Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering...
-
date post
20-Dec-2015 -
Category
Documents
-
view
217 -
download
1
Transcript of Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering...
![Page 1: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/1.jpg)
Muhammad Mahmudul Islam
Ronald Pose
Carlo Kopp
School of Computer Science & Software Engineering
Monash University, Australia
![Page 2: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/2.jpg)
Problem Statement
Supporting real-time traffic in multi-hop ad-hoc network (e.g. a SAHN) with a contention based MAC protocol is a challenging task
In a previous paper in WOCN 2005
We have explained the challenges
&
Provided a solution with respect to a SAHN
using IEEE 802.11e operating in EDCA mode
In this paperExtend our previous work
![Page 3: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/3.jpg)
SAHN: Suburban Ad-Hoc Network
EDCA: Enhanced Distributed Channel Access, an improved version of DCF (Distributed Coordination Function) of legacy 802.11
SAHN-MAC: EDCA of 802.11e + Proposed protocol
![Page 4: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/4.jpg)
Topics Covered
SAHN
Challenges
Solution
Simulation results
![Page 5: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/5.jpg)
SAHN (Suburban Ad-Hoc Network)
Multi-hop ad-hoc networkMulti-hop ad-hoc network Ideal for cooperative nodesIdeal for cooperative nodes,, ee.g. .g. connecting houses and businessconnecting houses and business Topology is quasiTopology is quasi--staticstatic Uses wireless technologyUses wireless technology Multi-hop QoS routing Multi-hop QoS routing DecentralizedDecentralized Multi MbpsMulti Mbps broadband broadband
serservicevice No charges for No charges for
SAHN trafficSAHN traffic Can run alonCan run alongside gside
TCP/IPTCP/IP Conceived byConceived by Ronald PoseRonald Pose && Carlo KoppCarlo Kopp inin 1997 1997 atat Monash University, A Monash University, Australiaustralia
![Page 6: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/6.jpg)
Simulation Setup
Used GloMoSim (version 2.02)Nodes are separated by at most 240 meters, Nodes use same TX power with a TX range of 240 mUse EDCA of IEEE 802.11e in the link layerPhysical layer uses OFDM with a Physical layer operates at the TX rate of 54 MbpsSession consists of UDP type CBR trafficRouting is done with DSR
Default setup
![Page 7: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/7.jpg)
Challenges (1/9)How to support QoS for real-time traffic?
Prevent network saturation
Why? (Explaining next)
![Page 8: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/8.jpg)
Challenges (2/9) Effect of saturation in network performance (1/2)
B C D EA
For 512 bytes payload, max achievable throughput between AE 5.2 Mbps
Establish a 2.6 Mbps session between AE
Since below saturation
Achieved throughput = 2.6 Mbps
End-to-end delay = 0.9 ms
![Page 9: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/9.jpg)
Challenges (3/9) Effect of saturation in network performance (2/2)
Throughput degraded by 35% (1.7 Mbps)
End-to-end delay increased by 550% (559 ms)At over saturation
1000
0.1
1
10
100
1
2
3
4
5
0
En
d-t
o-en
d d
elay
(m
s)
Th
rou
ghp
ut
(Mb
ps)
End-to-end delay
Throughput
Unsaturated[2.6 + 1.0]
NearSaturation[2.6 + 2.4]
Saturated[2.6 + 2.7]
OverSaturated[2.6 + 4.1]
Initial Load Added Load
![Page 10: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/10.jpg)
Challenges (4/9)
Prevent network saturation
How?
Prevent adding new sessions if they saturate the network
How?
Reserve bandwidth
Bandwidth reservation for multi-hop ad-hoc network with contention based MAC protocol is not trivial
Why? (Explaining next)
![Page 11: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/11.jpg)
Challenges (5/9) Throughput
Amount of data carried from one node to another in a given time period
Expressed in bps
Associated with the application layer
Bandwidth
Bandwidth and throughput are same at the application layer
For adding overheads of different layers
BW at the physical layer > Throughput
Bandwidth Utilization (U) = 100 %Bandwidth Consumed
Total Bandwidth
![Page 12: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/12.jpg)
Challenges (6/9)
Adding
NW & MAC headers & RTS/CTS/ACK overheads
UA 18 % & UB 18 %
BA
B C D EA
Establish a 3.4 Mbps session between end nodes
Each packet = 512 bytes
Effect of multiple hops on U
![Page 13: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/13.jpg)
Challenges (7/9)
Establish a 3.4 Mbps session between AE, Each packet = 512 bytes
B C D EA
G H I JF K Active Participant (α)
Passive Participant (ρ)
U of neighbors may be wasted
![Page 14: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/14.jpg)
Challenges (8/9) Why we need to know U of passive participants?
