Top Banner
Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan
57

Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Jan 20, 2016

Download

Documents

Lambert Barker
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Special Topics in Computer

Engineering

Wireless NetworksBy: Mohammad Nassiri

Bu-Ali Sina University, Hamedan

Page 2: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Access method in Wireless Ad-hoc

Networks

Page 3: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Ad-hoc mode in 802.11

Basically, ad-hoc mode in 802.11 does not support multi-hop transmission. However, there are a lot of mechanisms to provide the multi-hop transmission with the help of Layer-3, namely, IP layer.

Ad HocSimplestRapid

deploymentPeer-to-peerNo

administration

Page 4: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Multi-hop Ad-hoc Networks An Ad-hoc network Direct transmission with

neighboring nodes Each node can be router

and so it can relay traffic. B relays packet from A to C

Self-configuration, Self-healing

In this lecture, MAC issues in Wireless Ad-hoc Networks

Page 5: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Recall Rx = Reception

Range CS = Carrier

Sensing Range A can communicate

to B C can only sense a

transmission emitted from A

D cannot overhear A

Page 6: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

RTS/CTS for hidden problem

D and C are hidden to A

D is within CSR of B A sends to B, D sends

to B, collision is possible. RTS/CTS fails to resolve hidden terminal in this case

Page 7: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

RTS/CTS for exposed nodes ?

RTS/CTS cannot handle exposed node problem The left-hand scenario

Page 8: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Masked node C cannot decode CTS

from B It’s NAV is not up to

date. Later it can collide the

transmission of A to B by sending an RTS.

C is masked by B and D

Page 9: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

9

Blocked nodes in 3 pairs We consider blocked nodes in the

scenario of three parallel pairs node in the middle has almost no

possibility to access the channel

Studied by Chaudet et al. 2005

e.g. each pair in a room

A, C and E are emitters

Emitter C is starved by transmissions of A and E.

Page 10: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

10

A

C

E

DATA

DATA DATA

DATA

DATA

DATA

C is starved by A and E

DATA

DATA

How does legacy DCF work in this scenario when A and E are transmitting ?

DIFS EIFS Backoff Busy Channel

DATADATA

Three pairs

Page 11: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

11

Three pairs

A

C

E

DIFS EIFS Backoff Busy Channel

Long term Unfairness

DATA DATA DATA

DATA

DATA

How does legacy DCF work in this scenario when C is transmitting ?

DATADATA

Page 12: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

DCF evaluation in a chain

Throughput for chain with different length

Claude Chaudet: IEEE com. Magazine 2005

Page 13: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Does the IEEE 802.11 MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks?

Shugong XuTark SaadawiJune, 2001

IEEE Communications Magazine(Adapted from

mnet.cs.nthu.edu.tw/paper/jbb/010704.pps)

Next 5 slides from

Page 14: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Serious Unfairness – (1)

2 TCP Connections First session starts at 10.0s ( 6 4 ) Second session starts 20.0s later ( 2 3 )

1 2 3 4 5 6

Source

Destination

Destination

Source

Page 15: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Serious Unfairness – (2)

First session start

Second session start

Page 16: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Serious Unfairness – (3)

The throughput of the first session is zero in most of its lifetime after the second session starts.

There is not even a chance for it to restart.

The loser session is completely shutdown even if it starts much earlier.

Page 17: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Serious Unfairness – (6)

Discussion: Node5 cannot reach node4 when

• Node2 is sending (collision)• Node3 is sending ACK (defer)

1 2 3 4 5 6

Source

Destination

Destination

Source

Page 18: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Conclusion

The hidden terminal problem still exists in multihop networks.

The exposed terminal problem will be more harmful in a multihop network and there is no scheme in IEEE 802.11 standard to deal with this problem.

The binary exponential backoff scheme always favors the latest successful node. It will cause unfairness.

Page 19: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Multiple Channels for Wireless Networks

Page 20: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

20

Traditional Ad Hoc Network: Single Channel

Each device has 1 radio. All radios are tuned to the same channel.

Page 21: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Motivation

Exploit multiple channels to improve network throughput’ … why ?

Greater parallel communication is possible

1

defer

1

2

Page 22: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

22

Typical Wireless Networks

t=0frequencySender 1

t=1frequencySender 2

t=2frequencySender 3

Each network uses 1 channel only.

Channel 1 Channel 2 Channel 3

: :

Can we do better?

PowerDensity

Page 23: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

23

Can we do better?

t=0frequency

PowerDensity

Sender 1

Simultaneous sending on different channels?

Channel 1 Channel 2 Channel 3

Sender 3

t=1frequencySender 2 Sender 1 Sender 4

Sender 4

t=2frequencySender 3

: :

Sender 2Sender 4

Page 24: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

24

Goal

Given a wireless network where: M (>1) channels are available each node has 1 tunable radio each node has many neighbors

Design a Multi-Channel MAC protocol: increases total network throughput achieves low average delay robust, practical

Page 25: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

25

Why Multi-Channel MAC?

t=0

t=1

frequency

frequency

Sender 1

Sender 2 Sender 1

Sender 3

Sender 4

Sender 4

t=0

t=1

frequency

frequency

Sender 1

Sender 2

Single “Super” Channel

Multi-Channel MAC

Page 26: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

26

M-Channel Schedule example

Page 27: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

27

M-Channel Schedule example

Page 28: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

28

Core Design Issues

Q1: Which channel is receiver Y listening on?

Q2: Is channel i free?

time=t

time=t

frequency

frequencyFree ?

receiver Y

? ? ?

Chan i

Page 29: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Multi-channel Hidden Terminals

Page 30: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Multi-channel Hidden Terminals

Observations

1. Nodes may listen to different channels2. Virtual Carrier Sensing becomes difficult3. The problem was absent for single channel

Page 31: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

31

Multi-Channel MAC Protocols (1) Dedicated Control Channel (2 radios)

Dedicated control radio & channel for all control messages DCA [Wu2000], DCA-PC [Tseng2001], DPC [Hung2002].

(2) Split Phase Time divided into alternate (i) channel negotiation phase

on default channel & (ii) data transfer phase on all channels

MMAC [J.So2003], MAP [Chen et al.]

(3) Common Hopping Sequence All idle nodes follow the same channel hopping sequence HRMA [Tang98], CHMA, CHAT [Tzamaloukas2000]

(4) Parallel Rendezvous Each node follows its own channel hopping sequence SSCH [Bahl04], McMAC ()

Page 32: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

32

Protocol (1): Dedicated Control Channel

Ch3(data)

Ch2(data)

Ch1(Ctrl)

Time

Channel

RTS(2,3)

CTS(2)

RTS(3)

CTS(3)

Data Ack

Keys: 2 Radios/Node; Rendezvous on 1 channel; No time sync

Legend: Node 1 Node 2 Node 3 Node 4

Data AckData Ack ...

Page 33: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

33

Protocol (2): Split-Phase

Ch3

Ch2

Ch1

Time

Channel

Hello(1,2,3)

Ack (1)

Keys: 1 Radio; Rendezvous on a common channel; Coarse time sync

Control Phase Data TransferPhase

...

...

...Data AckRts Cts

DataRts Cts Ack ...

Hello(2,3)

Ack (2)

Unused

Page 34: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

34

Protocol (3): Common Hopping

Ch3

Ch2

Ch1

Time

Channel Key: 1 radio; Non-busy nodes hop together; Tight time sync

Ch4

1 2 3 4 5 6 7 8 9 10 11

Data/Ack ...

Enough for RTS/CTS

RTS+CTS

Page 35: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

A MAC protocol based on Split Phase

Page 36: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

802.11 PSM (Power Saving Mode)

Doze mode – less energy consumption but no communicationATIM – Ad hoc Traffic Indication Message

A

B

C

Time

Beacon

ATIM Window

Beacon Interval

Page 37: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

802.11 PSM (Power Saving Mode)

A

B

C

Time

Beacon

ATIM

ATIM Window

Beacon Interval

Page 38: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

802.11 PSM (Power Saving Mode)

A

B

C

Time

Beacon

ATIM

ATIM-ACK

ATIM Window

Beacon Interval

Page 39: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

802.11 PSM (Power Saving Mode)

A

B

C

Time

Beacon

ATIM

ATIM-ACK

ATIM-RES

ATIM Window

Beacon Interval

Page 40: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

802.11 PSM (Power Saving Mode)

A

B

C

Time

Beacon

ATIM

ATIM-ACK

DATAATIM-RES

Doze Mode

ATIM Window

Beacon Interval

Page 41: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

802.11 PSM (Power Saving Mode)

A

B

C

Time

Beacon

ATIM

ATIM-ACK

DATA

ACK

ATIM-RES

Doze Mode

ATIM Window

Beacon Interval

Page 42: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

802.11 PSM (Power Saving Mode) Summary

All nodes wake up at the beginning of a beacon interval for a fixed duration of time (ATIM window)

