SlideShare a Scribd company logo
1 of 31
Download to read offline
MAC Protocol for Reliable
Multicast over Multi-Hop
Wireless Ad Hoc Networks
OsamaAskoura
EECS6590paperreview
1
Roadmap
• Introduction
• Prior Works
• The Algorithm
• Performance Analysis
• Discussion
• Conclusion
2
What are ad-hoc networks?
3
Fig1: Ad-hoc Network Example. Sources: Google Images
Why are ad-hoc networks important ?
4
Fig2: Ad-hoc Network Applications. Sources: Google Images
What is multicast?
5
Fig3: Multicast Example. Sources: Google Images
Bob
Mike
Yan
Tell Bob, Mike and
Yan, Food is north
MAC Protocol for Reliable
Multicast over Multi-Hop
Wireless Ad Hoc Networks
6
No RTS/CTS in IEEE802.11 multicast
• MAC layer is based on one-hop broadcast
from source to multiple receivers.
• IEEE802.11 does not sustain RTS/CTS or
ACK in multicast.
• This yields unreliable communication.
– No guarantee of delivery
– Hidden Terminal Problem
7
Introduction
• Increasing MAC reliability adds MAC
overhead
• This paper proposes a MAC protocol that
uses RTS/CTS using OFDMA concepts.
• Introduces RTS/CTS to Multicast MAC
Protocol
• CTS’s are sent on orthogonal frequencies all
at once.
8
Prior Works
• MMP (Multicast MAC Protocol)
• LBP (Leader based protocol)
• ELBP (Enhanced Leader Based)
• BMMM (Batched Mode Multicast MAC)
9
Prior Works
• ABM/MMP (Multicast MAC Protocol)[Gossain2004]
– Uses ACK (ACK-Based-Multicast) Receive
members reply in specific order to avoid
collision at sender
– Ensures some reliability
– Still suffers hidden terminal problem
10
Prior Works
• LBP (Leader-based Protocol) [Kuri 2001]
– Only one “leader” member sends ACK or CTS
– Performs well in low mobility networks
– Suffers in high mobility networks
(MAC overhead choosing leader every time leader leaves)
– Other problems if leader couldn’t decode
he’s the leader to send CTS
– Problem if others couldn’t decode received messages or who’s
leader
– Problem if only leader received message. Others didn’t; It still
assumes all did
– Still suffers hidden terminal problem (only leader CTS’s)
11
Got it!
Prior Works
• ELBP (Enhanced Leader Based) [Bao2005]
– Uses RTS-CTS-SEQ-DATA-NACK
– SEQ indicates data frame is multicast
– Problem if member don’t receive both SEQ and
Data
– Still suffers hidden terminal problem
12
Prior Works
• BMMM (Batched Mode Multicast MAC)
[Sun 2002, Sun 2003]
– Uses RTS/CTS and ACK for all member
nodes
– Uses two channels for data transmission
and ACK
– Suffers high overhead
13
PRO Algorithm Overview
• Solves
– Hidden Terminal Problem
– Packet Loss due to channel error
– High overhead in MAC; thus high throughput
• Uses
– RTS/CTS & ACK
– CTS is sent concurrently over orthogonal channels
– Back-off is doubled up to Wmax if ACK not received.
14
Example
15
Algorithm Details
• Each member has unique pre-assigned subcarrier
location/bit in an OFDM symbol
• Sets this bit to BPSK +1, if successfully decoded
RTS/DATA
• Sets this bit to BPSK -1, if received but failed to
decode RTS/DATA. Sender resends RTS/DATA
• If member cannot decode MAC header of RTS. No
CTS is sent
16
Algorithm Flow Chart
• Solves
– Hidden Terminal Problem
– Packet Loss due to channel error
– High overhead in MAC; thus high throughput
17
Algorithm Design issues
• Who assigns the sub-carriers to members?
– A multicast leader (ML)
– Members broadcasts (MJREQ) to join, leader receives it and
assign empty subcarrier. (max of 52)
– Sends (MJACK) to confirm join and includes sub-carrier location
• How can a leader leave multicast group?
– Leader chooses a member at random
– Unicasts (MLREQ) to it. Member should reply (MLACK)
– If no reply within time threshold. Leader select another
member until a new ML is selected
18
Algorithm Design issues
• What if there’s no leader? Leader fails
suddenly?
– Matters only when new member join; no leader means no (MJACK) is
sent within time threshold to MJREQ
– New member claims leadership of the group
19
Performance Analysis
• Numerical Analysis was performed
• Considered a system consisting of 50 nodes. Each
node always has a packet available for
transmission - saturation condition. Transmission
queue of each node is always assumed to be
nonempty
• Metrics:
– transmission/failure/drop probabilities.
– Throughput and Goodput.
20
Performance Analysis (parameters)
21
B is number of “back-off stages” How many times we
double Wmin to reach Wmax.1024/16 =6
SIFS/DIFS/ACK/RTS/CTS times are transmission
durations
Pe is probability of error due to channel conditions
r is number of receivers
Number of nodes =50
Performance Analysis (transmission/failure probability)
• Transmission probability: ps
sender receives ACK
• Fail probability: p
sender does not receive ACK
• Collision probability: pc
22
ABM: MMP
Performance Analysis (drop probability)
• Dropped packet pd: if one node misses current packet and next packet is transmitted
(LBP non-leader nodes for example). Current packet is a dropped packet
• ABM and PRO dropped packets occur at retry limit exhaustion
• LBP dropped packets occur at retry limit and when one member does not receive packet
23
Performance Analysis (throughput)
24
Performance Analysis (throughput)
• Throughput considers system
utilization for successful
transmissions
• This is misleading for LBP since a
transmission is considered successful
even if data packets were dropped for
non-leader members
25
Performance Analysis (goodput)
• Define Goodput (G) as system
utilization when packets are received
by all receivers.
26
Performance Analysis (goodput)
27
Performance Analysis (goodput)
28
Discussion
• How can the new claimed leader
assign a sub-carrier to itself that does
not conflict with other nodes?
29
Conclusion
• Reliable MAC protocol proposed that
utilizes RTS/CTS over OFDM
concepts, using orthogonal channels
• This solves hidden terminal problem
and packet drops while keeping
“goodput” higher than older protocols
30
References
• [1] Sung Won Kim, Byung-Seo Kim, Inkyu Lee, “MAC Protocol for Reliable Multicast over Multi-Hop
Wireless Ad Hoc Network” IEEE, 2012
• [2] H. Gossain, N. Nandiraju, K. Anand, and D. P. Agrawal, “Supporting MAC layer multicast in IEEE 802.11
based MANETs: Issues and solutions,” in Proc. IEEE LCN, Nov. 2004, pp. 172–179.
• [3] J. Kuri and S. K. Kasera, “Reliable multicast in multi-access wireless LANs,” ACM Wireless Netw., vol. 7,
no. 4, pp. 359–369, Aug. 2001.
• [4] C.-W. Bao and W. Liao, “Performance analysis of reliable MAC-layer multicast for IEEE 802.11 wireless
LANs,” in Proc. IEEE ICC, May 2005, pp. 1378–1382.
• [5] M.-T. Sun, L. Huang, A. Arora, and T.-H. Lai, “Reliable MAC layer multicast in IEEE 802.11 wireless
networks,” Wireless Commun. Mobile Comput., vol. 3, no. 4, pp. 439–453, June 2003.
• [6] ——, “Reliable MAC layer multicast in IEEE 802.11 wireless networks,” in Proc. IEEE ICPP, Aug. 2002,
pp. 527–536.
31

