SlideShare a Scribd company logo
MAC Protocol for Reliable
Multicast over Multi-Hop
Wireless Ad Hoc Networks
OsamaAskoura
EECS6590paperreview
1
Roadmap
• Introduction
• Prior Works
• The Algorithm
• Performance Analysis
• Discussion
• Conclusion
2
What are ad-hoc networks?
3
Fig1: Ad-hoc Network Example. Sources: Google Images
Why are ad-hoc networks important ?
4
Fig2: Ad-hoc Network Applications. Sources: Google Images
What is multicast?
5
Fig3: Multicast Example. Sources: Google Images
Bob
Mike
Yan
Tell Bob, Mike and
Yan, Food is north
MAC Protocol for Reliable
Multicast over Multi-Hop
Wireless Ad Hoc Networks
6
No RTS/CTS in IEEE802.11 multicast
• MAC layer is based on one-hop broadcast
from source to multiple receivers.
• IEEE802.11 does not sustain RTS/CTS or
ACK in multicast.
• This yields unreliable communication.
– No guarantee of delivery
– Hidden Terminal Problem
7
Introduction
• Increasing MAC reliability adds MAC
overhead
• This paper proposes a MAC protocol that
uses RTS/CTS using OFDMA concepts.
• Introduces RTS/CTS to Multicast MAC
Protocol
• CTS’s are sent on orthogonal frequencies all
at once.
8
Prior Works
• MMP (Multicast MAC Protocol)
• LBP (Leader based protocol)
• ELBP (Enhanced Leader Based)
• BMMM (Batched Mode Multicast MAC)
9
Prior Works
• ABM/MMP (Multicast MAC Protocol)[Gossain2004]
– Uses ACK (ACK-Based-Multicast) Receive
members reply in specific order to avoid
collision at sender
– Ensures some reliability
– Still suffers hidden terminal problem
10
Prior Works
• LBP (Leader-based Protocol) [Kuri 2001]
– Only one “leader” member sends ACK or CTS
– Performs well in low mobility networks
– Suffers in high mobility networks
(MAC overhead choosing leader every time leader leaves)
– Other problems if leader couldn’t decode
he’s the leader to send CTS
– Problem if others couldn’t decode received messages or who’s
leader
– Problem if only leader received message. Others didn’t; It still
assumes all did
– Still suffers hidden terminal problem (only leader CTS’s)
11
Got it!
Prior Works
• ELBP (Enhanced Leader Based) [Bao2005]
– Uses RTS-CTS-SEQ-DATA-NACK
– SEQ indicates data frame is multicast
– Problem if member don’t receive both SEQ and
Data
– Still suffers hidden terminal problem
12
Prior Works
• BMMM (Batched Mode Multicast MAC)
[Sun 2002, Sun 2003]
– Uses RTS/CTS and ACK for all member
nodes
– Uses two channels for data transmission
and ACK
– Suffers high overhead
13
PRO Algorithm Overview
• Solves
– Hidden Terminal Problem
– Packet Loss due to channel error
– High overhead in MAC; thus high throughput
• Uses
– RTS/CTS & ACK
– CTS is sent concurrently over orthogonal channels
– Back-off is doubled up to Wmax if ACK not received.
14
Example
15
Algorithm Details
• Each member has unique pre-assigned subcarrier
location/bit in an OFDM symbol
• Sets this bit to BPSK +1, if successfully decoded
RTS/DATA
• Sets this bit to BPSK -1, if received but failed to
decode RTS/DATA. Sender resends RTS/DATA
• If member cannot decode MAC header of RTS. No
CTS is sent
16
Algorithm Flow Chart
• Solves
– Hidden Terminal Problem
– Packet Loss due to channel error
– High overhead in MAC; thus high throughput
17
Algorithm Design issues
• Who assigns the sub-carriers to members?
– A multicast leader (ML)
– Members broadcasts (MJREQ) to join, leader receives it and
assign empty subcarrier. (max of 52)
