CS6003 ADHOC & SENSOR NETWORKS

59
CS6003 ADHOC & SENSOR NETWORKS UNIT – II Dr.A.Kathirvel, Professor and Head, Dept of CSE Anand Institute of Higher Technology, Chennai

Transcript of CS6003 ADHOC & SENSOR NETWORKS

Page 1: CS6003 ADHOC & SENSOR NETWORKS

CS6003 ADHOC & SENSOR

NETWORKS

UNIT – II

Dr.A.Kathirvel, Professor and Head, Dept of CSEAnand Institute of Higher Technology, Chennai

Page 2: CS6003 ADHOC & SENSOR NETWORKS

Unit - II

MAC PROTOCOLS FOR AD HOC WIRELESS

NETWORKS

Issues in designing a MAC Protocol- Classification of MAC

Protocols- Contention based protocols- Contention based

protocols with Reservation Mechanisms- Contention

based protocols with Scheduling Mechanisms – Multi

channel MAC-IEEE 802.11

2

Page 3: CS6003 ADHOC & SENSOR NETWORKS

3

Issues

The main issues need to be addressed while designing a

MAC protocol for ad hoc wireless networks:

Bandwidth efficiency is defined at the ratio of the

bandwidth used for actual data transmission to the total

available bandwidth. The MAC protocol for ad-hoc

networks should maximize it.

Quality of service support is essential for time-

critical applications. The MAC protocol for ad-hoc

networks should consider the constraint of ad-hoc

networks.

Synchronization can be achieved by exchange of

control packets.

Page 4: CS6003 ADHOC & SENSOR NETWORKS

4

IssuesThe main issues need to be addressed while designing a MAC protocol for ad

hoc wireless networks:

Hidden and exposed terminal problems:

Hidden nodes:

Hidden stations: Carrier sensing may fail to detect another station.For example, A and D.

Fading: The strength of radio signals diminished rapidly with thedistance from the transmitter. For example, A and C.

Exposed nodes:

Exposed stations: B is sending to A. C can detect it. C might want tosend to E but conclude it cannot transmit because C hears B.

Collision masking: The local signal might drown out the remotetransmission.

Error-Prone Shared Broadcast Channel

Distributed Nature/Lack of Central Coordination

Mobility of Nodes: Nodes are mobile most of the time.

Page 5: CS6003 ADHOC & SENSOR NETWORKS

A)THE HIDDEN STATION PROBLEM. (B) THE EXPOSED STATION PROBLEM.

Hidden & exposed terminal problem

5

Page 6: CS6003 ADHOC & SENSOR NETWORKS

6

The Hidden Terminal Problem

Wireless stations have transmission rangesand not all stations are within radio range ofeach other.

Simple CSMA will not work!

C transmits to B.

If A “senses” the channel, it will not hearC’s transmission and falsely conclude that Acan begin a transmission to B.

Page 7: CS6003 ADHOC & SENSOR NETWORKS

7

The Exposed Station Problem

The inverse problem.

B wants to send to C and listens to the

channel.

When B hears A’s transmission, B falsely

assumes that it cannot send to C.

Page 8: CS6003 ADHOC & SENSOR NETWORKS

8

Wireless LAN configuration

LAN

Server

WirelessLAN

Laptops

Base station/access point

Palmtop

radio obs truc tion

A B C

DE

Page 9: CS6003 ADHOC & SENSOR NETWORKS

9

Design goals of a MAC Protocol

Design goals of a MAC protocol for ad hoc wirelessnetworks

The operation of the protocol should be distributed.

The protocol should provide QoS support for real-time traffic.

The access delay, which refers to the average delayexperienced by any packet to get transmitted, must bekept low.

The available bandwidth must be utilized efficiently.

The protocol should ensure fair allocation ofbandwidth to nodes.

Page 10: CS6003 ADHOC & SENSOR NETWORKS

10

Design goals of a MAC Protocol

Control overhead must be kept as low as possible.

The protocol should minimize the effects of hiddenand exposed terminal problems.

The protocol must be scalable to large networks.

It should have power control mechanisms.

The protocol should have mechanisms for adaptivedata rate control.

It should try to use directional antennas.

The protocol should provide synchronization amongnodes.

