packet,the throughput of the new mac protocol has been improved dramatically.

13 doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 13 Simulation (3) : Energy Efficiency Because the new mac protocol can reduce the probability of the collision, the energy used for retransmission can be saved. Hence the energy efficiency of new man is better than the current ones.

14 doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 14 Conclusion The backoff counter is introduced to break the deadlock circle. Each node needs to monitor the coming data. This modification can improve the throughput of the network and achieve the better energy efficiency.


Download ppt "Doc.: IEEE 802.15-04-0494-00-004b Submission Sept 2004 Liang Li, WXZJ Inc./Helicomm Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area."

Similar presentations


Ads by Google