MAC Protocols for Directional Antenna: A Survey

Download Report

Transcript MAC Protocols for Directional Antenna: A Survey

doc.: IEEE 802.11-09/0797r2
July 2009
Topology Considerations on Contentionbased Directional MAC Simulation
Date: 2009-07-14
Authors:
Name
Company
Address
Woo Yong Lee
ETRI
South Korea
[email protected]
Seung Eun Hong
ETRI
South Korea
[email protected]
Yongsun Kim
ETRI
South Korea
[email protected]
Hyun Kyu Chung
ETRI
South Korea
[email protected]
Sungrae Cho
Chung-Ang
University
Chung-Ang
University
Chung-Ang
University
South Korea
[email protected]
South Korea
[email protected]
South Korea
[email protected]
Laihyuk Park
Hyuntaek Lim
Submission
Slide 1
Phone email
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Impact of Topology on Simulation of
Contention-based Directional MAC (1/2)
• Topology and Service Scenario of Directional MAC
observes different behaviors in simulation.
• For example, CRTS and CRCM have been tested under
different topology.
CRTS proposed by T. Korakis, G. Jakllari, and L. Tassiulas, "A MAC protocol for full exploitation of directional antennas in ad-hoc wireless
networks," Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp.98–107, June 2003.
CRCM proposed by G Jakllari, J Broustis, T Korakis,S V. Krishnamurthy, and L Tassiulas, "Handling Asymmetry in Gain in Directional
Antenna Equipped Ad Hoc Networks," Proc. IEEE 16th International Symposium on PIMRC, pp.1284-1288, 2005
M Takata, M Bandai and T Watanabe, "MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks," Proc. IEEE
Goblecom 2007, pp.620-625, 2007
1
2
3
Randomly distributed 100 Nodes
in 1500x1500m
4
<4 nodes in linear topology>
Submission
<Randomly distributed topology>
Slide 2
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Impact of Topology on Simulation of
Contention-based Directional MAC (1/2)
• We observe the throughput performance of the two is
reversed with different topology
CRCM
CRTS
<Randomly distributed topology>
<4 node in linear topology>
• => Hence, a standardized approach is necessary.
Submission
Slide 3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Three Performance Indices need to be
analyzed
• Deafness problem (e.g., deafness ratio)
• Hidden node problem (e.g., failure rate due to hidden
nodes)
• Spatial reuse
Submission
Slide 4
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
Deafness Problem
• Definition: deafness occurs if a device does not answer
an RTS message addressed to it.
• Consequences: originator of the RTS will try more
RTSs while increasing contention window, during
which messages toward other devices are subject to be
blocked.
• Two examples
Submission
doc.: IEEE 802.11-09/0797r2
July 2009
Deafness Example #1
• Assume 3 nodes.
1
2
A
4
1
3
2
1
X
4
Submission
2
B
3
4
Slide 6
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Deafness Example #1
• Node A has a data to send B.
• A sends DRTS.
1
2
A
4
1
3
2
DRTS
1
X
4
Submission
2
B
3
4
Slide 7
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Deafness Example #1
• Node B responds with DCTS.
1
2
A
4
1
3
2
DCTS
1
X
4
Submission
2
B
3
4
Slide 8
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Deafness Example #1
• Other beams except one in communication are blocked.
1
2
A
4
1
3
2
In Communication
1
X
4
Submission
2
B
3
4
Slide 9
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Deafness Example #1
• Now, node X has a data to send A, it will send DRTS to
A. (node A is deaf now.)
Deafness
1
2
A
DRTS
1
4
3
2
1
X
4
Submission
2
B
3
4
Slide 10
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Deafness Example #2
• Four nodes.
• Now, node S has a data to send D.
1
1
2
A
4
2
D
4
3
1
3
2
B
4
1
3
2
S
4
Submission
3
Slide 11
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Deafness Example #2
• Four nodes.
• Now, node S has a data to send D.
1
1
2
A
4
2
D
4
3
1
3
2
B
4
1
2
3
DRTS
S
4
Submission
3
Slide 12
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Deafness Example #2
• Nodes A and B overhear the DRTS from S.
• Nodes A and B block their beams 3 and 4, respectively.
1
1
2
A
4
2
D
4
3
1
3
2
B
4
1
2
3
DRTS
S
4
Submission
3
Slide 13
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Deafness Example #2
• Node D responds with DCTS.
• Node B overhears the DCTS and blocks beam 2.
1
1
2
A
4
2
D
4
3
1
3
2
B
4
1
2
3
DCTS
S
4
Submission
3
Slide 14
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Deafness Example #2
• Nodes S and D are in communication.
1
1
2
A
4
2
D
4
3
1
3
2
B
4
1
2
3
In Communication
S
4
Submission
3
Slide 15
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Deafness Example #2
• Now, B has a data to A, so it sends DRTS to A.
• But, node A’s beam 3 is blocked (Another deafness
problem).
Deafness
1
1
2
A
4
2
D
DRTS
3
1
4
3
2
B
4
1
2
3
DCTS
S
4
Submission
3
Slide 16
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Hidden Terminal
Submission
Slide 17
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
Hidden Terminal Problem
• Definition: hidden terminal problem occurs if another
device interfere on-going communication by causing
collision.
• Consequences: throughput of on-going communication
is degraded.
• Two examples
Submission
doc.: IEEE 802.11-09/0797r2
Hidden Terminal Example #1
• Assume nodes sense carrier omni-directionally.
Sensing Range
D
Submission
B
C
Slide 19
A
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
Hidden Terminal Example #1
• Now, node B has a data to A
D
Submission
B
C
Slide 20
A
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
