Problems in Ad Hoc channel Access

Embed Size (px)

Citation preview

  • 8/10/2019 Problems in Ad Hoc channel Access

    1/7

    AbstractIn this term paper , I am going to discuss in

    detail the various parameters related to An ad-hoc

    network. Ad-hoc network is a self-organized and

    distributed entity consisting of a number of mobile

    stations (MS) without the coordination of any centralized

    access point. Clustering is one of the fundamental

    problems in ad hoc networks. In this context, we describea distributed clustering algorithm for multihop ad hoc

    networks. We first propose a randomized control channel

    broadcast access method to maximize the worst-case

    control channel efficiency, based on which a distributed

    clustering algorithm is proposed. Both theoretical

    analysis and simulations indicate that the proposed

    clustering algorithm takes much less time and overhead to

    cluster a given network with more stable cluster

    structure, while incurring very small maintenance

    overhead in a dynamic resulting from the mobility of the

    MS. Network. Three types of collision-free channelaccess protocols for ad-hoc networks are presented.

    These protocols are derived from a novel approach to

    contention resolution that allows each node to elect

    deterministically one or multiple winners for channel

    access in a given contention context (e.g., a timeslot),

    given the identifiers of its neighbors one and two

    hopsaway. The new protocols are shown to be fair and

    capable of achieving maximum utilization of the channel

    bandwidth.The delay and throughput characteristics of

    the contentionresolution algorithms are analyzed, and the

    performance of the three types of channel access

    protocols is studied by simulations

    Introduction

    In this term paper we are going to discuss about the

    various problems faced in adhoc networks. HiddenTerminal Problem in which Two nodes transmit

    concurrently data to the same receiver which causes the

    collision between the nodes. It can be prevented by using

    control messages. Another problem faced in the ad-hoc

    network is Exposed node problem in which overhearing

    data transmission from neighboring nodes

    take place. To overcome this problem we use separate

    control and data channels or directional antennas.there

    are many more problems faced in ad-hoc networks such

    as Receiver-Initiated MAC protocols in which receiver

    informs sender that it is ready to receive data but there

    are possibilities that no way of knowing for sure that

    sender has data to send.Other problem such as Sender-Initiated MAC protocols in which sender informs receiver

    it has data to send receiver confirms it is ready to receive

    but control messages: RTS-CTS.

    Problems in Ad Hoc Channel Access

    Hidden Terminal Problem

    This is a well-known problem found in contention-

    based protocols, such as pure ALOHA, slotted

    ALOHA, CSMA, IEEE 802.11, etc. Two nodes are

    said to be hidden from one another (out of signalrange) when both attempt to send information to the

    same receiving node, resulting in a collision of data

    at the receiver node (seeFigure 4.1).

    Taufeeq Malik

    Lovely Professional University

    Problems in Ad Hoc channel Access

  • 8/10/2019 Problems in Ad Hoc channel Access

    2/7

    Solution Hidden Terminal Problem

    To avoid collision, all of the receiver's neighboring

    nodes need to be informed that the channel will be

    occupied. This can be achieved by reserving the

    channel using control messages, that is, using a

    handshake protocol. An RTS (Request To Send)

    message can be used by a node to indicate its wish

    to transmit data. The receiving node can allow this

    transmission by sending a grant using the CTS

    (Clear To Send) message. Because of the broadcastnature of these messages, all neighbors of the sender

    and receiver will be informed that the medium will

    be busy, thus preventing them from transmitting and

    avoiding collision. Figure 4.2illustrates the concept

    of the RTS-CTS approach.

    Figure 4.2. Using an RTS-CTS handshake to

    resolve hidden node problems

    Shortcomings of the RTS-CTS Solution

    The RTS-CTS method is not a perfect solution to

    the hidden terminal problem. There will be cases

    when collisions occur and the RTS and CTS control

    messages are sent by different nodes. As shown in

    Figure 4.3, node B is granting a CTS to the RTS

    sent by node A. However, this collides with the RTS

    sent by node D at node C. Node D is the hidden

    terminal from node B. Because node D does not

    receive the expected CTS from node C, itretransmits the RTS. When node A receives the

    CTS, it is not aware of any collision at node C and

    hence it proceeds with a data transmission to node

    B.