Add another 3.4 Mbps
session GK
U of some of the nodes exceed their working limits
E.g. UC has to be
128.724%
(72.619 + 56.105)
B C D EA
G H I JF K
![Page 15: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/15.jpg)
Challenges (9/9)
At each α measure U for itself (Usα) and for neighboring ρ (Us
ρ)
At each ρ measure U for itself (Usρ)
How?
How?
Support QoS for real-time traffic
Do not allow new session if it causes the network to get saturated
Allocate BW before establishing a session
Measure BW without choking ongoing sessions
How?
How?
![Page 16: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/16.jpg)
Challenges (9/9)
How?
How?
Support QoS for real-time traffic
Do not allow new session if it causes the network to get saturated
Allocate BW before establishing a session
How?
How? Solution in previous work
At each α measure U for itself (Usα) and for neighboring ρ (Us
ρ)
At each ρ measure U for itself (Usρ)
Measure BW without choking ongoing sessions
![Page 17: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/17.jpg)
Challenges (9/9)
How?
How?
Support QoS for real-time traffic
Do not allow new session if it causes the network to get saturated
Allocate BW before establishing a session
How?
How? In this work
At each α measure U for itself (Usα) and for neighboring ρ (Us
ρ)
At each ρ measure U for itself (Usρ)
Measure BW without choking ongoing sessions
![Page 18: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/18.jpg)
Solution (1/14) Basics of the analytical model
RTS CTS
DATA ACK
A B C D
Interference Zone T1-T2
Step 1 starts at T1 Step 2
Step 3 Step 4 finishes at T2
A single transaction
A B C D A B C D
A B C D A B C D
![Page 19: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/19.jpg)
Solution (2/14)
Base case (it consists of 2 nodes) UsA U of session s at node A
Us(b) base case U of session s
UsA= Us
B = Us(b)
ACKDATACTSRTS
ACK
CTSDATA
RTS
UsB = Us (b)Us
A = Us (b)
A B
![Page 20: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/20.jpg)
Solution (3/14)
Other case (3 nodes)
ACKDATACTSRTS
ACK
CTSDATA
RTS
ACKDATACTSRTS
ACK
CTSDATA
RTS
UsB = 2 x Us (b)
UsC = 2 x Us (b)
UsA = 2 x Us (b)
A B C UsA= Us
B = UsC = 2 x Us(b)
![Page 21: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/21.jpg)
Solution (4/14)
Other case (4 nodes)
ACKDATACTSRTS
ACK
CTSDATA
RTS
ACKDATACTSRTS
ACK
CTSDATA
RTS
ACKDATACTSRTS
ACK
CTSDATA
RTS
UsB = 3 x Us (b)
UsC = 3 x Us (b)
UsA = 2 x Us (b)
UsD = 2 x Us (b)
A B C D
UsA= Us
D = 2 x Us(b)
UsB= Us
C = 3 x Us(b)
![Page 22: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/22.jpg)
Solution (5/14)
Other case (5 nodes)
ACKDATACTSRTS
ACK
CTSDATA
RTS
ACKDATACTSRTS
ACK
CTSDATA
RTS
ACKDATACTSRTS
ACK
CTSDATA
RTS
ACKDATACTSRTS
ACK
CTSDATA
RTS
UsB = 3 x Us (b)
UsC = 4 x Us (b)
UsA = 2 x Us (b)
UsD = 3 x Us (b)
UsE = 2 x Us (b)
A B C D E
UsA= Us
E = 2 x Us(b)
UsB= Us
D = 3 x Us(b)
UsC = 4 x Us(b)
![Page 23: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/23.jpg)
Solution (6/14)
Other case (6 nodes)
ACKDATACTSRTS
ACK
CTSDATA
RTS
ACKDATACTSRTS
ACK
CTSDATA
RTS
ACKDATACTSRTS
ACK
CTSDATA
RTS
ACKDATACTSRTS
ACK
CTSDATA
RTS
UsB = 3 x Us (b)
UsC = 4 x Us (b)
UsA = 2 x Us (b)
UsD = 4 x Us (b)
UsE = 3 x Us (b)
A B C D E
ACKDATACTSRTS
ACK
CTSDATA
RTS
F
UsF = 2 x Us (b)
UsA= Us
F = 2 x Us(b)
UsB= Us
E = 3 x Us(b)
UsC= Us
