Design and Modeling of Medium Access Control Protocols

  • Slides: 134
Download presentation
Design and Modeling of Medium Access Control Protocols for Wireless Ad Hoc Networks Part

Design and Modeling of Medium Access Control Protocols for Wireless Ad Hoc Networks Part 1: Nitin Vaidya Part 2: Rajive Bagrodia & Mineo Takai Mobi. Hoc 2002 Tutorial © 2002 1

Part 1 2 (c) 2002 Nitin Vaidya, UIUC

Part 1 2 (c) 2002 Nitin Vaidya, UIUC

Design of Medium Access Control Protocols for Wireless Ad Hoc Networks Nitin H. Vaidya

Design of Medium Access Control Protocols for Wireless Ad Hoc Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign nhv@uiuc. edu http: //www. crhc. uiuc. edu/~nhv © 2002 Nitin Vaidya 3

Wireless Ad Hoc Networks [IETF MANET] g Formed by wireless hosts (which may be

Wireless Ad Hoc Networks [IETF MANET] g Formed by wireless hosts (which may be mobile) g Without (necessarily) using a pre-existing infrastructure g Routes between nodes may potentially contain multiple hops i. Ad hoc does not necessarily mean multi-hop, but research literature typically equates ad hoc with multi-hop 4 (c) 2002 Nitin Vaidya, UIUC

Ad Hoc Networks g May need to traverse multiple links to reach a destination

Ad Hoc Networks g May need to traverse multiple links to reach a destination 5 (c) 2002 Nitin Vaidya, UIUC

Ad Hoc Networks g Mobility causes topology changes 6 (c) 2002 Nitin Vaidya, UIUC

Ad Hoc Networks g Mobility causes topology changes 6 (c) 2002 Nitin Vaidya, UIUC

Why Ad Hoc Networks ? g Ease of deployment g Speed of deployment g

Why Ad Hoc Networks ? g Ease of deployment g Speed of deployment g Decreased dependence on infrastructure 7 (c) 2002 Nitin Vaidya, UIUC

Many Applications g Personal area networking g Military environments g Civilian environments g Emergency

Many Applications g Personal area networking g Military environments g Civilian environments g Emergency operations icell phone, laptop, ear phone, wrist watch isoldiers, tanks, planes itaxi cab network imeeting rooms isports stadiums iboats, small aircraft isearch-and-rescue ipolicing and fire fighting 8 (c) 2002 Nitin Vaidya, UIUC

Many Variations g Fully Symmetric Environment g Asymmetric Capabilities g Asymmetric Responsibilities iall nodes

Many Variations g Fully Symmetric Environment g Asymmetric Capabilities g Asymmetric Responsibilities iall nodes have identical capabilities and responsibilities itransmission ranges and radios may differ ibattery life at different nodes may differ iprocessing capacity may be different at different nodes ispeed of movement ionly some nodes may route packets isome nodes may act as leaders of nearby nodes (e. g. , cluster head) 9 (c) 2002 Nitin Vaidya, UIUC

Many Variations g Traffic characteristics may differ in different ad hoc networks ibit rate

Many Variations g Traffic characteristics may differ in different ad hoc networks ibit rate itimeliness constraints ireliability requirements iunicast / multicast / geocast ihost-based addressing / content-based addressing / capability-based addressing g May co-exist (and co-operate) with an infrastructurebased network 10 (c) 2002 Nitin Vaidya, UIUC

Many Variations g Mobility patterns may be different g Mobility characteristics ipeople sitting at

Many Variations g Mobility patterns may be different g Mobility characteristics ipeople sitting at an airport lounge i. New York taxi cabs ikids playing imilitary movements ipersonal area network ispeed ipredictability • direction of movement • pattern of movement iuniformity (or lack thereof) of mobility characteristics among different nodes 11 (c) 2002 Nitin Vaidya, UIUC

Some Challenges g g g Limited wireless transmission range Broadcast nature of the wireless

Some Challenges g g g Limited wireless transmission range Broadcast nature of the wireless medium Packet losses due to transmission errors Host mobility Battery constraints Ease of snooping on wireless transmissions (security hazard) 12 (c) 2002 Nitin Vaidya, UIUC

Research on Ad Hoc Networks Variations in capabilities & responsibilities X Variations in traffic

Research on Ad Hoc Networks Variations in capabilities & responsibilities X Variations in traffic characteristics, mobility models, etc. X Performance criteria (e. g. , optimize throughput, reduce energy consumption) + Research funding = Significant research activity 13 (c) 2002 Nitin Vaidya, UIUC

Medium Access Control g Wireless channel is a shared medium g Need access control

Medium Access Control g Wireless channel is a shared medium g Need access control mechanism to avoid interference g MAC protocol design has been an active area of research for many years [Chandra 00 survey] 14 (c) 2002 Nitin Vaidya, UIUC

MAC: A Simple Classification Wireless MAC Centralized Distributed Guaranteed or controlled access Random access

MAC: A Simple Classification Wireless MAC Centralized Distributed Guaranteed or controlled access Random access This tutorial 15 (c) 2002 Nitin Vaidya, UIUC

This tutorial g Mostly focus on random access protocols g Not a comprehensive overview

This tutorial g Mostly focus on random access protocols g Not a comprehensive overview of MAC protocols g Provides discussion of some example protocols (mostly from relatively recent literature) 16 (c) 2002 Nitin Vaidya, UIUC

Hidden Terminal Problem [Tobagi 75] g g Node B can communicate with A and

Hidden Terminal Problem [Tobagi 75] g g Node B can communicate with A and C both A and C cannot hear each other When A transmits to B, C cannot detect the transmission using the carrier sense mechanism If C transmits, collision will occur at node B A B C 17 (c) 2002 Nitin Vaidya, UIUC

Busy Tone [Tobagi 75, Haas 98] g A receiver transmits busy tone when receiving

Busy Tone [Tobagi 75, Haas 98] g A receiver transmits busy tone when receiving data g All nodes hearing busy tone keep silent g Avoids interference from hidden terminals g Requires a separate channel for busy tone 18 (c) 2002 Nitin Vaidya, UIUC