Page 11: CS6003 ADHOC & SENSOR NETWORKS

11

Classifications of MAC protocols

Ad hoc network MAC protocols can beclassified into three types:

Contention-based protocols

Contention-based protocols with reservationmechanisms

Contention-based protocols with schedulingmechanisms

Other MAC protocols

Page 12: CS6003 ADHOC & SENSOR NETWORKS

12

Classifications of MAC protocols

MAC Protocols for Ad Hoc

Wireless Networks

Contention-Based

Protocols

Contention-based

protocols with

reservation mechanisms

Other MAC

Protocols

Contention-based

protocols with

scheduling mechanisms

Sender-Initiated

Protocols

Receiver-Initiated

Protocols

Synchronous

Protocols

Asynchronous

Protocols

Single-Channel

Protocols

Multichannel

Protocols

MACAW

FAMA

BTMA

DBTMA

ICSMA

RI-BTMA

MACA-BI

MARCH

D-PRMA

CATA

HRMA

RI-BTMA

MACA-BI

MARCH

SRMA/PA

FPRP

MACA/PR

RTMAC

Directional

Antennas

MMAC

MCSMA

PCM

RBAR

Page 13: CS6003 ADHOC & SENSOR NETWORKS

13

Classifications of MAC Protocols

Contention-based protocols

Sender-initiated protocols:

Packet transmissions are initiated by the sender node.

Single-channel sender-initiated protocols: A node that

wins the contention to the channel can make use of the

entire bandwidth.

Multichannel sender-initiated protocols: The available

bandwidth is divided into multiple channels.

Receiver-initiated protocols:

The receiver node initiates the contention resolution

protocol.

Page 14: CS6003 ADHOC & SENSOR NETWORKS

14

Classifications of MAC Protocols

Contention-based protocols with reservation

mechanisms

Synchronous protocols

All nodes need to be synchronized. Global

time synchronization is difficult to achieve.

Asynchronous protocols

These protocols use relative time

information for effecting reservations.

Page 15: CS6003 ADHOC & SENSOR NETWORKS

15

Classifications of MAC Protocols

Contention-based protocols with scheduling mechanisms

Node scheduling is done in a manner so that all nodes

are treated fairly and no node is starved of bandwidth.

Scheduling-based schemes are also used for enforcing

priorities among flows whose packets are queued at

nodes.

Some scheduling schemes also consider battery

characteristics.

Other protocols are those MAC protocols that do not

strictly fall under the above categories.

Page 16: CS6003 ADHOC & SENSOR NETWORKS

16

Contention-based protocols

MACAW: A Media Access Protocol for

Wireless LANs is based on MACA (Multiple

Access Collision Avoidance) Protocol

MACA

When a node wants to transmit a data packet, it first

transmit a RTS (Request To Send) frame.

The receiver node, on receiving the RTS packet, if it

is ready to receive the data packet, transmits a CTS

(Clear to Send) packet.

Page 17: CS6003 ADHOC & SENSOR NETWORKS

17

Contention-based protocols

Once the sender receives the CTS packet

without any error, it starts transmitting the data

packet.

If a packet transmitted by a node is lost, the

node uses the binary exponential back-off

(BEB) algorithm to back off a random interval

of time before retrying.

The binary exponential back-off mechanism

used in MACA might starves flows sometimes.

The problem is solved by MACAW.

Page 18: CS6003 ADHOC & SENSOR NETWORKS

18

MACA Protocol

The MACA protocol. (a) A sending an RTS to B.

(b) B responding with a CTS to A.

Page 19: CS6003 ADHOC & SENSOR NETWORKS

19

MACA avoids the problem of hidden terminals

A and C want to send to B

A sends RTS first

C waits after receiving CTS from B

MACA examples

A B C

RTS

CTSCTS

Page 20: CS6003 ADHOC & SENSOR NETWORKS

20

MACA avoids the problem of exposed

terminals

B wants to send to A, C to another terminal

now C does not have to wait for it cannot

receive CTS from A

MACA examples

A B C

RTS

CTS

RTS

Page 21: CS6003 ADHOC & SENSOR NETWORKS

21

MACAW

Variants of this method can be found in IEEE 802.11as DFWMAC (Distributed Foundation WirelessMAC),

MACAW (MACA for Wireless) is a revision ofMACA.

The sender senses the carrier to see and transmits aRTS (Request To Send) frame if no nearby stationtransmits a RTS.

The receiver replies with a CTS (Clear To Send)frame.

Page 22: CS6003 ADHOC & SENSOR NETWORKS

22

MACAW

Neighborssee CTS, then keep quiet.

see RTS but not CTS, then keep quiet until the CTS is backto the sender.

The receiver sends an ACK when receiving anframe.Neighbors keep silent until see ACK.

CollisionsThere is no collision detection.

The senders know collision when they don’t receive CTS.

They each wait for the exponential backoff time.

Page 23: CS6003 ADHOC & SENSOR NETWORKS

23

MACA variant:DFWMAC in 802.11

idle

wait for the

right to send

wait for ACK

sender receiver

packet ready to send; RTS

time-out;

RTS

CTS; data

ACK

RxBusy

idle

wait for

data

RTS; RxBusy

RTS;

CTS

data;

ACK

time-out

data;

NAK

ACK: positive acknowledgement

NAK: negative acknowledgement

RxBusy: receiver busy

time-out

NAK;

RTS

Page 24: CS6003 ADHOC & SENSOR NETWORKS

24

Contention-based protocols

Floor acquisition Multiple Access Protocols

(FAMA)

Based on a channel access discipline which consists

of a carrier-sensing operation and a collision-

avoidance dialog between the sender and the intended

receiver of a packet.

Floor acquisition refers to the process of gaining

control of the channel.

At any time only one node is assigned to use the

channel.

Page 25: CS6003 ADHOC & SENSOR NETWORKS

25

Contention-based protocols

Carrier-sensing by the sender, followed by the RTS-

CTS control packet exchange, enables the protocol to

perform as efficiently as MACA.

Two variations of FAMA

RTS-CTS exchange with no carrier-sensing uses the

ALOHA protocol for transmitting RTS packets.

RTS-CTS exchange with non-persistent carrier-

sensing uses non-persistent CSMA for the same

purpose.

Page 26: CS6003 ADHOC & SENSOR NETWORKS

26

Contention-based protocols

Busy Tone Multiple Access Protocols (BTMA)

The transmission channel is split into two:

a data channel for data packet transmissions

a control channel used to transmit the busy tone signal

When a node is ready for transmission, it senses the channel tocheck whether the busy tone is active.

If not, it turns on the busy tone signal and starts datatransmissions

Otherwise, it reschedules the packet for transmission aftersome random rescheduling delay.

Any other node which senses the carrier on the incomingdata channel also transmits the busy tone signal on thecontrol channel, thus, prevent two neighboring nodes fromtransmitting at the same time.

Page 27: CS6003 ADHOC & SENSOR NETWORKS

27

Contention-based protocols

Dual Busy Tone Multiple Access Protocol(DBTMAP) is an extension of the BTMAscheme.

a data channel for data packet transmissions

a control channel used for control packettransmissions (RTS and CTS packets) and alsofor transmitting the busy tones.

Page 28: CS6003 ADHOC & SENSOR NETWORKS

28

Contention-based protocols

Receiver-Initiated Busy Tone Multiple Access Protocol

(RI-BTMA)

The transmission channel is split into two:

a data channel for data packet transmissions

a control channel used for transmitting the busy

tone signal

A node can transmit on the data channel only if it

finds the busy tone to be absent on the control

channel.

The data packet is divided into two portions: a

preamble and the actual data packet.

Page 29: CS6003 ADHOC & SENSOR NETWORKS

29

Contention-based protocols

MACA-By Invitation (MACA-BI) is a receiver-

initiated MAC protocol.

By eliminating the need for the RTS packet it

reduces the number of control packets used in

the MACA protocol which uses the three-way

handshake mechanism.

Media Access with Reduced Handshake

(MARCH) is a receiver-initiated protocol.

Page 30: CS6003 ADHOC & SENSOR NETWORKS

30

Contention-based Protocols with

Reservation Mechanisms

Contention-based Protocols with ReservationMechanisms

Contention occurs during the resource (bandwidth)reservation phase.

Once the bandwidth is reserved, the node getsexclusive access to the reserved bandwidth.

