41
1 MAC protocols for Wireless Mesh Network Musaab M. Jasim Fatih university Computer department

Mac protocol for wmn

Embed Size (px)

Citation preview

Page 1: Mac protocol for wmn

1

MAC protocols for Wireless Mesh Network

Musaab M. JasimFatih university

Computer department

Page 2: Mac protocol for wmn

2

Outline Introduction of WMN architecture and Important

definitions . Data link layer and MAC definition & classification . Single channel concepts and protocols.

S-MAC . T-MAC . New TDMA-based MAC .

Multi channel concepts and classification . CC-MMAC . SSCH MAC .

Conclusion

Page 3: Mac protocol for wmn

3

Introduction of WMN architecture and Important definitions .

Page 4: Mac protocol for wmn

Introduction of WMN architecture .

First of all , to understand this article , we need know some information about WMN architecture in addition to some important definitions.

WMN consists of three types of componentsMesh routers .Mesh client devices .Router with gateway/bridge functionalities which enable the integration of WMNs with various existing wireless networks.

depending on these components there are three types of WMN architecture .

4

Page 5: Mac protocol for wmn

1- Infrastructure Meshing

It includes mesh routers that form backbone infrastructure for conventional clients that connect to them . and enable integration with other wireless networks by gateway/bridge functionalities .

5

Page 6: Mac protocol for wmn

6

2- Client mesh networking

It consists of mesh clients devices which provides peer-to-peer networking . These devices have to perform additional functions such as routing and self-configuration .

3- Hybrid mesh networking

It is combination from the first two types .

Page 7: Mac protocol for wmn

7

Depending on these types and because the WMN is Mix of many wireless network . so, in this article we will discuss two classes of protocols which can be used in WMNs , the first one are (S-MAC , T-MAC and TDMA-MAC ) protocols from standard IEEE 802.11 based on CSMA\CA protocols for the single channel , and the second are SSCH-MAC and CC-MMAC for the multiple channel .

Important definitions

To understand this article , we need know some definitions which will be contained in this presentation .•Throughput\ it is the amount of data moved successfully from one place in network to another in a given time .•Fairness \ it means using the system channel and resource in a fair way as possible .

Page 8: Mac protocol for wmn

8

• Hand shake \ it is transmission\receiving technique which achieved in three levels :I. RTS : Request To Send .

II. CTS : Clear To Send .

III. ACK : Acknowledgment .

With some in-between periods such as- IFS : inter-frame space .

- SIFS : short inter-frame space .

- DIFS : distributed coordination function inter-frame space .

• Duty Cycle \ The fraction of time a system is actually employed in performing its function. The percent of time that the system is active as opposed to the time the system is inactive .

• Overhead \ the processing time required to transmit control packets which uses for error checking and control of transmission .

• ARQ \ error detection method use by link layer to check the error and retransmit the lost packets . And it is abbreviation of ( Automatic Repeat reQuest .

• ATIM \ Ad-hoc Traffic Indication Message.

Page 9: Mac protocol for wmn

9

Data link layer and MAC definition & classification .

Page 10: Mac protocol for wmn

Data link layer & MAC definition

It is the second layer in the WMN stack layer which be responsible of ( Framing , Error detection and correction , Media Access control ,…) , which divide into two sub-layer :

1- logical link control (LLC) .

2- media access control (MAC) .

In this article we will deal with the MAC sub-layer only .MAC \ it is the second sub-layer of data link layer that provide addressing and channel access control protocols and mechanisms to make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium . So, it is interface between the (LLC) sub-layer and physical layer.

10

Page 11: Mac protocol for wmn

MAC protocols classification for WMN

11

Mac protocolsMac protocols

distributeddistributed centralizedcentralized

Single Single channelchannel

Multi Multi channelchannel

Multi Multi transceivertransceiver

Multi radioMulti radiosingle single transceivertransceiver

Based-Based-contentioncontention

Schedule-Schedule-contentioncontention

Page 12: Mac protocol for wmn

12

Single channel concepts and protocols .

Page 13: Mac protocol for wmn

Single channel concept and protocols

The Concept-It means that the nodes of WMN use shared single channel for transmission\receiving data . So, only one node can access to media at a time .-The main problem faced by the network is the "collision" which occurs when two nodes in the network send the data at the same time over the common channel and this results in corrupted of data . This problem caused by two reasons :

1- Hidden node .