MACA Solution for Hidden Terminal Problem [Karn 90] g When node A wants to

MACA Solution for Hidden Terminal Problem [Karn 90] g When node A wants to send a packet to node B, node A first sends a Request-to-Send (RTS) to A g On receiving RTS, node A responds by sending Clear -to-Send (CTS), provided node A is able to receive the packet g When a node (such as C) overhears a CTS, it keeps quiet for the duration of the transfer i. Transfer duration is included in RTS and CTS both A B C 19 (c) 2002 Nitin Vaidya, UIUC

Reliability g Wireless links are prone to errors. High packet loss rate detrimental to

Reliability g Wireless links are prone to errors. High packet loss rate detrimental to transport-layer performance. g Mechanisms needed to reduce packet loss rate experienced by upper layers 20 (c) 2002 Nitin Vaidya, UIUC

A Simple Solution to Improve Reliability g When node B receives a data packet

A Simple Solution to Improve Reliability g When node B receives a data packet from node A, node B sends an Acknowledgement (Ack). This approach adopted in many protocols [Bharghavan 94, IEEE 802. 11] g If node A fails to receive an Ack, it will retransmit the packet A B C 21 (c) 2002 Nitin Vaidya, UIUC

IEEE 802. 11 Wireless MAC g Distributed and centralized MAC components i. Distributed Coordination

IEEE 802. 11 Wireless MAC g Distributed and centralized MAC components i. Distributed Coordination Function (DCF) i. Point Coordination Function (PCF) g DCF suitable for multi-hop ad hoc networking g DCF is a Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) protocol 22 (c) 2002 Nitin Vaidya, UIUC

IEEE 802. 11 DCF g Uses RTS-CTS exchange to avoid hidden terminal problem i.

IEEE 802. 11 DCF g Uses RTS-CTS exchange to avoid hidden terminal problem i. Any node overhearing a CTS cannot transmit for the duration of the transfer g Uses ACK to achieve reliability g Any node receiving the RTS cannot transmit for the duration of the transfer i. To prevent collision with ACK when it arrives at the sender i. When B is sending data to C, node A will keep quite A B C 23 (c) 2002 Nitin Vaidya, UIUC

IEEE 802. 11 RTS = Request-to-Send RTS A B C D E F 24

IEEE 802. 11 RTS = Request-to-Send RTS A B C D E F 24 (c) 2002 Nitin Vaidya, UIUC

IEEE 802. 11 RTS = Request-to-Send RTS A B C D E F 25

IEEE 802. 11 RTS = Request-to-Send RTS A B C D E F 25 (c) 2002 Nitin Vaidya, UIUC

IEEE 802. 11 CTS = Clear-to-Send CTS A B C D E F 26

IEEE 802. 11 CTS = Clear-to-Send CTS A B C D E F 26 (c) 2002 Nitin Vaidya, UIUC

IEEE 802. 11 CTS = Clear-to-Send CTS A B C D E F 27

IEEE 802. 11 CTS = Clear-to-Send CTS A B C D E F 27 (c) 2002 Nitin Vaidya, UIUC

IEEE 802. 11 DATA A B C D E F 28 (c) 2002 Nitin

IEEE 802. 11 DATA A B C D E F 28 (c) 2002 Nitin Vaidya, UIUC

IEEE 802. 11 Carrier sense range Interference range DATA A B C D E

IEEE 802. 11 Carrier sense range Interference range DATA A B C D E F Transmit range 29 (c) 2002 Nitin Vaidya, UIUC

IEEE 802. 11 ACK A B C D E F 30 (c) 2002 Nitin

IEEE 802. 11 ACK A B C D E F 30 (c) 2002 Nitin Vaidya, UIUC

CSMA/CA g Carrier sense in 802. 11 i. Physical carrier sense i. Virtual carrier

CSMA/CA g Carrier sense in 802. 11 i. Physical carrier sense i. Virtual carrier sense using Network Allocation Vector (NAV) i. NAV is updated based on overheard RTS/CTS/DATA/ACK packets, each of which specified duration of a pending transmission g Collision avoidance i. Nodes stay silent when carrier sensed (physical/virtual) i. Backoff intervals used to reduce collision probability 31 (c) 2002 Nitin Vaidya, UIUC

Backoff Interval g When transmitting a packet, choose a backoff interval in the range

Backoff Interval g When transmitting a packet, choose a backoff interval in the range [0, cw] icw is contention window g Count down the backoff interval when medium is idle g When backoff interval reaches 0, transmit RTS i. Count-down is suspended if medium becomes busy 32 (c) 2002 Nitin Vaidya, UIUC

DCF Example B 1 = 25 B 1 = 5 wait data B 2

DCF Example B 1 = 25 B 1 = 5 wait data B 2 = 20 cw = 31 wait B 2 = 15 B 2 = 10 B 1 and B 2 are backoff intervals at nodes 1 and 2 33 (c) 2002 Nitin Vaidya, UIUC

Backoff Interval g The time spent counting down backoff intervals is a part of

Backoff Interval g The time spent counting down backoff intervals is a part of MAC overhead g Choosing a large cw leads to large backoff intervals and can result in larger overhead g Choosing a small cw leads to a larger number of collisions (when two nodes count down to 0 simultaneously) 34 (c) 2002 Nitin Vaidya, UIUC

g Since the number of nodes attempting to transmit simultaneously may change with time,

g Since the number of nodes attempting to transmit simultaneously may change with time, some mechanism to manage contention is needed g IEEE 802. 11 DCF: contention window cw is chosen dynamically depending on collision occurrence 35 (c) 2002 Nitin Vaidya, UIUC

Binary Exponential Backoff in DCF g When a node fails to receive CTS in

Binary Exponential Backoff in DCF g When a node fails to receive CTS in response to its RTS, it increases the contention window icw is doubled (up to an upper bound) g When a node successfully completes a data transfer, it restores cw to Cwmin g cw follows a sawtooth curve 36 (c) 2002 Nitin Vaidya, UIUC