QoS support can be provided for real-time traffic.

Page 31: CS6003 ADHOC & SENSOR NETWORKS

31

Contention-based Protocols with

Reservation MechanismsDistributed packet reservation multiple access protocol

(D-PRMA)

It extends the centralized packet reservation multipleaccess (PRMA) scheme into a distributed scheme thatcan be used in ad hoc wireless networks.

PRMA was designed in a wireless LAN with a basestation.

D-PRMA extends PRMA protocol in a wirelessLAN.

D-PRMA is a TDMA-based scheme. The channel isdivided into fixed- and equal-sized frames along thetime axis.

Page 32: CS6003 ADHOC & SENSOR NETWORKS

32

Access method DAMA: Reservation-

TDMA Reservation Time Division Multiple Access

every frame consists of N mini-slots and x data-slots

every station has its own mini-slot and can reserve up to k

data-slots using this mini-slot (i.e. x = N * k).

other stations can send data in unused data-slots according to a

round-robin sending scheme (best-effort traffic)

N mini-slots N * k data-slots

reservations

for data-slotsother stations can use free data-slots

based on a round-robin scheme

e.g. N=6, k=2

Page 33: CS6003 ADHOC & SENSOR NETWORKS

33

Distributed Packet Reservation

Multiple Access Protocol (D-PRMA)

Implicit reservation (PRMA - PacketReservation Multiple Access)

frame1

frame2

frame3

frame4

frame5

1 2 3 4 5 6 7 8 time-slot

collision at

reservation

attempts

A C D A B A F

A C A B A

A B A F

A B A F D

A C E E B A F Dt

ACDABA-F

ACDABA-F

AC-ABAF-

A---BAFD

ACEEBAFD

reservation

33

Page 34: CS6003 ADHOC & SENSOR NETWORKS

Distributed Packet Reservation

Multiple Access Protocol (D-PRMA)

a certain number of slots form a frame, frames arerepeated

stations compete for empty slots according to theslotted aloha principle

once a station reserves a slot successfully, this slot isautomatically assigned to this station in all followingframes as long as the station has data to send

competition for this slots starts again as soon as theslot was empty in the last frame

34

Page 35: CS6003 ADHOC & SENSOR NETWORKS

35

Contention-based protocols

with Reservation Mechanisms

Collision avoidance time allocation protocol (CATA)

based on dynamic topology-dependent transmission

scheduling

Nodes contend for and reserve time slots by means

of a distributed reservation and handshake

mechanism.

Support broadcast, unicast, and multicast

transmissions.

Page 36: CS6003 ADHOC & SENSOR NETWORKS

36

Contention-based protocols

with Reservation Mechanisms

The operation is based on two basic principles:

The receiver(s) of a flow must inform the potential source

nodes about the reserved slot on which it is currently

receiving packets. The source node must inform the

potential destination node(s) about interferences in the

slot.

Usage of negative acknowledgements for reservation

requests, and control packet transmissions at the beginning

of each slot, for distributing slot reservation information to

senders of broadcast or multicast sessions.

Page 37: CS6003 ADHOC & SENSOR NETWORKS

37

Contention-based protocols

with Reservation Mechanisms

Hop reservation multiple access protocol (HRMA)

a multichannel MAC protocol which is based onhalf-duplex, very slow frequency-hopping spreadspectrum (FHSS) radios

uses a reservation and handshake mechanism toenable a pair of communicating nodes to reserve afrequency hop, thereby guaranteeing collision-freedata transmission.

can be viewed as a time slot reservation protocolwhere each time slot is assigned a separate frequencychannel.

Page 38: CS6003 ADHOC & SENSOR NETWORKS

38

Contention-based protocols

with Reservation Mechanisms

Soft reservation multiple access with priorityassignment (SRMA/PA)

Developed with the main objective ofsupporting integrated services of real-time andnon-real-time application in ad hoc networks,at the same time maximizing the statisticalmultiplexing gain.

Nodes use a collision-avoidance handshakemechanism and a soft reservation mechanism.

Page 39: CS6003 ADHOC & SENSOR NETWORKS

39

Five-Phase Reservation Protocol (FPRP)

a single-channel time division multiple access(TDMA)-based broadcast scheduling protocol.

