8.mac schemes for ad hoc networks
TRANSCRIPT
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
1/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 1
MAC schemes for ad-hoc networks
Khalid Shabala
11.07.2011
MAC schemes for ad-hoc networks
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
2/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 2
MAC schemes for ad-hoc networks
Outline
Introduction
Ad hoc Networks
Mac schemes for ad hoc networks
Examples of using ad hoc in existing real-world systems Summery
References
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
3/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 3
MAC schemes for ad-hoc networks
Wireless ad hoc networks are decentralized wireless networks .
Introduction
WirelessNetworks
Decentralized Centralized
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
4/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 4
MAC schemes for ad-hoc networks
These networks rely on nodes Instead of preexisting infrastructures (access points)to forward the data.
In an infrastructure network ,when two nodes want to communicate, all data gothrough access points first .
While in ad hoc networks ,nodes work as routers and communicate with each other
directly Considered as multi-hop wireless networks where all nodes cooperate to maintain
network connectivity These type of networks are useful in a situation where temporary network
connectivity is needed
Ad-hoc networks
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
5/33
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
6/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 6
MAC schemes for ad-hoc networks
Random Access Protocols
In random access protocols each packet is subject to collision, since no resourcereservation is adopted
The advantages of this family of protocols :1. Each terminal can transmit information to the neighbor one with low
Power consumption.
2. Random access protocols provide low delays, since packets aretransmitted immediately. The disadvantages : The low stability with traffic load; When the traffic increases, the probability of
collision increases as well, and the number of lost packets increases.This reduces the throughput and increases the delay, since lost packets must beeventually retransmitted.
mechanisms are used to reduce the negative effect of collisions.
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
7/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 7
MAC schemes for ad-hoc networks
The simplest random access protocol is ALOHA .It was Developed in 1970 atUniversity of Hawaii.
ALOHA does not require any action by terminals before they transmit a packet.
A checksum is added at the end of each packet . The receiving terminal uses thechecksum to evaluate if the packet was received correctly or was corrupted bycollision.
In case of collision the packet is discarded. Retransmission of discarded packets is accomplished based on an Automatic
Repeat on ReQuest (ARQ) protocol, that resend packets after a random delay.
ALOHA Protocol
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
8/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 8
MAC schemes for ad-hoc networks
8
Pure ALOHA
If you have data to send, send the data If the message collides with anothertransmission, try resending " later.
Pure ALOHA does not check whether the channel is busy before transmitting.
Boxes indicate frames. Shaded boxesindicate frames which have collided.
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
9/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 9
MAC schemes for ad-hoc networks
Slotted ALOHA
An improvement of the original ALOHA protocol was "Slotted ALOHA. It introduces discrete timeslots and increases the maximum throughput. A node can send only at the beginning of a timeslot, and thus collisions are reduced.
In this case, we only need to worry about the transmission-attempts within oneframe-time and not two consecutive frame-times, since collisions can only occur
during each timeslot.
Boxes indicate frames. Shaded boxesindicate frames which are in the same slots.
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
10/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 10
MAC schemes for ad-hoc networks
o Slotted Aloha reduces the collision ,thus the throughput increases comparing with PureAloha as shown in the figure.
Slotted ALOHA
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
11/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 11
MAC schemes for ad-hoc networks
Carrier Sense Multiple Access (CSMA)
CSMA Is a random-access method that reduces the chance of collisions . In this method a node listens to the channel first and delays transmitting when it
senses that the channel is busy.
o "Carrier Sense " describes that a transmitting node senses (hears) if there is acarrier wave in the medium before trying to send
If a carrier is sensed, the node waits for the transmission in progress to finishbefore initiating its own transmission.
o Multiple Access " describes the fact that multiple stations send and receive on the
medium.Transmissions by one node are generally received by all other stations using themedium.
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
12/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 12
MAC schemes for ad-hoc networks
Carrier Sense Multiple Access (CSMA)
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
13/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 13
MAC schemes for ad-hoc networks
Hidden Terminal Problem
Two nodes, which have connectivity to a third node, in hidden terminal case, can nothear each other. Consider the situation in Figure 1. Node A wants to transmit to node B. Because of an obstruction ,Node A can not listen that node C is sending to node B. collisions Occur
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
14/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 14
MAC schemes for ad-hoc networks
14
A is transmitting to node B, while node C wants to transmit to node D. Following the CSMA protocol, node C listens to the medium, hears that node
a transmits and defers from accessing the medium. There is no reason why node C cannot transmit concurrently with the
transmission of node A, as the transmission of node C would not interferewith the reception at node B due to the distance between the two.
Exposed Terminal Problem
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
15/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 15
MAC schemes for ad-hoc networks
In general, the hidden terminal problem reduces the capacity of a network due toincreasing the number of collisions
the exposed terminal problem reduces the network capacity due to theunnecessarily deferring nodes from transmitting.
A proposed solution for the hidden terminal problem is The Collision Avoidance (CA)CA-based control could be classified to :
1. In-band CA protocols :Only one channel is used for data traffic and the Collision Avoidance protocols.Example: Medium Access with Collision Avoidance (MACA)
2. Out-of-Band CA protocols :Two channels are used ,one for the data and another for the Collision avoidance protocol.Example: Busy Tone Multiple Access (BTMA).
Hidden& Exposed Terminal Problem
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
16/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 16
MAC schemes for ad-hoc networks
CSMA/CD is a modification of CarrierSense Multiple Access (CSMA).
Collision detection is used to improveCSMA performance by terminatingtransmission as soon as a collision isdetected, and reducing the probabilityof a second collision on retry.
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
17/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 17
MAC schemes for ad-hoc networks
The Multiple Access Collision Avoidance (MACA) Scheme
In Multiple Access Collision Avoidance (MACA) RTS/CTS dialogue is usedfor collision avoidance on the shared channel.
This scheme reduces the probability of data packet collisions caused byhidden terminals .
It reduce also expose terminal problem.
The RTS/CTS dialogue isdemonstrated in the Figure .
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
18/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 18
MAC schemes for ad-hoc networks
The node A wants to transmit a packet B, it sends a short control packet - Request To Send(RTS) packet. All nodes that hear the RTS defer from accessing the channel for the duration of the RTS/CTS
dialogue. The destination -node B-upon reception of the RTS responds with another short control
packet Clear To Send (CTS)-packet All nodes that hear the CTS
packet defer from accessing thechannel for the duration of thecontrol packet transmission.
After reception CTS ,node Aacknowledges that the RTS/CTSdialogue has been successfuland node B starts to transmitthe actual data packet.
The Multiple Access Collision Avoidance (MACA) Scheme
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
19/33
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
20/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 20
MAC schemes for ad-hoc networks
The Floor Acquisition Multiple Access (FAMA) Scheme
In FAMA scheme, each ready node has to acquire the channel (the floor'') beforeit can use the channel to transmit the data packets.
Both carrier sensing and RTS/CTS dialogue are used to ensure the acquisition of the "floor'' and the successful transmission of the data packets.
To acquire the floor, the transmitting node sends an RTS to the intended node . The receiver sends a CTS after receiving an RTS addressed to it. FAMA performs as well as MACA, when hidden terminals are present and as
well as CSMA otherwise.
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
21/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 21
MAC schemes for ad-hoc networks
The Busy Tone Multiple Access (BTMA) scheme
In addition to the use of an RTS packet, an out-of-band busy tone is used tonotify neighbor nodes of the channel status.
When a node is ready to transmit, it sends out RTS packet to its intendedreceiver.
On reception of the RTS packet, the receiver sets up a busy tone and waits forthe incoming data packet.
When the other neighbors nodes hear the tone ,they defer from sending data
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
22/33
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
23/33
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
24/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 24
MAC schemes for ad-hoc networks
Scheduled Access Protocols
The probability of collisions of control or data packets in any random-basedscheme increases with the over load, which degrades channel utilization andfurther reduces battery life.
This motivates the need for establishing transmission schedules to allownodes to receive data packets without collisions.
Scheduled access protocols adopt mechanisms that avoid more than oneterminal to transmit at a given time .
Data packets are never subject to collision, since at any time all terminals inthe network are made aware of which terminal in the network is allowed totransmit.
The scheduled-access MAC protocol uses a combination of TDMA and FDMAor CDMA for accessing the channel. The main drawback of this scheme isthat, like most fixed scheduling mechanisms, time slots are wasted if a nodedoes not have any data to send to the intended receiver.
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
25/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 25
MAC schemes for ad-hoc networks
The Traffic-Adaptive Medium Access (TRAMA)
is introduced for energy- efficient collision-free channel access in wirelesssensor networks.
TRAMA reduces energy consumption by ensuring that the transmissions have nocollisions, and by allowing nodes to switch to a low-power, idle state wheneverthey are not transmitting or receiving. TRAMA assumes that time is slotted.