More Related Content

What's hot

2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithmslavanyapathy
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cdJAIGANESH SEKAR
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 
Wireless networks ..mac layer
Wireless networks ..mac layerWireless networks ..mac layer
Wireless networks ..mac layerGOURAV KUMAR
 
Vijay_ICCN-11
Vijay_ICCN-11Vijay_ICCN-11
Vijay_ICCN-11Vijay B T
 
Multi-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router ArchitectureMulti-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router Architecturelawuah
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Ronoh Kennedy
 
Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksMichael Rushanan
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2Hossam El-Deen Osama
 
16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)IAESIJEECS
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15JAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1JAIGANESH SEKAR
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...eSAT Publishing House
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...eSAT Journals
 

What's hot (19)

2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithms
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Wireless networks ..mac layer
Wireless networks ..mac layerWireless networks ..mac layer
Wireless networks ..mac layer
 
Vijay_ICCN-11
Vijay_ICCN-11Vijay_ICCN-11
Vijay_ICCN-11
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
Multi-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router ArchitectureMulti-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router Architecture
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
QoS in WLAN
QoS in WLANQoS in WLAN
QoS in WLAN
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 
IEEE_802.11e
IEEE_802.11eIEEE_802.11e
IEEE_802.11e
 
Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor Networks
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
 
16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
 

Similar to 6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Networks

Networking and data communication IP.ppt
Networking and data communication IP.pptNetworking and data communication IP.ppt
Networking and data communication IP.pptstephen972973
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONAswini Badatya
 
CCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATIONCCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATIONShankar Ghorpade
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptxitwkd
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkNiharikaDubey17
 
