The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.08 - Aug. (2013 vol.12)
pp: 1598-1612
Jonathan Lutz , Arizona State University, Tempe
Charles J. Colbourn , Arizona State University, Tempe
Violet R. Syrotiuk , Arizona State University, Tempe
ABSTRACT
The primary function of the medium access control (MAC) protocol is managing access to the shared communication channel. From the viewpoint of the transmitters, the MAC protocol determines each transmitter's channel occupancy, the fraction of time that it spends transmitting over the channel. In this paper, we define a set of topological persistences that conform to both network topology and traffic load. We employ these persistences as target occupancies for the MAC layer protocol. A centralized algorithm is developed for calculating topological persistences and its correctness is established. A distributed algorithm and implementation are developed that can operate within scheduled and contention-based MAC protocols. In the distributed algorithm, network resources are allocated through auctions at each receiver in which transmitters participate as bidders to converge on the topological allocation. Very low overhead is achieved by piggybacking auction and bidder communication on existing data packets. The practicality of the distributed algorithm is demonstrated in a wireless network via simulation using the ns-2 network simulator. Simulation results show fast convergence to the topological solution and, once operating with topological persistences, improved performance compared to IEEE 802.11 in delay, throughput, and drop rate.
INDEX TERMS
Media Access Protocol, Resource management, Transmitters, Distributed algorithms, Network topology, Receivers, medium access control, Wireless networks
CITATION
Jonathan Lutz, Charles J. Colbourn, Violet R. Syrotiuk, "Topological Persistence for Medium Access Control", IEEE Transactions on Mobile Computing, vol.12, no. 8, pp. 1598-1612, Aug. 2013, doi:10.1109/TMC.2012.134
REFERENCES
[1] D. Plummer, "Ethernet Address Resolution Protocol," IETF RFC 826, 1982.
[2] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, "MACAW: A Medium Access Protocol for Wireless LANs," Proc. ACM SIGCOMM, pp. 212-225, 1994.
[3] I. Chlamtac and A. Faragó, "Making Transmission Schedules Immune to Topology Changes in Multi-Hop Packet Radio Networks," IEEE/ACM Trans. Networking, vol. 2, no. 1, pp. 23-29, Feb. 1994.
[4] I. Chlamtac and S. Kutten, "A Spatial-Reuse TDMA/FDMA for Mobile Multi-Hop Radio Networks," Proc. IEEE INFOCOM, pp. 389-393, 1985.
[5] I. Chlamtac and S.S. Pinter, "Distributed Nodes Organization Algorithm for Channel Access in a Multihop Dynamic Radio Network," IEEE Trans. Computers, vol. 36, no. 6, pp. 728-737, June 1987.
[6] C.J. Colbourn and V.R. Syrotiuk, "Scheduled Persistence for Medium Access Control in Sensor Networks," Proc. IEEE Int'l Conf. Mobile Ad-Hoc and Sensor Systems (MASS), pp. 264-273, 2004.
[7] J. Deng, P.K. Varshney, and J. Haas, "A New Backoff Algorithm for the IEEE 802.11 Distributed Coordination Function," Proc. Comm. Networks and Distributed Systems Modeling and Simulation Conf. (CNDS), 2004.
[8] L.C. Freeman, "A Set of Measures of Centrality Based on Betweenness," Sociometry, vol. 40, no. 1, pp. 35-41, 1977.
[9] C.L. Fullmer and J. Garcia-Luna-Aceves, "Floor Acquisition Multiple Access (FAMA) for Packet-Radio Networks," Proc. ACM SIGCOMM, vol. 25, pp. 262-273, 1995.
[10] J. Garcia-Luna-Aceves and A. Tzamaloukas, "Receiver-Initiated Collision Avoidance in Wireless Networks," Wireless Networks, vol. 8, pp. 249-263, 2002.
[11] Z. Haas and J. Deng, "On Optimizing the Backoff Interval for Random Access Schemes," IEEE Trans. Comm., vol. 51, no. 12, pp. 2081-2090, Dec. 2003.
