1 Order Matters: Interference-Aware Transmission Reordering in Wireless Networks.

Slides:



Advertisements
Similar presentations
February 20, Spatio-Temporal Bandwidth Reuse: A Centralized Scheduling Mechanism for Wireless Mesh Networks Mahbub Alam Prof. Choong Seon Hong.
Advertisements

1 Message In Message (MIM): A Case for Reordering Transmissions in Wireless Networks Naveen Santhapuri, Srihari Nelakuditi University of South Carolina.
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Successive Interference Cancellation: A Back of the Envelope Perspective Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi.
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
Analog Network Coding Sachin Katti Shyamnath Gollakota and Dina Katabi.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Strider : Automatic Rate Adaptation & Collision Handling Aditya Gudipati & Sachin Katti Stanford University 1.
Network Coding Testbed Using Software-Defined Radio Abstract In current generation networks, network nodes operate by replicating and forwarding the packets.
1 Link Layer Multicasting with Smart Antennas: No Client Left Behind Souvik Sen, Jie Xiong, Rahul Ghosh, Romit Roy Choudhury Duke University.
Living with Interference in Unmanaged Wireless Environments David Wetherall, Daniel Halperin and Tom Anderson Intel Research & University of Washington.
Successive Interference Cancellation: A Back of the Envelope Perspective Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi I have.
Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks E. Gelal, K. Pelechrinis, T.S. Kim, I. Broustis Srikanth V. Krishnamurthy,
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Mobility Increases Capacity In Ad-Hoc Wireless Networks Lecture 17 October 28, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor.
Opportunistic Packet Scheduling and Media Access Control for Wireless LANs and Multi-hop Ad Hoc Networks Jianfeng Wang, Hongqiang Zhai and Yuguang Fang.
DAC: Distributed Asynchronous Cooperation for Wireless Relay Networks 1 Xinyu Zhang, Kang G. Shin University of Michigan.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
SourceSync: A Distributed Architecture for Sender Diversity Hariharan Rahul Haitham Hassanieh Dina Katabi.
Z IG Z AG D ECODING : C OMBATING H IDDEN T ERMINALS IN W IRELESS N ETWORKS Shyamnath Gollakota and Dina Katabi MIT CSAIL SIGCOMM 2008 Presented by Paul.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Tamer Nadeem Dept. of Computer Science Lec #7: MAC Multi-Rate.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Link Layer: Wireless Mesh Networks Capacity Y. Richard Yang 11/13/2012.
Network Coding Testbed Jeremy Bergan, Ben Green, Alex Lee.
Symphony: Orchestrating Collisions in Enterprise Wireless Networks Tarun Bansal (Co-Primary Author), Bo Chen (Co-Primary Author), Prasun Sinha and Kannan.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Wireless Sensor Networks COE 499 Energy Aware Routing
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Overview of Research Activities Aylin Yener
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Decoding Collisions Shyamnath Gollakota Dina Katabi.
Congestion Control in CSMA-Based Networks with Inconsistent Channel State V. Gambiroza and E. Knightly Rice Networks Group
An Adaptive, High Performance MAC for Long- Distance Multihop Wireless Networks Presented by Jason Lew.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Architectures and Algorithms for Future Wireless Local Area Networks  1 Chapter Architectures and Algorithms for Future Wireless Local Area.
1 Exploiting Diversity in Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign Presentation at Mesh.
Improving Loss Resilience with Multi- Radio Diversity in Wireless Networks by Allen Miu, Hari Balakrishnan and C.E. Koksal Appeared in ACM MOBICOM 2005,
Cross-Layer Approach to Wireless Collisions Dina Katabi.
Rami Melhem Sameh Gobriel & Daniel Mosse Modeling an Energy-Efficient MAC Layer Protocol.
MIMO: Challenges and Opportunities Lili Qiu UT Austin New Directions for Mobile System Design Mini-Workshop.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
2012 1/6 NSDI’08 Harnessing Exposed Terminals in Wireless Networks Mythili Vutukuru, Kyle Jamieson, and Hari Balakrishnan MIT Computer Science and Artificial.
CRMA: Collision Resistant Multiple Access Lili Qiu University of Texas at Austin Joint work with Tianji Li, Mi Kyung Han, Apurv Bhartia, Eric Rozner, Yin.
Trading Structure for Randomness in Wireless Opportunistic Routing Szymon Chachulski, Michael Jennings, Sachin Katti and Dina Katabi MIT CSAIL SIGCOMM.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
MAC Protocols for Sensor Networks
The Importance of Being Opportunistic Sachin Katti Dina Katabi, Wenjun Hu, Hariharan Rahul, and Muriel Medard.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
Impact of Interference on Multi-hop Wireless Network Performance
Wireless Communication
The University of Adelaide, School of Computer Science
Wireless LANs Wireless proliferating rapidly.
Topics in Distributed Wireless Medium Access Control
Hidden Terminal Decoding and Mesh Network Capacity
Network Coding Testbed
Javad Ghaderi, Tianxiong Ji and R. Srikant
AccuRate: Constellation Aware Rate Estimation in Wireless Networks
CSMA/CN: Carrier Sense Multiple Access with Collision Notification
Decoding Collisions Shyamnath Gollakota Dina Katabi.
E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
Presentation transcript:

1 Order Matters: Interference-Aware Transmission Reordering in Wireless Networks

2 Wireless Networks Interference Limited Packet decoded successfully  When interference substantially lower  Else, collision Collision IEEE

3 Phy Layer Capture Concurrent transmissions may not necessarily cause collision  Possible to decode the frame with higher SINR  As long as receiver not “locked” onto interference  Known as PHY layer capture What is locking onto a signal? What is locking onto a signal?

4 Implications of Capture When stronger signal is of interest, AND Arrives within PLCP window  Concurrency feasible PLCP

5 Implications of Capture When stronger signal is of interest, AND Arrives within PLCP window  Concurrency feasible However, PLCP duration small  Probability of precise timing also small millisecond 20 us

6 Capture and MIM Message in Message (MIM)  Strong frame arrives after preamble of interfering frame  Receiver locked onto interference by then, and decoding  However, continues searching for another preamble  Strong message can be extracted while in another message

7 Caveats Recognizing arrival of new preamble requires new preamble to be have higher SINR Only then correlation shows a high value

8 SINR for MIM a function of relative arrival order and timing SINR Requirements [Lucent NIC] 4 dB 10 dB

9 Order Matters Some signal-arrival orders will permit concurrency  Productive But the reverse order may cause collision  Unproductive Example …

10 MIM Aware Scheduling AP1 must start first, followed by staggered transmission from AP2 -- concurrency feasible AP1 must start first, followed by staggered transmission from AP2 -- concurrency feasible 10 dB 5 dB

11 MIM Aware Scheduling AP1 must start first, followed by staggered transmission from AP2 -- concurrency feasible AP1 must start first, followed by staggered transmission from AP2 -- concurrency feasible 10 dB 5 dB In general, weaker transmission must start first, stronger receiver suppresses it, and extracts own signal In general, weaker transmission must start first, stronger receiver suppresses it, and extracts own signal

12 MIM Aware Scheduling AP1 must start first, followed by staggered transmission from AP2 -- concurrency feasible AP1 must start first, followed by staggered transmission from AP2 -- concurrency feasible 10 dB 5 dB In general, weaker transmission must start first, stronger receiver suppresses it, and extracts own signal In general, weaker transmission must start first, stronger receiver suppresses it, and extracts own signal Observe that does not enforce this order, hence will fail to exploit MIM capabilities Observe that does not enforce this order, hence will fail to exploit MIM capabilities

13 Problem Definition: Design an MIM-aware scheduling algorithm that reorders transmissions to augment concurrency What is the bound on improvement? How to cope with time-vaying channel? How to sustain fairness and starvation?