MILD Algorithm in MACAW [Bharghavan 94] g When a node successfully completes a transfer,

MILD Algorithm in MACAW [Bharghavan 94] g When a node successfully completes a transfer, reduces cw by 1 i. In 802. 11 cw is restored to cwmin i. In 802. 11, cw reduces much faster than it increases i. MACAW: cw reduces slower than it increases Exponential Increase Linear Decrease g MACAW can avoid wild oscillations of cw when large number of nodes contend for the channel 37 (c) 2002 Nitin Vaidya, UIUC

Alternative Contention Resolution Mechanism [Hiperlan] g Elimination phase i. A node transmits a burst

Alternative Contention Resolution Mechanism [Hiperlan] g Elimination phase i. A node transmits a burst for a random number (geometrically distributed) of slots i. If medium idle at the end of the burst, go to yield phase, else give up until next round g Yield phase i. Stay silent for a random number (geometrical distributed) of slots i. If medium still silent, transmit 38 (c) 2002 Nitin Vaidya, UIUC

Receive-Initiated Mechanism [Talucci 97, Garcia 99] g In most protocols, sender initiates a transfer

Receive-Initiated Mechanism [Talucci 97, Garcia 99] g In most protocols, sender initiates a transfer g Alternatively, a receiver may send a Ready-To-Receive (RTR) message to a sender requesting it to being a packet transfer g Sender node on receiving the RTR transmits data g How does a receiver determine when to poll a sender with RTR? i. Based on history, and prediction of traffic from the sender 39 (c) 2002 Nitin Vaidya, UIUC

Fairness 40 (c) 2002 Nitin Vaidya, UIUC

Fairness 40 (c) 2002 Nitin Vaidya, UIUC

Fairness Issue g Many definitions of fairness plausible g Simplest definition: All nodes should

Fairness Issue g Many definitions of fairness plausible g Simplest definition: All nodes should receive equal bandwidth A B Two flows C D 41 (c) 2002 Nitin Vaidya, UIUC

Fairness Issue g Assume that initially, A and B both choose a backoff interval

Fairness Issue g Assume that initially, A and B both choose a backoff interval in range [0, 31] but their RTSs collide g Nodes A and B then choose from range [0, 63] i. Node A chooses 4 slots and B choose 60 slots i. After A transmits a packet, it next chooses from range [0, 31] i. It is possible that A may transmit several packets before B transmits first packet A B Two flows C D 42 (c) 2002 Nitin Vaidya, UIUC

Fairness Issue g Unfairness occurs when one node has backed off much more than

Fairness Issue g Unfairness occurs when one node has backed off much more than some other node A B Two flows C D 43 (c) 2002 Nitin Vaidya, UIUC

MACAW Solution for Fairness g When a node transmits a packet, it appends the

MACAW Solution for Fairness g When a node transmits a packet, it appends the cw value to the packet, all nodes hearing that cw value use it for their future transmission attempts g Since cw is an indication of the level of congestion in the vicinity of a specific receiver node, MACAW proposes maintaining cw independently for each receiver g Using per-receiver cw is particularly useful in multihop environments, since congestion level at different receivers can be very different 44 (c) 2002 Nitin Vaidya, UIUC

Another MACAW Proposal g For the scenario below, when node A sends an RTS

Another MACAW Proposal g For the scenario below, when node A sends an RTS to B, while node C is receiving from D, node B cannot reply with a CTS, since B knows that D is sending to C g When the transfer from C to D is complete, node B can send a Request-to-send-RTS to node A [Bharghavan 94 Sigcomm] i. Node A may then immediately send RTS to node B A B C D 45 (c) 2002 Nitin Vaidya, UIUC

g This approach, however, does not work in the scenario below i. Node B

g This approach, however, does not work in the scenario below i. Node B may not receive the RTS from A at all, due to interference with transmission from C A B C D 46 (c) 2002 Nitin Vaidya, UIUC

Weighted Fair Queueing [Keshav 97 book] g Assign a weight to each node g

Weighted Fair Queueing [Keshav 97 book] g Assign a weight to each node g Bandwidth used by each node should be proportional to the weight assigned to the node 47 (c) 2002 Nitin Vaidya, UIUC

Distributed Fair Scheduling (DFS) [Vaidya 00 Mobicom] g A fully distributed algorithm for achieving

Distributed Fair Scheduling (DFS) [Vaidya 00 Mobicom] g A fully distributed algorithm for achieving weighted fair queueing g Chooses backoff intervals proportional to (packet size / weight) g DFS attempts to mimic the centralized Self-Clocked Fair Queueing algorithm [Golestani] g Works well on a LAN 48 (c) 2002 Nitin Vaidya, UIUC

Distributed Fair Scheduling (DFS) B 1 = 5 B 1 = 10 B 1

Distributed Fair Scheduling (DFS) B 1 = 5 B 1 = 10 B 1 = 15 wait Collision ! data B 2 = 5 Weight of node 1 = 1 Weight of node 2 = 3 B 1 = 15 (DFS actually picks a random value with mean 15) Assume equal packet size B 2 = 5 (DFS picks a value with mean 5) 49 (c) 2002 Nitin Vaidya, UIUC

Impact of Collisions g After collision resolution, either node 1 or node 2 may

Impact of Collisions g After collision resolution, either node 1 or node 2 may transmit a packet g The two alternatives may have different fairness properties (since collision resolution can result in priority inversion) 50 (c) 2002 Nitin Vaidya, UIUC

Distributed Fair Scheduling (DFS) wait data B 2 = 5 B 1 = 10

Distributed Fair Scheduling (DFS) wait data B 2 = 5 B 1 = 10 wait data B 2 = 5 Collision resolution 51 (c) 2002 Nitin Vaidya, UIUC da

Distributed Fair Scheduling g DFS uses randomization to reduce collisions g DFS also uses

Distributed Fair Scheduling g DFS uses randomization to reduce collisions g DFS also uses a shifted contention window for choosing initial backoff interval i. Alleviates negative impact of synchronization i. Reduces priority inversion (which leads to short-term unfairness) 802. 11 0 31 DFS 52 (c) 2002 Nitin Vaidya, UIUC

DFS g Due to large cw, DFS can potentially yield lower throughput than IEEE

DFS g Due to large cw, DFS can potentially yield lower throughput than IEEE 802. 11 itrade-off between fairness and throughput g On multi-hop network, properties of DFS still need to be characterized g Fairness in multi-hop case affected by hidden terminals i. May need use of a copying technique, analogous to window copying in MACAW, to share some protocol state 53 (c) 2002 Nitin Vaidya, UIUC

Fairness in Multi-Hop Networks g Several definitions of fairness [Ozugur 98, Vaidya 99 MSR,

Fairness in Multi-Hop Networks g Several definitions of fairness [Ozugur 98, Vaidya 99 MSR, Luo 00 Mobicom, Nandagopal 00 Mobicom] g Hidden terminals make it difficult to achieve a desired notion of fairness 54 (c) 2002 Nitin Vaidya, UIUC

Balanced MAC [Ozugur 98] g Variation on p-persistent protocol g A link access probability

Balanced MAC [Ozugur 98] g Variation on p-persistent protocol g A link access probability p_ij is assigned to each link (i, j) from node i to node j g p_ij is a function of the 1 -hop neighbors of node i and 1 -hop neighbors of all neighbors of node i g Node i picks a back-off interval, and when it counts to 0, node i transmits with probability p_ij i. Otherwise, it picks another backoff interval, and repeats 55 (c) 2002 Nitin Vaidya, UIUC

Balanced MAC degree of node j g p_ij is typically = -------------------------maximum degree of

Balanced MAC degree of node j g p_ij is typically = -------------------------maximum degree of all neighbors of node i i. With an exception for the node whose degree is highest among all neighbors of i – For this neighbor k, link access probability is set to min (1, degree of i/degree of k) 56 (c) 2002 Nitin Vaidya, UIUC

Balanced MAC 2/3 2/5 E 2/3 K 3 D 1/2 2/3 3/5 5 J

Balanced MAC 2/3 2/5 E 2/3 K 3 D 1/2 2/3 3/5 5 J 1/3 1/4 3/5 3/4 L 4 F 1/5 1/4 H 3/5 3/4 2/5 1/2 C 1/5 4/5 1 1/4 1/2 4/5 2/5 G 2 B 2/5 2 A 1 57 (c) 2002 Nitin Vaidya, UIUC

Balanced MAC g Results show that it can sometimes (not always) improve fairness g

Balanced MAC g Results show that it can sometimes (not always) improve fairness g Fairness definition used here: max throughput / min throughout g Ad hoc solution i. Not seem to be based on a mathematical argument 58 (c) 2002 Nitin Vaidya, UIUC

Estimation-Based Fair MAC [Bansou 00 Mobi. Hoc] g Attempts to equalize throughput/weight ratio for

Estimation-Based Fair MAC [Bansou 00 Mobi. Hoc] g Attempts to equalize throughput/weight ratio for all nodes g Two parts of the algorithm i. Fair share estimation i. Window adjustment 59 (c) 2002 Nitin Vaidya, UIUC

Estimation-Based Fair MAC g Fair share estimation: Node estimates how much bandwidth (Wi) it

Estimation-Based Fair MAC g Fair share estimation: Node estimates how much bandwidth (Wi) it is able to use, and the amount of bandwidth (Wo) used by by all other neighbors combined i. Estimation based on overheard RTS, CTS, DATA packets 60 (c) 2002 Nitin Vaidya, UIUC

Estimation-Based Fair MAC g Define: g Window adjustment: i. Ti = Wi / weight

Estimation-Based Fair MAC g Define: g Window adjustment: i. Ti = Wi / weight of i i. To = Wo / weight assigned to the group of neighbors of i i. Fairness index = Ti / To i. If fairness index is too large, cw = cw * 2 i. Else if fairness index is too small, cw = cw / 2 i. Else no change to cw (contention window) 61 (c) 2002 Nitin Vaidya, UIUC

Proportional Fair Contention Resolution (PFCR) [Nandagopal 00 Mobicom] g Proportional fairness: Allocate bandwidth Ri

Proportional Fair Contention Resolution (PFCR) [Nandagopal 00 Mobicom] g Proportional fairness: Allocate bandwidth Ri to node i such that any other allocation Si has the following property i. Si g (Si-Ri) / Ri < 0 Link access probability is dynamically changed depending on success/failure at transmitting a packet i. On success: Link access probability is increased by an additive factor a i. On failure: Link access probability is decreased by a multiplicative factor (1 -b) 62 (c) 2002 Nitin Vaidya, UIUC

Proportional Fair Contention Resolution (PFCR) g Comparison with Balanced MAC i. Both dynamically choose

Proportional Fair Contention Resolution (PFCR) g Comparison with Balanced MAC i. Both dynamically choose link access probability, but balanced MAC chooses it based on connectivity, while PFCR bases it on link access success/failure i. Balanced MAC does not attempt to achieve any particular formal definition of fairness, unlike PFCR g Comparison with Estimation-based MAC i. Estimation-based MAC needs an estimate of bandwidth used by other nodes i. Estimation-based MAC chooses contention window dynamically, while PFCR chooses link access probability 63 (c) 2002 Nitin Vaidya, UIUC

Priority Scheduling 64 (c) 2002 Nitin Vaidya, UIUC

Priority Scheduling 64 (c) 2002 Nitin Vaidya, UIUC

Priority Scheduling g Given packets belonging to different priority classes, packets with higher priority

Priority Scheduling g Given packets belonging to different priority classes, packets with higher priority should be transmitted first High A g Low B Since the packets may be at different nodes sharing the wireless channel, how to coordinate access ? 65 (c) 2002 Nitin Vaidya, UIUC

