Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks



Similar documents
Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

MAC Algorithms in Wireless Networks

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

Adaptive DCF of MAC for VoIP services using IEEE networks

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

CSMA/CA. Information Networks p. 1

Lecture 17: Wireless Networking"

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Performance Evaluation of Wired and Wireless Local Area Networks

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

... neither PCF nor CA used in practice

SJBIT, Bangalore, KARNATAKA

A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

A TCP-like Adaptive Contention Window Scheme for WLAN

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

A Survey: High Speed TCP Variants in Wireless Networks

The MAC layer in wireless networks

Selfish MAC Layer Misbehavior in Wireless Networks

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Lecture 7 Multiple Access Protocols and Wireless

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

EPL 657 Wireless Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

How To Solve A Network Problem In An Ipa (Ipa 2) (Ipam) (Networking) (For Acedo) (Ipta) (Powerline) (Network) (Nem

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

IEEE Ad Hoc Networks: Performance Measurements

Dynamic Source Routing in Ad Hoc Wireless Networks

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Random Access Protocols

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

ECE 428 Computer Networks and Security

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY

Chapter 6: Medium Access Control Layer

Algorithms for Interference Sensing in Optical CDMA Networks

How To Determine The Capacity Of An B Network

PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE WIRELESS LANS

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

QoS issues in Voice over IP

TCP in Wireless Networks

10. Wireless Networks

Performance Analysis of the IEEE Wireless LAN Standard 1

How To Make A Multi-User Communication Efficient

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

A Catechistic Method for Traffic Pattern Discovery in MANET

ECE 333: Introduction to Communication Networks Fall 2002

Performance Evaluation of a Binary Exponential Code Backoff Algorithm for IEEE Kang Sun

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

A Non-beaconing ZigBee Network Implementation and Performance Study

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

CS263: Wireless Communications and Sensor Networks

Performance Evaluation Of Multiband CSMA/CA With RTS/CTS For M2M Communication With Finite Retransmission Strategy

Based on Computer Networking, 4 th Edition by Kurose and Ross

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

Wiereless LAN

Performance evaluation of QoS in wireless networks using IEEE e

Performance Evaluation of Unicast and Broadcast Mobile Ad-hoc Networks Routing Protocols

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Security in Ad Hoc Network

Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC)

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

Transcription:

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk Abstract- The collision probability in the MAC layer could become very high when a poor backoff algorithm is used, especially in dense networks. The Binary Exponential Backoff () used in the IEEE 8. MAC protocol uses a uniform random distribution to choose the backoff value. This often leads to reducing the effect of window size increment. This paper proposes a new backoff algorithm called Fibonacci Increment Backoff () in which the differences between consecutive contention window sizes are reduced. Results from simulation experiments reveal that the proposed algorithm achieves higher throughput than the when used in a mobile ad hoc environment. Keywords IEEE 8., Ad hoc networks, Medium access control, Backoff algorithm, Throughput analysis. I. INTRODUCTION Since their emergence, wireless networks have become increasingly popular in the computing industry. This is particularly true within the past decade, which has seen wireless networks being widely adopted to enable mobility. Over the development process of computer networks, two main variations of mobile wireless networks have been introduced, infrastructure and ad hoc wireless networks []. Recently, a significant number of researchers have moved towards studying Mobile Ad Hoc Networks (MANETs). Interest in MANETs is due to many new characteristics provided only by this type of networks. Firstly, MANETs are easily deployed allowing a plug-and-communicate method of networking. Secondly, MANETs need no infrastructure [7], eliminating the need for an infrastructure reduces the cost of establishing the network. Moreover, such networks can be useful in disaster recovery where there is not enough time or resources to install and configure an infrastructure. Thirdly, MANETs also do not need central management. Hence, they are used in military operations where units are moving around the battlefield and a central unit cannot be used for synchronization [7]. Nodes forming an ad hoc network are required to have the ability to double up as a client, a server, and a router simultaneously [7]. Moreover, these nodes should also have the ability to connect to and automatically configure to start transmitting data over the network. As a result of having the characteristics mentioned so far,, protocols used for ad hoc networks generally function in a distributed manner []. The distributed Coordination Function (DCF) is used for synchronous, contention-based, distributed access to the channel []. MANETs use a shared medium to transfer data between its nodes. It is impractical to expect a MANET to be fully connected, where a node can directly communicate with every other node in the network. Typically, nodes are obliged to use a multihop path for transmission, and a packet may pass through multiple nodes before being delivered to its intended destination. The wireless medium used by MANETs has a number of problems. Bandwidth sharing, signal fading, noise, interference, etc. with such a public medium, a well-organized and effective Medium Access Control (MAC) is indispensable to organize sharing the scarce bandwidth resource [] [7]. Based on the features mentioned, the design of the medium access control (MAC) protocol is a significant factor affecting the performance of MANETs. Many researchers have proposed the mechanism of channel sensing, or packet sensing to avoid collision. The sensing mechanisms typically rely on the transmitter and receiver performing a handshake prior to the transmission of the data packet []. More specifically, The Medium Access Collision Avoidance (MACA) method proposed by Karn [] implements the handshake via a pair of Request-To-Send (RTS) and Clear-To-Send (CTS) messages. When a node has to send data to another, it first sends a short RTS to the destination. The receiver responds with a CTS packet []. On receipt of the CTS, the sender

sends its queued data packet(s). All other nodes overhearing the CTS message will defer from sending out any packet until the predicted transmission period indicated in the CTS packet, is passed. Any node that overhears the RTS signal but not CTS is allowed to send out packets in a certain time period as either the RTS/CTS handshake is not completed or it is out of range of the receiver. As a part of an efficient MAC protocol, a backoff algorithm is used to avoid collisions when many nodes try to access the medium []. Only one of the nodes is granted access to the channel, while other contending nodes are suspended into a backoff state for some period (BO) [8]. Many backoff algorithms have been developed in the literature [, 8]. One example is the Multiplicative Increase Linear Decrease (MILD) algorithm []. This algorithm improves the total throughput of the network, but the cost of this improvement is the need of a perfect knowledge regarding collisions happening over the network, which is high cost and hardto-acquire knowledge [7]. In a wired LAN the total number of nodes of the network is easily obtained. However, as nodes in MANETs are mobile, knowing the number of nodes may incur a high cost, since this knowledge needs to be updated due to the frequent change in the MANET topology. One approach to update and keep the knowledge consistent is by exchanging packets between neighboring nodes [].these packets form extra load, consume a part of the network resources, and cause a longer delay. Moreover, neighbor discovery requires more control processing, and even incurs more work to the backoff algorithm itself. Other backoff algorithms have tried to find a fixed optimum backoff value to use. Even though, the distributed functionality was incomplete []. In the IEEE 8. standard MAC protocol, the truncated Binary Exponential Backoff () is used [9]. In this algorithm, when a node over the network has a packet to send, it first senses the channel using a carrier sensing technique. If the channel is found to be idle and not being used by any other node, the node is granted access to start transmitting. Otherwise, the node waits for an inter-frame space and the backoff mechanism is invoked. A random backoff time is chosen in the range [, CW-]. A uniform random distribution is used here, where CW is the current contention window size. The following equation is used to calculate the backoff time (BO): BO = (Rand () MOD CW) * aslottime () The backoff procedure is preformed then, by putting the node on a waiting period of length BO. Using carrier sense mechanism, the activity of the medium is sensed at every time slot. If the medium is found to be idle then the backoff period is decremented by one time slot. Backoff time (BO) new = (BO) old - aslottime () If the medium is busy during backoff, then the backoff timer is suspended. That is, the backoff period is counted in term of idle time slots. Whenever the medium is found idle for longer than an inter-frame space, backoff is resumed. When the backoff period is finished with a BO value of zero, a transmission should take place. If the node succeeds to send a packet and receive an acknowledgment for that packet, then the CW for this node is reset to the minimum, which is equal to in the case of. The 'truncated' simply means that after a certain number of increases, the exponentiation stops; i.e. the retransmission timeout increases to a ceiling value, and thereafter does not increase any more. The ceiling is set at i = transmission failures, assuring that the maximum delay is slot times. Since these delays cause other nodes to collide as well, there is a possibility that on a busy network, many nodes may be caught in a single collision set. To overcome the possibility of starvation, the transmission process is aborted after failing attempts of transmission [] has a number of disadvantages []. One major disadvantage is the problem of fairness. tends to have a preference for most recent contention winner and new contending nodes over other nodes when allocating channel access. Determining backoff period is accomplished by choosing a random backoff value from a contention window (CW) which has smaller size for new contending nodes and contention winners. This behavior causes what is known as Channel capture effect in the network. Another problem of is stability. has been designed to be stable for large number of nodes [7]. However, a number of studies have shown that could suffer from instability [7]. In this paper, we present a new backoff algorithm, referred to as Fibonacci Increment Backoff () that can overcome the

