1 / 23

A Power Control MAC Protocol for Ad Hoc Networks

A Power Control MAC Protocol for Ad Hoc Networks . EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, 2005. Speaker: Han-Tien Chang. Outline. Introduction Related Work IEEE 802.11 MAC Protocol BASIC Power Control Protocol Proposed Power Control MAC Protocol

bjorn
Télécharger la présentation

A Power Control MAC Protocol for Ad Hoc Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, 2005. Speaker: Han-Tien Chang

  2. Outline • Introduction • Related Work • IEEE 802.11 MAC Protocol • BASIC Power Control Protocol • Proposed Power Control MAC Protocol • Performance Evaluation • Conclusions • Comments

  3. Introduction • Wireless hosts are usually powered by batteries which provide a limited amount of energy. • Power saving • Enter a doze state by powering off its wireless network interface • Power control • suitablyvary transmit power to reduce energy consumption • used to improve spatial reuse of the wireless channel

  4. Introduction (cont’d) • A simple power control protocol has been proposed based on an RTS–CTS based IEEE 802.11 network [1,6,10,15]. • RTS and CTS are transmitted using the highest power level • DATA and ACK are transmitted using the minimum power level necessary for the nodes to communicate • Increases collisions and degrades network throughput • In this paper, they present a new power control protocol which does not degrade throughput. [1] S. Agarwal, S. Krishnamurthy, R.H. Katz and S.K. Dao, Distributed power control in ad-hoc wireless networks, in: Proc. PIMRC01 (2001). [6] J. Gomez, A.T. Campbell, M. Naghshineh and C. Bisdikian, Conserving transmission power in wireless ad hoc networks, in: Proc. ICNP’01 (November 2001). [10] P. Karn, MACA – a new channel access method for packet radio, in: Proc. 9th ARRL Computer Networking Conference (1990). [15] M.B. Pursley, H.B. Russell and J.S.Wysocarski, Energy-efficient transmission and routing protocols for wireless multiple-hop networks and spread-spectrum radios, in: Proc. EUROCOMM 2000 (2000) pp. 1–5.

  5. Related Work • Power control mechanism • be incorporated into the IEEE 802.11 RTS–CTS handshake is proposed in [10,15]. • Node A, to specify its current transmit power level in the transmitted RTS • Allows receiver node B to include a desired transmit power level in the CTS sent back to A. • On receiving the CTS, node A then transmits DATA using the power level specified in the CTS. • Maintain a desired signal-to-noise ratio of node B.

  6. Related Work (cont’d) • Transmit power is controlled according to packet size in [4,5]. • IEEE 802.11 may result in unfairness for nodes which use lower transmission power than their neighbor nodes. [14] propose a scheme to improve the fairness. • Power Controlled Multiple Access (PCMA) protocol [12] • PCMA uses two channels, one channel for “busy tones”, and the other for all other packets. [4] J.-P. Ebert, B. Stremmel, E. Wiederhold and A. Wolisz, An energyefficient power control approach for WLANs, Journal of Communications and Networks 2(3) (2000) 197–206. [5] J.-P. Ebert and A. Wolisz, Combined tuning of RF power and medium access control for WLANs, in: Proc. IEEE International Workshop on Mobile Multimedia Communications (MoMuC’99) (November 1999). [12] J.P. Monks, V. Bharghavan and W.M.W. Hwu, A power controlled multiple access protocol for wireless packet networks, in: Proc. INFOCOM 2001 (April 2001). [14] N. Poojary, S.V. Krishnamurthy and S. Dao, Medium access control in a network of ad hoc mobile nodes with heterogeneous power capabilities, in: Proc. IEEE International Conference on Communications (ICC 2001), Vol. 3 (2001) pp. 872–877.

  7. 250m 550m IEEE 802.11 MAC Protocol • Distributed Coordination Function • Transmission Range • Carrier sensing range • Carrier sensing zone

  8. IEEE 802.11 MAC Protocol (cont’d) • The EIFS interval begins following indication by the physical layer that the channel is idle after sensing of the erroneous frame. • The purpose of EIFS is to protect an ACK frame at the source node. EIFS = SIFS+ DIFS+ [(8 * ACK-size)+PreambleLength+ PLCPHeaderLength] / BitRate

  9. IEEE 802.11 MAC Protocol (cont’d) • Hidden terminal problem • nodes in the receiver’s carrier sensing zone, but not in the sender’s carrier sensing zone or transmission range • can cause a collision with the reception of a DATA packet at the receiver A C E F Hidden node B D

  10. BASIC Power Control Protocol • One simple solution • As a modification to IEEE 802.11 • Transmit RTS and CTS at the highest possible power level • Transmit DATA and ACK at the minimum power level necessary to communicate • A destination node receives an RTS, it responds by sending a CTS as usual (at power level pmax). • When the source node receives the CTS, it calculates pdesired

  11. BASIC Power Control Protocol (cont’d) • Deficiency of the BASIC protocol • The power control mechanism causes • The transmission range and carrier sensing range become smaller. • The data transmission cannot be detected by some nodes which may interfere the current transmission. • More prone to collisions, degrading throughput (as shown in the later simulations)

  12. BASIC Power Control Protocol (cont’d) • D sends RTS. • E sends CTS. • Data from D to E • ACK from E to D • H can hear CTS, but cannot hear data tx. • H will interfere the current transmission when H starts transmitting

  13. Proposed Power Control MAC (PCM) Protocol • The procedure used in PCM • Source and destination nodes transmit the RTS and CTS using pmax • Nodes in the carrier sensing zone set their NAVs for EIFS duration when they sense the signal and cannot decode it correctly • The source node may transmit DATA using a lower power level, similar to the BASIC scheme. • To avoid a potential collision with the ACK (as discussed earlier) • The source node transmits DATA at the power levelpmax, periodically. • For just enough time so that nodes in the carrier sensing zone can sense it.

  14. Proposed Power Control MAC Protocol (cont’d) • The key difference between PCM and the BASIC scheme • The PCM periodically increases the transmit power to pmax during the DATA packet transmission. • 15μs should be adequate for carrier sensing in [22] • EIFS duration is set to 212μs using a 2 Mbps bit rate • In PCM, a node transmits DATA at pmax every 190μs for a 20μs duration. • Thus, the interval between the transmissions at pmax is 210μs, which is shorter than EIFS duration. [22] The Editors of IEEE 802.11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification (1997).

  15. Proposed Power Control MAC Protocol (cont’d) The procedure graph of PCM The interval between the transmissions at pmax The time of carrier sensing and increasing/decreasing output power

  16. Performance Evaluation • Simulated schemes • BASIC, PCM, PCM40 and IEEE 802.11 • PCM40increase the transmit power every 170μs for 40μs during DATA transmission • Two metrics • aggregate throughput over all flows in the network • total data delivered per unit of transmit energy consumption (Mbits delivered per Joule)

  17. Performance Evaluation (cont’d) • Simulation model and topology • Use ns-2 with CMU wireless extension • All simulation results are the average of 30 runs. • Each simulation runs for 20 seconds of simulation time. • Topology • Chain Topology • vary the distance from 40 m to 250 m • Random topology: one hop flows • Random topology: multi-hop flows

  18. Performance Evaluation (cont’d) • Chain Topology: varying node distance

  19. Performance Evaluation (cont’d) Chain Topology: varying network load (one hop flow)

  20. Performance Evaluation (cont’d) Random topology: network load / different 50 scenarios

  21. Performance Evaluation (cont’d) Random topology multi-hop flow Random topology: varying packet size (one hop flow)

  22. Conclusions • Overcome the shortcoming of the BASIC power control protocol • PCM achieves energy savings without causing throughput degradation • One possible concern with PCM • It requires a frequent increase and decrease in the transmit power which may make the implementation difficult. • Future work includes the development of a power control MAC protocol that conserves energy while increasing spatial reuse.

  23. Comments • Find the deficiency of other works • Improve the power control mechanism by a simple manner • Various simulation scenarios to support the proposed mechanism

More Related