    Fi gure 4.3. The incompleteness of the RTS-CTS method.

  • 8/10/2019 Problems in Ad Hoc channel Access

    3/7

    Another problematic scenario occurs when multiple

    CTS messages are granted to different neighboring

    nodes, causing collisions. As shown in Figure 4.4,

    two nodes are sending RTS messages to different

    nodes at different points in time. Node A sends an

    RTS to node B. When node B is returning a CTS

    message back to node A, node C sends an RTS

    message to node B. Because node C cannot hear theCTS sent by node B while it is transmitting an RTS

    to node D, node C is unaware of the communication

    between nodes A and B. Node D proceeds to grant

    the CTS message to node C. Since both nodes A

    and C are granted transmission, a collision will occur

    when both start sending data.

    F igure 4.4. Another il lustration of the RTS-CTS

    problem.

    Exposed Node Problem

    Overhearing a data transmission from neighboring

    nodes can inhibit one node from transmitting to

    other nodes. This is known as the exposed node

    problem. An exposed node is a node in range of the

    transmitter, but out of range of the receiver. This is

    illustratedFigure4.5.

    Solution

    A solution to the exposed node problem is the use of

    separate control and data channels or the use of

    directional antennas. The former will be discussed in

    the PAMAS and DBTMA sections. Figure 4.6a

    shows that a mobile node using an omni-directional

    antenna can result in several surrounding nodesbeing "exposed," thus prohibiting them from

    communicating with other nodes. This lowers

    network availability and system throughput.

    Alternatively, if directional antennas are employed,

    this problem can be mitigated. As shown in Figure

    4.6b, node C can continue communicating with the

    receiving palm pilot device without impacting the

    communication between nodes A and B. The

    directivity provides spatial and connectivity isolation

    not found in omni-directional antenna systems.

    Figure 4.6. Using a directional antenna to resolve

    the exposed node problem.

  • 8/10/2019 Problems in Ad Hoc channel Access

    4/7

  • 8/10/2019 Problems in Ad Hoc channel Access

    5/7

    CTS packet is overheard so as to temporarily limit

    power output when a CTS packet is overheard.

    Figure 4.9. An illustration of the control

    handshake used in MACA

    Collisions do occur in MACA, especially during the

    RTS-CTS phase. There is no carrier sensing in

    MACA. If two or more stations transmit an RTS

    concurrently, resulting in a collision, these stations

    will wait for a randomly chosen interval and try

    again, doubling the average interval on every

    attempt. The station that wins the competition willreceive a CTS from its responder, thereby blocking

    other stations to allow the data communication

    session to proceed.

    MACA-BI (By Invitation)

    A shift from the classic three-way handshake MAC

    protocol is MACA-BI (By Invitation). Invented by

    Fabrizio Talucci, MACA-BI uses only a two-way

    handshake, as shown in Figure 4.10. There is no

    RTS. Instead, the CTS message is renamed as RTR

    (Ready To Receive). In MACA-BI, a node cannot

    transmit data unless it has received an invitation

    from the receiver. Note that the receiver node does

    not necessarily know that the source has data to

    transmit. Hence, the receiver needs to predict if

    indeed the node has data to transmit to it. Thetimeliness of the invitation will, therefore, affect

    communication performance.

    Fi gure 4.10. An ill ustration of MACA-BI control

    handshake.

    The author suggested the estimation of packet queue

    length and arrival rate at the source to regulate the

    transmission of invitations. One possible way to

    accomplish this is to piggyback such information

    into each data packet so that the receiver is aware of

    the transmitter's backlog. Hence, for constant bitrate (CBR) traffic, the efficiency of MACA-BI will

    be high since the prediction scheme will work fine.

    However, for bursty traffic, MACA-BI performance

    will be no better than MACA. To enhance the

    communication performance of MACA-BI under

    non-stationary traffic situations, a node may still

    transmit an RTS if the transmitter's queue length or

    packet delay exceeds a certain acceptable threshold

    before an RTR is issued.

  • 8/10/2019 Problems in Ad Hoc channel Access

    6/7

    Power-Aware Multi-Access Protocol with

    Signaling (PAMAS)

    The Power-Aware Multi-Access Protocol with

    Signalling for ad hoc networks (PAMAS)[17] is

    based on the MACA protocol with the addition of a

    separate signalling channel. RTS-CTS dialogue

    exchanges occur over this channel. PAMASconserves battery power by selectively powering off

    nodes that are not actively transmitting or receiving

    packets.

    In PAMAS, nodes are required to shut themselves

    off if they are overhearing other transmissions not

    directed to them. In addition, each node makes an

    independent decision about whether to power off its

    transceiver. The conditions that force a node to

    power off include:

    a. If a node has no packets to transmit, it

    should power off if one of its neighboring

    nodes is transmitting.

    b. If a node has packets to transmit, but at least

    one of the neighboring nodes is transmitting

    and another is receiving, then it should

    power off its transceiver.

    Dual Busy Tone Multiple Access (DBTMA)

    The use of a busy tone [18] was first proposed by

    Professor Fouad Tobagi from Stanford University.

    He proposed Busy Tone Multiple Access (BTMA)

    to solve the hidden terminal problem. However,

    BTMA relies on a wireless last-hop network

    architecture, where a centralized base station servesmultiple mobile hosts. When the base station is

    receiving packets from a specific mobile host, it

    sends out a busy tone signal to all other nodes within

    its radio cell. Hence, hidden terminals sense the busy

    tone and refrain from transmitting.

    (1) Fi gure 4.13. The pri nciple of Dual Busy Tone

    Multi ple Access (DBTMA).

    In DBTMA (Dual Busy Tone Multiple Access)[19]

    [20], two out-of-band busy tones are used to notify

    neighboring nodes of any on-going transmission. In

    addition, the single shared channel is further split

    into data and control channels. Data packets are sent

    over the data channel, while control packets (such as

    RTS and CTS) are sent over the control channel.Specifically, one busy tone signifies transmit busy,

    while another signifies receive busy. These two busy

    tones are spatially separated in frequency to avoid

    interference.

  • 8/10/2019 Problems in Ad Hoc channel Access

    7/7

    Conclusion

    We discussed main issues of MAC layer and Routing

    protocols of network layer. These two layers play most

    important role in improving the performance of MANET.

    The future is PERVASIVE MANET[12]. cross-layer

    policies is a very promising direction, which can be

    further explored. Cross-layering can tackle the traffic in

    better manner on ad hoc networks by sharing information

    from different layers . Moreover, information collected at

    a particular layer (e.g., a route failure) can be exploited

    by different layers to tune the protocol behavior. The

    future of ad hoc networks is really appealing, giving the

    vision of anytime, anywhere and cheap

    communications. Before those imagined scenarios come

    true, huge amount of work is to be done in both research

    and implementation. At present, the general trend in

    MANET is toward mesh architecture and large scale.

    Improvement in bandwidth and capacity is required,

    which implies the need for a higher frequency and betterspatial spectral reuse. Propagation, spectral reuse, and

    energy issues support a shift away from a single long

    wireless link (as in cellular) to a mesh of short links (as in

    ad hoc networks). Large scale ad hoc networks are

    another challenging issue in the near future which can be

    already foreseen. As the evolvement goes on, especially

    the need of dense deployment such as battlefield and

    sensor networks, the nodes in ad hoc networks will be

    smaller, cheaper, more capable, and come in all forms. In

    all, although the widespread deployment of ad hoc

    networks is still year away, the research in this field will

    continue being very active and imaginative. Futureresearch makes it possible to Imagine a wireless mesh of