14 Solution Space Shuffle  A centralized MIM-aware scheduling protocol for Enterprise wireless LANs (EWLAN) AP2 Controller AP1 AP3

15 Solution Space Shuffle  A centralized MIM-aware scheduling protocol for Enterprise wireless LANs (EWLAN)  Why EWLAN? 1. Becoming popular in single-admin environments § Offices, warehouses, libraries 2. Understand MIM for centralized systems, then goto distributed § Need to walk before running AP2 Controller AP1 AP3

16 Shuffle: 3 Main Components 1.Measuring Interference Relation: Rehearsal  Characterize interference map to identify MIM opportunity  Cope with time-varying channel conditions 2.Packet Scheduler  Use rehearsal outcome to schedule transmissions  Scheduling = Reordering and staggering  Protect from unfairness and starvation 3.Schedule Coordinator  Execute MIM-aware schedule  Cope with failures, retransmissions, and centralized bottleneck

17 Main Assumptions Dominant download traffic  Upload handled through periodic “upload windows” Processing time and latencies  Powerful controller, thin APs  Wired backbone fast, but can become bottleneck Additive Interference  Total interference = sum of individual interferences

18 Feasibility First What is the maximum improvement with Shuffle in finite network scenarios? Determine the optimal link selection, and their relative order of initiation, to achieve this bound Observe that graph coloring inapplicable

19 Analysis Optimal MIM-aware link scheduling is NP-Hard  Proof: Reduction from Independent Set selection MIM scheduling is special case Set SL (Signal Last SINR)=  Relative order requires the optimal choice of links first. Hence, NP-Hard

20 Integer Linear Program Use ILP to upper bound improvement  For a large number of finite-sized topologies

21 CPLEX Results MIM comparison with non MIM  Substantial improvement feasible, worth researching

22 Protocol Design Measuring Interference Relations: Rehearsal

23 Rehearsal Central controller needs link conflict information  Graph coloring notion of conflict not applicable  Conflicts also change with time-varying channel Basic idea:  Controller orchestrates a rehearsal of transmissions  Clients and APs record RSSI values as instructed times  Recorded RSSI correlated at controller  Inteference graph generated

24 Rehearsal At network initialization  APs and clients informed about time of transmissions  Each AP transmits sequence of probes at base rate  Clients transmit probes, piggybacks recorded RSSI values  At the end, APs forward gathered values to controller  Controller derives interference map using additive interference assumption

25 Interference Map Pairwise interferences mapped  Controller populates table i j Interference from i to j Interferer Sniffer...

26 Rehearsal Opportunistic rehearsal  Continuous rehearsal expensive  Utilize regular transmissions to piggyback overheard RSSI Coping with Fading  Convergence may take long with opportunistic  Handling loss will require immediate conflict information  Perform self-corrective rehearsal using data packets Schedule packets conservatively to also serve the rehearsal purpose

27 Rehearsal MIM Scheduler (Optimal NP-Hard) MIM Scheduler (Optimal NP-Hard) i j Interference from i to j

28 MIM-Aware Scheduler Scheduler operation:  Choose non-conflicting packets from queue  Determine their relative starting order + stagger durations  Dispatch batch to AP Scheduler goal:  Maximize batch size  Protect from starvation  Ensure high fairness

29 Greedy Heuristics Basic greedy  Fix a queue lookahead size for scheduling (say L)  Controller takes in-order packets from FIFO queue  Packet j scheduled if no conflict with pkts already scheduled Conflict is a function of SL and SF thresholds  If conflict, packet j postponed for next batch No starvation, Good Fairness  Every batch, a packet progresses in queue  Head of the batch always transmitted O(n 2 )

30 Greedy Heuristics Randomized Greedy  Perform basic greedy on randomized subsets of queue  Probability of choosing packets biased Earlier in the queue have higher probability  Choose largest batch among all solutions Least-Conflict Greedy  Compute packet score = # of pair-wise conflicts Score higher if pkt must start earlier, lower else  Sort packets based on score  Perform basic greedy on this sorted order  Incorporate aging for fairness/starvation O(n 2 logn) O(n 2 )

