The Fundamental Role of Hop Distance in IEEE 80

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Università degli Studi di Firenze 08 July 2004 COST th MCM - Budapest, Hungary 1 Cross-layer design for Multiple access techniques in wireless communications.
University At Buffalo Capacity Of Ad-Hoc Networks Ajay Kumar.
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
How Effective is the IEEE RTS/CTS Handshake in Ad Hoc Networks Kaixin Xu,Mario Gerla, Sang Bae IEEE Globecom 2002.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
Module C- Part 1 WLAN Performance Aspects
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Re-routing Instability in IEEE Multi-hop Ad-hoc Networks Ping Chung Ng and Soung Chang Liew The 4th IEEE International Workshop on Wireless Local.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
Sep 12, 2002Wireless Networking Seminar1 Does IEEE Work Well in Multi-hop Wireless Network? Author: Shugong Xu, Tarek Saadawi City University of.
Capacity of Ad Hoc Networks Quality of Wireless links Physical Layer Issues The Channel Capacity Path Loss Model and Signal Degradation MAC for.
Elec 599 Report: Modeling Media Access in Embedded Two-Flow Topologies of Multi-hop Wireless Networks Jingpu Shi Advisor: Dr. Edward Knightly Department.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.
Chapter 6 Multiple Radio Access
SEEDEX: A MAC protocol for ad hoc networks R. Rozovsky and P. R. Kumar ACM ACM MobiHoc 2001 speaker: Chien-Wen.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Priority Scheduling in Wireless Ad Hoc Networks Xue Yang and NitinVaidya University of Illinois at Urbana-Champaign.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
THROUGHPUT ANALYSIS OF IEEE DCF BASIC IN PRESENCE OF HIDDEN STATIONS Shahriar Rahman Stanford Electrical Engineering
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
How Physical Carrier Sense Affects System Throughput in IEEE Wireless Networks Zheng Zeng, Yong Yang and Jennifer C. Hou Department of Computer.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Performance Evaluation of Multiple IEEE b WLAN Stations in the Presence of Bluetooth Radio.
1 Effectiveness of Physical and Virtual Carrier Sensing in IEEE Wireless Ad Hoc Networks Fu-Yi Hung and Ivan Marsic WCNC 2007.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
A Bidirectional Multi-channel MAC Protocol for Improving TCP Performance on Multihop Wireless Ad Hoc Networks Tianbo Kuang and Carey Williamson Department.
1 A Coordinate-Based Approach for Exploiting Temporal-Spatial Diversity in Wireless Mesh Networks Hyuk Lim Chaegwon Lim Jennifer C. Hou MobiCom 2006 Modified.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
A Power Control MAC Protocol for Ad Hoc Networks
David S. L. Wei Joint Work with Alex Chia-Chun Hsu and C.-C. Jay Kuo
Kunal Amarnani, Ayush Bhardwaj, Angad Kumar Kapoor & Tejas Pargaonkar
IEEE Protocol: Design and Performance Evaluation of An Adaptive Backoff Mechanism JSAC, vol.18, No.9, Sept Authors: F. Cali, M. Conti and.
Distributed Medium Access Control in Wireless Networks
Topics in Distributed Wireless Medium Access Control
Idle sense.
TCP and MAC interplay in Wireless Ad Hoc Networks
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
Full Duplex Benefits and Challenges
CS 457 – Lecture 7 Wireless Networks
On the Physical Carrier Sense in Wireless Ad-hoc Networks
Hidden Terminal Decoding and Mesh Network Capacity
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
TCP in Mobile Ad-hoc Networks
New Insights from A Fixed Point Analysis of Single Cell IEEE 802
He Xiaoben Further study of multi-hop communications - modeling the hidden terminal problem He Xiaoben
TCP in Wireless Ad-hoc Networks
The Impact of Multihop Wireless Channel on TCP Performance
High Throughput MAC layer Multicasting
Pradeep Kyasanur Nitin H. Vaidya Presented by Chen, Chun-cheng
<month year> <doc.: IEEE doc> January 2013
<month year> <doc.: IEEE doc> January 2013
Full Duplex Benefits and Challenges
User Cooperation for Improving Spatial Spectral Utilization in Multhop Wireless Networks March 1, 2006 Chansu Yu 3/1/2006 NEONet 2006.
The System Issues of Rate Adaptation
Presentation transcript:

The Fundamental Role of Hop Distance in IEEE 80 The Fundamental Role of Hop Distance in IEEE 80.11 Multi-Hop Ad Hoc Networks IEEE ICNP 2005 Authors: Yan Gao, Dah-Ming Chiu and John C.S. Lui [1]: Offered Load Control in IEEE 802.11 Multi-Hop Ad-Hoc Networks, MASS’04 Ping Chung Ng and Soung Chang Liew The Chinese University of Hong Kong April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Chunyu Hu, University of Illinois at Urbana-Champaign Motivation How to maximize throughput of a multi-hop flow? Study the factor: Hop distance (the link length) Problem considered: Hidden terminals Exposed terminals and Signal capture Collisions caused by contention ignored! Exemplary scenario: Chain topology (one-dimension) April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Chunyu Hu, University of Illinois at Urbana-Champaign Outline Hidden terminal problem revisited Physical hidden nodes Protocol hidden nodes Signal capture Effect on throughput Analysis of one-dimension network Collision probability Derive a fixed point equation Discussion – why hop distance is important? Conclusion April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Hidden Terminal Problem Revisited Rcs Physical hidden nodes: 1->2 Ri 1 2 Rtx Rtx Protocol hidden nodes: 5->6 3 4 d 5 6 Rtx: transmission range Ri: interference range Signal transmitted in this range But outside of Rtx will corrupt the signal received by node 4 Assume loss factor = 4, Ri = 1.78d Rcs: Sensing range April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Chunyu Hu, University of Illinois at Urbana-Champaign Rcs Ri 3 4 d Rtx 1 2 5 6 Timeline Comment: Does this problem really exist? Hint: Check the implementation of the interference model in ns2. 5 6 3 4 1 2 April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Chunyu Hu, University of Illinois at Urbana-Champaign Signal Capture Focused scenario: Both node 4 and node 7 have packets to transmit. Assume capture threshold CPThresh = 10 and path loss factor = 4. At receiver node 5: SNR = P4/P7 = (2d/d)^4 =16 > 10 However, due to signal capture, if the transmission 7->8 starts first, then node 5 will experience a collision! (Q: why node 5 captures on a signal with strength below RXThresh? ) April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Chunyu Hu, University of Illinois at Urbana-Champaign Effect on Throughput Notations: [0, Time] – time interval considered (long duration) Si – the airtime within [0, Time] that node i transmits in “steady-state” Includes DATA + SIFS + ACK + DIFS + retransmission time Not include backoff time slots x – Si/Time  – the collision probability experienced by a transmission Assumptions: Ignore collisions caused by contention and exposed terminal problems. That is, only consider collisions caused by the hidden nodes. April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Vulnerable Period induced by Hidden Nodes The hidden terminal problem occurs when The transmission of nodes 4 and 7 overlaps, and The transmission of node 7 starts first. Note: S4, S5 and S6 are non-overlapping S5, S6 and S7 are non-overlapping Node 5 and 6 use together 2x percentage of time in [0, Time] The remaining time in [0, Time] that S4 and S7 may overlap is 1-2x Node 7 uses x transmission time in [0, Time] The vulnerable period induced by node 7 on node 4 is therefore: a = DATA / (DIFS+DATA+SIFS+ACK) Collision prob.  April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Chunyu Hu, University of Illinois at Urbana-Champaign Outline Hidden terminal problem revisited Physical hidden nodes Protocol hidden nodes Signal capture Effect on throughput Analysis of one-dimension network Collision probability Derive a fixed point equation Discussion – why hop distance is important? Conclusion April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Analysis of One-Dimension Network Consider one-dimension network with arbitrary node density Analysis flow path Derive the collision probability  = ƒ (x) Relate  and hence x to the attempt prob. Pt Already know Pt = G() Solve the fixed point equation April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

The One-Dimension Network Notations:  – node density, uniquely characterize the network Rcs – sensing range (neighborhood size n = 2Rcs) npr – # of nodes that may cause protocol hidden node problem in the neighborhood of a node nph – # of nodes that may cause physical hidden node problem in the neighborhood of a node d – distance between transmitter and receiver In general, we have: Denote the interfered link by (SI, RI). The protocol hidden nodes are located beyond Rcs of node SI and the interference range of node RI, but within node RI’s interference range. They transmit earlier than SI to cause problems. The physical hidden nodes are located beyond Rcs of node SI, but within the interference range of RI. They transmit later than SI to cause problems. April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Derive Collision Probability  Key idea Express the overlapped time between certain nodes based on topological information (that is, ) A generalization of the simple case Redefine the distance in terms of n (the neighborhood size) Any two nodes more than (n-1)/2 apart cannot hear each other and may have overlapped tx time Cnk – the overlapped airtime of two nodes whose distance is (n-1)/2 + k apart. April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Overlapped Airtime Cnk For k=1, For k=2, In general, April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Derive Collision Probability  (cont’d) There are (n-(n-1)/2-k) node pairs that have Cnk as overlapped airtime. The collision probability caused by Cnk: By induction, it can be shown: and hence The overall collision probability April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Chunyu Hu, University of Illinois at Urbana-Champaign Outline Hidden terminal problem revisited Physical hidden nodes Protocol hidden nodes Signal capture Effect on throughput Analysis of one-dimension network Collision probability Derive a fixed point equation Discussion – why hop distance is important? Conclusion April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Derive A Fixed Point Equation Step 1. Derive  = ƒ (x) (done) Step 2. x = Pt * T / , where T=DIFS+DATA+SIFS+ACK,  = slot time. Step 3. Pt = Pidle * G(), G() is given in the previous presentation. Step 4: Express Pidle in terms of x: Step 5: Obtain the fixed point equation: April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Chunyu Hu, University of Illinois at Urbana-Champaign Derive the Throughput Solve the above fixed-point equation, we can obtain x, and so  and Pt. Throughput: Where Pt is the attempt probability, T/ is the packet transmission time in slots,  is the collision probability, D is effective tx time, = DATA/T, data_rate is the data rate, e.g. 11Mbps. April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Chunyu Hu, University of Illinois at Urbana-Champaign Discussions In single-flow networks, only one protocol hidden node is involved regardless of the hop distance and no physical hidden nodes In two-source string network (See the figure above), the optimal distance is the threshold beyond which physical hidden node problem appears. Before a physical hidden nodes joins, the advantage of increasing hop distance dominates the disadvantage Afterwards, the hidden node cause overall degradation April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Simulation Validation Single source Two-source April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign

Chunyu Hu, University of Illinois at Urbana-Champaign Conclusion Analyze the throughput in a one-dimension network with arbitrary density Consider the protocol hidden node problem Do not consider the physical hidden node problem Because it doesn’t exist in single-source flows Optimal hop distance is the distance beyond which the physical hidden node problem occurs That means, only occurs in multi-source flows How the physical hidden node problem affects the throughput? April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign