SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

1 The Case for Heterogeneous Wireless MACs Chun-cheng Chen Haiyun Luo Dept. of Computer Science, UIUC.
Medium Access Issues David Holmer
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Module C- Part 1 WLAN Performance Aspects
Collision Aware Rate Adaptation (CARA) Bob Kinicki Computer Science Department Computer Science Department Advanced Computer.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Opportunistic Packet Scheduling and Media Access Control for Wireless LANs and Multi-hop Ad Hoc Networks Jianfeng Wang, Hongqiang Zhai and Yuguang Fang.
Hidden Terminal based Attack, Diagnosis and Detection Yao Zhao, Leo Zhao, Yan Chen Lab for Internet & Security Tech, Northwestern Univ.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
On the Performance Behavior of IEEE Distributed Coordination Function M.K.Sidiropoulos, J.S.Vardakas and M.D.Logothetis Wire Communications Laboratory,
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Sep 12, 2002Wireless Networking Seminar1 Does IEEE Work Well in Multi-hop Wireless Network? Author: Shugong Xu, Tarek Saadawi City University of.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Signal Strength based Communication in Wireless Sensor Networks (Sensor Network Estimation) Imran S. Ansari EE 242 Digital Communications and Coding (Fall.
Wireless Switch Protocol 課程 : 行動計算 學號 :M 學生 : 陳德翰.
Wireless LAN Simulation - IEEE MAC Protocol
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Opersating Mode DCF: distributed coordination function
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Understanding the Real-World Performance of Carrier Sense MIT Computer Science and Artificial Intelligence Laboratory Networks and Mobile Systems
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Chapter 6 Multiple Radio Access
DRP: An Efficient Directional Routing Protocol for Mobile Ad Hoc Networks Hrishikesh Gossain Mesh Networks Product Group, Motorola Tarun Joshi, Dharma.
Angular MAC: a framework for directional antennas in wireless mesh networks Erdem Ulukan and Özgür Gürbüz Faculty of Engineering and Natural Sciences,
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
A Throughput-Adaptive MAC Protocol for Wireless Sensor Networks Zuo Luo, Liu Danpu, Ma Yan, Wu Huarui Beijing University of Posts and Telecommunications.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
A Cooperative Multi-Channel MAC Protocol for Wireless Networks IEEE Globecom 2010 Devu Manikantan Shila, Tricha Anjali and Yu Cheng Dept. of Electrical.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Adaptive Power Control Algorithm for Ad Hoc Networks with Short and Long Term Packet Correlations Jun Zhang, Zuyuan Fang, and Brahim Bensaou Dept. of Computer.
How Physical Carrier Sense Affects System Throughput in IEEE Wireless Networks Zheng Zeng, Yong Yang and Jennifer C. Hou Department of Computer.
2012 1/6 NSDI’08 Harnessing Exposed Terminals in Wireless Networks Mythili Vutukuru, Kyle Jamieson, and Hari Balakrishnan MIT Computer Science and Artificial.
Balancing the Hidden and Exposed Node Problems With Power Control In CSMA/CA-Based Wireless Networks Yihong Zhou and Scott M. Nettles Department of Electrical.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
1 Effectiveness of Physical and Virtual Carrier Sensing in IEEE Wireless Ad Hoc Networks Fu-Yi Hung and Ivan Marsic WCNC 2007.
FD-MMAC: Combating Multi-channel Hidden and Exposed Terminals Using a Single Transceiver Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, and Swetha Shivaramaiah.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Performance Enhancement of Multirate IEEE WLANs with Geographically Scattered Stations 1 Duck-Yong Yang, 2 Tae-Jin Lee, 3 Kyunghun Jang, 3 Jin-Bong.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
The Impact of Multihop Wireless Channel on TCP Performance
Presentation transcript:

SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science, University of Illinois, Urbana-Champaign IEEE Transactions on Mobile Computing, Vol. 7, No.3, 2008

Outline Introduction Introduction Hidden/exposed terminal problem in networks Hidden/exposed terminal problem in networks Motivation Motivation SELECT SELECT a self-learning collision avoidance mechanism a self-learning collision avoidance mechanism Performance evaluation Performance evaluation Conclusion Conclusion

Introduction Limited number of orthogonal channels restricts the deployment of APs. Limited number of orthogonal channels restricts the deployment of APs. –3 channels for b/g, 12 for a –Interference range is long compared with communication range

Introduction Recent published data shows 40% of APs are operating on channel 6 Recent published data shows 40% of APs are operating on channel 6 In Boston, a max number of 85 APs are detected in the interference range In Boston, a max number of 85 APs are detected in the interference range –At least 30 APs are directly interfering with each other

Hidden/exposed terminal problem Restrain by RTS Restrain by CTS Restrain by B’s CTS, Cannot reply E’s RTS C’s RTS collide with A->B