Priorities in 802. 11 g CTS and ACK have priority over RTS After channel

Priorities in 802. 11 g CTS and ACK have priority over RTS After channel becomes idle g If a node wants to send CTS/ACK, it transmits SIFS duration after channel goes idle g If a node wants to send RTS, it waits for DIFS > SIFS 66 (c) 2002 Nitin Vaidya, UIUC

SIFS and DIFS DATA 1 ACK 1 SIFS DIFS backoff RTS SIFS 67 (c)

SIFS and DIFS DATA 1 ACK 1 SIFS DIFS backoff RTS SIFS 67 (c) 2002 Nitin Vaidya, UIUC

Variation in Backoff Interval [Aad 01] g For high priority packets g For low

Variation in Backoff Interval [Aad 01] g For high priority packets g For low priority packet g Higher priority packets use small backoff intervals i. Backoff interval in [0, CWh] i. Backoff interval in [CWh+1, CWl] i. Higher probability of transmitting a high priority packet before a pending low probability packet 68 (c) 2002 Nitin Vaidya, UIUC

g With this scheme, if two high priority packets collide, they will have to

g With this scheme, if two high priority packets collide, they will have to choose a new backoff interval, and may be transmitted after a low priority packets g Example: i. Packet H 1 : backoff interval 9 slots i. Packet H 2 : backoff interval 9 slots i. Packet L : backoff interval 13 slots i. When H 1 and H 2 collide • Packet L : backoff interval is now 4 slots • Assume that H 1 and H 2 pick backoff intervals 6 and 7 slots respectively, after collision • Packet L will be transmitted first 69 (c) 2002 Nitin Vaidya, UIUC

Second Mechanism [Aad 01] g High priority packets always choose backoff in [0, CWh]

Second Mechanism [Aad 01] g High priority packets always choose backoff in [0, CWh] g Low priority packets wait for LIFS idle period before counting down where LIFS = DIFS + CWh g Ensures that high priority packets will always get a chance to transmit before a low priority packet can 70 (c) 2002 Nitin Vaidya, UIUC

Example DIFS H L busy H backoff LIFS H H LIFS L backoff 71

Example DIFS H L busy H backoff LIFS H H LIFS L backoff 71 (c) 2002 Nitin Vaidya, UIUC

g Disadvantage: When no high priority packets, low priority packet unnecessarily wait for long

g Disadvantage: When no high priority packets, low priority packet unnecessarily wait for long periods of time g How to avoid priority reversal, and also minimize wait for low priority packets ? [Yang 02 Mobihoc] 72 (c) 2002 Nitin Vaidya, UIUC

Priority Using Black Bursts [Hiperlan/1, Sobrinho 96, 99] g All nodes begin the priority

Priority Using Black Bursts [Hiperlan/1, Sobrinho 96, 99] g All nodes begin the priority contention phase together g Higher priority node transmit a longer burst than low priority node g After transmitting its burst, a node listens to the channel g If channel still busy, the node has lost contention to a higher priority node 73 (c) 2002 Nitin Vaidya, UIUC

Energy Conservation 74 (c) 2002 Nitin Vaidya, UIUC

Energy Conservation 74 (c) 2002 Nitin Vaidya, UIUC

Energy Conservation g Since many mobile hosts are operated by batteries, MAC protocols which

Energy Conservation g Since many mobile hosts are operated by batteries, MAC protocols which conserve energy are of interest g Two approaches to reduce energy consumption i. Power save: Turn off wireless interface when desirable i. Power control: Reduce transmit power 75 (c) 2002 Nitin Vaidya, UIUC

Power Aware Multi-Access Protocol (PAMAS) [Singh 98] g A node powers off its radio

Power Aware Multi-Access Protocol (PAMAS) [Singh 98] g A node powers off its radio while a neighbor is transmitting to someone else Node A sending to B Node C stays powered off B A C 76 (c) 2002 Nitin Vaidya, UIUC

Power Aware Multi-Access Protocol (PAMAS) g What should node C do when it wakes

Power Aware Multi-Access Protocol (PAMAS) g What should node C do when it wakes up and finds that D is transmitting to someone else i. C does not know how long the transfer will last Node D sending to E Node A sending to B C stays powered off B A C D C wakes up and finds medium busy E 77 (c) 2002 Nitin Vaidya, UIUC

PAMAS g PAMAS uses a control channel separate from the data channel g Node

PAMAS g PAMAS uses a control channel separate from the data channel g Node C on waking up performs a binary probe to determine the length of the longest remaining transfer i. C sends a probe packet with parameter L i. All nodes which will finish transfer in interval [L/2, L] respond i. Depending on whether node C see silence, collision, or a unique response it takes varying actions g Node C (using procedure above) determines the duration of time to go back to sleep 78 (c) 2002 Nitin Vaidya, UIUC

Disadvantages of PAMAS g Use of a separate control channel g Nodes have to

Disadvantages of PAMAS g Use of a separate control channel g Nodes have to be able to receive on the control channel while they are transmitting on the data channel i. And also transmit on data and control channels simultaneously g A node (such as C) should be able to determine when probe responses from multiple senders collide 79 (c) 2002 Nitin Vaidya, UIUC

Power Save in IEEE 802. 11 Ad Hoc Mode g Time is divided into

Power Save in IEEE 802. 11 Ad Hoc Mode g Time is divided into beacon intervals ATIM window Beacon interval g Each beacon interval begins with an ATIM window i. ATIM = 80 (c) 2002 Nitin Vaidya, UIUC

Power Save in IEEE 802. 11 Ad Hoc Mode g If host A has

Power Save in IEEE 802. 11 Ad Hoc Mode g If host A has a packet to transmit to B, A must send an ATIM Request to B during an ATIM Window g On receipt of ATIM Request from A, B will reply by sending an ATIM Ack, and stay up during the rest of the beacon interval g If a host does not receive an ATIM Request during an ATIM window, and has no pending packets to transmit, it may sleep during rest of the beacon interval 81 (c) 2002 Nitin Vaidya, UIUC

Power Save in IEEE 802. 11 Ad Hoc Mode Node A ATIM Req ATIM

Power Save in IEEE 802. 11 Ad Hoc Mode Node A ATIM Req ATIM Data Ack Node B Node C Sleep 82 (c) 2002 Nitin Vaidya, UIUC

Power Save in IEEE 802. 11 Ad Hoc Mode g Size of ATIM window

Power Save in IEEE 802. 11 Ad Hoc Mode g Size of ATIM window and beacon interval affects performance [Woesner 98] g If ATIM window is too large, reduction in energy consumption reduced i. Energy consumed during ATIM window g If ATIM window is too small, not enough time to send ATIM request 83 (c) 2002 Nitin Vaidya, UIUC

Power Save in IEEE 802. 11 Ad Hoc Mode g How to choose ATIM

Power Save in IEEE 802. 11 Ad Hoc Mode g How to choose ATIM window dynamically? g How to synchronize hosts? i. Based on observed load [Jung 02 infocom] i. If two hosts’ ATIM windows do not overlap in time, they cannot exchange ATIM requests i. Coordination requires that each host stay awake long enough (at least periodically) to discover out-of-sync neighbors [Tseng 02 infocom] ATIM 84 (c) 2002 Nitin Vaidya, UIUC

Impact on Upper Layers g If each node uses the 802. 11 power-save mechanism,

Impact on Upper Layers g If each node uses the 802. 11 power-save mechanism, each hop will require one beacon interval i. This delay could be intolerable g Allow upper layers to dictate whether a node should enter the power save mode or not [Chen 01 mobicom] 85 (c) 2002 Nitin Vaidya, UIUC

Energy Conservation g Power save g Power control 86 (c) 2002 Nitin Vaidya, UIUC

Energy Conservation g Power save g Power control 86 (c) 2002 Nitin Vaidya, UIUC

Power Control Power control has two potential benefit g Reduced interference & increased spatial

Power Control Power control has two potential benefit g Reduced interference & increased spatial reuse g Energy saving 87 (c) 2002 Nitin Vaidya, UIUC

Power Control g When C transmits to D at a high power level, B

Power Control g When C transmits to D at a high power level, B cannot receive A’s transmission due to interference from C A B C D 88 (c) 2002 Nitin Vaidya, UIUC

Power Control g If C reduces transmit power, it can still communicate with D

Power Control g If C reduces transmit power, it can still communicate with D • Reduces energy consumption at node C • Allows B to receive A’s transmission (spatial reuse) A B C D 89 (c) 2002 Nitin Vaidya, UIUC

Power Control g a Received power level is proportional to 1/d , a >=

Power Control g a Received power level is proportional to 1/d , a >= 2 g If power control is utilized, energy required to transmit to a host at distance d is proportional to a d + constant g Shorter hops typically preferred for energy consumption (depending on the constant) [Rodoplu 99] i. Transmit to C from A via B, instead of directly from A to C A B C 90 (c) 2002 Nitin Vaidya, UIUC

Power Control with 802. 11 g A Transmit RTS/CTS/DATA/ACK at least power level needed

Power Control with 802. 11 g A Transmit RTS/CTS/DATA/ACK at least power level needed to communicate with the received B C D g A/B do not receive RTS/CTS from C/D. Also do not sense D’s data transmission g B’s transmission to A at high power interferes with reception of ACK at C 91 (c) 2002 Nitin Vaidya, UIUC

A Plausible Solution g RTS/CTS at highest power, and DATA/ACK at smallest necessary power

A Plausible Solution g RTS/CTS at highest power, and DATA/ACK at smallest necessary power level Data sensed A B C D Data Interference range g g g RTS Ack A cannot sense C’s data transmission, and may transmit DATA to some other host This DATA will interfere at C This situation unlikely if DATA transmitted at highest power level i. Interference range ~ sensing range 92 (c) 2002 Nitin Vaidya, UIUC

g Transmitting RTS at the highest power level also reduces spatial reuse g Nodes

g Transmitting RTS at the highest power level also reduces spatial reuse g Nodes receiving RTS/CTS have to defer transmissions 93 (c) 2002 Nitin Vaidya, UIUC

Modification to Avoid Interference g g Transmit RTS/CTS at highest power level, DATA/ACK at

Modification to Avoid Interference g g Transmit RTS/CTS at highest power level, DATA/ACK at least required power level Increase DATA power periodically so distant hosts can sense transmission [Jung 02 tech] Power level g Need to be able to change power level rapidly 94 (c) 2002 Nitin Vaidya, UIUC

Caveat g Energy saving by power control is limited to savings in transmit energy

Caveat g Energy saving by power control is limited to savings in transmit energy g Other energy costs may not change g For some 802. 11 devices, the energy consumption of the wireless interface reduces only by a factor of 2 when transmit power reduced from max to min possible for the device 95 (c) 2002 Nitin Vaidya, UIUC

Power Controlled Multiple Access (PCMA) [Monks 01 infocom] g If receiver node R can

Power Controlled Multiple Access (PCMA) [Monks 01 infocom] g If receiver node R can tolerate noise E, it sends a busy tone at power level C/E, where C is an appropriate constant g When some node X receives a busy-tone a power level Pr, it may transmit at power level Pt <= C/Pr busy tone data S R C/E X Pt Y 96 (c) 2002 Nitin Vaidya, UIUC

Power Controlled Multiple Access (PCMA) [Monks 01 infocom] g If receiver node R can

Power Controlled Multiple Access (PCMA) [Monks 01 infocom] g If receiver node R can tolerate noise E, it sends a busy tone at power level C/E, where C is an appropriate constant g When some node X receives a busy-tone a power level Pr, it may transmit at power level Pt <= C/Pr g Explanation: i. Gain of channel RX = gain of channel XR = g i. Busy tone signal level at X = Pr = g * C / E i. Node X may transmit at level = Pt = C/Pr = E/g i. Interference received by R = Pt * g = E 97 (c) 2002 Nitin Vaidya, UIUC

