1 / 14

New Protocol to Solve the Deadlock of IEEE802.15.4 MAC

This contribution proposes an enhanced MAC protocol to solve the deadlock problems in IEEE802.15.4, achieving high throughput and maintaining high energy efficiency.

aart
Download Presentation

New Protocol to Solve the Deadlock of IEEE802.15.4 MAC

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [New Protocol to Solve the Deadlock of IEEE802.15.4 MAC] Date Submitted: [Sept. 2004] Source: [Liang Li, Xin Wang, Chenyang Yang, Zhijian Hu ] Company: [WXZJ Inc.] Address: [Building D, No.2, Shangdi XinXi Lu, Beijing, China 100085 ] Voice:[], E-Mail:[liang_1@yahoo.com] Re: [ IEEE 802.15.4b ] Abstract: [This contribution proposes an enhanced MAC for TG4.] Purpose: [Response to the call for proposal of IEEE 802.15.4b, Doc Number: 15-04-0366-00-004b] Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15. Liang Li, WXZJ Inc./Helicomm

  2. Proposal • Enhance the IEEE802.15.4 CSMA/CA algorithm • Solving the deadlock problems • Achieving the High throughput • Keeping the High energy efficiency Liang Li, WXZJ Inc./Helicomm

  3. Deadlock in ad hoc • The two nodes transmit the data to each other and are hard to receive the data from the other each other. • Ref IEEE802.15-04-0366 for the description of deadlock Liang Li, WXZJ Inc./Helicomm

  4. State Chart with current CSMA/CA • Once one node enters this circle, it can not receive the data frames until it transmits the data successfully or abandons the transmission. Liang Li, WXZJ Inc./Helicomm

  5. The Deadlock in the States Viewpoint • When a node is in State 1, it can’t receive the data from the nodes within State 2, nor it sends the ack to nodes within State 3. • When a node is within State 2, it will make other nodes failed to contend the channel. • When a node is within State 3, it can’t receive the data from the nodes in State 2. Liang Li, WXZJ Inc./Helicomm

  6. New CSMA/CA: Monitoring the Channel and Adding the Backoff Counter • Set the node within State 1 and may monitor the channel and receive the data , then send the acknowledgement back. The backoff counter is introduced. • The deadlock circle may be broken in such way. Liang Li, WXZJ Inc./Helicomm

  7. The Flowchart of the CSMA/CA Liang Li, WXZJ Inc./Helicomm

  8. The Simple Explanation to the New CSMA/CA Algorithm • The node should decrease the backoff counter if the channel is idle, otherwise it should pause the decreasing of the backoff counter. • When there is packet transmitting in the channel, the node who is in backoff state will detect a busy channel. The backoff counter of this node will not decrease in this period. When the packet has been received, the node will process the packet first and send back the ACK if necessary. Then the backoff counter will continue to decease since the channel is idle. Liang Li, WXZJ Inc./Helicomm

  9. The Multiple-Response of the Two Nodes (1) Liang Li, WXZJ Inc./Helicomm

  10. The Multiple-response of the Two Nodes (2) • Node A & B begin the backoff procedure simultaneous. Node A finishes the backoff first and begins its transmission. • Node B will receive the packet that transmitted by Node A and don’t decrease its own backoff counter. • Node B send back the ACK after the receiving and enter the backoff state again. Liang Li, WXZJ Inc./Helicomm

  11. Simulation with new MAC Protocol (1) • We test our new mac protocol in a linear ad hoc networks. • The throughput and energy-efficiency have been tested. • The throughput is defined as the end-to-end throughput when packets are transmitted in multihop. Liang Li, WXZJ Inc./Helicomm

  12. Simulation (2) : Throughput • Because the new protocol can reduce the collision of the packet,the throughput of the new mac protocol has been improved dramatically. Liang Li, WXZJ Inc./Helicomm

  13. Simulation (3) : Energy Efficiency • Because the new mac protocol can reduce the probability of the collision, the energy used for retransmission can be saved. Hence the energy efficiency of new man is better than the current ones. Liang Li, WXZJ Inc./Helicomm

  14. Conclusion • The backoff counter is introduced to break the deadlock circle. Each node needs to monitor the coming data. • This modification can improve the throughput of the network and achieve the better energy efficiency. Liang Li, WXZJ Inc./Helicomm

More Related