2- Exposed node .

13

Page 14: Mac protocol for wmn

Hidden node It is one of the collision problem reasons which occurs

when two nodes have the same neighbor but each one outside the scope of other coverage . As shown in the example below

14

1. “A” tend to send data to “B” .

2. “C“ tend to send data to “B“ too .

3. Because of “C” outside the

transmission range of “A” . So, “C”

is hidden node of it .

4. Each “A” and “C” will send the

data to “B” over the same channel

(shared channel) .

5. The receiving data on the “B” will

collide and be corrupted .

Page 15: Mac protocol for wmn

Exposed node It is one of the collision problem reasons which means a

node is prevented from sending packets to other node due to a neighboring transmitter. As shown in the example below

15

1. “S1” tend to send data to “R1” . So

it send the request packet which

be hearing by “S2”.

2. “S2“ tend to send data to “R2” but

after it heard the “S1” request

packet it will go on the silent state

and prevents to sending the data

until the “S1” accomplish the

transmission , and that results in

latency and reducing in the

network throughput .

Page 16: Mac protocol for wmn

To avoid these problems of the single channel network

there are two approaches of MAC protocols :

1. Based-contention protocols .

2. Schedule-based protocols .

In this article , we will deal with two types of based-

contention protocols :

S-MAC protocol .

T-MAC protocol .

and one type of the schedule-based protocol

New TDMA-based protocol .16

Page 17: Mac protocol for wmn

S-MAC protocol The objective of the S-MAC is to reduce the collision & overhearing

problem and provide a good energy-efficiency . Its mechanism based on the fixed duty cycle idea and provide

synchronization between the node .

17

S-MAC time slot

It contains a periodic time interval in which the node go on one of two modes :- Listen mode\ in which the node goes on the active mode by exchanging the

SYNC packet with the neighbors to prevent the node’s clock from drifting and

maintaining the synchronization by adjusting its timer counters depending on

the SYNC packet value , then check the channel to determine if it needs to

communicate with other node by hand shack mechanism .

- Sleep mode\ after expiration the listen interval the node go into sleep mode

by switch off the radio and sets the timer to awake later .

Page 18: Mac protocol for wmn

Synchronizer and Follower node At the start up , the node try to establish the initial schedule by listing for a

certain time if it is not hear schedule from the another node , it will establish private schedule and immediately broadcast this schedule to the neighbor nodes to follow it , so this node called (Synchronizer) and the nodes which follow this table called (Follower ).

But if a node receives a neighbor's schedule after it selects its own schedule , it adopts to both schedules and broadcast its own schedule before going to sleep .

18

Collision and overhearing avoidance S-MAC protocol avoids the collision By

using (RTS,CTS,ACK) packet from the carrier sense mechanism.

And by using the network allocation vector (NAV) which contain the transmitted period of the neighbor transmission which is delivered from the duration field in transmitted packet , it can avoid overhearing , every time it tend to transmit data , it check the physical and the virtual carrier sense (NAV) if it are zero (free media) to send.

Page 19: Mac protocol for wmn

Message passing technique Consider the previous Example , if

the transmitted data frame is a big and do not reach to the receiver or the ACK packet from receiver lost, the sender will wait for fixed time then use ARQ to retransmit the a big data to receiver again, and this means consuming another time and more power .

19

To avoid this state ,S-MAC using message passing technique by dividing the data into small parts called (fragments) . So, when one of these fragments not reach the node will need only less time and power for retransmitted it , but the disadvantage of this technique is reduction the fairness . As shown in the figure where the node “C” will wait a long time to access media.

Page 20: Mac protocol for wmn

T-MAC protocol It is contention-based single channel protocol , belongs to CSMA\CA protocols

family from standard IEEE 802.11 . It considered the enhanced version of S-MAC by using adaptive duty

cycle with dynamical listen period called Traffic Aware(TA) instead of fixed duty cycle.

By its mechanisms ,a node will keep listening and potentially transmitting as long as it is in active period and goes to sleeping mode when the active period ends and no activation event has occurred for a time (TA) .

TA must be long enough to receive at least the start of the CTS packet to preventing node from going to sleep mode while its neighbors are still communicating . So, the lower limit on the length of interval TA given in this formula .

TA > C + R + T C : length of the contention interval . R : the length of RTS packet . T : SIFS “ short inter-frame space .

20

Page 21: Mac protocol for wmn

T-MAC mechanism and early sleeping problem

Mechanism

Consider the example :- A , B , C are nodes in the network .- within (TA) the nodes contend to gain

access to the channel . At the end the A get the channel .

- A send RTS to B and B send CTS to A , and C .

- When C hears the CTS , it stills for the rest of TA then will go to sleeping mode .

- When A receive the CTS packet , it initiates the transmitting data to B.

- when the transmission has accomplished , B send ACK packet to A and C .

- Now C can transmitting its data over the channel .

21

Page 22: Mac protocol for wmn

T-MAC mechanism and early sleeping problem Early sleeping problem

Consider the example :- A , B , C , D are nodes in the network .- within (TA) the A and C nodes contend to

gain access to the channel .but C loses the contention and A get the channel .

- A send RTS to B and B send CTS to A , and C .

- C tends to sending data to D but because of CTS it waits for random Backoff time.

- But D did not hear any thing , so after (TA) go to sleep mode .

- When the transmission is accomplished between A and B , B will send ACK to A and it be heard by C .

- Now C send RTS to D to initiate the transmitting but D do not response , because of early sleep mode .

22

Page 23: Mac protocol for wmn

T-MAC mechanism and early sleeping problem Solve “Early sleeping” problem

There are two solution for Early sleeping problem :

1. Future Request To Send (FRTS) packet- When C hear the CTS from B , it will set the

time of the next transmission in the (FRTS) packet and send it to D .

- D immediately sets its timer counter depending on the FRTS to wake up for potential future transmitting .

23

2. Taking priority on full buffers- It means that C have to catch the channel

when it hears CTS from B by sending RTS to B to force it to wait for random Backoff time until it accomplish sending data to D and send ACK .

- thus , it avoid the early sleeping problem in D .

Page 24: Mac protocol for wmn

Innovative TDMA MAC protocol It is a new TDMA-based (Time Division Multiple Access) MAC protocol

(proposed protocol) compatible for wireless mesh backbone using directional antennas and provide a parallel transmission which means

that the different concurrent transmissions have the same start and end times . It is designed only for uniform grid topologies where each node has

four neighbors and is equipped with four beam antennas which be non-overlapped directional antennas .

the Routers in this protocol can transmit or receive data by using 2 modes (directional or omnidirectional mode) .

Three sets of neighbors are used in this protocol: OO-neighbors/DD-neighbors when both the transmitter and the receiver use omnidirectional/directional mode respectively, and DO-neighbors when either the transmitter or the receiver uses the directional mode.

Its mechanism depending on dividing the time sequence into slots which involve mini-slots.

So, it is designed to be collision free, deafness-free and blocking-free. 24

Page 25: Mac protocol for wmn

25

Innovative TDMA MAC protocol

Time division and mini-slot assignmentThe time sequence in nodes is divided into slots. Each slot is divided into a

control part and a transmission part.

- Control and transmission part•The goal of the control part is to decide which nodes will transmit in the following transmission part and which nodes will receive.•It is divided into N mini-slot where N represents the number of nodes in the most load two-hop neighborhood. Each mini-slot is divided into three mini-parts.•In order to minimize the control overhead, the transmission part is much greater than the control part.

Page 26: Mac protocol for wmn

Innovative TDMA MAC protocol

26

- Mini-slot assignment

• The goal of the mini-slot assignment is to

assign a number of nodes to each mini-slot.

• The mini-slot assignment should take into

consideration that two nodes in the same

two-hop neighborhood cannot be assigned

to the same mini-slot , to avoid a collision

when the same two-hop neighborhoods

begin a transmission at the same time .

• the mini-slot assignment achieve by the

algorithm which offers a flexible and

scalable way for assigning time-slots to

wireless routers .

Page 27: Mac protocol for wmn

27

Innovative TDMA MAC protocol- TDMA frameworkTo explain the operations realized by our protocol and understand it , we need to consider the example in the right side which be a network with 6 nodes in chain topology . Where A,B,C is within the two-hop neighborhoods of the two other. So, each one of them should be assigned to a separate mini-slot . Thus,TDMA assigns a number of nodes to each mini-slot.

here it assigned (A,D),(B,E) and (C,F) to mini-slots respectively .

1.The first mini-slot , D has in the head of its queue a packet intended to transmit it to C. so, what are the procedure to accomplish this transmission ?!