    rooftop-mounted ad hoc routers; an ad hoc network of

    cars for instant traffic and other information; sensors and

    robots forming a multimedia network that allows remote

    visualization and control; multiple airborne routers (from

    tiny robots to blimps) automatically providing

    connectivity and capacity where needed like in a football

    game; in an ad hoc network of spacecraft around and in

    transit between the Earth and mars .These may seem like

    science fiction, but a lot of work is in Process seriously

    by the ad hoc research

    Bibliography

    http://www.jatit.org/volumes/research-

    papers/Vol8No1/2Vol8No1.pdf

    http://www.sandilands.info/sgordon/doc/jayasuriya2004-

    hidden.pdf

    https://www.google.co.in/webhp?sourceid=chrome-

    instant&ion=1&espv=2&ie=UTF-

    8#q=future%20scope%20of%20ad%20hoc%20network

    http://rimtengg.com/coit2007/proceedings/pdfs/27.pdf

    http://en.wikipedia.org/wiki/Wireless_ad_hoc_network

    http://www.journals.elsevier.com/ad-hoc-networks/

    http://www.techterms.com/definition/adhocnetwork

    http://www.slideshare.net/somarka/efficient-route-

    discovery-in-mobile-ad-hoc-network

    http://technav.ieee.org/tag/72/ad-hoc-networks

    http://www.jatit.org/volumes/research-papers/Vol8No1/2Vol8No1.pdfhttp://www.jatit.org/volumes/research-papers/Vol8No1/2Vol8No1.pdfhttp://www.jatit.org/volumes/research-papers/Vol8No1/2Vol8No1.pdfhttp://www.sandilands.info/sgordon/doc/jayasuriya2004-hidden.pdfhttp://www.sandilands.info/sgordon/doc/jayasuriya2004-hidden.pdfhttp://www.sandilands.info/sgordon/doc/jayasuriya2004-hidden.pdfhttps://www.google.co.in/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=future%20scope%20of%20ad%20hoc%20networkhttps://www.google.co.in/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=future%20scope%20of%20ad%20hoc%20networkhttps://www.google.co.in/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=future%20scope%20of%20ad%20hoc%20networkhttps://www.google.co.in/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=future%20scope%20of%20ad%20hoc%20networkhttp://rimtengg.com/coit2007/proceedings/pdfs/27.pdfhttp://rimtengg.com/coit2007/proceedings/pdfs/27.pdfhttp://en.wikipedia.org/wiki/Wireless_ad_hoc_networkhttp://en.wikipedia.org/wiki/Wireless_ad_hoc_networkhttp://www.journals.elsevier.com/ad-hoc-networks/http://www.journals.elsevier.com/ad-hoc-networks/http://www.techterms.com/definition/adhocnetworkhttp://www.techterms.com/definition/adhocnetworkhttp://www.slideshare.net/somarka/efficient-route-discovery-in-mobile-ad-hoc-networkhttp://www.slideshare.net/somarka/efficient-route-discovery-in-mobile-ad-hoc-networkhttp://www.slideshare.net/somarka/efficient-route-discovery-in-mobile-ad-hoc-networkhttp://technav.ieee.org/tag/72/ad-hoc-networkshttp://technav.ieee.org/tag/72/ad-hoc-networkshttp://technav.ieee.org/tag/72/ad-hoc-networkshttp://www.slideshare.net/somarka/efficient-route-discovery-in-mobile-ad-hoc-networkhttp://www.slideshare.net/somarka/efficient-route-discovery-in-mobile-ad-hoc-networkhttp://www.techterms.com/definition/adhocnetworkhttp://www.journals.elsevier.com/ad-hoc-networks/http://en.wikipedia.org/wiki/Wireless_ad_hoc_networkhttp://rimtengg.com/coit2007/proceedings/pdfs/27.pdfhttps://www.google.co.in/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=future%20scope%20of%20ad%20hoc%20networkhttps://www.google.co.in/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=future%20scope%20of%20ad%20hoc%20networkhttps://www.google.co.in/webhp?sourceid=chrome-instant&ion=1&espv=2&ie=UTF-8#q=future%20scope%20of%20ad%20hoc%20networkhttp://www.sandilands.info/sgordon/doc/jayasuriya2004-hidden.pdfhttp://www.sandilands.info/sgordon/doc/jayasuriya2004-hidden.pdfhttp://www.jatit.org/volumes/research-papers/Vol8No1/2Vol8No1.pdfhttp://www.jatit.org/volumes/research-papers/Vol8No1/2Vol8No1.pdf