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolPradnya Saval
 
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Pradnya Saval
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptHODElex
 
MPLS (1).ppt
MPLS (1).pptMPLS (1).ppt
MPLS (1).pptmarwan76
 
Sensys ch5-mac
Sensys ch5-macSensys ch5-mac
Sensys ch5-machinalala
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxPondinesh2
 
Chapter5 link layer and la ns
Chapter5 link layer and la nsChapter5 link layer and la ns
Chapter5 link layer and la nsKhánh Ghẻ
 
Tnc18 slides 1___2018-06-09-garr-terenav1
Tnc18 slides 1___2018-06-09-garr-terenav1Tnc18 slides 1___2018-06-09-garr-terenav1
Tnc18 slides 1___2018-06-09-garr-terenav1domenico di mola
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithmRoshan Karunarathna
 

Similar to 6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Networks (20)

Networking and data communication IP.ppt
Networking and data communication IP.pptNetworking and data communication IP.ppt
Networking and data communication IP.ppt
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
 
CCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATIONCCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATION
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer Network
 
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
 
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.ppt
 
MPLS (1).ppt
MPLS (1).pptMPLS (1).ppt
MPLS (1).ppt
 
Sensys ch5-mac
Sensys ch5-macSensys ch5-mac
Sensys ch5-mac
 
Presentation8
Presentation8Presentation8
Presentation8
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
Chapter5 link layer and la ns
Chapter5 link layer and la nsChapter5 link layer and la ns
Chapter5 link layer and la ns
 
Tnc18 slides 1___2018-06-09-garr-terenav1
Tnc18 slides 1___2018-06-09-garr-terenav1Tnc18 slides 1___2018-06-09-garr-terenav1
Tnc18 slides 1___2018-06-09-garr-terenav1
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithm
 
Manet
ManetManet
Manet
 
Manet
ManetManet
Manet
 

Recently uploaded

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 

Recently uploaded (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 

6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Networks

  • 1. MAC Protocol for Reliable Multicast over Multi-Hop Wireless Ad Hoc Networks OsamaAskoura EECS6590paperreview 1
  • 2. Roadmap • Introduction • Prior Works • The Algorithm • Performance Analysis • Discussion • Conclusion 2
  • 3. What are ad-hoc networks? 3 Fig1: Ad-hoc Network Example. Sources: Google Images
  • 4. Why are ad-hoc networks important ? 4 Fig2: Ad-hoc Network Applications. Sources: Google Images
  • 5. What is multicast? 5 Fig3: Multicast Example. Sources: Google Images Bob Mike Yan Tell Bob, Mike and Yan, Food is north
  • 6. MAC Protocol for Reliable Multicast over Multi-Hop Wireless Ad Hoc Networks 6
  • 7. No RTS/CTS in IEEE802.11 multicast • MAC layer is based on one-hop broadcast from source to multiple receivers. • IEEE802.11 does not sustain RTS/CTS or ACK in multicast. • This yields unreliable communication. – No guarantee of delivery – Hidden Terminal Problem 7
  • 8. Introduction • Increasing MAC reliability adds MAC overhead • This paper proposes a MAC protocol that uses RTS/CTS using OFDMA concepts. • Introduces RTS/CTS to Multicast MAC Protocol • CTS’s are sent on orthogonal frequencies all at once. 8
  • 9. Prior Works • MMP (Multicast MAC Protocol) • LBP (Leader based protocol) • ELBP (Enhanced Leader Based) • BMMM (Batched Mode Multicast MAC) 9
  • 10. Prior Works • ABM/MMP (Multicast MAC Protocol)[Gossain2004] – Uses ACK (ACK-Based-Multicast) Receive members reply in specific order to avoid collision at sender – Ensures some reliability – Still suffers hidden terminal problem 10
  • 11. Prior Works • LBP (Leader-based Protocol) [Kuri 2001] – Only one “leader” member sends ACK or CTS – Performs well in low mobility networks – Suffers in high mobility networks (MAC overhead choosing leader every time leader leaves) – Other problems if leader couldn’t decode he’s the leader to send CTS – Problem if others couldn’t decode received messages or who’s leader – Problem if only leader received message. Others didn’t; It still assumes all did – Still suffers hidden terminal problem (only leader CTS’s) 11 Got it!
  • 12. Prior Works • ELBP (Enhanced Leader Based) [Bao2005] – Uses RTS-CTS-SEQ-DATA-NACK – SEQ indicates data frame is multicast – Problem if member don’t receive both SEQ and Data – Still suffers hidden terminal problem 12
  • 13. Prior Works • BMMM (Batched Mode Multicast MAC) [Sun 2002, Sun 2003] – Uses RTS/CTS and ACK for all member nodes – Uses two channels for data transmission and ACK – Suffers high overhead 13
  • 14. PRO Algorithm Overview • Solves – Hidden Terminal Problem – Packet Loss due to channel error – High overhead in MAC; thus high throughput • Uses – RTS/CTS & ACK – CTS is sent concurrently over orthogonal channels – Back-off is doubled up to Wmax if ACK not received. 14
  • 16. Algorithm Details • Each member has unique pre-assigned subcarrier location/bit in an OFDM symbol • Sets this bit to BPSK +1, if successfully decoded RTS/DATA • Sets this bit to BPSK -1, if received but failed to decode RTS/DATA. Sender resends RTS/DATA • If member cannot decode MAC header of RTS. No CTS is sent 16
  • 17. Algorithm Flow Chart • Solves – Hidden Terminal Problem – Packet Loss due to channel error – High overhead in MAC; thus high throughput 17
  • 18. Algorithm Design issues • Who assigns the sub-carriers to members? – A multicast leader (ML) – Members broadcasts (MJREQ) to join, leader receives it and assign empty subcarrier. (max of 52) – Sends (MJACK) to confirm join and includes sub-carrier location • How can a leader leave multicast group? – Leader chooses a member at random – Unicasts (MLREQ) to it. Member should reply (MLACK) – If no reply within time threshold. Leader select another member until a new ML is selected 18
  • 19. Algorithm Design issues • What if there’s no leader? Leader fails suddenly? – Matters only when new member join; no leader means no (MJACK) is sent within time threshold to MJREQ – New member claims leadership of the group 19
  • 20. Performance Analysis • Numerical Analysis was performed • Considered a system consisting of 50 nodes. Each node always has a packet available for transmission - saturation condition. Transmission queue of each node is always assumed to be nonempty • Metrics: – transmission/failure/drop probabilities. – Throughput and Goodput. 20
  • 21. Performance Analysis (parameters) 21 B is number of “back-off stages” How many times we double Wmin to reach Wmax.1024/16 =6 SIFS/DIFS/ACK/RTS/CTS times are transmission durations Pe is probability of error due to channel conditions r is number of receivers Number of nodes =50
  • 22. Performance Analysis (transmission/failure probability) • Transmission probability: ps sender receives ACK • Fail probability: p sender does not receive ACK • Collision probability: pc 22 ABM: MMP
  • 23. Performance Analysis (drop probability) • Dropped packet pd: if one node misses current packet and next packet is transmitted (LBP non-leader nodes for example). Current packet is a dropped packet • ABM and PRO dropped packets occur at retry limit exhaustion • LBP dropped packets occur at retry limit and when one member does not receive packet 23
  • 25. Performance Analysis (throughput) • Throughput considers system utilization for successful transmissions • This is misleading for LBP since a transmission is considered successful even if data packets were dropped for non-leader members 25
  • 26. Performance Analysis (goodput) • Define Goodput (G) as system utilization when packets are received by all receivers. 26
  • 29. Discussion • How can the new claimed leader assign a sub-carrier to itself that does not conflict with other nodes? 29
  • 30. Conclusion • Reliable MAC protocol proposed that utilizes RTS/CTS over OFDM concepts, using orthogonal channels • This solves hidden terminal problem and packet drops while keeping “goodput” higher than older protocols 30
  • 31. References • [1] Sung Won Kim, Byung-Seo Kim, Inkyu Lee, “MAC Protocol for Reliable Multicast over Multi-Hop Wireless Ad Hoc Network” IEEE, 2012 • [2] H. Gossain, N. Nandiraju, K. Anand, and D. P. Agrawal, “Supporting MAC layer multicast in IEEE 802.11 based MANETs: Issues and solutions,” in Proc. IEEE LCN, Nov. 2004, pp. 172–179. • [3] J. Kuri and S. K. Kasera, “Reliable multicast in multi-access wireless LANs,” ACM Wireless Netw., vol. 7, no. 4, pp. 359–369, Aug. 2001. • [4] C.-W. Bao and W. Liao, “Performance analysis of reliable MAC-layer multicast for IEEE 802.11 wireless LANs,” in Proc. IEEE ICC, May 2005, pp. 1378–1382. • [5] M.-T. Sun, L. Huang, A. Arora, and T.-H. Lai, “Reliable MAC layer multicast in IEEE 802.11 wireless networks,” Wireless Commun. Mobile Comput., vol. 3, no. 4, pp. 439–453, June 2003. • [6] ——, “Reliable MAC layer multicast in IEEE 802.11 wireless networks,” in Proc. IEEE ICPP, Aug. 2002, pp. 527–536. 31