Exchange ATIM during ATIM window

Nodes that receive ATIM message stay up during for the whole beacon interval

Nodes that do not receive ATIM message may go into doze mode after ATIM window

Page 43: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

MMAC : Assumptions

All channels have same BW and none of them are overlapping channels

Nodes have only one transceiver

Transceivers are capable of switching channels but they are half-duplex

Channel switching delay is approx 250 us, avoid per packet switching

Page 44: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

MMAC : Steps

Divide time into beacon intervals

At the beginning, nodes listen to a pre-defined channel for ATIM window duration

Channel negotiation starts using ATIM messages

Nodes switch to the agreed upon channel after the ATIM window duration

Page 45: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

MMAC

Preferred Channel List (PCL)

For a node, PCL records usage of channels inside Tx range

HIGH preference – always selected

MID preference – others in the vicinity did not select the channel

LOW preference – others in the vicinity selected the channel

Page 46: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

MMAC

Channel Negotiation

Sender transmits ATIM to the receiver and includes its PCL in the ATIM packet

Receiver selects a channel based on sender’s PCL and its own PCL

Receiver sends ATIM-ACK to sender including the selected channel

Sender sends ATIM-RES to notify its neighbors of the selected channel

Page 47: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

MMAC

A

B

C

DTime

ATIM Window

Beacon Interval

Common Channel Selected Channel

Beacon

Page 48: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

MMAC

A

B

C

D

ATIM

ATIM-ACK(1)

ATIM-RES(1)

Time

ATIM Window

Common Channel Selected Channel

Beacon

Page 49: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

MMAC

A

B

C

D

ATIM

ATIM-ACK(1)

ATIM-RES(1)

ATIM-ACK(2)

ATIM ATIM-RES(2)

Time

ATIM Window

Common Channel Selected Channel

Beacon

Page 50: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

MMAC

ATIM

ATIM-ACK(1)

ATIM-RES(1)

ATIM-ACK(2)

ATIM ATIM-RES(2)

Time

ATIM Window

Beacon Interval

Common Channel Selected Channel

Beacon

RTS

CTS

RTS

CTS

DATA

ACK

ACK

DATA

Channel 1

Channel 1

Channel 2

Channel 2

A

B

C

D

Page 51: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Experimental Parameters

Transmission rate: 2MbpsTransmission range: 250mTraffic type: Constant Bit Rate (CBR)Beacon interval: 100ms

Packet size: 512 bytesATIM window size: 20msDefault number of channels: 3 channels

Compared protocols802.11: IEEE 802.11 single channel protocolDCA: Wu’s protocolMMAC: Proposed protocol

Page 52: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

WLAN - Throughput

Page 53: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Multi-hop Network - Throughput

Page 54: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Analysis

For MMAC:

ATIM window size significantly affects performance

ATIM/ATIM-ACK/ATIM-RES exchanged once per flow per beacon interval – reduced overhead

ATIM window size can be adapted to traffic load

Page 55: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Discussions

MMAC requires a single transceiver per host to work in multi-channel ad hoc networks

MMAC achieves throughput performance comparable to a protocol that requires multiple transceivers per host

Beaconing mechanism may fail to synchronize in a multi-hop network – probabilistic beaconing may help

Starvation can occur with common source and multiple destinations

Page 56: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

Multi-interface Multi-channel

Each node has multiple interfaces

Page 57: Special Topics in Computer Engineering Wireless Networks By: Mohammad Nassiri Bu-Ali Sina University, Hamedan.

References J. So, N. Vaidya; ``

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver''; Proc. ACM MobiHoc 2004

S.-L.Wu, C.-Y. Lin, Y.-C. Tseng, and J.-P. Sheu.  "A new multichannel MAC protocol with on-demand channel assignment for multi-hop mobile ad hoc networks."; In Int’l Symp. on Parallel Architectures, Algorithms and Networks (I-SPAN), 2000.

C. Chaudet, D. Dhoutaut, I. G. Lassous, Performance issues with IEEE 802.11 in ad hoc networking , IEEE Communications magazine, Volume 43, Number 7; Pages: 110-116, July 2005

S. Xu, T. Saadawi, Does the IEEE 802.11 MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks?, IEEE Communications magazine, June 2001

Review 1-60