TRAMA employs a traffic adaptive distributed election scheme that selectsreceivers based on schedules announced by transmitters
Nodes using TRAMA exchange their two hop neighborhood information and thetransmission schedules specifying which nodes are the intended receivers of their traffic in chronological order, and then select the nodes that should
transmit and receive during each time slot.
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
26/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 26
MAC schemes for ad-hoc networks
Accordingly, TRAMA consists of three components:1. the Neighbor Protocol (NP):
propagates one-hop neighbor information among neighboring nodes during therandom access period using the signaling slots, to obtain consistent two-hoptopology information across all nodes.
2. the Schedule Exchange Protocol (SEP):allows nodes to exchange two hop neighbor information and their schedules.
3.the Adaptive Election Algorithm (AEA):uses neighborhood and schedule information to select the transmitters andreceivers for the current time slot, leaving all other nodes in liberty to switch to
low-power mode.
The Traffic-Adaptive Medium Access (TRAMA)
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
27/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 27
MAC schemes for ad-hoc networks
The Traffic-Adaptive Medium Access (TRAMA)
TRAMA assumes a single, time-slotted channel for both data and signalingtransmissions. The Figure shows the overall time-slot organization of theprotocol.
Time is organized as sections of random and scheduled-access periods. We refer to random-access slots as signaling slots and scheduled-access slots as
transmission slots .
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
28/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 28
MAC schemes for ad-hoc networks
Flow-Aware Medium Access (FLAMA )
FLAMA is an energy-efficient medium-access control (MAC) protocol designed for wirelesssensor networks.
Energy efficiency is achieved by preventing idle listening, data collisions and transmissionsto a node that is not ready to receive packets.
It is simple enough so that it can be run by nodes with limited processing, memory,communication, and power capabilities.
FLAMA outperforms TRAMA, the first traffic adaptive, schedule-based MAC proposed forsensor networks ( Small delays comparing to TRAMA with significant improvement inenergy savings).
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
29/33
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
30/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 30
MAC schemes for ad-hoc networks
During random access, neighbor discovery, time synchronization and traffic informationexchange are performed.
Data transmission happens during scheduled access. Using periodic random-access periodsallows FLAMA to adapt to topology and traffic changes in the network.
Unlike TRAMA , FLAMA does not require scheduling announcements during scheduled accessperiods.
Alternatively, traffic information is exchanged among nodes during random access to reflectthe driving traffic patterns, or flows. This allows FLAMA to still adapt to changes in trafficbehavior and topology (e.g., node failure). FLAMA uses flow information to establishtransmission schedules for each node.
Additionally, FLAMA achieves traffic adaptive by assigning slots to a node depending on theamount of traffic generated by that node. This is accomplished by assigning node weightsbased on the incoming and outgoing flows.
Nodes with more outgoing flows are given higher weights (i.e., more slots); the net effect isthat nodes that produce/forward more traffic are assigned more slots.
Flow-Aware Medium Access (FLAMA )
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
31/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11 31
MAC schemes for ad-hoc networks
Examples of using ad hoc Networks
tactical operation for fast establishment of military communication during thedeployment of forces in unknown and hostile terrain; rescue missions for communication in areas without adequate wirelesscoverage; national security for communication in times of national crisis, where theexisting communication infrastructure is non-operational due to a natural disaster
or a global war; commercial use for setting up communication in exhibitions, conferences, orsales presentations. Civil and Environmental Engineering ApplicationsSensors can be used for civil engineering applications. Research has to developsensor technology to develop smart structures witch is attractive for
earthquake-active zones ,wildfire Instrumentation and air pollution monitoring
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
32/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11
MAC schemes for ad-hoc networks
32
Mac schemes for ad hoc networks:
Pure & slotted aloha.CSMA&CSMA/CDMACAMACAWFAMABTMA&DBTMAPAMASTRAMA&FLAMA
Delay ,Bandwidth efficiency , Stability ,Throughput, power consumption ,Fairness andQuality of service
Summary
-
8/6/2019 8.MAC Schemes for Ad Hoc Networks
33/33
Seminar on Medium Access Control Protocols in
Wireless Communications 2010/11
MAC schemes for ad-hoc networks
References
33
Andrew S. Tanenbaum ,Computer Networks, Fourth Edition.Holger, Karl and Adreas, Willig, Protocols and Architectures for Wireless SensorNetworks Wiley 2005.
Stallings , Data Communications , Chapter 8.1/8.2/8.3.Rajendran , Aceves, Energy-Efficient, Application-Aware Medium Access for SensorNetworks.Sohraby , Minoli and Znati ,Wireless Sensor Networks :Technology, Protocols, andApplications