440 likes | 701 Views
Contention-based Directional MAC Protocols: A Survey. Date: 2009-07-14. Authors:. Taxonomy of Contention-based Directional MAC Protocols. CSMA/CA based protocols Data/ACKs are transmitted directionally. July 2009. Non-Circular Directional MAC Protocols. Slide 3. W. Y. Lee et. al.
E N D
Contention-based Directional MAC Protocols: A Survey Date: 2009-07-14 Authors: W. Y. Lee et. al
Taxonomy of Contention-based Directional MAC Protocols • CSMA/CA based protocols • Data/ACKs are transmitted directionally W. Y. Lee et. al
July 2009 Non-Circular Directional MAC Protocols Slide 3 W. Y. Lee et. al
Omni-directional RTS/ Omni-directional CTS W. Y. Lee et. al
A MAC protocol for mobile ad-hoc networks using directional antennas A.Nasipuri, S.Ye,J.You,R.E.Hiromoto, "A MAC protocol for mobile ad-hoc networks using directional antennas", In Proceedings of IEEE Wireless Communications and Networking Conference(WCNC), Chicago, IL, 2000 • Mulitple Non-circular Directional antennas Assumed • RTS is transmitted omni-directionally via all antennas(ORTS) W. Y. Lee et. al
A MAC protocol for mobile ad-hoc networks using directional antennas July 2009 If not intended receiver for the RTS, it blocks its antenna(s). Nodes overhearing RTS blocks its antennas => bad spatial reuse A.Nasipuri, S.Ye,J.You,R.E.Hiromoto, "A MAC protocol for mobile ad-hoc networks using directional antennas", In Proceedings of IEEE Wireless Communications and Networking Conference(WCNC), Chicago, IL, 2000 Slide 6 W. Y. Lee et. al
A MAC protocol for mobile ad-hoc networks using directional antennas July 2009 If intended receiver for the RTS, it transmits CTS omni-directionally via all antennas(OCTS) If not intended receiver for the CTS, it blocks its antenna(s). Nodes overhearing CTS blocks its antennas => bad spatial reuse A.Nasipuri, S.Ye,J.You,R.E.Hiromoto, "A MAC protocol for mobile ad-hoc networks using directional antennas", In Proceedings of IEEE Wireless Communications and Networking Conference(WCNC), Chicago, IL, 2000 Slide 7 W. Y. Lee et. al
A MAC protocol for mobile ad-hoc networks using directional antennas July 2009 The originators of RTS and CTS block all antennas except the one that is used for DATA/ACK. A.Nasipuri, S.Ye,J.You,R.E.Hiromoto, "A MAC protocol for mobile ad-hoc networks using directional antennas", In Proceedings of IEEE Wireless Communications and Networking Conference(WCNC), Chicago, IL, 2000 Slide 8 W. Y. Lee et. al
A MAC protocol for mobile ad-hoc networks using directional antennas • Event-driven simulator (M=# of antennas) W. Y. Lee et. al
A MAC protocol for mobile ad-hoc networks using directional antennas W. Y. Lee et. al
Directional RTS/ Omni-directional CTS W. Y. Lee et. al
Medium access control protocols using directional antennas in ad hoc networks YB Ko, V Shankarkumar, and NH Vaidya, “Medium access control protocols using directional antennas in ad hoc networks,” INFOCOM 2000, Tel Aviv, Israel, 2000, pp. 13 – 21. • DMAC: Directional MAC (the first “DMAC,” but its name has been shared by several descendants.) • Assumptions • Location information is determined by GPS (not in practice). • A node shares the location information withits neighbors. N38 º W 27º N39 º W 28º W. Y. Lee et. al
Medium access control protocols using directional antennas in ad hoc networks July 2009 • Since a source knows the destination’s location, it transmits RTS to the destination directionally (DRTS). • If nodes overhear the DRTS, they block their antenna. • Nodes in other direction of the DRTS can exploit spatial reuse. YB Ko, V Shankarkumar, and NH Vaidya, “Medium access control protocols using directional antennas in ad hoc networks,” INFOCOM 2000, Tel Aviv, Israel, 2000, pp. 13 – 21. ⅹ DRTS Source Destination ⅹ Slide 13 W. Y. Lee et. al
