conference pdf

Upload: rakesh-madiraju

Post on 04-Jun-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Conference PDF

    1/6

    High Throughput MAC Protocol for Mobile Ad Hoc Networks

    Rakesh Sharma. M1 M.tech(CE), G. pradeep reddy

    2M.tech(CE), O.ravikumar

    3M.tech(CE),

    Gerardine Immaculate Mary 4Asst.prof(SR)

    School of electronics engineering, VIT university, vellore-632014

    [email protected], [email protected],[email protected], [email protected]

    ABSTRACT:

    One way to improve the throughput of a mobile ad hoc network at the media access layer is to allow

    as much as concurrent transmission among neighbouring nodes. In this paper we present a high

    throughput MAC protocol, called Concurrent Transmission MAC (CTMAC), which supports concurrent

    transmission. To safeguard concurrent transmission, collision avoidance information is included in the

    control packets and used by neighbouring nodes to schedule their transmissions. Also, to avoid the

    collision between DATA packets and ACK packets, a new ACK sequence mechanism is proposed.

    Simulations are done in NS-2. The simulation results shows that a significant gain in throughput can be

    obtained by CTMAC protocol compared with the existing IEEE 802.11 MAC protocol.

  • 8/13/2019 Conference PDF

    2/6

    High Throughput MAC Protocol for Mobile Ad Hoc Networks

    ABSTRACT:

    One way to improve the throughput of a

    wireless ad hoc network at the media access

    layer is to allow as much as concurrent

    transmission among neighbouring nodes. In this

    paper we present a high throughput MAC

    protocol, called Concurrent Transmission MAC

    (CTMAC), which supports concurrent

    transmission. To safeguard concurrent

    transmission, collision avoidance information is

    included in the control packets and used by

    neighbouring nodes to schedule their

    transmissions. Also, to avoid the collision

    between DATA packets and ACK packets, a

    new ACK sequence mechanism is proposed.

    Simulations are done in NS-2. The simulation

    results shows that a significant gain in

    throughput can be obtained by CTMAC

    protocol compared with the existing IEEE

    802.11 MAC protocol.

    INTRODUCTION

    Mobile ad hoc networks (MANET) have gained a

    significant attention in the past several years. How

    to efficiently utilize the channel remains a great

    challenge. IEEE 802.11 DCF [1] has been regarded

    as the basic Media Access Control (MAC) protocol

    for MANETs. It is based on CSMA/CA (carrier

    sense multiple access collision avoidance).With

    extension to allow for the exchange of RTS/CTS

    (request-to-send/clear-to-send) packets between the

    transmitter and receiver before actual transmission

    of DATA packets.

    IEEE 802.11 DCF is overly restrictive, it prohibitsconcurrent transmission among neighbouring nodes

    even when the transmission is possible. In

    MANET, a packet can be received successfully

    even if there exist other interfering packets, only if

    its instantaneous power is larger than instantaneous

    joint interference power by minimum threshold

    factor. The threshold factor is called signal-to

    interference-and noise ratio (SINR).

    Fig. 1.scenario

    In Fig 1 when the node i sends packets to node j,

    after exchanging control packets between node i

    and j, the transmissions u to v and m to n both

    prohibited until the end of transmission i to j. Thusin fig 1 without considering ACK packets as long

    as the required SINR is fulfilled then the DATA

    packets of other transmissions can be transmitted

    simultaneously. But the ACK packets also collide

    with each other or with the DATA packets. For this

    to avoid an ACK sequence mechanism has been

    proposed. Thus potential concurrent transmission

    between neighbouring nodes in a MANET is

    possible, which is the main topic of the paper. The

    proposed CTMAC protocol has some key features.

    First, after successfully exchange of control packets

    CTMAC inserts additional control gap (ACG)

    between RTS/CTS and DATA packet. The ACG

    offers neighbouring nodes to exchange their control

    packets and schedule concurrent transmission.

    Second, in CTMAC collision avoidance

    information is inserted in control packets. This

    information used in conjunction with the received

    signal strength of the packets by the potentially

    interfering nodes to dynamically determine whether

    it is possible to schedule their transmission.

    Third ,to avoid collision between DATA and ACK

    packets CTMAC introduces a new sequence

    mechanism.

    Finally in CTMAC the concurrent transmission is

    controlled locally by the node sin the vicinity of

    transmitting/receiving node, depending on the

    information they overhear. Thus CTMAC is

    asynchronous and does not require any central

    control. It is suitable for large scale of ad hoc

    networks.

  • 8/13/2019 Conference PDF

    3/6

    II. PRELIMINARIES

    One essential requirement of CTMAC is that the

    schedule transmission should not collide with the

    existing transmission. To achieve this, CTMAC

    needs to maintain some necessary information. InCTMAC, each node maintains a new data structure

    called Active Neighbour List (ANL). ANLi records

    node is knowledge about the active nodes in is

    vicinity. For every active node in is vicinity, ANLi

    contain following information.

    { , , ,

    D, }

    Where

    is the address of the active nodeu.

    is the estimated channel gain betweennode i and u.

    and are the starting times ofDATA and ACK packets of the

    transmission between node u and v.