– Sends (MJACK) to confirm join and includes sub-carrier location
• How can a leader leave multicast group?
– Leader chooses a member at random
– Unicasts (MLREQ) to it. Member should reply (MLACK)
– If no reply within time threshold. Leader select another
member until a new ML is selected
18
Algorithm Design issues
• What if there’s no leader? Leader fails
suddenly?
– Matters only when new member join; no leader means no (MJACK) is
sent within time threshold to MJREQ
– New member claims leadership of the group
19
Performance Analysis
• Numerical Analysis was performed
• Considered a system consisting of 50 nodes. Each
node always has a packet available for
transmission - saturation condition. Transmission
queue of each node is always assumed to be
nonempty
• Metrics:
– transmission/failure/drop probabilities.
– Throughput and Goodput.
20
Performance Analysis (parameters)
21
B is number of “back-off stages” How many times we
double Wmin to reach Wmax.1024/16 =6
SIFS/DIFS/ACK/RTS/CTS times are transmission
durations
Pe is probability of error due to channel conditions
r is number of receivers
Number of nodes =50
Performance Analysis (transmission/failure probability)
• Transmission probability: ps
sender receives ACK
• Fail probability: p
sender does not receive ACK
• Collision probability: pc
22
ABM: MMP
Performance Analysis (drop probability)
• Dropped packet pd: if one node misses current packet and next packet is transmitted
(LBP non-leader nodes for example). Current packet is a dropped packet
• ABM and PRO dropped packets occur at retry limit exhaustion
• LBP dropped packets occur at retry limit and when one member does not receive packet
23
Performance Analysis (throughput)
24
Performance Analysis (throughput)
• Throughput considers system
utilization for successful
transmissions
• This is misleading for LBP since a
transmission is considered successful
even if data packets were dropped for
non-leader members
25
Performance Analysis (goodput)
• Define Goodput (G) as system
utilization when packets are received
by all receivers.
26
Performance Analysis (goodput)
27
Performance Analysis (goodput)
28
Discussion
• How can the new claimed leader
assign a sub-carrier to itself that does
not conflict with other nodes?
29
Conclusion
• Reliable MAC protocol proposed that
utilizes RTS/CTS over OFDM
concepts, using orthogonal channels
• This solves hidden terminal problem
and packet drops while keeping
“goodput” higher than older protocols
30
References
• [1] Sung Won Kim, Byung-Seo Kim, Inkyu Lee, “MAC Protocol for Reliable Multicast over Multi-Hop
Wireless Ad Hoc Network” IEEE, 2012
• [2] H. Gossain, N. Nandiraju, K. Anand, and D. P. Agrawal, “Supporting MAC layer multicast in IEEE 802.11
based MANETs: Issues and solutions,” in Proc. IEEE LCN, Nov. 2004, pp. 172–179.
• [3] J. Kuri and S. K. Kasera, “Reliable multicast in multi-access wireless LANs,” ACM Wireless Netw., vol. 7,
no. 4, pp. 359–369, Aug. 2001.
• [4] C.-W. Bao and W. Liao, “Performance analysis of reliable MAC-layer multicast for IEEE 802.11 wireless
LANs,” in Proc. IEEE ICC, May 2005, pp. 1378–1382.
• [5] M.-T. Sun, L. Huang, A. Arora, and T.-H. Lai, “Reliable MAC layer multicast in IEEE 802.11 wireless
networks,” Wireless Commun. Mobile Comput., vol. 3, no. 4, pp. 439–453, June 2003.
• [6] ——, “Reliable MAC layer multicast in IEEE 802.11 wireless networks,” in Proc. IEEE ICPP, Aug. 2002,
pp. 527–536.
31