Nodes uses a contention mechanism in order toacquire time slots.

The protocol assumes the availability of global timeat all nodes.

The reservation takes five phases: reservation,collision report, reservation confirmation, reservationacknowledgement, and packing and eliminationphase.

Contention-based protocols

with Reservation Mechanisms

Page 40: CS6003 ADHOC & SENSOR NETWORKS

40

MACA with Piggy-Backed Reservation (MACA/PR)

Provide real-time traffic support in multi-hopwireless networks

Based on the MACAW protocol with non-persistentCSMA

The main components of MACA/PR are:

A MAC protocol

A reservation protocol

A QoS routing protocol

Contention-based protocols

with Reservation Mechanisms

Page 41: CS6003 ADHOC & SENSOR NETWORKS

41

Real-Time Medium Access Control Protocol (RTMAC)

Provides a bandwidth reservation mechanism for

supporting real-time traffic in ad hoc wireless networks

RTMAC has two components

A MAC layer protocol is a real-time extension of the

IEEE 802.11 DCF.

A medium-access protocol for best-effort traffic

A reservation protocol for real-time traffic

A QoS routing protocol is responsible for end-to-end

reservation and release of bandwidth resources.

Contention-based protocols

with Reservation Mechanisms

Page 42: CS6003 ADHOC & SENSOR NETWORKS

42

Protocols in this category focus on packet

scheduling at the nodes and transmission

scheduling of the nodes.

The factors that affects scheduling decisions

Delay targets of packets

Traffic load at nodes

Battery power

Contention-based protocols

with Scheduling Mechanisms

Page 43: CS6003 ADHOC & SENSOR NETWORKS

43

Distributed priority scheduling and medium

access in Ad Hoc Networks present two

mechanisms for providing quality of service

(QoS)

Distributed priority scheduling (DPS) – piggy-backs

the priority tag of a node’s current and head-of-line

packets o the control and data packets

Multi-hop coordination – extends the DPS scheme to

carry out scheduling over multi-hop paths.

Contention-based protocols

with Scheduling Mechanisms

Page 44: CS6003 ADHOC & SENSOR NETWORKS

44

Distributed Wireless Ordering Protocol (DWOP)

A media access scheme along with a scheduling

mechanism

Based on the distributed priority scheduling scheme

Contention-based protocols

with Scheduling Mechanisms

Page 45: CS6003 ADHOC & SENSOR NETWORKS

45

Distributed Laxity-based Priority Scheduling (DLPS)

Scheme

Scheduling decisions are made based on

The states of neighboring nodes and feed back from

destination nodes regarding packet losses

Packets are recorded based on their uniform laxity

budgets (ULBs) and the packet delivery ratios of the

flows. The laxity of a packet is the time remaining

before its deadline.

Contention-based protocols

with Scheduling Mechanisms

Page 46: CS6003 ADHOC & SENSOR NETWORKS

46

MAC protocols that use directional antennas haveseveral advantages:

Reduce signal interference

Increase in the system throughput

Improved channel reuse

MAC protocol using directional antennas

Make use of an RTS/CTS exchange mechanism

Use directional antennas for transmitting andreceiving data packets

MAC Protocols that use directional

Antennas

Page 47: CS6003 ADHOC & SENSOR NETWORKS

47

Directional Busy Tone-based MAC Protocol (DBTMA)

It uses directional antennas for transmitting the RTS,CTS, data frames, and the busy tones.

Directional MAC Protocols for Ad Hoc WirelessNetworks

DMAC-1, a directional antenna is used fortransmitting RTS packets and omni-directional antennafor CTS packets.

DMAC-1, both directional RTS and omni-directionalRTS transmission are used.

MAC Protocols that use directional

Antennas

Page 48: CS6003 ADHOC & SENSOR NETWORKS

48

Other MAC ProtocolsMulti-channel MAC Protocol (MMAC)

Multiple channels for data transmission

There is no dedicated control channel.

