Cooperative Medium Access Control Protocol for Mobile Ad-hoc Networks using Spatial Diversity

Автор: Tazeem Ahmad Khan, M T Beg, M A Khan

Журнал: International Journal of Intelligent Systems and Applications(IJISA) @ijisa

Статья в выпуске: 11 vol.5, 2013 года.

Бесплатный доступ

Enhancement the Performance of MANET (Mobile Ad-hoc Network) using spatial diversity. Spatial diversity implemented using cooperative transmission technique in Medium access control (MAC) layer level protocol. In noisy environment limit the network performance like coverage area, limit number of node, degrade packet transmission rate, increase packet loss rate etc. In this paper enhance the source to destination transmission range, minimize the packet loss, improve packet transmission rate and appropriate end to end delay. When direct link is fail to transmit packet then Cooperative scheme help to transmit packet. Cooperative scheme is to help the packet transmission with five handshakes instead of four. This scheme implemented in MANET network on MAC layer protocol. Cooperative scheme improve the performance with help of intermediate node between sources to destination. We are performance analysis using discrete simulator NS-2 in MANET. Our performance based on MAC layer level with cooperative scheme in IEEE WLAN standard CSMA/CA protocol.

Еще

802.11, CSMA/CA, NS-2, MAC Layer, MANET

Короткий адрес: https://sciup.org/15010493

IDR: 15010493

Текст научной статьи Cooperative Medium Access Control Protocol for Mobile Ad-hoc Networks using Spatial Diversity

Published Online October 2013 in MECS

In the world most demanded technology is wireless technology. Wireless technology is similar wired technology, the basic difference between wired network and wireless network is lower data link layer (MAC layer) and Physical layer protocol. In wireless network Medium access control protocol CSMA/CA instead of CSMA/CD and token ring, MAC mechanism is control the end to end transmission and reception process, also control performance parameters like throughputs, data loss, packets delivery ratio and share medium. In data transmission process MAC layer with RTS/TCS protocol to reduce collision rate using four way handshakes. In highly noise environment or fading channel condition RTS/CTS protocol less effective or transmission failed, if transmission fail due to atmospheric channel condition or distance, an intermediate nodes cooperate the transmission, it is called Cooperative transmission or cooperative medium access control protocol. Cooperative MAC is used five handshake process to avoid receiver frame decode problem, enhance the packet deliver ratio, throughputs and data loss rate. Cooperative technique based on the diversity technique, it is called spatial diversity. In this technique have a potential to improve the performance of wireless network, also appropriate for broadcast transmission. Our simulation this technique is implemented mobile ad-hoc network to enhance the performance of network [1, 2, 5, 6, 7].

This is hot area of Research cooperative transmission scheme. Researchers aim is enhancement wireless network parameters like throughputs, end to end delay, minimization energy consumption using cooperative scheme. The cooperative scheme is also implemented on physical layer level to improve the performance [11, 12, 13, 15].

This paper is organized as: Section-II Cooperative MAC scheme is help to data transmission using Spatial Diversity, Section-III Simulation and results using NS-2, Section- IV Conclusion of result analysis.

  • II.    About the WLAN Cooperative MAC Scheme

Medium Access control is heart of wireless networks, either a centralized control or ad-hoc network. MAC is a lower sub- data link layer. MAC layer and Physical layer specification finalized by recommended committee time to time as amendment or final report IEEE wireless standers [1, 212, 13, 15]. MAC layer base on Contention free and Contention oriented access. Contention free is a distributed channel access mechanism based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). CSMA/CA channel contention mechanism can also used with Request to send / Clear to Send (RTS/CTS) mechanism. The hidden node problem solved using RTS/CTS operation. DCF used different frame space DIFS, IFS, SIFS for transmission a frame. Time space depends on the channel condition (idle or busy). If the channel is busy, it enters a backoff procedure among contention window [1, 4,5,11, 12, 22].

Function of MAC layer mainly reliable transmission, access mechanism control, and also security [7,8, 9]. Procedure of data transmission and reception, data addressing, data fragmentation, packets formatting is depends on MAC sub-layer. Data link layer are divided upper sub layer logical link control and lower sub medium access control layer. Logical link layer is common line and wireless network. MAC layer receive data packet from logical link layer, send to physical layer [11, 12, 13,].