PCMA g Advantage i. Allows higher spatial reuse, as well as power saving using

PCMA g Advantage i. Allows higher spatial reuse, as well as power saving using power control g Disadvantages: i. Need a separate channel for the busy tone i. Since multiple nodes may transmit the busy tones simultaneously, spatial reuse is less than optimal 98 (c) 2002 Nitin Vaidya, UIUC

Small Addresses Save Energy [Schurgers 01 mobihoc] g In sensor networks, packet sizes are

Small Addresses Save Energy [Schurgers 01 mobihoc] g In sensor networks, packet sizes are small, and MAC addresses may be a substantial fraction of the packet g Observation: MAC addresses need only be unique within two hops E 1 G 0 D 3 A 2 C 0 F 2 B 1 g Fewer addresses are sufficient: Address size can be smaller. [Schurgers 00 mobihoc] uses Huffman coding to assign variable size encoding to the addresses Energy consumption reduced due to smaller addresses g 99 (c) 2002 Nitin Vaidya, UIUC

Adaptive Modulation 100 (c) 2002 Nitin Vaidya, UIUC

Adaptive Modulation 100 (c) 2002 Nitin Vaidya, UIUC

Adaptive Modulation g Channel conditions are time-varying g Received signal-to-noise ratio changes with time

Adaptive Modulation g Channel conditions are time-varying g Received signal-to-noise ratio changes with time A B 101 (c) 2002 Nitin Vaidya, UIUC

Adaptive Modulation g g Multi-rate radios are capable of transmitting at several rates, using

Adaptive Modulation g g Multi-rate radios are capable of transmitting at several rates, using different modulation schemes Choose modulation scheme as a function of channel conditions Modulation schemes provide a trade-off between throughput and range Throughput Distance 102 (c) 2002 Nitin Vaidya, UIUC

Adaptive Modulation g If physical layer chooses the modulation scheme transparent to MAC i.

Adaptive Modulation g If physical layer chooses the modulation scheme transparent to MAC i. MAC cannot know the time duration required for the transfer g Must involve MAC protocol in deciding the modulation scheme i. Some implementations use a sender-based scheme for this purpose [Kamerman 97] i. Receiver-based schemes can perform better 103 (c) 2002 Nitin Vaidya, UIUC

Sender-Based “Autorate Fallback” [Kamerman 97] g Probing mechanisms g Sender decreases bit rate after

Sender-Based “Autorate Fallback” [Kamerman 97] g Probing mechanisms g Sender decreases bit rate after X consecutive transmission attempts fail g Sender increases bit rate after Y consecutive transmission attempt succeed 104 (c) 2002 Nitin Vaidya, UIUC

Autorate Fallback g Advantage i. Can be implemented at the sender, without making any

Autorate Fallback g Advantage i. Can be implemented at the sender, without making any changes to the 802. 11 standard specification g Disadvantage i. Probing mechanism does not accurately detect channel state i. Channel state detected more accurately at the receiver i. Performance can suffer • Since the sender will periodically try to send at a rate higher than optimal • Also, when channel conditions improve, the rate is not increased immediately 105 (c) 2002 Nitin Vaidya, UIUC

Receiver-Based Autorate MAC [Holland 01 mobicom] g Sender sends RTS containing its best rate

Receiver-Based Autorate MAC [Holland 01 mobicom] g Sender sends RTS containing its best rate estimate g Receiver chooses best rate for the conditions and sends it in the CTS g Sender transmits DATA packet at new rate g Information in data packet header implicitly updates nodes that heard old rate 106 (c) 2002 Nitin Vaidya, UIUC

Receiver-Based Autorate MAC Protocol C A RTS (2 Mbps) CTS (1 Mbps) B Data

Receiver-Based Autorate MAC Protocol C A RTS (2 Mbps) CTS (1 Mbps) B Data (1 Mbps) D NAV updated using rate specified in the data packet 107 (c) 2002 Nitin Vaidya, UIUC

Directional Antennas 108 (c) 2002 Nitin Vaidya, UIUC

Directional Antennas 108 (c) 2002 Nitin Vaidya, UIUC

Traditional MAC Protocols g Typically assume omni-directional antennas g With omni-directional antennas, packet transmission

Traditional MAC Protocols g Typically assume omni-directional antennas g With omni-directional antennas, packet transmission intended for one neighbor may cause interference at all neighbors. 109 (c) 2002 Nitin Vaidya, UIUC

Omnidirectional Antennas g MAC protocols prevent interfering transmissions g When A transmits to B,

Omnidirectional Antennas g MAC protocols prevent interfering transmissions g When A transmits to B, D cannot transmit to C C D A B 110 (c) 2002 Nitin Vaidya, UIUC

Directional Antennas g Directional antennas reduce interference R S P Q 111 (c) 2002

Directional Antennas g Directional antennas reduce interference R S P Q 111 (c) 2002 Nitin Vaidya, UIUC

Directional Antennas g Increased range by limiting energy waste in unnecessary directions g Directional

Directional Antennas g Increased range by limiting energy waste in unnecessary directions g Directional antenna gain higher than omni-directional antenna gain Number of neighbors may be greater Number of hops to a destination may be smaller g g 112 (c) 2002 Nitin Vaidya, UIUC

Directional Antennas g Directional antenna gain higher than omni-directional antenna gain g Reach a

Directional Antennas g Directional antenna gain higher than omni-directional antenna gain g Reach a given neighbor with less power than omnidirectional transmission 113 (c) 2002 Nitin Vaidya, UIUC

Directional Antennas Potential benefits g Higher spatial reuse g Greater range (for given transmit

Directional Antennas Potential benefits g Higher spatial reuse g Greater range (for given transmit power) g Reduction in energy consumption But need new MAC protocols to best utilize directional antennas 114 (c) 2002 Nitin Vaidya, UIUC

Directional MAC (D-MAC) g Many proposals using RTS/CTS exchange [Ko 00 infocom, Nasipuri 00,

Directional MAC (D-MAC) g Many proposals using RTS/CTS exchange [Ko 00 infocom, Nasipuri 00, Roychoudhury 02 tech, Takai 02 mobihoc] g Proposals differ in how the RTS/CTS are transmitted i. In a particular direction i. In all directions (omni-directional) i. In a subset of directions 115 (c) 2002 Nitin Vaidya, UIUC