D = 4 x Us(b)
![Page 24: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/24.jpg)
Solution (7/14)
We can infer Us
α depends on the number of transactions α can hear transferring the same data packet for s
Each transaction involvesa specific link that joins the TX and the RX active participants
5 Nodes
UsA= Us
E = 2 x Us(b)
UsB= Us
D = 3 x Us(b)
UsC = 4 x Us(b)
6 Nodes
UsA= Us
F = 2 x Us(b)
UsB= Us
E = 3 x Us(b)
UsC= Us
D = 4 x Us(b)
2 Nodes
UsA= Us
B = Us(b)3 Nodes
UsA= Us
B = UsC = 2 x Us(b)
4 Nodes
UsA= Us
D = 2 x Us(b)
UsB= Us
C = 3 x Us(b)
Generalized formUs
α= n Us(b) n = number of links an α hears carrying the same data packet for s
Generalized form of the analytical model for Usα
![Page 25: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/25.jpg)
Solution (9/14) Generalized form of the analytical model for Us
ρ (1/6)
G H I JF
A B C DE K
T1 T2 T3 T4
Consider the session s between AD
s consists of a single data packet
Total 3 transactions on links AB, BC & CD during T1-T2, T2-T3 & T3-T4 respectively
E-K are passive participants of s
![Page 26: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/26.jpg)
Solution (9/14)
G H I JF
A B C DE K
T1 T2
T1-T2: UsE = Us
F = UsG = Us
H = Us(b)
Generalized form of the analytical model for Usρ (2/6)
![Page 27: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/27.jpg)
Solution (9/14)
G H I JF
A B C DE K
T2 T3
T1-T2: UsE = Us
F = UsG = Us
H = Us(b)
T2-T3: UsG = Us
H = UsI = Us(b)
Generalized form of the analytical model for Usρ (3/6)
![Page 28: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/28.jpg)
Solution (9/14)
G H I JF
A B C DE K
T3 T4
T1-T2: UsE = Us
F = UsG = Us
H = Us(b)
T2-T3: UsG = Us
H = UsI = Us(b)
T3-T4: UsH = Us
I = UsJ = Us
K = Us(b)
Generalized form of the analytical model for Usρ (4/6)
![Page 29: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/29.jpg)
Solution (9/14)
G H I JF
A B C DE K
T1 T2 T3 T4
T1-T2: UsE = Us
F = UsG = Us
H = Us(b)
T2-T3: UsG = Us
H = UsI = Us(b)
T3-T4: UsH = Us
I = UsJ = Us
K = Us(b)
T1-T4: UsE = 1
Us(b)
UsF = 1
Us(b)
UsG = 2 Us(b) Us
H = 3 Us(b)
UsI = 2 Us(b) Us
J = 1 Us(b) UsK = 1 Us(b)
Generalized form of the analytical model for Usρ (5/6)
![Page 30: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/30.jpg)
Solution (9/14)
G H I JF
A B C DE K
T1 T2 T3
The relationship between UsG & Us(b) depends on the number of links
carrying the same packet for s
Similar relation holds for other passive participants too
T1-T4: UsE = 1
Us(b)
UsF = 1
Us(b)
UsG = 2 Us(b) Us
H = 3 Us(b)
UsI = 2 Us(b) Us
J = 1 Us(b) UsK = 1 Us(b)
Generalized form of the analytical model for Usρ (7/8)
![Page 31: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/31.jpg)
Solution (9/14)
Therefore we can write
Usα/ρ= n Us(b)
n = number of links an α/ρ hears carrying the same data packet for s
Generalized form of the analytical model for Usρ (8/8)
![Page 32: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/32.jpg)
Solution (10/14)
Each active participant has to measure Us
α= n Us(b) Us
ρ= n Us(b)
Each passive participant has to measureUs
ρ= n Us(b)
A session initialization request packet (SIREQ) is sent before a session starts
SIREQ containsThroughput requirement
List of active participants in the route
EstimateUs(b) from Info_1
Estimate the value of n
What to measure?