More Related Content

What's hot

2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
JAIGANESH SEKAR
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithms
lavanyapathy
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
JAIGANESH SEKAR
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
Nitesh Singh
 
Wireless networks ..mac layer
Wireless networks ..mac layerWireless networks ..mac layer
Wireless networks ..mac layer
GOURAV KUMAR
 
Vijay_ICCN-11
Vijay_ICCN-11Vijay_ICCN-11
Vijay_ICCN-11
Vijay B T
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
JAIGANESH SEKAR
 
Multi-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router ArchitectureMulti-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router Architecture
lawuah
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
JAIGANESH SEKAR
 
QoS in WLAN
QoS in WLANQoS in WLAN
QoS in WLAN
8neutron8
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
Ronoh Kennedy
 
IEEE_802.11e
IEEE_802.11eIEEE_802.11e
IEEE_802.11e
Sanjay Saha
 
Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor Networks
Michael Rushanan
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
Hossam El-Deen Osama
 
16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)
IAESIJEECS
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
JAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
JAIGANESH SEKAR
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
eSAT Journals
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
eSAT Publishing House
 

What's hot (19)

2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithms
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Wireless networks ..mac layer
Wireless networks ..mac layerWireless networks ..mac layer
Wireless networks ..mac layer
 
Vijay_ICCN-11
Vijay_ICCN-11Vijay_ICCN-11
Vijay_ICCN-11
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
Multi-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router ArchitectureMulti-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router Architecture
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
QoS in WLAN
QoS in WLANQoS in WLAN
QoS in WLAN
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 
IEEE_802.11e
IEEE_802.11eIEEE_802.11e
IEEE_802.11e
 
Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor Networks
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
 
16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
 

Viewers also liked

IP Multicast Routing
IP Multicast RoutingIP Multicast Routing
IP Multicast Routing
Pedro De Almeida
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
Pradeep Kumar TS
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
Abhishek Kesharwani
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
Iffat Anjum
 
Ppt multicast routing
Ppt multicast routingPpt multicast routing
Ppt multicast routing
reena aggarwal
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing Protocols
Ram Dutt Shukla
 

Viewers also liked (6)

IP Multicast Routing
IP Multicast RoutingIP Multicast Routing
IP Multicast Routing
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
 
Ppt multicast routing
Ppt multicast routingPpt multicast routing
Ppt multicast routing
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing Protocols
 

Similar to 6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Networks

Networking and data communication IP.ppt
Networking and data communication IP.pptNetworking and data communication IP.ppt
Networking and data communication IP.ppt
stephen972973
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
Jayaprasanna4
 
Network Layer
Network LayerNetwork Layer
Network Layer
Rutwik Jadhav
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
Aswini Badatya
 
CCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATIONCCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATION
Shankar Ghorpade
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
itwkd
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer Network
NiharikaDubey17
 
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Pradnya Saval
 
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Pradnya Saval
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.ppt
HODElex
 
MPLS (1).ppt
MPLS (1).pptMPLS (1).ppt
MPLS (1).ppt
marwan76
 
Sensys ch5-mac
Sensys ch5-macSensys ch5-mac
Sensys ch5-mac
hinalala
 
Presentation8
Presentation8Presentation8
Presentation8
Mohd Yusak
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
Pondinesh2
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
LautaroRondan
 
Chapter5 link layer and la ns
Chapter5 link layer and la nsChapter5 link layer and la ns
Chapter5 link layer and la ns
Khánh Ghẻ
 
Tnc18 slides 1___2018-06-09-garr-terenav1
Tnc18 slides 1___2018-06-09-garr-terenav1Tnc18 slides 1___2018-06-09-garr-terenav1
Tnc18 slides 1___2018-06-09-garr-terenav1
domenico di mola
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithm
Roshan Karunarathna
 
Manet
ManetManet
Manet
ManetManet

Similar to 6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Networks (20)

Networking and data communication IP.ppt
Networking and data communication IP.pptNetworking and data communication IP.ppt
Networking and data communication IP.ppt
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
 
CCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATIONCCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATION
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer Network
 
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
 
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.ppt
 
MPLS (1).ppt
MPLS (1).pptMPLS (1).ppt
MPLS (1).ppt
 
Sensys ch5-mac
Sensys ch5-macSensys ch5-mac
Sensys ch5-mac
 
Presentation8
Presentation8Presentation8
Presentation8
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
Chapter5 link layer and la ns
Chapter5 link layer and la nsChapter5 link layer and la ns
Chapter5 link layer and la ns
 
Tnc18 slides 1___2018-06-09-garr-terenav1
Tnc18 slides 1___2018-06-09-garr-terenav1Tnc18 slides 1___2018-06-09-garr-terenav1
Tnc18 slides 1___2018-06-09-garr-terenav1
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithm
 
Manet
ManetManet
Manet
 
Manet
ManetManet
Manet
 

More from Osama Askoura

Molecular Communication for Bio Fuels
Molecular Communication for Bio FuelsMolecular Communication for Bio Fuels
Molecular Communication for Bio Fuels
Osama Askoura
 
Distributed Computing Set 3 - Topics of non-Byzantine Consensus
Distributed Computing Set 3 - Topics of non-Byzantine ConsensusDistributed Computing Set 3 - Topics of non-Byzantine Consensus
Distributed Computing Set 3 - Topics of non-Byzantine Consensus
Osama Askoura
 
Distributed Computing On Topics of: Leader election + Byzantine algorithms)
Distributed Computing On Topics of: Leader election + Byzantine algorithms)Distributed Computing On Topics of: Leader election + Byzantine algorithms)
Distributed Computing On Topics of: Leader election + Byzantine algorithms)
Osama Askoura
 
Distributed Computing - Slide Set 1 (broadcast algorithms + stronger)
Distributed Computing - Slide Set 1 (broadcast algorithms + stronger)Distributed Computing - Slide Set 1 (broadcast algorithms + stronger)
Distributed Computing - Slide Set 1 (broadcast algorithms + stronger)
Osama Askoura
 
Coexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed Spectrum
Coexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed SpectrumCoexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed Spectrum
Coexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed Spectrum
Osama Askoura
 
Coexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed Spectrum
Coexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed SpectrumCoexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed Spectrum
Coexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed Spectrum
Osama Askoura
 
Virtual reality Immersion and Presence in Physiological Measures
Virtual reality Immersion and Presence in Physiological MeasuresVirtual reality Immersion and Presence in Physiological Measures
Virtual reality Immersion and Presence in Physiological Measures
Osama Askoura
 

More from Osama Askoura (7)

Molecular Communication for Bio Fuels
Molecular Communication for Bio FuelsMolecular Communication for Bio Fuels
Molecular Communication for Bio Fuels
 
Distributed Computing Set 3 - Topics of non-Byzantine Consensus
Distributed Computing Set 3 - Topics of non-Byzantine ConsensusDistributed Computing Set 3 - Topics of non-Byzantine Consensus
Distributed Computing Set 3 - Topics of non-Byzantine Consensus
 
Distributed Computing On Topics of: Leader election + Byzantine algorithms)
Distributed Computing On Topics of: Leader election + Byzantine algorithms)Distributed Computing On Topics of: Leader election + Byzantine algorithms)
Distributed Computing On Topics of: Leader election + Byzantine algorithms)
 
Distributed Computing - Slide Set 1 (broadcast algorithms + stronger)
Distributed Computing - Slide Set 1 (broadcast algorithms + stronger)Distributed Computing - Slide Set 1 (broadcast algorithms + stronger)
Distributed Computing - Slide Set 1 (broadcast algorithms + stronger)
 
Coexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed Spectrum
Coexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed SpectrumCoexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed Spectrum
Coexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed Spectrum
 
Coexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed Spectrum
Coexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed SpectrumCoexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed Spectrum
Coexistence of LTE-U with WiFi 802.11n at 5GHz Unlicensed Spectrum
 
Virtual reality Immersion and Presence in Physiological Measures
Virtual reality Immersion and Presence in Physiological MeasuresVirtual reality Immersion and Presence in Physiological Measures
Virtual reality Immersion and Presence in Physiological Measures
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Networks

  • 1. MAC Protocol for Reliable Multicast over Multi-Hop Wireless Ad Hoc Networks OsamaAskoura EECS6590paperreview 1
  • 2. Roadmap • Introduction • Prior Works • The Algorithm • Performance Analysis • Discussion • Conclusion 2
  • 3. What are ad-hoc networks? 3 Fig1: Ad-hoc Network Example. Sources: Google Images
  • 4. Why are ad-hoc networks important ? 4 Fig2: Ad-hoc Network Applications. Sources: Google Images
  • 5. What is multicast? 5 Fig3: Multicast Example. Sources: Google Images Bob Mike Yan Tell Bob, Mike and Yan, Food is north
  • 6. MAC Protocol for Reliable Multicast over Multi-Hop Wireless Ad Hoc Networks 6
  • 7. No RTS/CTS in IEEE802.11 multicast • MAC layer is based on one-hop broadcast from source to multiple receivers. • IEEE802.11 does not sustain RTS/CTS or ACK in multicast. • This yields unreliable communication. – No guarantee of delivery – Hidden Terminal Problem 7
  • 8. Introduction • Increasing MAC reliability adds MAC overhead • This paper proposes a MAC protocol that uses RTS/CTS using OFDMA concepts. • Introduces RTS/CTS to Multicast MAC Protocol • CTS’s are sent on orthogonal frequencies all at once. 8
  • 9. Prior Works • MMP (Multicast MAC Protocol) • LBP (Leader based protocol) • ELBP (Enhanced Leader Based) • BMMM (Batched Mode Multicast MAC) 9
  • 10. Prior Works • ABM/MMP (Multicast MAC Protocol)[Gossain2004] – Uses ACK (ACK-Based-Multicast) Receive members reply in specific order to avoid collision at sender – Ensures some reliability – Still suffers hidden terminal problem 10
  • 11. Prior Works • LBP (Leader-based Protocol) [Kuri 2001] – Only one “leader” member sends ACK or CTS – Performs well in low mobility networks – Suffers in high mobility networks (MAC overhead choosing leader every time leader leaves) – Other problems if leader couldn’t decode he’s the leader to send CTS – Problem if others couldn’t decode received messages or who’s leader – Problem if only leader received message. Others didn’t; It still assumes all did – Still suffers hidden terminal problem (only leader CTS’s) 11 Got it!
  • 12. Prior Works • ELBP (Enhanced Leader Based) [Bao2005] – Uses RTS-CTS-SEQ-DATA-NACK – SEQ indicates data frame is multicast – Problem if member don’t receive both SEQ and Data – Still suffers hidden terminal problem 12
  • 13. Prior Works • BMMM (Batched Mode Multicast MAC) [Sun 2002, Sun 2003] – Uses RTS/CTS and ACK for all member nodes – Uses two channels for data transmission and ACK – Suffers high overhead 13
  • 14. PRO Algorithm Overview • Solves – Hidden Terminal Problem – Packet Loss due to channel error – High overhead in MAC; thus high throughput • Uses – RTS/CTS & ACK – CTS is sent concurrently over orthogonal channels – Back-off is doubled up to Wmax if ACK not received. 14
  • 16. Algorithm Details • Each member has unique pre-assigned subcarrier location/bit in an OFDM symbol • Sets this bit to BPSK +1, if successfully decoded RTS/DATA • Sets this bit to BPSK -1, if received but failed to decode RTS/DATA. Sender resends RTS/DATA • If member cannot decode MAC header of RTS. No CTS is sent 16
  • 17. Algorithm Flow Chart • Solves – Hidden Terminal Problem – Packet Loss due to channel error – High overhead in MAC; thus high throughput 17
  • 18. Algorithm Design issues • Who assigns the sub-carriers to members? – A multicast leader (ML) – Members broadcasts (MJREQ) to join, leader receives it and assign empty subcarrier. (max of 52) – Sends (MJACK) to confirm join and includes sub-carrier location • How can a leader leave multicast group? – Leader chooses a member at random – Unicasts (MLREQ) to it. Member should reply (MLACK) – If no reply within time threshold. Leader select another member until a new ML is selected 18
  • 19. Algorithm Design issues • What if there’s no leader? Leader fails suddenly? – Matters only when new member join; no leader means no (MJACK) is sent within time threshold to MJREQ – New member claims leadership of the group 19
  • 20. Performance Analysis • Numerical Analysis was performed • Considered a system consisting of 50 nodes. Each node always has a packet available for transmission - saturation condition. Transmission queue of each node is always assumed to be nonempty • Metrics: – transmission/failure/drop probabilities. – Throughput and Goodput. 20
  • 21. Performance Analysis (parameters) 21 B is number of “back-off stages” How many times we double Wmin to reach Wmax.1024/16 =6 SIFS/DIFS/ACK/RTS/CTS times are transmission durations Pe is probability of error due to channel conditions r is number of receivers Number of nodes =50
  • 22. Performance Analysis (transmission/failure probability) • Transmission probability: ps sender receives ACK • Fail probability: p sender does not receive ACK • Collision probability: pc 22 ABM: MMP
  • 23. Performance Analysis (drop probability) • Dropped packet pd: if one node misses current packet and next packet is transmitted (LBP non-leader nodes for example). Current packet is a dropped packet • ABM and PRO dropped packets occur at retry limit exhaustion • LBP dropped packets occur at retry limit and when one member does not receive packet 23
  • 25. Performance Analysis (throughput) • Throughput considers system utilization for successful transmissions • This is misleading for LBP since a transmission is considered successful even if data packets were dropped for non-leader members 25
  • 26. Performance Analysis (goodput) • Define Goodput (G) as system utilization when packets are received by all receivers. 26
  • 29. Discussion • How can the new claimed leader assign a sub-carrier to itself that does not conflict with other nodes? 29
  • 30. Conclusion • Reliable MAC protocol proposed that utilizes RTS/CTS over OFDM concepts, using orthogonal channels • This solves hidden terminal problem and packet drops while keeping “goodput” higher than older protocols 30
  • 31. References • [1] Sung Won Kim, Byung-Seo Kim, Inkyu Lee, “MAC Protocol for Reliable Multicast over Multi-Hop Wireless Ad Hoc Network” IEEE, 2012 • [2] H. Gossain, N. Nandiraju, K. Anand, and D. P. Agrawal, “Supporting MAC layer multicast in IEEE 802.11 based MANETs: Issues and solutions,” in Proc. IEEE LCN, Nov. 2004, pp. 172–179. • [3] J. Kuri and S. K. Kasera, “Reliable multicast in multi-access wireless LANs,” ACM Wireless Netw., vol. 7, no. 4, pp. 359–369, Aug. 2001. • [4] C.-W. Bao and W. Liao, “Performance analysis of reliable MAC-layer multicast for IEEE 802.11 wireless LANs,” in Proc. IEEE ICC, May 2005, pp. 1378–1382. • [5] M.-T. Sun, L. Huang, A. Arora, and T.-H. Lai, “Reliable MAC layer multicast in IEEE 802.11 wireless networks,” Wireless Commun. Mobile Comput., vol. 3, no. 4, pp. 439–453, June 2003. • [6] ——, “Reliable MAC layer multicast in IEEE 802.11 wireless networks,” in Proc. IEEE ICPP, Aug. 2002, pp. 527–536. 31