First mini-part\ D transmits a jam signal using the omnidirectional mode.so , C and E know that D will be busy in the transmission part .

Second mini-part\ D transmits a jam signal toward C using the directional mode . So, C knows that it is the corresponding receiver of D and E knows that it is not the corresponding receiver of D .

Third mini-part\ C transmits a jam signal using the omnidirectional mode. So, B know that C will be busy in the transmission part .

Page 28: Mac protocol for wmn

28

Innovative TDMA MAC protocol- TDMA framework

2.The second mini-slot where B and E existing, During the first mini-slot :

A. If node B has in the head of its queue a packet intended to transmit it to node A, it follows the same procedure of node D.

B. In the other case, if node B has in the head of its queue a packet intended to transmit it to C, it defers the transmission of this packet to the next mini-slot.

C. Then B checks if it has another packet in the queue intended to transmit it to node A. If such packet exists, node B follows the procedure of node D; otherwise B remains idle during its mini-slot.

D. Node E follows the procedure of node B by preventing the transmission toward node D.

2.The same procedure is repeated in the third mini-slot.

The transmission will take place just after the end of the control part. The precedent mechanism is repeated at the beginning of each slot.

Page 29: Mac protocol for wmn

29

Multi channel concepts and classification

Page 30: Mac protocol for wmn

Multi-channel concepts and classification Concept :

It means , exploit the multiple frequencies of the medium for enabling transmissions on different non-conflicting frequencies .

There are many ways to classify the multi-channel protocols :

1. Depending on its mechanism

30

Multi-channel MAC Multi-channel MAC protocolsprotocols

Handshake Handshake protocoleprotocole

Hopping Hopping sequencesequence

Directional Directional antennaantenna

Page 31: Mac protocol for wmn

Multi-channel concepts and classification

2- Depending on the channel assignment techniques

31

Multi-channel MAC Multi-channel MAC protocolsprotocols

Dynamic channel Dynamic channel assignment assignment

Split phaseSplit phase

Static channel Static channel assignment assignment

Dedicated Dedicated control control channelchannel

Common Common frequency frequency hoppinghopping

Page 32: Mac protocol for wmn

Multi-channel concepts and classification

3- Depending on the node transceiver

32

Multi-channel MAC Multi-channel MAC protocolsprotocols

Multi-RadioMulti-RadioSingle Single

transceivertransceiver Multi- transceiverMulti- transceiver

In this presentation we will discuss two multi-channel protocols- CC-MMAC : Channel Cognitive Multi-Channel MAC protocol. - SSCH : Slotted Seeded Channel Hopping .

Page 33: Mac protocol for wmn

CC-MMAC protocol

33

CC-MMAC is a multi-channel MAC protocol which be enhanced version of the standard 802.11s with Common Channel Framework (CCF) and (DCF) protocol.

Whereby this protocol , each node uses

A. PCL (Preferable Channel List) to record the usage of channels in the transmission range of the node .

B. NCL (Neighbor Channel List) to record the usage of channel of the neighbor nodes.

It do not need special control channel, and requires a network interface. By using the interactive of the ATIM, ATIM-ACK and ATIM-RES , The Protocol

selects the channel . Where the ATIM frame contain the information of PCL and NCL which sends to the receiving node .

After the ATIM window, data will be transmitted by exchanging RTS/CTS in the selected channel. The RTS/CTS scheme can avoid collision occurred by the different source-destination nodes to use the same data channel at the same time.

In this protocol , the default channel can also be used to transmit data.

Page 34: Mac protocol for wmn

CC-MMAC protocol

34

In CC-MMAC protocol, each node maintains two data structures.

1. FCL ( Free Channel List) which uses to update PCL part in ATIM and contains the node local view on the channels.

2. NFCL (Neighbor-Free Channel List) which uses to update NCL part In ATIM and contains the node local view on the channels of two-hop nodes .

The channel state types depending on CC-MMAC

There are three states of the channel in this protocol

HIGH preference (Hp, FCL[c] =-1 ) If the channel has already been selected by the node for use in the current beacon interval .

Medium preference (Mp, FCL[c]= 0) If the channel has not yet been taken for use in the transmission range of the host .

Low Preference (Lp, FCL[c] = n, n is the integer except 0) If the channel is already taken for use in the transmission range of the host.

And to avoid the interference cases as much as possible, there is a counter for each channel in the FCL and NFCL to record how many (source-destination) pairs want to use the channel for the current interval.