Based on channel usage channels can be classified into three types: high

preference channel (HIGH), medium preference channel (MID), low

preference channel (LOW)

Multi-channel CSMA MAC Protocol (MCSMA)

The available bandwidth is divided into several channels

Power Control MAC Protocol (PCM) for Ad Hoc Networks

Allows nodes to vary their transmission power levels on a per-packet basis

Receiver-based Autorate Protocol (RBAR)

Use a rate adaptation approach

Interleaved Carrier-Sense Multiple Access Protocol (ICSMA)

The available bandwidth is split into tow equal channels

The handshaking process is interleaved between the two channels.

Page 49: CS6003 ADHOC & SENSOR NETWORKS

What is IEEE 802.11?

Standard for wireless local area networks (wireless

LANs) developed in 1990 by IEEE

Intended for home or office use (primarily indoor)

802.11 standard describes the MAC layer, while

other substandards (802.11a, 802.11b) describe the

physical layer

Wireless version of the Ethernet (802.3) standard

49

Page 50: CS6003 ADHOC & SENSOR NETWORKS

Network Setup

Ethernet

MT

AP AP AP

MT MT

Basic Network Setup is Cellular

Mobile Terminals (MT) connect with Access Points (AP)

Standard also supports ad-hoc networking where MT’s talk directly to MT’s

50

Page 51: CS6003 ADHOC & SENSOR NETWORKS

IEEE 802.11 Physical Layers

802.11b 802.11a

Modulation Scheme DSSS OFDM

Spectrum (GHz) 2.4 – 2.485 5.15-5.35, 5.725-5.825

Data Rate (Mbps) 1 – 11 6 - 54

Subchannels 11 overlapping 8 independent

Interference Microwave, Cordless

Phones,Bluetooth,

HomeRF, Light Bulbs!

HyperLAN II

Availability Today Late August?

Cost $250 AP, $100 PC Card ??? (same)

51

Page 52: CS6003 ADHOC & SENSOR NETWORKS

Media Access Control - Ethernet

CSMA/CD (Carrier Sense Multiple Access with CollisionDetection)

If media is sensed idle, transmit

If media is sensed busy, wait until idle and then transmitimmediately

Collisions can occur if more than one user transmits at the sametime

If a collision is detected, stop transmitting.

Reschedule transmission according to exponential backoff

Desktop System Desktop System Desktop System

Ethernet

52

Page 53: CS6003 ADHOC & SENSOR NETWORKS

Media Access Control (802.11)

Would like to use CSMA

Nice for bursty traffic

Make for seamless replacement of wired LANs withwireless LANS

Use CSMA, but can’t use CD

PT/PR ratio is too high

Don’t want to waste energy on mobiles

Use Collision Avoidance instead

Don’t always start transmitting immediately aftersomeone else

53

Page 54: CS6003 ADHOC & SENSOR NETWORKS

CSMA/CA Details

SIFS (Short Interframe Space)

DIFS (Distributed Interframe Space)

Packet A ACK

B CSIFS DIFS

Packet C ACK

SIFS DIFS

Packet B

Scenario:

B and C want to transmit, but A currently has control of medium

B randomly selects 7 slots of backoff, C selects 4 slots

C transmits first, then B

54

Page 55: CS6003 ADHOC & SENSOR NETWORKS

What is HIPERLAN/2?

European standard developed by ETSI/BRAN

(European Telecommunications Standards

Institute/Broadband Radio Access Networks)

Physical Layer is very similar to 802.11a

(OFDM operating in the 5 GHz spectrum)

Standard based on wireless ATM

(Asynchronous Transfer Mode)

55

Page 56: CS6003 ADHOC & SENSOR NETWORKS

HIPERLAN/2 MAC

BCH – Miscellaneous header

FCH – Details how the DL and UL phases will be allocated

ACH – Feedback on which resource requests were received

RCH – Random access resource request

56

Page 57: CS6003 ADHOC & SENSOR NETWORKS

Performance Comparison

57

Page 58: CS6003 ADHOC & SENSOR NETWORKS

IEEE 802.11

IEEE 802.11 is a widely accepted standard in the UnitedStates for wireless LANs

Primarily a “cellular” random access scheme withprovisions for ad hoc networking and contention freeaccess

802.11b products are available now, but better to waitfor 802.11a products later this year

HIPERLAN/2 is being pushed in Europe

Wireless ATM solution for real-time traffic

Standard reflects the network topology

58

Page 59: CS6003 ADHOC & SENSOR NETWORKS

Questions ?