Hidden Terminal Example #1
• Node B has a data to A
DRTS
D
Submission
B
C
Slide 21
A
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
Hidden Terminal Example #1
• Node B changes it receiving antenna mode to
directional one.
D
Submission
B
C
Slide 22
A
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
Hidden Terminal Example #1
• Node A sends back to B with DCTS.
DCTS
D
Submission
B
C
Slide 23
A
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
Hidden Terminal Example #1
• Node A turns its receiving antenna mode to directional
one, and communication is going on.
In Communication
D
Submission
B
C
Slide 24
A
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
Hidden Terminal Example #1
• Now, node D has a data to send C.
• But, D’s RTS accidentally reaches to node A’s receiving
range due to some channel conditions.
In Communication
D
B
C
A
Collision
Submission
Slide 25
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Hidden Terminal Example #2
• 4 nodes
• Node A has a data to B.
2
1
S
1
3
2
D
4
4
1
3
2
A
4
3
1
2
B
4
Submission
Slide 26
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Hidden Terminal Example #2
• Node A sends DRTS to B.
2
1
S
1
3
2
D
4
4
1
3
2
A
4
3
DRTS
1
2
B
4
Submission
Slide 27
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Hidden Terminal Example #2
• Node B responds with DCTS.
2
1
S
1
3
2
D
4
4
1
3
2
A
4
3
DCTS
1
2
B
4
Submission
Slide 28
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Hidden Terminal Example #2
• Nodes A and B are in communication.
2
1
S
1
3
2
D
4
4
1
3
2
A
4
3
In Communication
1
2
B
4
Submission
Slide 29
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Hidden Terminal Example #2
• Now, node S has a data to send D, so it sends DRTS to
D.
2
1
S
3
DRTS
1
2
D
4
4
1
3
2
A
4
3
In Communication
1
2
B
4
Submission
Slide 30
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Hidden Terminal Example #2
• Node D responds with DCTS.
2
1
S
3
DCTS
1
2
D
4
4
1
3
2
A
4
3
In Communication
1
2
B
4
Submission
Slide 31
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Hidden Terminal Example #2
• Nodes S and D are in communication.
2
1
S
3
In Communication 1
2
D
4
4
1
3
2
A
4
3
In Communication
1
2
B
4
Submission
Slide 32
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Hidden Terminal Example #2
• Further, nodes A and B complete their communication.
2
1
S
3
In Communication 1
2
D
4
4
1
3
2
A
4
3
Communication completed
1
2
B
4
Submission
Slide 33
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Hidden Terminal Example #2
• Again, node A has a data to D.
2
1
S
3
In Communication 1
2
D
4
4
1
2
Now, A has a data to D
A
4
3
3
1
2
B
4
Submission
Slide 34
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Hidden Terminal Example #2
• Node A sends DRTS to D since A did not hear previous
DRTS from S nor DCTS from D.
2
1
S
3
In Communication 1
2
D
4
4
1
2
DRTS
A
4
3
3
1
2
B
4
Submission
Slide 35
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Hidden Terminal Example #2
• Collision due to unheard RTS/CTS.
Collision
2
1
S
3
In Communication 1
2
D
4
4
1
2
DRTS
A
4
3
3
1
2
B
4
Submission
Slide 36
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
Spatial Reuse
• Benefit from directivity of directional antennas.
• Two examples
Submission
doc.: IEEE 802.11-09/0797r2
July 2009
Spatial Reuse
1
2
1
3
4
1
2
1
3
4
Submission
1
B
A
4
2
1
E
D
4
2
2
F
3
4
3
2
C
3
4
Slide 38
3
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Spatial Reuse
1
2
D
1
4
2
3
A
4
3
1
2
B
1
4
2
3
S
4
Submission
3
Slide 39
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
An Example of Topology in Simulation
Submission
Slide 40
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Scenarios (Conference Room)
Deafness Example#1
Submission
Slide 41
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Scenarios (Conference Room)
Antenna
blocked
Deafness Example #2
Submission
Slide 42
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Scenarios (Conference Room)
Hidden Terminal Problem Example#1
Submission
Slide 43
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Scenarios (Conference Room)
Communication
Completed
Hidden terminal example #2
Submission
Slide 44
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Scenarios (Conference Room)
Spatial reuse
Submission
Slide 45
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
Scenarios (Conference Room)
Submission
Slide 46
W. Y. Lee et. al
doc.: IEEE 802.11-09/0797r2
July 2009
References
[1] R. R. Choudhury, X. Yang, R. Ramanathan and NH Vaidya, “On designing MAC
protocols for wireless networks using directional antennas,” IEEE Trans. Mobile
Computing, Volume 5, Issue 5, May 2006, pp.477 – 491
[2] R.R. Choudhury, X. Yang, N.H. Vaidya, and R. Ramanathan, “Using Directional
Antennas for Medium Access Control in Ad Hoc Networks,” Proc. ACM MobiCom,
June 2002
[3] M. Takata, M. Bandai and T. Watanabe, "MAC Protocol with Directional Antennas
for Deafness Avoidance in Ad Hoc Networks," Proc. IEEE GLOBECOM, pp.620625, 2007
[4] G. Jakllari, J. Broustis, T. Korakis,S V. Krishnamurthy, and L. Tassiulas,
"Handling Asymmetry in Gain in Directional Antenna Equipped Ad Hoc
Networks," Proc. IEEE 16th International Symposium on PIMRC, pp.1284-1288
[5] T. Korakis, G. Jakllari, and L. Tassiulas, "A MAC protocol for full exploitation of
directional antennas in ad-hoc wireless networks," Proc. ACM International
Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp.98–107,
June 2003.
Submission
Slide 47
W. Y. Lee et. al