Escolar Documentos
Profissional Documentos
Cultura Documentos
Abstract
INTRODUCTION
A multihop wireless ad hoc network consists of mobile hosts (MHs) equipped with radio devices to
cooperatively form a communication network. In
such a network, MHs may not be within transmission range of each other, but they can still build a
connection through other MHs. Since all MHs use
a common radio channel to communicate with one
another, it becomes necessary to have a medium access control (MAC) protocol to govern their access
to this shared media so that there is no conflict.
The carrier sense multiple access (CSMA) protocols
[1][3] have been used in a number of packet-radio
networks in the past. Although they are simple and
can achieve acceptable channel throughput under
certain situations, they suffer from the well-known
hidden terminal problem [2] in multihop wireless
ad hoc networks, which signifkantly degrades their
performance.
To overcome this problem, various MAC protocols [5][6][7][81[10] have been developed with an ad-
2
2.1
RELATED WORK
Sender-initiated MAC Protocols
512
2.2
3.1
513
involved. During route discovery, packets are broadcast. When it comes to data communication, nodes
in the route use an underlying MAC protocol such
as MARCH.
To begin data transmission in Route 1, an RTS
packet (RTS1) packet is first sent from MHA to
MHB. If this packet is successfully received by
MHB, MHB will reply with a CTSl packet to grant
the data transmission, as illustrated previously in
Figure 2. Meanwhile, CTSl is also overheard by
MHc. According to the MAC address and RTID,
MHc knows that the packet is sent by its upstream
MHB in Route 1. A timer T,, is then invoked
at MHc. T ! is set to a value long enough for
MHB to receive and process the new data packet.
Upon timeout, if the channel is free, MHc sends a
CTS2 packet to MHB to acquire the data packet.
Similarly, MHD will overhear CTS2 sent by MHc
and will subsequently invite MHc to relay the data
packet via CTS3 once its T, timer expires.
In the above example, MHz, the downstream MH
of MHc in Route 2, will also overhear the CTS2
packet. To avoid MHz misinterpreting it and initiating an unnecessary CTS-only handshake, the
RTID method is applied.
In MARCH, the MAC layer has access to tables that maintain information on the routes the
node participates into, as well as its upstream and
downstream neighbors in those routes. This does
not mean that MARCH performs any Layer 2 routing. It just consults those tables to understand if
it should respond to a control message (RTS/CTS)
particular to a certain route. If a MH is going to initiate a CTS-only handshake in route i, it encloses
its RTID for that route in the CTS packet. Therefore, by checking the RTID in CTS?, only MHD will
react appropriately to the control packet, and may
''7 timer
initiate a CTS-only handshake after its
expires. It is important to note that MARCH does
not participate in routing, nor makes any decisions
about the data packets exchanged. The contents of
the data packets are passed on to the network layer
for processing and action as usual.
3.2
MARCH Illustration
PERFORMANCE EVALUATION
514
Yt.
w-3G
"
- . .
Y
i:
...................................
FI
4.1
End-to-End Throughput
515
4.2
Control Overhead
4.3
CSMA/CA Protocols, 4th International Conference on Land Mobile Radio, pp. 231-6, 1987.
[4] A. Colvin, CSMA with collision avoidance, Computer Communication, vol. 6, no. 5 , pp 227-35,1983.
End-to-end Delay
Figure 7 shows the average end-to-end delay associated with transmitting a data packet through a
route. Under light traffic load, the delay in MARCH
is higher than MACA. This is because the reduced
handshake mechanism introduces an extra delay
close to the the packet inter-arrival time at each intermediate MH (e.g., MH2, MH3 and MH4 in route
1). However, as the traffic load increases beyond
50 pkt/sec, the delay in MACA grows significantly
when compared t o MARCH since control packet collisions cause a lot of queuing delay at MH2 and MH7.
Packet queing due to collisions does not happen in
MARCH until the traffic load is above 100 pkt/sec.
Protocol for Wireless LAN, Proc. ACM SIGCOMM 94, pp. 212-225,1994.
[7] Chane L. Fullmer and J.J. Garcia-Luna-Aceves,
Floor Acquisition Multiple Access (FAMA) for
Packet-Radio Networks, Proc. ACM SIGCOMM
95, 1995.
[8] Fabrizio Talucci and Mario Gerla, MACA-BI
(MACA By Invitation): A Wireless MAC Protocol
for High Speed Ad Hoc Networking, Proc. IEEE
ICUPC 97,1997.
[9] J.J. Garcia-Luna-Aceves and Asimakis Tzamaloukas, Reversing the Collision-Avoidance
Handshake
in
Wireless
Networks,Proc.
ACM/IEEE Mobicom 99, Seattle, Washington,
1999.
CONCLUSION
References
[l]L. Kleinrock and F. A. Tobagi, Packet switching in
radio channels: Part I - carrier sense multiple-access
516