    D is the tag used to distinguish thetransmitter and receiver. If the control

    packet is received from a transmitter then

    the D tag is set to 1. If the control packet

    is from the receiver, then the D tag is set

    to 0. MTI is maximum tolerable interference of

    a receiver node u, denoted by . This

    is maximum additional interference that

    node u can tolerate from a neighbouring

    node during us DATA transmission.

    Another requirement of CTMAC is the DATA

    packet of slave transmission must be less than or

    equal to the DATA packet of corresponding master

    transmission.

    III. PROPOSED PROTOCOL

    We know describes details of CTMAC, subsection

    A we explains operation. In section b describes

    ACK sequence mechanism and in section C

    concurrency control.

    A. Basic operation of CTMAC

    First let us consider the example shown in fig.1,the

    operation is illustrated in fig 2. To simplify the

    description , we only consider the transmission i to

    j and u to v. Node i first transmits an RTS packet to

    node j, including information such as scheduled

    start times of DATA and ACK packets. Node j

    replies with a CTS packet which consists of similar

    information. After the RTS/CTS packets are

    exchanged, node waits for a duration specified by

    Fig.2. operation of CTMAC

    ACG before sending DATA packet. During this

    period node u and v can exchange control packets

    and schedule their transmission. If the transmission

    is successfully scheduled, then the two

    transmissions can be done concurrently and starting

    time of both DATA packets is same.

    In CTMAC, the CTS packet of original IEEE

    802.11 DCF is extended and classified into two

    types: normal CTS and negative CTS packet. The

    use of normal CTS packet is similar to IEEE

    802.11. The negative CTS packet is send when the

    slave receiver finds it is impossible for the slave

    transmission according to concurrency control

    rules.

    However just extending the CTS packet is not

    enough for concurrent transmission control. First,

    the slave transmitter has no way to notify its

    neighbouring nodes of adjustment. Second, the socalled cascading lock problem remains unsolved,

    which may lead to un necessary channel

    reservation. To solve above problem, a packet

    called ATS (Abort to send) is used by slave

    transmission to inform the neighbours of necessary

    information. ATS has two meanings according to

    the situation it is used: first is when the slave

    receiver disagrees with the values scheduled by

    slave transmitter. Second situation is when it is

    impossible for the slave receiver to get the data

    packet from the slave transmitter.

  • 8/13/2019 Conference PDF

    4/6

  • 8/13/2019 Conference PDF

    5/6

    IV. SIMULATION RESULTS:

    Parameters used in simulation

    Propagation model Two ray ground

    Data packet size 2Kb

    Data rate 2Mbps

    SINR 6 dB

    Receive sensitivity -94dBm

    Receive threshold -82dBm

    Transmit power 15dBm

    Transmission range 400m

    Carrier-sense range 800m

    A. Line topology

    Fig 5. Line topology

    Consider the topology shown in fig 5.the distance

    between nodes also shown in fig. Node i is

    transmitting to node j, node n is transmitting to

    node m. Node n always have packets to send. All

    the nodes are in each other transmission ranges,

    there can be only one transmission at any time

    under the scheme of IEEE 802.11 DCF.

    In CTMAC, both transmissions may proceed

    simultaneously. At the beginning, the node is

    transmission prohibits node m from correctly

    receiving node ns DATA packet, because its SINR

    is violated. The node m is moving towards n at

    10m/s and after 5 seconds SINR is satisfied and

    two transmissions can take Place. We can see the

    increase in throughput from the figure 6.

    Fig 6.through put of line topology

    B. Random topology

    We evaluate the performance of CTMAC under

    random topology. We consider two simulations

    under this topology one for 20 nodes and another

    for 100 nodes. Assuming there are m end to end

    flows in the network. For each flow, the source

    node is saturated and always has packet to send. To

    better understand the throughput we use end to end

    throughput.

    The simulation results are plotted in fig 7a and fig

    7b for 20 and 100 nodes respectively.

    Fig 7a.throughput of random topology for 20 nodes

    Fig 7b throughput of random topology for 100

    nodes.

  • 8/13/2019 Conference PDF

    6/6

    V. CONCLUSION:

    In this paper we proposed CTMAC, a high

    throughput media access control protocol for

    MANET. Through simulation we evaluated and

    compared the performance of CTMAC with IEEE802.11 scheme. The simulation results showed that

    CTMAC increases the network throughput

    compared to other protocols.

    REFERENCES

    1. IEEE computer society LAN MAN standards

    committee Ed.international standard ISO/IES8802-

    11; PART 11: wireless LAN Medium Access

    Control (MAC) and physical layer (PHY)

    specifications.

    2. J.H.Kim and J.K.Lee capture effects of wireless

    CSMA/CA protocols in Rayleigh and shadow

    fading channels.

    3. NS-2 software http://nsnam.isi.edu

    4. communication networks and fundamental

    concepts and key architectures by Leon-Garcia &

    Indra Widjaja

    5. T.S.Rappaport and L.B.Milstein Effects of

    radio propagation path loss on DS-CDMA cellularfrequency reuse for reverse channel.

    6. M.krunz POWMAC-single channel power

    control protocol for throughput enhancement in

    wireless ad hoc network.