Directional MAC (D-MAC) Example g Directional RTS (DRTS) g Omnidirectional CTS (OCTS) 116 (c)

Directional MAC (D-MAC) Example g Directional RTS (DRTS) g Omnidirectional CTS (OCTS) 116 (c) 2002 Nitin Vaidya, UIUC

D-MAC Example DRTS = Directional RTS A B C DRTS D E F 117

D-MAC Example DRTS = Directional RTS A B C DRTS D E F 117 (c) 2002 Nitin Vaidya, UIUC

D-MAC Example CTS = Clear-to-Send CTS A B C D E F 118 (c)

D-MAC Example CTS = Clear-to-Send CTS A B C D E F 118 (c) 2002 Nitin Vaidya, UIUC

D-MAC Example OCTS = Omnidirectional CTS A B C D E F 119 (c)

D-MAC Example OCTS = Omnidirectional CTS A B C D E F 119 (c) 2002 Nitin Vaidya, UIUC

D-MAC Example DATA A B C D E F 120 (c) 2002 Nitin Vaidya,

D-MAC Example DATA A B C D E F 120 (c) 2002 Nitin Vaidya, UIUC

D-MAC Example ACK A B C D E F 121 (c) 2002 Nitin Vaidya,

D-MAC Example ACK A B C D E F 121 (c) 2002 Nitin Vaidya, UIUC

Directional Carrier Sensing [Takai 02 mobihoc, Roychoudhury 02 tech] g Physical carrier sensing similar

Directional Carrier Sensing [Takai 02 mobihoc, Roychoudhury 02 tech] g Physical carrier sensing similar to omni antennas g Virtual carrier sensing somewhat different i. When RTS/CTS received from a particular direction, record the direction of arrival and duration of proposed transfer i. Channel assumed to be busy in the direction from which RTS/CTS received 122 (c) 2002 Nitin Vaidya, UIUC

Exploiting Larger Range of Directional Antennas [Roychoudhury 02 tech] D C A g B

Exploiting Larger Range of Directional Antennas [Roychoudhury 02 tech] D C A g B Omni neighbors E F G Directional neighbors When transmission needs to be schedules, receiving node is in omni-receive mode smaller gain 123 (c) 2002 Nitin Vaidya, UIUC

Exploiting Larger Range of Directional Antennas D C A g g g B Omni

Exploiting Larger Range of Directional Antennas D C A g g g B Omni neighbors E F G Directional neighbors Cannot send RTS from A to D directly Send RTS over multiple hops A-B-C-D Send CTS directionally from D to A Send DATA directionally from D to A (single hop) Send ACK directionally from A to D 124 (c) 2002 Nitin Vaidya, UIUC

Exploiting Larger Range of Directional Antennas D C A g g B Omni neighbors

Exploiting Larger Range of Directional Antennas D C A g g B Omni neighbors E F Directional neighbors G Reduces number of hops traversed by data Can improve delay and throughput 125 (c) 2002 Nitin Vaidya, UIUC

Multiple Channels 126 (c) 2002 Nitin Vaidya, UIUC

Multiple Channels 126 (c) 2002 Nitin Vaidya, UIUC

Multiple Channels g Multiple channels in ad hoc networks: typically defined by a particular

Multiple Channels g Multiple channels in ad hoc networks: typically defined by a particular code (CDMA) or frequency band (FDMA) g TDMA requires time synchronization among hosts in ad hoc network i. Difficult g Many MAC protocols have been proposed 127 (c) 2002 Nitin Vaidya, UIUC

Multi-Channel MAC: A simple approach g Divide bandwidth into multiple channels g Choose any

Multi-Channel MAC: A simple approach g Divide bandwidth into multiple channels g Choose any one of the idle channels g Use a single-channel protocol on the chosen channel i. ALOHA i. MACA 128 (c) 2002 Nitin Vaidya, UIUC

Multi-Channel MAC with Soft Reservation [Nasipuri 00] g Similar to the simple scheme, channel

Multi-Channel MAC with Soft Reservation [Nasipuri 00] g Similar to the simple scheme, channel used recently for a successful transmission preferred g Tends to “reserve” channels 129 (c) 2002 Nitin Vaidya, UIUC

Another Protocol g Use one (control) channel for RTS/CTS and remaining (data) channels for

Another Protocol g Use one (control) channel for RTS/CTS and remaining (data) channels for DATA/ACK g Each host maintains NAV table, with one entry for each data channel g Sender sends RTS to destination, specifying the channels that are free per sender’s table g Receiver replies with CTS specifying a channel that it also thinks is free i. A channel is used only if both sender and receiver conclude that it is free 130 (c) 2002 Nitin Vaidya, UIUC

Related Standards Activities 131 (c) 2002 Nitin Vaidya, UIUC

Related Standards Activities 131 (c) 2002 Nitin Vaidya, UIUC

Related Standards Activities g IEEE 802. 11 g Hiperlan/2 g Blue. Tooth g IETF

Related Standards Activities g IEEE 802. 11 g Hiperlan/2 g Blue. Tooth g IETF manet (Mobile Ad-hoc Networks) working group ihttp: //grouper. ieee. org/groups/802/11/ ihttp: //www. etsi. org/technicalactiv/hiperlan 2. htm ihttp: //www. bluetooth. com ihttp: //www. ietf. org/html. charters/manet-charter. html 132 (c) 2002 Nitin Vaidya, UIUC

Tutorial on Mobile Ad Hoc Networks g www. crhc. uiuc. edu/~nhv 133 (c) 2002

Tutorial on Mobile Ad Hoc Networks g www. crhc. uiuc. edu/~nhv 133 (c) 2002 Nitin Vaidya, UIUC

Thank you !! For more information, send e-mail to Nitin Vaidya at nhv@uiuc. edu

Thank you !! For more information, send e-mail to Nitin Vaidya at nhv@uiuc. edu © 2002 Nitin Vaidya 134