31 Optimal Vs Greedy (variants)

32 Rehearsal MIM Scheduler (Optimal NP-Hard) MIM Scheduler (Optimal NP-Hard) Schedule Coordinator (ReTx, Prefetch, Predict) Schedule Coordinator (ReTx, Prefetch, Predict)

33 Schedule Coordinator Packets dispatched to APs  Time synchronized between APs and contollers  Pipeline Controller to AP, and AP to Client transmissions  APs transmit at specified time

34 Schedule Coordinator ACK Transmission  Controller embed ACK schedule in Data Packet header  Clients follow schedule (MIM-aware)  AP forwards ACKs to controller (ACKs may have RSSI)  When no ACK, AP forwards NACK  Lost packets scheduled with highest priority

35 Batch Selection C1 C4 C3 C1 C2 C1 Queue Batch

36 Controller sends packets to APs C1 C4 C3 C1 C2 C1 Queue Batch

37 APs/Clients Stagger transmissions C1C3C4 ACK Data Staggering Order: AP2-AP3-AP1 ACK Staggering Order: C4-C3-C1

38 Coping with Fading Loss Time varying channel  Interference graph changes  Subsequent MIM scheduling can cause further failures Immediate corrective rehearsal  Controller identifies links suspected of fading  Schedules a packet batch only for these APs This is a partial rehearsal Packets are transmitted in serial order  APs and clients unaware, send Data and ACKs  Controller updates interference map from ACK RSSIs

39 Pipelining Batches Batch - ACK - Batch inefficient  APs remain idle between batches (not negligible) Controller sends 2 batches to AP  AP sends batch 1 and receives ACKs  Batch 2 started, ACKs forwarded to controller in parallel  Controller processes ACKs and next batch in parallel  Controller schedules batch 3, sends to APs  AP finishes batch 2  Repeat …

40 Testbed Evaluation Looks Familiar?

41 Linux Laptops + Soekris + WiFi Device Driver Validating that order really matters

42 Evaluation Shuffle performs better

43 Ordering Not all ordering is same -- hence, random not enough

44 Future Work MIM aware routing  Choose paths such that MIM is maximally activated Distributed Shuffle  We presented for EWLAN  What about residential WLANs, organic emergence? Can postambles be useful?  As opposed to Preamble (Hari Balkrishnan, NSDI 08)

45 Conclusion Necessary to pay attention to PHY layer capabilities  Interference cancellation (its first steps) one example MIM is ability to extract frame of interest  Even under ongoing interference  Provided some (relative order, SINR) conditions hold Facilitating these conditions can enable MIM  Rich performance gains feasible MIM-aware link layer scheduling necessary

46 Conclusion Shuffle - MIM scheduling for EWLANs  EWLANs proliferating, also foundation for distributed case NP-Hard problem  Bounds characterized through linear programming Greedy scheduling heuristics perform well  Performance close to optimal Evaluation on Linux testbed + Soekris boxes  Consistent improvement, even under fading and losses

47 Questions?

48 Interference Cancellation in Wireless LANs

49 Successive Interference Cancellation (SIC) State of the art allows only one reception  The stronger one SIC enables a receiver to receive both signals  Stronger signal decoded and subtracted  Residual signal decoded from the residue

50 SIC based WLANs Existing schemes require SINR >   Game of out-shouting each other SIC offers payoff if transmitter  Either out-shouts or whispers  Fundamental changes for protocol design

51 MIM + SIC Ongoing work on GNU radios  SIC + MIM implementation can enable protocols

52 Diving a Little More Modulation 101  How do you transmit a bit sequence?  Need to convert bits onto analog domain … convert back  Basic Idea: Change the properties of a signal (amplitude, frequency, phase) to reflect the bit that you are trying to convey Example: Shout loud for +1, whisper for 0 Shouting loud is a symbol for +1 … whispering is a symbol for 0

53 Modulation 101 But humans can modulate their voice better  So why not shout/whisper at different levels? Each level a symbol -- each symbol carries multiple bits

54 Modulation 101 But humans can modulate their voice better  So why not shout/whisper at different levels? Each level a symbol -- each symbol carries multiple bits So if recevier samples at the right time (during peak or trough) then it can get a value. Since it knows the ranges for each symbol, it knows what symbol was received … hence, what bit sequence. So if recevier samples at the right time (during peak or trough) then it can get a value. Since it knows the ranges for each symbol, it knows what symbol was received … hence, what bit sequence.

55 With Actual Signals More opportunity:  Modulate a Sin(.) and a Cos(.) signal with different bits  This is like 2D space Called constellation diagram  Send the sum of both as a single symbol  Receiver gets sum, and can extract both using a coherent demodulator

56 Quadrature Amplitude Modulation (QAM) Mathematically

57 16 QAM reception Receiver gets a dot  Computes nearest neighbor as the transmitted symbol  Hence, the bits are now decoded

58 16 QAM reception Receiver gets a dot  Computes nearest neighbor as the transmitted symbol  Hence, the bits are now decoded Do you see why higher Data rate increases the Probability of error? Because, separation between Symbols become smaller Do you see why higher Data rate increases the Probability of error? Because, separation between Symbols become smaller

59 Easier Said Than Done Lots of issues:  Rx is assumed to know the phase of transmitted signal So that Rx can sample at the right time  But difficult because signals getting reflected  Also, Rx’s frequency needs to be exactly same as Tx Recall PLCP  It helps in straightening these out

60 So Then … How do You Do SIC? Basic Idea:  Let received combined signal be S’ … Stronger received signal be S1, weaker received signal be S2  Synchronize with the stronger signal By detecting PLCP  Demodulate by treating the weaker as interference Get the bits out  Now, model the stronger signal based on the bits (S1’) To see how it would look without the interference (S1’ != S1)  Now subtract: i.e., S2’ = S’ - S1’  Demodulate S2’ to get the bits out How

61 Modeling a Symbol from Bits

62 Modeling a Symbol from Bits S’S’

63 Modeling a Symbol from Bits S’S’ S1 ’

64 Modeling a Symbol from Bits S’S’ S1 ’ -S1 ’

65 Modeling a Symbol from Bits S’S’ S1 ’ -S1 ’ S2 ’ = S ’ + (-S1 ’ ) Thus weaker signal is bit 11

66 All Modeling, Subtracting in Software USRP (Universal Software Radio Peripheral)  Connected to laptop for doing processing  This paper demonstrated offline SIC All signals received, and procesing done after that

67 ZigZag Decoding: Combating Hidden Terminals in Wireless Networks Shyamnath Gollakota and Dina Katabi MIT CSAIL SIGCOMM 2009

68 Hidden Terminal Problem Leads to low utilization of bandwidth and unfairness in channel access RTS/CTS induced too much overhead Collided packets may still be decodable! Alice Bob AP X

69 Basic idea of ZigZag Decoding Chunk 1 from user A from 1 st copy of collided packet can be decoded successfully  Subtract from 2 nd copy to decoded the Chunk 1 of user B Subtract from 1 st copy of collided packet to decode Chunk 2 from user A –Subtract from 2 nd copy of collided packet to decode Chunk 2 from user B

70 Wait! What about Shannon Capacity? Requires retransmissions if collision occurs  No overhead if no collision R1 R2 TDMA

71 Other alternatives CDMA  Incompatible with WLAN  Low efficiency in high SNR Successive interference cancellation (SIC)  Chunk == packet  Decode the strong signal first, subtract from the sum and then decode the weak signal  No need for retransmissions  Both transmitters need to transmit at a lower rate

