33
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs • K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

Embed Size (px)

Citation preview

Page 1: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

Demand Based Bandwidth Assignment MAC Protocol for

Wireless LANs

• K.Murugan, B.Dushyanth, E.Gunasekaran

S.Arivuthokai, RS.Bhuvaneswaran,

S.Shanmugavel

Page 2: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

ABSTRACT

• The issues in wireless n/w to be considered are: Bandwidth utilization, cell capacity, propagation delay, power efficiency and quality of service of MAC Layer.

• IEEE 802.11 Specifications for WLANs use CSMA/CD scheme. This scheme is successful due to its simplicity but inefficient in utilizing the physical bandwidth.

• Many satellite networks have used Demand assignment multiple access-TDMA(DAMA-TDMA) where time slots are allocated dynamically.

Page 3: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

ABSTRACT

• In this paper, a variation of this protocol has been proposed called Demand Based Bandwidth Assignment (DBBA) Protocol.

• Main challenge that this protocol resolves is to avoid collision to the maximum extent during the demand request contention period.

• To analyze DBBA, a test bench has been developed to simulate traffic.

Page 4: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

ABSTRACT

• Based on simulation result , it has been observed that the proposed DBBA protocol has higher bandwidth utilization, supports larger no. of stations in one cell, lesser propagation delay, more power efficient and the ability to provide better QOS.

• Since there is no collision the efficiency of the system can be increased without affecting the overall throughput of the system.

Page 5: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

1.INTRODUCTION• IEEE 802.11 supports up to 54Mbps of raw

physical data. This is much higher compared to the 10Mbps wired networks and significantly smaller than 100 Mbps and Gigabit networks.

• It uses Aloha protocol to share the wireless medium. The drawback of this protocol being that it cannot work under high traffic load.

• Wireless media being highly bandwidth and power limited, a TDMA solution may help to increase the utilization of the channel bandwidth.

• The disadvantage of TDMA , being that the time slots are fixed and could limit the no. of nodes.

Page 6: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

1.INTRODUCTION

• DAMA-TDMA has been used by many satellite networks where the time slots are allocated dynamically.

• We propose a variation of this protocol in this paper called the Demand Based Bandwidth Assignment (DBBA) protocol.

• One of the challenges faced by this protocol is to avoid collision completely during the demand request contention period.

• The performance of this protocol can be assessed with throughput, latency and collision and the QOS capabilities can be compared with the existing ones.

Page 7: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

1.INTRODUCTION

• Time stamp based simulation is devised. The simulator generates packets at random time of random length.

• The scheduler processes and provides the packet transmission, collision and delay details to the monitor program. The monitor program collects the statistics to generate the simulation results at the end of the simulation run.

Page 8: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

2.IEEE 802.11 MAC PROTOCOL• IEEE802.11 MAC uses CSMA/CA scheme.• Full duplex solution is very expensive in wireless

medium and so NIC cards are half duplex . Therefore MAC layer depends on acknowledgement packet to determine collision.

• The received station have to send an acknowledge packet before stipulated time interval after completion of the transmission.

• If the transmitting node does not receive the acknowledge packet within the timeout period, it assumes that the packet did not reach the destination and retransmits the packet.

Page 9: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

2.IEEE 802.11 MAC PROTOCOL

• The utilization of the bandwidth is very low due to MAC layer constraints.

• If the no. of nodes increases, the collision probability increases and lowers the overall network bandwidth.

• The latency of the packets depends on traffic conditions and cannot guarantee bandwidth to any node.

Page 10: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

2.1 MAC LAYER• According to IEEE 802.11, stations access the

channel using a basic access method, or an optional four way handshake access method with an additional Request-To –Send/Clear-To-Send (RTS/CTS) message exchange shown in fig1.

• Under the basic access method , the station when ready for a new data frame transmission senses the channel status. If the channel is found to be busy, the station defers its transmission and continues to sense the channel until it is ideal.

• After the channel is idle for a specified period of time called the Distributed Interframe space (DIFS) period, the station chooses a random number as a Back off timer.

Page 11: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

2.1 MAC LAYER

Page 12: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

2.1 MAC LAYER

• The time immediately after the DIFS Time period is slotted.

• The Backoff timer is decreased by one for each idle slot, stopped if the channel is sensed busy, and then reactivated if the channel is idle again and remains idle for more than a DIFS Time duration.

• When the Backoff timer reaches zero, the data frame is transmitted.

Page 13: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

2.1 IEEE 802.11 MAC PROTOCOL• In the four-way handshaking access method , an

additional operation is introduced on top of the basic access method before a data frame transmission taken place.

• When the Backoff timer of a station reaches zero, instead of transmitting the data frame as in the basic access method, the station with the four-way handshaking access method first transmits an RTS Frame too request for a transmission right.

• Upon receiving the RTS frame, the receiver replies with a CTS frame after SIFS period.

Page 14: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

3.DBBA-MAC PROTOCOL• The DBBA MAC protocol considers a network,

which has a primary controller node and multiple station nodes.

• The DBBA frame is made of n time slots. There are four basic types of time slots: a: Beacon time slot. b:Demand request time slot. C: Demand Assignment time slot and d: Data Time slots.

• The controller broadcasts a beacon packet during the beacon time slot at the beginning of each frame.

• The beacon frame contains information about the network SSID,frame information and timeslot information.

Page 15: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

3.DBBA-MAC PROTOCOL

• When a node wants to transmit , it sends a packet called the demand request packet to the controller during the demand request time slot. A demand request packet has information about the source node id, destination node id, date size and quality of service requirement.

• The controller processes all the requests and comes with the bandwidth assignment table.

• The next time slot is the Demand Assignment time slot. The controller broadcasts acknowledgement to all the accepted requests, requested during the Demand Request time slot.

Page 16: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

3.1 FRAME STRUCTUTRE

Page 17: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

3.1 FRAME STRUCTURE• A typical duration of a frame ranges from 10

millisecond to 50ms. As shown in the diagram a frame has a beacon time slot, demand request time slot , bandwidth assignment time slot and n data time slots.

• The controller assigns special tome slots to every super frame , which could be between 500ms to 10 seconds.

• These special time slots allow the new users to enter the network and existing stations to acknowledge their presence. On powers up , the node tries to locate the controller. If it succeeds in finding the controller, it associates with the controller after successful authentication. If node fails to find the controller , it takes possession of being a controller in ad-hoc mode.

Page 18: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

DBBA NETWORK SIMULATION MODEL

Page 19: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

4.SIMULATION

• In order to assess the performance of the proposed DBBA protocol, a simulator has been devised. In this section the complete details about the simulator is provided.

Simulation Model: The Scheduler, Modem and packet generator are three classes used to simulate the MAC protocol for IEEE 802.11 Wireless Local Area Network.

Page 20: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

4.SIMULATION

• Scheduler: Scheduler is the main truck of the simulator. Scheduler collects the desired transmission time from all stations. The modem in turn runs the required methods and submits the desired transmit times.

• The scheduler then determines the modem references, which has the lowest desired transmission time stamp. The scheduler detects for collision and then if it detects , it sends message to all stations about the collision and the duration of the collision.

Page 21: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

4.SIMULATION

• Modem: Modem class depicts the behavior of stations. It gets information from the packet generator.

• Modems returns the packet timestamp, length , destination and other details to scheduler. If the packet is transmitted successfully , it gets a new packet from the packet generator.

• The modem waits for acknowledge of the transmitted packet from the scheduler. If the scheduler fails to give the acknowledge, the modem assumes that the packet has collided or has not reached the destination properly.

Page 22: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

4.SIMULATION

• Packet Generator: Packet Generator Class depicts a user generating traffic data. Every modem will have one instance of the Packet generator class. The length of packet is generated using three uniform distribution packets. The three different types of data packets are small, medium and large packets.

Page 23: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

4.2 FLOW CHART FOR DBBA NODE PROCESSING DATA

• Stations will ensure that channel is available before transmitting it.

• Every station other than the transmitting station will recompute the start of their packet transmission. The station does the following to simulate the condition.

• 1.Conputes the time at which the current packet will finish.

• 2.Adds the delay for acknowledgement.• 3.Adds the random time to account for the back

off time.• 4.Submits the new desired time of transmission

to the scheduler.

Page 24: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel
Page 25: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

5.SIMULATION RESULT

• In this paper 802.11 MAC was compared with a new protocol DBBA in terms of throughput,collisions,and average latency.

• In the 1st set of experiments ,the throughput and collisions of both 802.11 and DBBA were studied with different no. of nodes.

Page 26: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

5.SIMULATION RESULT

• According to figure, as the number of nodes increases the throughput of DBBA slightly increases due to higher traffic loads.

No of Nodes vs Throughput (Traffic Load = 0.8)

0102030405060708090

100

3 6 9 12 15 18 21 24 27 30No of Nodes

Thro

ughp

ut (%

)

DDBA

IEEE802_11

Page 27: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

5.SIMULATION RESULT

• In the figure the number of collisions is 5 % to 8% lesser than 802.11 as the number of nodes increases.

No of Nodes vs Collisions (Traffic Load = 0.8)

0102030405060708090

100

3 6 9 12 15 18 21 24 27 30No of Nodes

Collis

ions

DBBA

IEEE802_11

Page 28: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

5.SIMULATION RESULT

• In the second set of experiments , the throughput and collisions of both 802.11 and DBBA is studies withy different traffic loads.

• As shown in fig,the throughput of DBBA increases as traffic load increases, because it uses a TDMA frame with dynamic time slot allocation.

Traffic Load vs Throughput (No of Nodes = 100)

0102030405060708090

100

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9

Traffic Load

Thro

ughp

ut (%

)

DBBA

IEEE802_11

Page 29: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

5.SIMULATION RESULT

• In this figure, the amount of collisions is 5% to 8% lesser than 802.11 as the traffic load increases.

Traffic Load vs Collisions (No of Nodes = 20)

0102030405060708090

100

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

Traff ic Load

Collis

ions

(%)

DBBA

IEEE802_11

Page 30: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

5.SIMULATION RESULT

• In the third set of experiments, the average latency of DBBA and 802.11 is studied with increasing number of nodes and different traffic loads.

• As shown in fig, the delay is little more than the 802.11 as the number of nodes increases with traffic load 0.8

No of Nodes vs Average Latency (Traffic Load = 0.8)

0800

160024003200400048005600640072008000

3 6 9 12 15 18 21 24 27 30

No of Nodes

Avg

. Lat

ency

(US)

DBBA

IEEE802_11

Page 31: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

5.SIMULATION RESULT

• In this figure, under different traffic load conditions , the average latency of DBBA protocols is higher than the other one.

Traffic Load vs Average Latency (No of Nodes = 20)

0500

100015002000250030003500400045005000

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

Traffic Load

Avg

. Lat

ency

(US)

DBBA

IEEE802_11

Page 32: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

6.CONCLUSION

• In this paper, a variation of Demand Assignment Multiple Access-TDMA protocol has been proposed called Demand Based Bandwidth Assignment(DBBA) protocol.

• It has been observed that the DBBA protocol has higher bandwidth utilization,supports larger number of stations in one cell,lesser propagation delay, more power efficient and the ability to provide better quality of service.

Page 33: Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel

6.CONCLUSION

• Since there is no collision, the efficiency of the system can be increased without affecting the overall throughput of the system.

• Further to be considered are the allocation of dedicated slots for a complete session, which can reduce the delay for the constant bit rate services.