Medium access control protocols using directional antennas in ad hoc networks July 2009 • If the intended receiver receives the DRTS successfully, it responds with CTS omni-directionally (OCTS). • Nodes overhearing OCTS block their antennas. YB Ko, V Shankarkumar, and NH Vaidya, “Medium access control protocols using directional antennas in ad hoc networks,” INFOCOM 2000, Tel Aviv, Israel, 2000, pp. 13 – 21. ⅹ OCTS Destination OCTS OCTS ⅹ Source ⅹ OCTS Slide 14 W. Y. Lee et. al
Medium access control protocols using directional antennas in ad hoc networks • Spatial Reuse Improvement by using DRTS • Node D cannot transmit anything toward node C due to OCTS(C,B). • Since Node D’s RTS is directional to E, node D can initiate DRTS to node E. • Spatial reuse is improved by DRTS. E B C A D DRTS (B,C) OCTS (C,B) OCTS (C,B) DRTS(D,E) OCTS (E,D) OCTS (E,D) DATA DATA ACK ACK W. Y. Lee et. al
Medium access control protocols using directional antennas in ad hoc networks • Problems • Since B transmits DRTS directionally to C, node A does not aware of it. (deafness) • This creates significant collisions from A. D F A B C DRTS (B) DRTS (A) OCTS(B,C) OCTS(B,C) DATA DRTS (A) ACK W. Y. Lee et. al
Simulation (1/3) 5 10 15 20 25 4 9 14 19 24 3 8 13 18 23 2 7 12 17 22 1 6 11 16 21 NS-2based simulation Mesh topology No mobility Bulk TCP traffic based on several scenarios 2 Mbps links Two adjacent rows and two adjacent columns being separated by 200 meters Traffic model: FTP with infinite backlog at each source node TCP packet size: 1460 bytes Maximum advertised window is 8 packets July 2009 Slide 17 W. Y. Lee et. al
Simulation (2/3) 5 10 15 20 25 4 9 14 19 24 3 8 13 18 23 2 7 12 17 22 1 6 11 16 21 July 2009 Scenario 1 • Scenario 1 • In 802.11, communication of connections 1 and 2 cannot occur at the same time unlike in DMAC • Fairness in 802.11 is not good unlike in DMAC 1 2 Slide 18 W. Y. Lee et. al
Simulation (3/3) 5 10 15 20 25 4 9 14 19 24 3 8 13 18 23 2 7 12 17 22 1 6 11 16 21 July 2009 Scenario 2 • Better throughput at the DMAC since it exploits spatial reuse. 4 3 Slide 19 W. Y. Lee et. al
Medium access control protocols using directional antennas in ad hoc networks W. Y. Lee et. al
Directional RTS/ Directional CTS W. Y. Lee et. al
(5) (6) (1) (4) (2) (3) MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks M Takata, M Bandai and T Watanabe, "MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks," Proc. IEEE Goblecom 2007, pp.620-625, 2007 • DMAC/DA protocol • Each device maintains a neighbor table by communication history. • Device’s neighbor table maps each neighboring node’s ID with that device’s beam number. • Deafness duration: the time of Deafness (initiated by WTS), e.g., C notifies that C will be busy for Tc. • Link Activity: Latest transmission time from backlogged nodes (e.g., D and E). => WTS is necessary B C E D A W. Y. Lee et. al
MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks July 2009 • (1) DRTS • (2) DCTS • WTS is transmitted circularly to avoid deafness and hidden node problem • (3) WTS (Wait-to-Send) A->E and B->G • (4) WTS A->D • (5) DATA • (6) ACK M Takata, M Bandai and T Watanabe, "MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks," Proc. IEEE Goblecom 2007, pp.620-625, 2007 Slide 23 W. Y. Lee et. al
MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks • WTS (Wait To Send) message W. Y. Lee et. al
MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks • Simulation • Event Driven • Node: 100 (randomly distributed) • 1500x1500m • Transmission range • Omni: 250m • Directional: 500m • Data rate:11Mbps W. Y. Lee et. al
MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks NPN: Next Packet Notification (to increase throughput) PCS: Physical Carrier Sensing MDA: MAC protocol for Directional Antenna [12] • Simulation Result W. Y. Lee et. al
MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks W. Y. Lee et. al
July 2009 Circular Directional MAC Protocols Slide 28 W. Y. Lee et. al
Circular Directional RTS/ Directional CTS W. Y. Lee et. al
A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks • CRTS protocol maintains location table • Through Circular RTS, each node records location table. July 2009 T. Korakis, G. Jakllari, and L. Tassiulas, "A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks," Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp.98–107, June 2003. Rx beam 4 Circular RTS (B with Tx beam 2) Tx beam 2 A B Slide 30 W. Y. Lee et. al
A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks July 2009 • CRTS protocol • Source node transmits RTS circularly. • Destination node transmits CTS directionally toward RTS originator. • Nodes behind the destination does not aware of it. • Node receiving either RTS orCTS blocks its corresponding antenna. T. Korakis, G. Jakllari, and L. Tassiulas, "A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks," Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp.98–107, June 2003. Circular DRTS DCTS Slide 31 W. Y. Lee et. al
A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks July 2009 • Problem of CRTS protocol • Since DCTS does not inform nodes behind the destination node, collision may occur (hidden node problem) T. Korakis, G. Jakllari, and L. Tassiulas, "A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks," Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp.98–107, June 2003. Circular DRTS Collision DCTS Slide 32 W. Y. Lee et. al
A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks • Simulation • Event driven simulation • Physical channel is error free • Propagation delay is zero • Packet length is constant and equal to 1024 bytes • The packet arrival at each station is a Poisson process with the same mean • Each simulation runs for 200 seconds with a warm up period of 50 seconds. July 2009 Slide 33 W. Y. Lee et. al
A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks • Simulation • Scenario 1 July 2009 • A and B are • communicating • DMAC: Since either DRTS from A or • OCTS from B does not reach to C, C • can continuously transmit RTS to B • (Hidden node problem) • CRTS: Since A’s CRTS inform C of • communication with B, C suppress its • RTS. (2) Now, C is trying to send RTS to B Slide 34 W. Y. Lee et. al
A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks W. Y. Lee et. al
Circular Directional RTS/ Circular Directional CTS W. Y. Lee et. al
Handling Asymmetry in Gain in Directional Antenna Equipped Ad Hoc Networks July 2009 • CRCM (Circular RTS and CTS MAC) protocol • Source transmits RTS circularly • Destination sends CTS circularly • Circular CTS is partially transmitted to non-overlapping region of CRTS to reduce overhead. • Node receiving either RTS or CTS blocks its corresponding antenna. • Circular RTS/CTS reducesDeafness andhidden node problems. G Jakllari, J Broustis, T Korakis,S V. Krishnamurthy, and L Tassiulas, "Handling Asymmetry in Gain in Directional Antenna Equipped Ad Hoc Networks," Proc. IEEE 16th International Symposium on PIMRC, pp.1284-1288, 2005 Location of RTS originator is determined by location table Circular CTS Circular RTS Slide 37 W. Y. Lee et. al
Handling Asymmetry in Gain in Directional Antenna Equipped Ad Hoc Networks • Location tracking and maintenance • Using location table, relative location of nodes can be figured out. • Under the following scenario, node C needs to block beams 2 and 4. 4 4 W. Y. Lee et. al