……….Info_1……….Info_2
………Trivial ………Explaining next
![Page 33: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/33.jpg)
Solution (11/14)
Let NH represent a neighbor of each node within 2–hop radius
Each node knows the following information about NH(1) NH’s geographical location(2) list of the NH’s neighbors and NH’s neighbors’ geographical locations(3) transmission ranges assigned to NH with its neighbors
Info_2 + Info_3
Estimate n
Estimate the value of n
Algorithm
……….Info_3
![Page 34: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/34.jpg)
Solution (12/14)
Let α be the active participant estimating the value of n
Initialize n to 0Makes a list of all active participants (APs) within 2-hop radius. The list (α1, α 2….. α k) including αFor each α i (α 1, α 2….. α k), add 1 to n if
α i = α
α i is neighbor as in Fig (1)
α i is a 2-hop neighbor as in Fig (2) & the TX range of α i+1 α i reaches α
α i is a neighbor as in Fig (3) & the TX range of α i α i+1 reaches α
Estimate n of Usα by an α, i.e. an α is estimating n for itself
αiαi+1 α
RTS, DATA
CTS, ACK CTS, ACK
αi+1αiαRTS, DATA
CTS, ACKRTS, DATA
αi αRTS, DATA
CTS, ACK
(1)
(2)
(3)
![Page 35: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/35.jpg)
Solution (13/14)
Let ρ be a passive participant of α
Initialize n to 0Makes a list of all APs within 2-hop radius of ρ The list (α1, α 2….. α k) including αFor each α i (α 1, α 2….. α k), add 1 to n if
α = α i & ρ is located as in Fig (1) & the TX range of α iα i+1 (α i+1α i) reaches ρ
α = α i & ρ is a 2-hop neighbor as in Fig (2) &the TX range of α i+1α i reaches ρ
α = α i & ρ is a 1-hop neighbor as in Fig (3) & the TX range of α i α i+1 reaches ρ
Estimate n of Usρ by an α, i.e. an α is estimating n for its passive neighbors
αi αi+1
ρ
RTS, DATA
CTS, ACK
CTS, ACK
αi+1αi
ρRTS, DATA
CTS, ACK
RTS, DATA
αi αi+1
RTS, DATA
CTS, ACK
(1)
(2)
(3)
ρCTS, ACKRTS, DATA
![Page 36: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/36.jpg)
Solution (14/14)
Let ρ be a passive participant overhearing a SIREQ
Initialize n to 0Makes a list of all APs within 2-hop radius of ρ The list (α1, α 2….. α k)For each α i (α 1, α 2….. α k), add 1 to n if
ρ is located as in Fig (1) & the TX range of α iα i+1 (α i+1α i) reaches ρ
α i is a 2-hop neighbor of ρ as in Fig (2) &the TX range of α i+1α i reaches ρ
α i is a 1-hop neighbor as in Fig (3) & the TX range of α i α i+1 reaches ρ
Estimate n of Usρ by a ρ, i.e. a ρ is estimating n for itself
αi αi+1
ρ
RTS, DATA
CTS, ACK
CTS, ACK
αi+1αi
ρRTS, DATA
CTS, ACK
RTS, DATA
αi αi+1
RTS, DATA
CTS, ACK
(1)
(2)
(3)
ρCTS, ACKRTS, DATA
![Page 37: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/37.jpg)
Simulation Setup
30 nodes on a 1500 × 1500 square meters flat terrainEach node had at most 6 neighborsEach simulation run consisted of at most 12 sessionsEach session was offered a load of 1 MbpsA new session was added every 2 secSimulation time for each test case was 50 secFor simplicity all sessions were of the same ACAll established sessions were executed till the end of the simulation runPath length of each route in each test case was fixedPath lengths among various test cases varied between 2-6The avg values of performance metrics were recorded at 1 sec interval
For performance evaluation
![Page 38: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/38.jpg)
Simulation Result (1/5)
SAHN-MAC & 802.11e have been compared with respect to End-to-end delayThroughput Delivery ratio
Delivery ratio is the percentage of data received successfully at the final destination
With the given configurations both SAHN-MAC & 802.11e performed similarly up to path length 3
![Page 39: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/39.jpg)
Simulation Result (2/5)
Path length = 5
Fairly stable
Not stable
![Page 40: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/40.jpg)
Simulation Result (3/5)
Path length = 5
Not stable
Fairly stable
![Page 41: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/41.jpg)
Simulation Result (4/5)
Path length = 5
Not stable
Fairly stable
![Page 42: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/42.jpg)
Simulation Result (5/5)
Additions of new sessions increased network load802.11e cannot stop the network from overloading since it does not have any admission control mechanismSAHN-MAC did not allow any session to initiate if the new session could choke ongoing sessionsThus SAHN-MAC maintains fairly stable network performance compared to 802.11e
Summary of performance evaluation
![Page 43: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/43.jpg)
Conclusion
Extended initial SAHN-MAC by considering neighboring nodes in bandwidth calculationSimulation results show SAHN-MAC can support fairly deterministic QoS which important for real-time trafficAt present we are extending SAHN-MAC for multiple frequency channels & directional antennasWe would also like to build a scheduling scheme at the MAC layer to handle different classes of traffic efficiently
![Page 44: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.](https://reader031.fdocuments.us/reader031/viewer/2022012922/56649d445503460f94a20c9b/html5/thumbnails/44.jpg)
Questions
Thank you