The cooperative scheme is based on a conventional MAC layer mechanism protocol. In centralized control wireless network is used cooperative scheme as known Coop MAC protocol. In our study is implemented this scheme to standard (IEEE 802.11) mobile wireless network to enhance the performance. In cooperative scheme procedure node transmit a packet, firstly identify cooperation scheme table to know about the rate of transmission, minimum time for one hop or two hop transmission via helper (intermediate node) and at instant select the appropriate helper. Instant selected helper received the packet from transmitting node at rate R 1 and send to the destination node at rate R 2 . Destination node is sending acknowledge to receiver node after successful reception. Cooperative scheme is extended form five-way handshake mechanism instead of four- way handshake using RTS-CTS to exchange data. When source node transmit need help to helper for transmission, it similar procedure as traditional RTS-CTS. The helper and destination node are send the message to transmitter node to use cooperative scheme. The helper node is idle, then helper inform a helperready to send, when it receive RTS [5, 6, 7].

Cooperative scheme is also enhance control schedule, all the helpers to contain required information in the cooperative scheme table. Appropriate MAC address is indexed in the table, one of them selected as a helper. The 3rd and 4th field in the table source and Destination table is store the information related helper. The cooperative scheme implemented to Mobile Ad-hoc Network is not similar as conventional wireless network. It is used cooperative diversity. MAC layer operation response time is better as compare to conventional MAC layer and information easily access from physical layer [5, 20, 23].

When a node has M bytes data send to another node, first check the table and find all helper to transmission time and select minimum time transmission helper. Total transmission time is source-to-helper and helper-to-destination. If source-to-helper at rate Ra 1 and helper-to-destination Ra 2 then total transmission time is

8*W

T о t a I tr arts m is s i о n ti m e  --1-- (1)

Rai Ra2

If source-to-destination at rate Ra, transmission time 8*W/Ra, then we want to transmission time less than 8*W/Ra.

8 *W 8*W +   <

Rai Ra2

8 *W

Ra

Fig. 1: Cooperative scheme of control packet Exchange technique

Fig. 2: Cooperative scheme of data and exchange technique ACK packet

Cooperative scheme procedure is show in the Figure 1 and Figure 2 In the figure1.shows control packet exchange procedure, when source node send a control packet RTS and helper received RTS, then helper reply helper-ready-to-send to source and destination. In Figure 2 show data and acknowledge packet exchange procedure, when source node send a data packet via helper to destination, then destination acknowledge directly to source node after successful received packet [5, 6,7,13, 20, 21].

  • III.    Simulation and Performance Evaluation

The cooperative scheme implemented and in mobile ad-hoc network by mean of NS-2 simulator. A network model for MANET show in Figure 3 it consist of 7 nodes, all nodes are mobile except source node. The movement of node for 40 sec is defining as follow:

$ns at 0.0 "$node_(0) setdest 100.0 100.0 500.0" $ns at 0.0 "$node_(1) setdest 150.0 250.0 500.0" $ns at 0.0 "$node_(2) setdest 300.0 300.0 500.0" $ns at 0.0 "$node_(3) setdest 500.0 300.0 500.0" $ns at 0.0 "$node_(4) setdest 400.0 300.0 500.0" $ns at 0.0 "$node_(5) setdest 100.0 400.0 500.0" $ns at 0.0 "$node_(6) setdest 600.0 150.0 500.0" $ns at 1.0 "$node_(1) setdest 050.0 250.0 500.0" $ns at 1.0 "$node_(2) setdest 200.0 250.0 500.0" $ns at 6.0 "$node_(2) setdest 300.0 300.0 500.0" $ns at 3.0 "$node_(4) setdest 500.0 250.0 500.0" $ns at 1.0 "$node_(5) setdest 200.0 400.0 500.0" $ns at 3.0 "$node_(5) setdest 400.0 300.0 500.0" $ns at 5.0 "$node_(5) setdest 350.0 150.0 500.0" $ns at 6.0 "$node_(5) setdest 250.0 150.0 500.0" $ns at 7.0 "$node_(5) setdest 250.0 100.0 500.0" $ns at 8.0 "$node_(5) setdest 100.0 400.0 500.0" $ns at 4.0 "$node_(6) setdest 500.0 100.0 500.0" ………………..continue to 40 sec.

Fig. 3: Network model of Mobile Ad-hoc Network

(a) Node 0 to 5 with helper Node 1

(b) Node 0 to 5 with helper Node 2

(c) Node 0 to 5 with direct transmission

Fig. 4: The cooperation is initiated when the potential cooperative link can satisfy the target data rate which the direct link cannot satisfy. Therefore, it will be automatically connect appropriate helper

$err set rate_ 0.05, .10 and 0.15

Our experiment conduct is based on a standard 802. 11g mobile ad-hoc network and set the simulation parameters. MAC layer are set payload 2500 and 2000 bytes, RTS 37bytes, CTS 31 bytes. Physical layer are set basic rate 6Mbps, data rate 802.11g standard, acknowledgement 31 bytes. We are use recently added module MAC layer and Physical layer in NS-2 simulator, which is supported cooperative scheme to enhance the performance of mobile Ad-hoc network using five handshake. Our experiment some modification in the files as signal-to interference –noise ratio, monitoring in respect to power. Format parameters in MAC and physical protocol listed in table 1.