Page 35: Mac protocol for wmn

CC-MMAC protocol

Suppose that node A has packets for B and thus sends an ATIM packet to B during the ATIM window , with A's PCL and NCL included in the packet.

On receiving the ATIM request, B decides which channel to use during the beacon interval, based on its PCL, NCL and A's PCL, NCL.

The selection procedures used by B are :-1. If there is a Hp channel in the receiving node's

PCL and NCL, this channel is selected.

2. Else if there is a Hp channel in the source node's PCL and NCL, this channel is selected.

3. Else if there is not Hp channel, add the counters of the source node's PCL, NCL and the receiving node's FCL, NFCL to calculate a channel that is the smallest interfere for the destination node, or the source node , and the least usage times in source's PCL or destination's PCL will selected.

35

Mechanism & Rules for selecting the channel

Page 36: Mac protocol for wmn

SSCH MAC protocol

36

It is multi-channel single transceiver MAC protocol belongs to Dynamic Channel Assignment \ independent frequency hopping class .

It does not requires dedicated control channel, but needs clock synchronization among nodes.

So, every channel can be regarded as a control channel and wireless devices can employ different channels simultaneously to exchange control information.

And this removes the congestion of control packets and result in increasing the channel capacity .

Each node in SSCH has channel hopping sequence which calculated based on initial channel index and seed type.

And each one can know the other’s hopping schedule by broadcasting their channel schedules .

So, when a node has a packet queued for destination node , it attempts to change the slots value from its channel schedule to match the destination node’s schedule to achieve overlapping channels .

But , what do (slot , channel schedule , seed and channel hopping sequence) mean?!

Page 37: Mac protocol for wmn

SSCH MAC protocol

37

Important definitions Slot \is defined as the time spent on a single Channel . Channel schedule \is the list of channels that the node plans to switch to in

subsequent slots and the time at which it plans to make each switch . pseudo-random seed or (Seed) \is a deterministic procedure used by

theoretical computer science and cryptography to generate random binary string , in our protocol it used to generate the channel hopping sequence depending on the value of the total channels and current channel and the current seed value to determine the next channel as shown in this formula :

So , for each current channel and seed [(channel , seed) pair] there is a specific hopping sequence .

Channel hopping sequence \ it represents the sequence of channels which the node can hop over it .

To understand the SSCH mechanism we need take an example to how it is work .

Page 38: Mac protocol for wmn

SSCH MAC protocol

In this example there are three channels (0,1,2) and two seed (1,2) and tree nodes (A,B,C).

A adopt the first (channel, seed) pair with seed (2) at odd slots and the second pair with seed (1) at event slots .

In this example , A want to generate a traffic to destination C . In a slot 4.

So, A adopts its hopping sequence with node B at the slot 5 with seed (1) .

Now , A and B are synchronous at the odd slot and they are starting the exchanging data .

B also seeks to forward data to the following node C, so can select another non-synchronized pair to synchronize with C.

B iterates the process of receiving data from A at odd slots and forwarding data to C at even slots.

Thus , the transmission A → B → C become more efficient with multi-channel exchanging data of the SSCH MAC mechanism .

38

SSCH mechanism

Page 39: Mac protocol for wmn

39

Conclusions

Page 40: Mac protocol for wmn

Conclusions

The design of MAC layer protocol assumes significance in a WMN because achievable capacity depends heavily on the performance of MAC protocol. In addition to a fully distributed operation, the major issues faced by the popular CSMA/CA-based IEEE 802.11 and distributed coordination function (DCF) are: (i) hidden terminal problem, (ii) exposed terminal problem, (iii) location-dependent contention, and (iv) high error probability on the channel.

In order to increase the network capacity, the multiple channels protocols

have to use in WMNs .

As the WMN has a hybrid structure of centralized and ad hoc Architecture , the MAC layer access mechanisms proposed for wireless ad hoc, sensor and WLAN are potentially suitable for wireless mesh networks. There are a lot of papers that study the possibility of implementing existing MAC protocols to Ad hoc network such as CC-MMAC and SSCH MAC protocol for WMN and they give good results .

40

Page 41: Mac protocol for wmn

The endThe end

At the end At the end

I want to thank dr.Taner for your help and support.I want to thank dr.Taner for your help and support.

And sayAnd say

“ “ thank you to all attendees “ thank you to all attendees “

41