[12] J. Hastad, T. Leighton, and B. Rogoff, "Analysis of Backoff Protocols for Multiple Access Channels," Proc. ACM 19th Ann. Symp. Theory of Computing (STOC), pp. 740-744, 1987.
[13] X.L. Huang and B. Bensaou, "On Max-Min Fairness and Scheduling in Wireless Ad-Hoc Networks: Analytical Framework and Implementation," Proc. ACM MobiHoc, pp. 221-231, 2001.
[14] IEEE 802.3, CSMA/CD Ethernet Access Method, IEEE, 1983.
[15] IEEE 802.11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE, 1997.
[16] L.B. Jiang and S.C. Liew, "Proportional Fairness in Wireless LANs and Ad Hoc Networks," Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), vol. 3, pp. 1551-1556.
[17] J. Ju and V.O.K. Li, "An Optimal Topology-Transparent Scheduling Method in Multihop Packet Radio Networks," IEEE/ACM Trans. Networking, vol. 6, no. 3, pp. 298-305, June 1998.
[18] P. Karn, "MACA - A New Channel Access Method for Packet Radio," Proc. ARRL/CRRL Amateur Radio ninth Computer Networking Conf., pp. 134-140, 1990.
[19] J. Lutz, C.J. Colbourn, and V.R. Syrotiuk, "Apples and Oranges: Comparing Schedule- and Contention-Based Medium Access Control," Proc. 13th ACM Int'l Conf. Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM), pp. 319-326, 2010.
[20] T. Nandagopal, T.-E. Kim, X. Gao, and V. Bharghavan, "Achieving MAC Layer Fairness in Wireless Packet Networks," Proc. ACM MobiCom, pp. 87-98, 2000.
[21] The Network Simulator ns-2, http://www.isi.edu/nsnamns/, 2013.
[22] M. Pióro and D. Medhi, Routing, Flow, and Capacity Design in Communication and Computer Networks. Elsevier, 2004.
[23] R. Rozovsky and P.R. Kumar, "SEEDEX: A MAC Protocol for Ad Hoc Networks," Proc. ACM MobiHoc, pp. 67-75, 2001.
[24] J.L. Sobrinho and A.S. Krishnakumar, "Distributed Multiple Access Procedures to Provide Voice Communications over IEEE 802.11 Wireless Networks," Proc. Global Telecomm. Conf. (GlobeCom), vol. 3, pp. 1689-1694, 1996.
[25] V.R. Syrotiuk, C.J. Colbourn, and S. Yellamraju, "Rateless Forward Error Correction for Topology-Transparent Scheduling," IEEE/ACM Trans. Networking, vol. 16, no. 2, pp. 464-472, Apr. 2008.
[26] F. Talucci, M. Gerla, and L. Fratta, "MACA-BI (MACA by Invitation) - A Receiver Oriented Access Protocol for Wireless Multihop Networks," Proc. IEEE Int'l Conf. Universal Personal Comm. (ICUPC), vol. 2, pp. 913-917, 1997.
[27] A.S. Tanenbaum and D.J. Wetherall, Computer Networks. Prentice Hall, 2003.
[28] Z. Tang and J. Garcia-Luna-Aceves, "A Protocol for Topology-Dependent Transmission Scheduling in Wireless Networks," Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), pp. 1333-1337, 1999.
[29] L. Tassiulas and S. Sarkar, "Maxmin Fair Scheduling in Wireless Networks," Proc. IEEE INFOCOM, pp. 763-772, 2002.
[30] X. Wang and K. Kar, "Distributed Algorithms for Max-Min Fair Rate Allocation in ALOHA Networks," Proc. 42nd Ann. Allerton Conf. Comm., Control, and Computing, 2004.
[31] X. Wang, K. Kar, and J.-S. Pang, "Lexicographic Max-Min Fairness in a Wireless Ad Hoc Network with Random Access," Proc. IEEE Conf. Decision and Control (CDC), pp. 1284-1300, 2006.
[32] C. Zhu and M.S. Corson, "A Five-Phase Reservation Protocol (FPRP) for Mobile Ad Hoc Networks," Wireless Networks, vol. 7, no. 4, pp. 371-384, 2001.
48 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool