Académique Documents
Professionnel Documents
Culture Documents
Contention
Joseph Camp
Associate Professor, SMU
EE 5377/7377: Embedded Wireless Design Lab
Sep. 14/16, 2015
Joseph Camp
Overview
Survey MAC Solutions
Contention and Binary Exponential Backoff
Different Qualities of Service
Throughput Sharing Impact on DCF Mechanism Caused By:
Information Asymmetries
Channel Asymmetries
Joseph Camp
SMU
Joseph Camp
SMU
B
What will happen here? (I am purposely being vague)
Joseph Camp
SMU
Collision
One result could be collision, where data arrives at the same
time
Data A
C
Data B
B
How could this be avoided?
Joseph Camp
SMU
Collision
One or more nodes try to transmit a packet simultaneously
Receiver is not able to untangle the result
Wireless channel wasted for the duration of the overlapping
packets
Joseph Camp
SMU
SMU
Spatial Reuse
One result could be spatial reuse where two packets can be
transmitted at the same time
A
Data A
Data C
SMU
SMU
A MACs Goal
For a channel capacity of R bps, what if:
1 node transmitting?
M nodes transmitting?
Joseph Camp
SMU
A MACs Goal
For a channel capacity of R bps, what if:
1 node transmitting? Ideally, node would achieve R bps
M nodes transmitting? M nodes each receive ~ R/M
Decentralized so that one node cant bring down entire
system
Simple, so easy to implement
Joseph Camp
SMU
Joseph Camp
SMU
Joseph Camp
SMU
Joseph Camp
SMU
Joseph Camp
SMU
History of Aloha
Scenario: Univ. of Hawaii, 1970
Packet Radio
Used to connect far-flung campuses on different islands
Application: Teletype requiring only 80 characters/second
Joseph Camp
SMU
Aloha Protocol
Immediately transmit arriving packet
No sensing, no scheduling, no rate limiting,
SMU
ACK
DIFS
DATAA
DIFS
ACKB
SIFS
50
128
50
50
IEEE 802.11b
20
50
IEEE 802.11a
34
IEEE 802.11g
9 or 20
28 or 50
9 or 20
28 or 50
34
34
ACK
DIFS
DATAA
DIFS
ACKB
SIFS
ACK
DATAA
DIFS
ACKB
DATAC
SIFS
DATAA
DIFS
SIFS
DIFS
DATA
ACK
STAB
STAC
ACK
SIFS
DIFS
DIFS
NAVB and C
CWmin
CWmax
AIFSN
Background (AC_BK)
15
1023
15
1023
Video (AC_VI)
15
Voice (AC_VO)
Legacy DCF
15
1023
Ab
Aa
B Aa
b
b
a
a
A
(1)
AB
Ba
ab
(2)
AB
AB
Ab
B
b
b
B
Aa
a
A
ab
(3)
AB
AB
Ab
B Aa
b
b
a
Ba
B
b
b
(4)
B
B
Ab
Aa
a
Ba
B Aa
b
b
a
(5)
A
ab
(6)
B
b
B Aa
b
b
a
Aa
a
(7)
A
Ba
ab
(8)
B
b
b
B
Ab
Aa
a
Ba
(9)
B Aa
b
a
b
ab
(10)
B
b
Aa
a
Ba
(11)
B Aa
b
b
a
Ba
ab
(12)
B
b
b
Scenario Classification
Senders Connected (SC): scenarios 2-7, where senders of
each flow are in radio range.
Asymmetric Incomplete State (AIS), scenarios 11 and 12,
where senders are disconnected, asymmetric connections
between the two flows.
Symmetric Incomplete State (SIS), scenario 8, 9 and 10,
where senders are disconnected, symmetric connections
between the two flows.
Ab
Aa
B Aa
b
b
a
a
A
(1)
AB
Ba
ab
(2)
AB
AB
Ab
B
b
b
B
Aa
a
A
ab
(3)
AB
AB
Ab
B Aa
b
b
a
Ba
B
b
b
(4)
B
B
Ab
Aa
a
Ba
B Aa
b
b
a
(5)
A
ab
(6)
B
b
B Aa
b
b
a
Aa
a
(7)
A
Ba
ab
(8)
B
b
b
B
Ab
Aa
a
Ba
Yellow:
Symmetric
(9)
Incomplete State
B Aa
b
a
b
ab
(10)
B
b
Aa
a
Ba
B Aa
b
b
a
Ba
ab
Red:
(11) Asymmetric(12)
Incomplete State
B
b
b
Hidden Terminals
Objective
Topological
Asymmetries
Channel
Asymmetries
Methodology
In-lab experiments to inform model of wireless adapter
behavior
Capture and packet loss probability based on SNR
Develop analytical model to model MAC-level throughput of
competing flows
Considers all possible capture behaviors
Design a set of urban experiments for model validation and
understanding role of realistic channel conditions on
asymmetries
Apply the model to understand how to improve
performance
8 dB
Markov Model
Inputs: SNR matrix between nodes and traffic matrix
Output: MAC-level throughput of flows
Both access mechanisms modeled
Joint backoff state evolution
Idle (), single access (TS), overlapping access (T)
Forward B Reverse B
Reverse A Forward A
Simple Example
Timeline/Table
...
+
...
+
SMU
Anonymous Surveys
Semi-weekly anonymous surveys will help me to get
feedback from you about how the course is going
Write any question that you may have about the material or
course
Anything that could be improved upon
Any other feedback that you might deem relevant