72 Patterns that ZigZag Applicable Both backward and forward decoding can be used

73 Technical Barriers How do I know packets collide Matching collision happened? (P1, P2) and (P1’, P2’) Frequency offset between transmitter and receiver Sampling offset Inter-symbol interference What if errors occur in chunks Acknowledgement? } subtraction is non-trivial

74 Evaluation 14-node GNURadio testbed  USRP with RFX2400 radio (2.4 GHz)  BPSK  Bit rate 500kbs  32-bit preamble  1500-byte payload, 32-bit CRC Deficiency in GNURadio  Cannot coordinate transmission and reception very closely  CSMA, ACK TransmitterReceiver Software

75 Micro-benchmark

76 Alice & Bob Bob’s location is fixed, Alice moves closer to the base-station

77 Impact of SNR on BER Alice & Bob at fixed and equal location Vary transmission power level

78 Testbed Results Pick two senders randomly  10% hidden terminals, 10% partial, 80% perfect

79 Three hidden terminals

80 Conclusion ZigZag improves fairness & throughput Further research  Combination of analog network coding

81 Questions?

82 Preliminary on communication BPSK: 0 -> > 1

83 Collision Detection Preamble  Pseudo random number  Correlation with moving window  thresholding

84 Matching collision Given (P1 + P2(  )) and (P1’, P2’(  ’)), how to determine that P1 = P’ and P2 = P2’’  Determine offset first  Correlation of P2(  ) and P2’(  ’)

85 Decode matching collision Decode iteratively Re-encoding  Computing channel parameters Channel gain estimated from Frequency offset and sampling error 1) coarse estimation from previously successful reception 2) iterative estimation Inter-symbol interference: take the inverse of linear filter (for removal of ISI)

86 Decode matching collision (cont’d) Re-encoding  Account for sampling error

87 What about errors? Will errors in decoding have a cascading effect?  Error propagation dies out exponentially Error correction capability of modulation  Forward and backward decoding

88 Acknowledgement Use as much synchronous acknowledgement as possible for backward compatibility

89 Duke EWLAN Topology Client, AP placement traces used to feed Qualnet  Fading models from Qualnet  Only 4 topologies shown in graph

90 Increasing AP Density Shuffle throughput higher in denser conditions  Greater scope to “squeeze in” transmissions in space

91 Latency Improves Latency increases due to higher concurrency  As well as from TDMA scheduling

92 Under Channel Fading Corrective rehearsal effective to cope with fading  We observed loss fraction of 12% under Ricean.

93 Ongoing Work Integrating upload traffic  Proposing upload windows  Can be opportunistically used for download (ZMAC)  Can be used to accommodate client joins, departure Interference from external networks affect schedule  Need to treat border APs separately Interference cancellation may decode both signals  More powerful than MIM, hence, new MAC necessary  We are investigating possibilities through GNU radio

94 Today’s Menu Spotlight Shuffle Micro-Blog Mingle

95 Micro-Blog: A Virtual Information Telescope using Mobile Phones and Social Participation

96 Mobile Phones = Powerful Sensors Next Generation Mobile Phones  Variety of embedded sensors - Cameras, mic., accelerometer, health monitor, RFID reader 3 Billion active phones  phone sales will surpass computers  Convergent device accepted technologically, socially

97 Vision Envision each mobile phone as a virtual lens Imagine an Information Telescope over 3 billion lenses Enabling you to zoom in and perceive any part of the world through the eyes and ears of these phones And even querying them in real time, with automatic, social, or participatory replies

98 Micro-Blog Virtual Telescope Internet, Cellular Networks Internet, Cellular Networks Visualization Service Web Service Sensors Phones People Physical Space

99 Prototype: From Japan

100 Prototype: From Sydney

101 Post-Its in the Air Information superimposed on virtual space  Google maps, Microsoft SensorMap, etc. Feasible to superimpose on physical space  As if sticky notes floating in the air  Downloadable into mobile phones … Prototype for Duke campus

102 Micro-Blog [mobisys2008] Project Website  Project live at 

103 So, where exactly is the research here ???!!**

104 Many Challenges Energy-Aware Localization [mobisys08_poster]  GPS offers 7 hours battery, but hi accuracy  Alternates tradeoff accuracy for energy

105 Many Challenges Location Privacy  Users do not want to reveal location  Partial location important for contextual info. Incentives  No reason for user to participate  Designing incentive schemes Too much information entering the system  Information distillation critical … many many more

106 Thanks a lot for your time and patience SyNRG Homepage:

107 Analogy Imagine a graphic equalizer  How do you know what setting will play the song best?  If each song had a “known tune” preceding it You could set the graphic equalizer based on the tune Then listen to the song well Analogous to “locking” on to the song

108 Similarly … Payload in data frame preceded with PLCP  PLCP like pilot signal  Receiver uses for synchronization/correction with Tx  During synchronization, Rx susceptible to distraction  Once synchronized, following bits can be well decoded However, if strong interference, then collision Back

109 Backup Slides

110

111 The Menu Spotlight Shuffle Micro-Blog Mingle

112 Optimal link schedule w, w/o MIM: shows potential gain with MIM-awareness Optimal link schedule w, w/o MIM: shows potential gain with MIM-awareness Integer Programming

113 Vision Design a (software) information telescope to zoom into a any part of the world, and view it through virtual lenses located there Design a (software) information telescope to zoom into a any part of the world, and view it through virtual lenses located there Query the lenses in real time Incentivize participatory sensing Enable automatic sensing Incentivize participatory sensing Enable automatic sensing

114 Our Research PHY MAC / Link Network Transport Security Application Incentives Channel fluctuations Spatial Reuse Mobility Energy Savings Eavesdropping Loss Discrimination Privacy Ubiquitous Services Interference Mgmt. What can be enabled (bottom up) What can be enabled (bottom up) What are the visions (top down) What are the visions (top down)

115 Shuffle: 3 Main Components 1.Measuring interference relationship - Rehearsal -Controller orchestrates rehearsal -Each node measures interference map from all others -Result is a network-wide interference map 2.Scheduler determines links and order of transmission -From the interference map -Scheduling NP-Hard --> approximation algorithms -Packets scheduled in batches 3.Schedule manager executes schedule -Copes with failures, fading, mobility -Performs pre-fetching, speculation, prediction

116 Collection of wireless hosts  Relay packets on behalf of each other  Together form an arbitrary topology  May be connected to wired infrastructure 2 reasons to prefer multihop  Capacity and Power constraint Wireless Multihop Networks B A C D

117 MIM Scheduling 0/1 Solution to ILP satisfies Hence, IP solution is the time-ordered schedule

118 2 Key Architectures  Single hop networks  Multi-hop networks

119 Wireless Single Hop Networks Cellular Networks Distributed WLANs Centralized Enterprise WLANs

120 Collection of wireless hosts  Relay packets on behalf of each other  Together form an arbitrary topology  May be connected to wired infrastructure 2 reasons to prefer multihop  Capacity and Power constraint Wireless Multihop Networks

121 The Context The edge of the internet becoming wireless  167,000 hotspots by 2008 end [GartnerSurvey06]  75 million user base  Mesh network extensions to rural regions Many Motivations to get unplugged  Unrestricted mobility  Significantly lower deployment/maintenance cost  Ease of use

122 Proliferating Applications and Technologies When combined in synergy … Mesh Networks Sensor Networks Social Communities Mobile Networks Ad Hoc Networks RFID Tracking Personal Area Networks Hybrid Networks Mobile Blogging Location Services Smart Clothes Information Mapping Gaming

123 The Key Intuition Ability to Decode = Ability to Cancel In other words, knowing the structure of interference, helps in coping with it In other words, Stronger, decipherable interference better than weak, undecipherable ones

124 Theory Vs Practice Theoretically, cancellation feasible In practice, perfect cancellation difficult  Suppression beneficial  Along with some help from higher SINR requirements Suppression + Higher SINR = Concurrency