Upload
evan-henderson
View
212
Download
0
Embed Size (px)
Citation preview
Tackling Exposed Node Problem in IEEE 802.11 Mac
Deepanshu Shukla(01329004)
Guide:
Dr. Sridhar Iyer
Wireless LAN
Physical layer impactImpact of Interference range
Hidden Terminal ProblemExposed Node
Physical Layer
Medium Communicate over a medium significantly less reliable than
wired PHYs. Medium is a scarce commodity Lack full connectivity
Transmission Have time-varying and asymmetric propagation properties Due to propagation limits, collision may not be ‘sensed’ by
some nodes Fix Range
Have Carrier sense threshold and Receive threshold If packet below receive threshold, it is marked as in error and
passed to MAC. Packets below carrier sense threshold are ignored by PHY
layer
Effect of Interference Range
Transmission from 1 2 will fail
Hidden Terminal Problem
A
BC
Hidden terminals A and C cannot hear each other. A sends to B, C cannot receive A. C wants to send to B, C senses a “free” medium (CS fails) Collision occurs at B. A cannot receive the collision (CD fails). A is “hidden” for C.
Solution? Hidden terminal is peculiar to wireless (not found in wired) Need to sense carrier at receiver, not sender! “virtual carrier sensing”: Sender “asks” receiver whether it
can hear something. If so, behave as if channel busy.
Exposed Node Scenario
Exposed Terminal Problem
Exposed terminals A starts sending to B. S1 senses carrier, finds medium in use and has to wait for
AB to end. D is outside the range of A, therefore waiting is not
necessary. A and C are “exposed” terminals.
A->B and S2->anyNode transmissions can be parallel; no collisions
NOT allowed under IEEE 802.11
Refer figure 3.2
Effect of RTS/CTS on NAV
•Timing info contained in RTS
3*SIFS+Packet Time+2*RTS_TX_Time
Proposed Solution
Maintain neighborhood informationIdentify Exposed NodeProcess timing informationSynchronize ACK Schedule DATA transmission
Identify Exposed Nodes
Node hears RTS corresponding DATA
Process Timing Info
Upon hearing RTS Record Recv. Time
Upon hearing DATA Record Recv. Time
Calculate “Propagation Delay” Difference of the advertised time and actual time.
Calculate following expected time of ACK time required for DATA Delay required to synchronize ACK
Transmit DATA
Is Exposed Node? YES Does network Layer has data? YES Check the Size of DATA
Is it less than the ongoing data size? YES Check the Destination of DATA
Is it Broadcast? NO Addressed to already busy node? NO
Calculate the time of transmission of ACK (from RTS duration and propagation delay)
Schedule DATA packet transmission after the calculated delay
Modification to packets
RTS Requires no change
CTS / ACK IEEE 802.11 CTS does not have TA (Transmitter's Address) Added to maintain neighborhood information
DATA Add “isExposed ”, 1- bit flag No such bit in IEEE 802.11
Simulation Topologies
4-6-8 Node, single hop 5 Node, multi hop
Simulation Results
Multi hop Scenario – 5 Nodes Single hop Scenario – 6 Nodes
Limitation of algorithm
Reverse exposed node
Effect of interference range
Related Work - MACAP
Introduce a ‘Control Phase’ Use additional control packet RTS’ Add 2-byte fields TACK, TDATA to RTS & CTS and “inflexible bit” to
RTS
Conclusion
Exposed nodes play a major role bandwidth underutilization, especially in case of multi hop scenario, as shown by the performance increase.
The Medium lays down various constraints and coming up with optimum PHY layer parameters is important.
The increase in performance is substantial to further investigate this problem in case of “Reverse Exposed” nodes
Thank you.