limitation of the existing MAC solutions in. In the algorithm the difference between consecutive contention window sizes are reduced according to a Fibonacci sequence. Results from simulation experiments reveal that the proposed algorithm achieves higher throughput than the when used in a mobile ad hoc environment. The rest of the paper is organized as follows. Section presents the new algorithm. Section presents the simulation model. Section then analyses the performance results. Finally, Section concludes this study. II. THE PROPOSED ALGORITHM Most backoff algorithms suffer from the following shortcoming due to their inherent operations. Increasing the contention window in case of failure to transmit tends to rapidly increase large contention windows to even larger sizes. Reaching such large window sizes dangerously decrease the possibility of gaining access to the channel. Moreover, a large window size tends to contribute to increasing channel idle times, leading to a major waste the shared limited communication channel. Motivated by this above observation, we propose a new backoff algorithm to improve the performance of the backoff algorithm. One of the most famous series in math is the Fibonacci series defined by the following rule []: F (n) = F (n -) + F (n - ). F () =, F () =, n >=. The Fibonacci series has a number of useful characteristics. One specific property is a special value, closely related to the Fibonacci series, is called the golden section. This value is obtained by taking the ratio of successive terms in the Fibonacci series. Figure illustrates this property. After a certain number of terms, the ratio tends to converge into a limit of. []. In our proposed algorithm, we used the F (n) as the new contention window size, leading to a smaller increment on large window sizes as shown in figure. Figure Ratio of successive Fibonacci terms. Figure Pseudo code of Algorithm

III. SIMULATION The proposed algorithm has been evaluated using the Network Simulator NS.9 []. The original standard MAC protocol has been modified to implement our proposed backoff algorithm. Modifications have mainly targeted the mac8_.h and mac8_.cc files. Several topologies and mobility scenarios have been created to test the algorithm as intensively as possible. Firstly, we have varied the total number of nodes in the network. Changing the number of nodes is our method of predicting the performance of our algorithm for all sizes of networks. Simulations have been carried out for networks having total number of node varying between and mobile nodes. Secondly, in order to address the main drawback of MANETs, we have used different values for mobility speed. Testing for speed values, ranging from ms - to ms - has given us useful information concerning the efficiency of our algorithm for static and highly mobile MANETs as well. Other simulation parameters are the area of m m, simulation time is 9 seconds, nodes transmission range is m and the traffic generated is CBR traffic. Table summarizes simulation parameters. Table Simulation Parameters Parameter Nodes Speeds (ms - ) Area Simulation time Transmission range Value,,,,,, m X m 9 s m IV.RESULTS As shown in the following figures, the new has improved the total throughput of the network simulated in our work. When the number of nodes is increased, the contention is higher to gain access to the channel. Because of the reduced amount of increment on the window size, a larger size of data was successfully received by nodes over the network. The same enhancement is noticed even while increasing mobility speed. One of the major obstacles in the way of developing a MAC protocol for MANETs is mobility. Having a long backoff value allows the node to move outside the transmission range before being allowed to retry accessing the channel. With, the ceiling of backoff periods is controlled to prevent extremely long backoff periods. One more factor participating in increasing throughput is reducing idle times. With smooth increments of contention window size, idle time is reduced. Total received data for speed m /s 7 Data receievd MB 8 Number of nodes Figure Received Data at speed m/s

Total data received at m/s 9 8 7 8 Number of nodes Figure Received Data at speed m/s Total Data Received for Nodes.. Data MB... speed m/s Figure Received Data at nodes Total Data Received for Nodes 8 7 Data (MB) 8 Speed m /s Figure Received Data at nodes V. CONCLUSION The Binary Exponential Backoff () is used by the IEEE 8. Medium Access Control (MAC) protocol. uses uniform random distribution to choose the backoff value. In this paper, we have proposed a new backoff algorithm to reduce the increment factor for large contention window sizes. Results from simulations have demonstrated that the proposed algorithm increased the total throughput of mobile ad hoc networks especially when the system size is large. The total throughput has been increased for highly mobile networks.

VI. REFERENCES [] L. Bao and J. J. Garcia-Luna-Aceces, A New Approach to Channel Access Scheduling for Ad Hoc Networks, in ACM MOBICOM, pp.,. [] V. Bharghavan, et al., "MACAW: a media access protocol for wireless LAN's", Proceedings of the conference on Communications architectures, protocols and applications, 99, pp.. [] L. Bononi, et al., "A differentiated distributed coordination function MAC protocol for cluster-based wireless ad hoc networks", Proceedings of the st ACM international workshop on performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, pp. 77-8,. [] F. Cali', et al.., IEEE 8. Wireless LAN: Capacity Analysis and Protocol Enhancement, Proc. INFOCOM'98, San Francisco, CA, March 9 - April, 998, pp. -9. [] B. Ensaou, et al., Fair Media Access in 8. based Wireless Ad-Hoc Networks. In IEEE/ACM MobiHOC (Boston, MA., August ). [] K. Fall and K. Varadhaa. editors. NS notes and Documentation. The V l N l Project UC Berkeley. LBL. USC/ISI. and Xeros PARC.. [7] Z.Fang, et al., Performance evaluation of a fair backoff algorithm for IEEE 8. DFWMAC. International Symposium on Mobile Ad Hoc Networking & Computing [8] J. Goodman et al., Stability of Binary Exponential Backoff, app. In the Proc. of the 7-th Annual ACM Symp. Theory of Comp., Providence, May 98. [9] J. Hastad, et al., Analysis of Backoff Protocols for Multiple Access Channels, Siam J. Computing vol., No., 8/99, pp. 7. [] IEEE, ANSI/IEEE std 8., 999 Edition (R), Part : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. [] P. Karn, "MACA - A new channel access method for packet radio", ARRL/CRRL Amateur Radio 9th computer Networking Conference, 99, pp. - [] S. Manaseer and M. Ould-kauoa, "A New Backoff Algorithm for MAC Protocol in MANETs," st Annual UK Performance Engineering Workshop, pp 9-,. [] K. Sakakibara, et al., "Backoff Algorithm with Release Stages for Slotted ALOHA Systems." ECTI Transactions On Electrical Eng., Electronics, And Communications vol., no. pp 9-7,. [] K. Sundaresan and R. Sivakumar, "A unified MAC layer framework for ad-hoc networks with smart antennas", Proceedings of the th ACM international symposium on Mobile ad hoc networking and computing, pp. -,. [] C. Sauer, E. MacNair, "Simulation of Computer Communication Systems", Prentice-Hall, INC., 98 [] F. Tobagi and L. Kleinrock, "Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics", IEEE Transactions on Communications, 97, Vol., No., pp.. [7] F. Tobagi and L. Kleinrock, "Packet Switching in Radio Channels: Part II--The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution", IEEE Transactions on Communications, 97, Vol., No., pp. 7. [8] Cheng-shong Wu and Victor O.K. Li, "Receiver-initiated busy-tone multiple access in packet radio networks", Proceedings of the ACM workshop on Frontiers in computer communications technology, 987, pp. -. [9] K. Xu, et al., "How effective is the IEEE 8. RTS/CTS handshake in ad hoc networks", IEEE Global Telecommunications Conference,, Vol., pp. 7 7. [] H. Zhai and Y. Fang, Performance of Wireless LANs Based on IEEE 8. protocols. th IEEE International Symposium on Personal, Indoor and Mobile Radio Communication Proceedings, pp 8-9,. [] Finch, S. R. "The Golden Mean." Mathematical Constants. Cambridge University Press, pp. -,.