Table 1: Simulation Parameters

No of nodes

07

Slot time

9us

CCA time

3us

SIFS

16us

DIFS

28us

Preamble Length

96 bit

PLCP Header Length

40 bit

PLCP Data Rate

6 Mbps

Max Propagation Delay

5us

Short Retry Limit

7

Long Retry Limit

4

Header Duration

40us

Symbol Duration

8us

RTS Threshold

2346

CW Min

15

CW Max

1023

Rx Tx Turn around Time

2us

Data Rate

54 Mbps

(a) Node 0 to 5 with helper Node 1

We simulate the purposed scheme as per given parameters, Figiure4 shows NS-NAM Screen shot cooperative scheme.

(b) Node 0 to 5 with helper Node 2

(c) Node 0 to 5 with direct transmission

End-to-End Delay for Diffrent

Table 2: End-To-End Delay for Different Error Rate

Simulation Time

E-T-E_ delay=5% error_rate

E-T-E_ delay=10% error_rate

E-T-E_ delay=15% error_rate

0s

0

0

0

2s

0.0050803

0.005040555

0.00505366

4s

0.0050648

0.005051855

0.00531692

6s

0.0049973

0.004998888

0.00185388

8s

0.0050645

0.005061663

0.00479468

10s

0.0049989

0.005014699

0.00500013

12s

0.0052526

0.00525175

0.00527779

14s

0.0050785

0.005068383

0.00503774

16s

0.0049996

0.004997165

0.00504957

18s

0.0050587

0.005046725

0.00502494

20s

0.0050261

0.005039693

0.00505276

22s

0.0052501

0.005251201

0.00530739

24s

0.0050508

0.005049315

0.00504703

26s

0.0050028

0.005001313

0.00500554

28s

0.0050349

0.005036436

0.00503213

30s

0.0050262

0.005039517

0.00503757

32s

0.00524

0.00523915

0.00523743

34s

0.0050662

0.005052313

0.00510202

36s

0.0049975

0.004999981

0.00500152

38s

0.0050462

0.00504563

0.00503489

40s

0.0050392

0.005041054

0.00502807

  • 3.1    End-to-End Delay

  •    E-T-E_delay=5% error_rate

  •    E-T-E_delay=10% error_rate

E-T-E_delay=15% error_rate

Fig. 5: Performance of mobile ad-hoc network using cooperative scheme in the form of end to end delay for different error rate

Table 3: End-To-End Delay for Different Packet Size

Simulation Time

E-T-E_ delay=Packet_ size-2500 Bytes

E-T-E_ delay=Packet_ size-2000 Bytes

0s

0

0

2s

0.0050803

0.005054403

4s

0.0050648

0.005037466

6s

0.0049973

0.005001093

8s

0.0050645

0.005035724

10s

0.0049989

0.005053049

12s

0.0052526

0.005251718

14s

0.0050785

0.005037416

16s

0.0049996

0.00499991

18s

0.0050587

0.005049728

20s

0.0050261

0.005052642

22s

0.0052501

0.005249865

24s

0.0050508

0.00503926

26s

0.0050028

0.005002726

28s

0.0050349

0.005032421

30s

0.0050262

0.005027577

32s

0.00524

0.00523768

34s

0.0050662

0.005037602

36s

0.0049975

0.005000022

38s

0.0050462

0.0050366

40s

0.0050392

0.005026532

End-to-End Delay for Diffrent Packet Size

E-T-E_delay=Packet_size-2500 Bytes

E-T-E_delay=Packet_size-2000 Bytes

Fig. 6: Performance of mobile ad-hoc network using cooperative scheme in the form of end to end delay for different Packet Size

  • 3.2    Packet Loss Ratio

Packet losss Ratio for Diffrent error rate

Table 4: Packet Loss Ratio for Different Error Rate

Simulation Time

loss_ratio1 =5% error_rate

loss_ratio2 =10% error_rate

loss_ratio3 =15% error_rate

0s

0

0

0

2s

0

0

0

4s

0.0320197

0.017369727

0.1425486

6s

0.0174564

0.231067961

0.61149653

8s

0

0

0.19656357

10s

0.0031486

0.003140704

0.00764818

12s

0

0.000508388

0.22231172

14s

0

0

0.00257069

16s

0.0032538

0.00288913

0.16178304

18s

0

0

0.03331218

20s

0.0014057

0.00112328

0.28715107

22s

0.0027912

0.005309735

0.00233402

24s

0

0

0

26s

0.0027432

0.001477729

0.02372379

28s

0

0

0.12421053

30s

0.0005429

0.000542495

0.01264895

32s

0.0003388

0.001015057

0.01672355

34s

0

0

0.04894241

36s

0.000746

0.00059657

0.01492762

38s

0

0

0.0061755

40s

0.0005335

0.000533262

0.00054645

  •    loss_ratio1=5% error_rate

  •    loss_ratio2=10% error_rate

  •    loss_ratio3=15% error_rate

Fig. 7: Performance of mobile ad-hoc network using cooperative scheme in the form of packet loss ratio for different error rate

Table 5: Packet Loss Ratio for Different Packet Size

Simulation Time

loss_ratio= Packet size-2500 Bytes

loss_ratio= Packet size-2000 Bytes

0s

0

0

2s

0

0

4s

0.0320197

0.0075

6s

0.0174564

0.0075

8s

0

0

10s

0.0031486

0.001882058

12s

0

0.004052685

14s

0

0

16s

0.0032538

0.001805706

18s

0

0

20s

0.0014057

0.001122334

22s

0.0027912

0.008060453

24s

0

0

26s

0.0027432

0.000633179

28s

0

0

30s

0.0005429

0.000542005

32s

0.0003388

0.000338238

34s

0

0

36s

0.000746

0.000893655

38s

0

0

40s

0.0005335

0.000532765

Loss Packets Ratio for Diffrent Packet Size

Table 6: Packets Deliver Vs Received Packets For Different Packet Size

Simulation Time

Received

Packets= Packet_size-2500 Bytes

Received_ packets= Packet_size-2000 Bytes

Expected _packets

0s

0

0

0

2s

393

397

400

4s

788

794

800

6s

1188

1194

1200

8s

1583

1591

1600

10s

1963

1966

1980

12s

2363

2366

2380

14s

2757

2764

2780

16s

3157

3164

3180

18s

3552

3560

3580

20s

3930

3938

3960

22s

4330

4338

4360

24s

4726

4735

4760

26s

5126

5135

5160

28s

5523

5532

5560

30s

5902

5911

5941

32s

6302

6311

6341

34s

6697

6708

6741

36s

7097

7108

7141

38s

7493

7504

7541

40s

7890

7902

7941

loss_ratio=Packet_size-2500 Bytes

loss_ratio=Packet_size-2000 Bytes

Fig. 8: Performance of mobile ad-hoc network using cooperative scheme in the form of packet Loss ratio for different Packet Size

  • 3.3    Packets Deliver vs. Received Packets

    We conduct cooperative scheme experiment to analysis Packets Deliver vs. Received Packets for different packet size in mobile ad-hoc networks. The effect of packet size shown in Table VI or in Figure 9 for employed Packet size 2500 & 2000 bytes respectively in terms of Packets Deliver vs. Received Packets.

Receive Packets vs. Expected Packets

  •    Received Packets=Packet_size-2500 Bytes

  •    Received_packets=Packet_size-2000 Bytes

  •    Expected_packets

Fig. 9: Performance of mobile ad-hoc network using cooperative scheme in the form of receive packet s for different packet size vs. expected packets

  • IV. Conclusion

Список литературы Cooperative Medium Access Control Protocol for Mobile Ad-hoc Networks using Spatial Diversity