Handling Asymmetry in Gain in Directional Antenna Equipped Ad Hoc Networks RTS 1 2 3 4 • Simulation • Opnet ver. 10.0 • 4 nodes in the line Scenario: Node 2 initiates communication to node 3. Now, node 4 tries to send RTS to node 3 in CRTS protocol. Throughput of CRCM is better than CRTS. W. Y. Lee et. al
Handling Asymmetry in Gain in Directional Antenna Equipped Ad Hoc Networks W. Y. Lee et. al
Comparison of Directional MAC Protocols W. Y. Lee et. al
References [1] A.Nasipuri, S.Ye,J.You, R.E.Hiromoto, "A MAC protocol for mobile ad-hoc networks using directional antennas", In Proceedings of IEEE Wireless Communications and Networking Conference(WCNC), Chicago, I L, 2000 [2] YB Ko, V Shankarkumar, and NH Vaidya, “Medium access control protocols using directional antennas in ad hoc networks,” INFOCOM 2000, Tel Aviv, Israel, 2000, pp. 13 – 21. [3] R. R. Choudhury and NH Vaidya, “Deafness: a mac problem in ad hoc networks when using directional antennas,” ICNP 2004, pp. 283 – 292. [4] R. R. Choudhury, X. Yang, R. Ramanathan and NH Vaidya, “On designing MAC protocols for wireless networks using directional antennas,” IEEE Trans. Mobile Computing, Volume 5, Issue 5, May 2006, pp.477 – 491 [5] R.R. Choudhury, X. Yang, N.H. Vaidya, and R. Ramanathan, “Using Directional Antennas for Medium Access Control in Ad Hoc Networks,” Proc. ACM MobiCom, June 2002 [6] M. Takata, M. Bandai and T. Watanabe, "MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks," Proc. IEEE GLOBECOM, pp.620-625, 2007 [7] R. Ramanathan, "Ad Hoc Networking With Directional Antennas: A Complete System Solution," IEEE JSAC 2005, vol.23, no.3 , pp.496-506, Mar 2005 [8] G. Jakllari, J. Broustis, T. Korakis,S V. Krishnamurthy, and L. Tassiulas, "Handling Asymmetry in Gain in Directional Antenna Equipped Ad Hoc Networks," Proc. IEEE 16th International Symposium on PIMRC, pp.1284-1288 W. Y. Lee et. al
[9] F. Yildirim and H. Liu, "Directional MAC for 60 GHz using Polarization Diversity Extension (DMAC-PDX)," Proc. IEEE GLOBECOM, pp.4697-4701, 2007 [10] G. Li, L.L. Yang, "On Utilizing Directional Antenna in 802.11 Networks: Deafness Study," Proc. IEEE COMSWARE 2007, pp. 1-6, Jan 2007 [11] A P Subramanian and S R. Das, "Addressing Deafness and Hidden Terminal Problem in Directional Antenna based Wireless Multi-Hop Networks," Proc. IEEE COMSWARE,pp. 1-6, Jan. 2007 [12] H. Gossain, C. Cordeiro and D. P. Agrawal, “MDA: An Efficient Directional MAC scheme for Wireless Ad Hoc Networks,” Proc. IEEE GLOBECOM, Nov. 2005. [13] T. Korakis, G. Jakllari, and L. Tassiulas, "A A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks", Proc. ACM MobiHoc 2003, 2003 [14] T. Korakis, G. Jakllari, and L. Tassiulas, "CDR-MAC: A Protocol for Full Exploitation of Directional Antennas in Ad Hoc Wireless Networks," IEEE Transactions on Mobile Computing, Vol.7, No.2, Feb 2008. [15] M. Taksata, M. Bandai, and T. Watanabe, "A Directional MAC Protocol with Deafness Avoidance in Ad Hoc Networks," IEICE Trans. Commun, Vol.E90-B, No.4, APR 2007 [16] M. Takata, M. Bandai, and T. Watanabe, “Performance analysis of a directional MAC protocol for location information staleness in MANETs,” IPSJ J., vol.46, no.11, pp.2623–2632, Nov. 2005. [17] J. Wang, Y. Fang, and D. Wu, “SYN-DMAC: A directional MAC protocol for ad hoc networks with synchronization,” Proc. IEEE Military Communications Conference (MILCOM), pp.2258–2263, Oct. 2005. [18] M. Takata, K. Nagashima, and T. Watanabe, “A dual access mode MAC protocol for ad hoc networks using smart antennas,” Proc. IEEE International Conference on Communications (ICC), pp.4182–4186, June 2004. W. Y. Lee et. al