  • Sathya Narayanan-Thanasis Korakis Pei Liu, Zhifeng Tao and Shivendra S. Panwar. “CoopMAC: A coopera tive MAC for Wireless LANs.” IEEE Journal on Selected Are as In Communications, 25(2):340–354, February 2007.
  • S. Moh, C. Yu, A Cooperative Diversity-Based Robust MAC Protocol in Wireless Ad Hoc Networks, IEEE Trans. Parallel and distributed system, vol. 22, no. 3, Mar. 2011, pp. 353-363.
  • A. Sendonaris, E. Erkip and B. Aa zhang, User cooperation diversity-part I: System description, IEEE Transactions on Communications, vol. 51, no. 11, Nov. 2003, pp. 1927-1938.
  • J. N. Laneman and G. W. Wornell, Distributed space–time coded protocols for exploiting cooperative diversity in wireless networks, IEEE Transactions on Information Theory, vol. 49, no. 10, Oct. 2003, pp. 2415-2525.
  • J. N. Laneman, D. N. C. Tse, and G.W.Wornell, Cooperative diversity in wireless networks: Efficient protocols and outage behavior, IEEE Transactions on Information Theory, vol. 51, no. 12, Dec. 2004, pp. 3062–3080.
  • H. Zhu and G. Cao, rDCF: A relay-enabled medium access control protocol for wireless ad hoc networks, Proc.of IEEE INFOCOM, vol. 1, Miami, USA, 2005, pp. 12-22.
  • R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung, Network Information Flow, IEEE Transactions on Information Theory, 2003, pp. 371-381
  • A. S. Ibrahim, Z. Han, and K. J. R. Liu, Distributed energy-efficient cooperative routing in wireless networks, IEEE Transactions on Communications, vol. 7, no. 10, Oct. 2008, pp. 3930–3941.
  • J. Jang, A study on a cooperative MAC protocol at ad hoc networks, KIMICS, vol. 13, no. 8, Aug. 2009, pp. 1561- 1570.
  • J. Jang, A study on a network coding enabled cooperative MAC protocol at ad hoc networks, KIMICS, vol. 13, no. 9, Sep. 2009, pp. 1819-1828.
  • S. Moh, C. Yu, A Cooperative Diversity-Based Robust MAC Protocol in Wireless Ad Hoc Networks, IEEE Trans. Parallel and distributed system, vol. 22, no. 3, Mar. 2011, pp. 353-363.
  • S. Vijay Bhanu,R. M. Chandrasekaran,"Voice Call Capacity Analysis and Enhancement of IEEE 802.11 WLAN" European Journal of Scientific Research ISSN 1450-216X Vol.76 No.2, 2012, pp.271-280
  • IEEE Std. 802.11-1999, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, 1999.
  • IEEE Std. 802.11b-1999, Part 11: Wireless LAN Medium Access control (MAC) and Physical Layer (PHY) specifications: High-Speed Physical Layer Extension in the 2.4GHz Band, 1999.
  • Y. Yuan, B. Zheng, W. Lin and C. Dai, An opportunistic cooperative mac protocol based on cross-layer design, 2007 International Symposium on Intelligent Signal Processing and Communications Systems, ISPACS 2007 - Proceedings, 2008, pp. 714-717.
  • A. Azgin, Y. Altunbasak, and G. AlRegib, Cooperative MAC and Routing Protocols for Wireless Ad Hoc Networks, Proc. of IEEE GLOBECOM, 2005, pp. 2854-2859.
  • P. Liu, Z. Tao, and S. Panwar, A cooperative MAC protocol for wireless local area networks, Proc. of IEEE ICC, vol. 5, Seoul, Korea, 2005, pp. 2962-2968.
  • N. Li, N. Cheng, Y. Cai and X. Xu, Performance Analysis of a Cooperative MAC Based on Opportunistic Relaying for Ad Hoc Networks, 2010 International Conference on Wireless Communications and Signal Processing, Oct. 2010, pp. 1-6.
  • Bletsas A., Khisti A., Reed D. P., A simple distributed method for relay selection in cooperative diversity wireless networks, based on reciprocity and channel measurements, IEEE 61st Vehicular Technology Conference, VTC 2005-Spring, vol. 3, Dec. 2005, pp. 1484-1488.
  • T. Korakis, Z. Tao, Y. Slutskiy and S. Panwar, A Cooperative MAC protocol for Ad Hoc Wireless Networks, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, May 2007, pp. 532-536.
  • M A Khan, T A Khan, M T Beg, “Performance Optimization of MAC Layer IEEE802.11 WLAN using Fragmentation” VSRD International Journal of Electrical, Electronics & Communication Engineering”, VSRD IJEECE, Dec 2012 , pp 916-920
  • T A Khan, M T Beg, M A Khan, “Evaluation of Back-off Algorithm performance of MAC layer IEEE 802.11WLAN” International Journal of Engineering and Management Sciences, IJEMS, ISSN 2229-600x, April’ 2013
  • T A Khan, M T Beg, M A Khan, “Performance Analysis of WLAN using OPNET” International Journal of Innovative Technology and Exploring Engineering, IJITEE, Vol 2, Issue 5, April 2013, ISSN 2278-2375,PP 1-4
  • G. Berger-Sabbatel M. Heusse, F. Rousseau and A. Duda. “Performance anomaly of 802.11b” In Proc. of IEEE INFOCOM, San Francisco, USA,March-April 2003.
  • The ns Manual (formerly ns Notes Documentation) The VINT Project A collaboration between research at UC Berkeley, LBL, USC/ISI, and Xerox PARC Kevin Fall, and Kannan Varadha, January 6, 2009 http://www.slideshare.net/code453/ns2-manual
  • NS Mannual, http://www.isi.edu/nsnam/ns
Еще
Статья научная