Drawbacks of hidden/ exposed receiver problem 1. Sender drops the head-of-line data packet –Resulting in a contention-induced packet loss 2. Unsuccessful RTS transmission, misled the sender to conclude –Receiver is unavailable (false link breakage is triggered) –Channel quality at the receiver side is low (Using low data transfer rate)

Drawbacks of hidden/ exposed receiver problem 3. Unsuccessful RTS attempts inflate sender’s contention window 4. Repeated RTS attempts prevent the sender’s neighbor from transmitting –Low channel utilization 5. Hidden/exposed terminal problem will persists until the clients move and contention relation changes

Motivation Use MICA2 CC1000 to simulate the operation of devices Use MICA2 CC1000 to simulate the operation of devices Exposed receiver Potential sender

RSS at motes C and D while A is transmitting to B

RSS vs. SR (successful ratio) C → D, G → H are active C → D, G → H are active E → F serves as an additional interference E → F serves as an additional interference A → B, A records the RTS successful ratio A → B, A records the RTS successful ratio

RSS vs. RTS SR at mote A

RSS vs. RTS SR over time

Summary of RSS vs. RS The RSS at the sender and the receiver has strong correlation The RSS at the sender and the receiver has strong correlation To estimate the RSS at the receiver from the sender is complex To estimate the RSS at the receiver from the sender is complex The sender can use its RSS as an indicator of the status at receiver The sender can use its RSS as an indicator of the status at receiver

Overview of SELECT Sender uses the detected RSS to map the receiver’s condition (successful ratio) Sender uses the detected RSS to map the receiver’s condition (successful ratio) RSS is divided into several intervals, each interval has a corresponding SR RSS is divided into several intervals, each interval has a corresponding SR RSS ≧ CS thred → channel busy RSS ≧ CS thred → channel busy SR ≧ threshold → transmit the data SR ≧ threshold → transmit the data SR < threshold → pretend the transmission is failed SR < threshold → pretend the transmission is failed

SELECT: self-learning collision avoidance RSS-SR mapping maintenance RSS-SR mapping maintenance RSS-SR mapping lookup RSS-SR mapping lookup Integration with DCF Integration with DCF Intelligent SR threshold setup Intelligent SR threshold setup

RSS-SR mapping maintenance To update the SR within an interval T win To update the SR within an interval T win Using a variable α (from 0 to 1) to indicate the weight of old data Using a variable α (from 0 to 1) to indicate the weight of old data –α~1: the stored data is very new –α~0: the stored data is almost useless Current time Last update time

RSS-SR mapping algorithm Calculate α Set update variable Update variable & timestamp

RSS-SR mapping lookup When a sender wants to send data to a receiver, the sender lookup the corresponding SR under current RSS When a sender wants to send data to a receiver, the sender lookup the corresponding SR under current RSS –Remove out-of-date data first

RSS-SR mapping lookup Channel Busy Return SR

Integration with DCF When MAC module access the channel and the result is determined When MAC module access the channel and the result is determined –Udp_RSS_SR RSS_SR_Look-UP RSS_SR_Look-UP

Integration with DCF: when backoff expired RSS ≧ CS thred → channel busy RSS ≧ CS thred → channel busy –Performs random backoff RSS < CSthred → channel idle RSS < CSthred → channel idle –SR ≧ threshold → transmit the data –SR < threshold → pretend the transmission is failed, also performs random Backoff

Intelligent SR threshold setup (1) The authors assume the successful ratio (SR) of each RSS is distributed according to the measured RSS distribution The authors assume the successful ratio (SR) of each RSS is distributed according to the measured RSS distribution When can a station measure RSS? When can a station measure RSS? –During random backoff

Intelligent SR threshold setup (2) C rssi = number of measured signal strength falls within interval RSS i C rssi = number of measured signal strength falls within interval RSS i T=update interval T=update interval T rssi = the time that channel quality falls within interval RSS i T rssi = the time that channel quality falls within interval RSS i

Intelligent SR threshold setup (3) If SR i < threshold, station won’t transmit during period T If SR i < threshold, station won’t transmit during period T The lose of throughput The lose of throughput – △ rss j = time spend to transmit a packet within interval RSS j interval

Intelligent SR threshold setup (4) Try to maximize the expected throughput Try to maximize the expected throughput Total spend time Time saved by a node at the low-SR rss i Available throughput

Simulation setup Ns Ns Two-Ray Ground model Two-Ray Ground model Communication range: 115m Communication range: 115m RSS min =-100dBm RSS min =-100dBm RSS validation windows= 2 second RSS validation windows= 2 second CBR/UDP traffic CBR/UDP traffic

Exposed receiver Station 3 is an exposed receiver Station 3 is an exposed receiver

Result of exposed receiver (w/o RTS/CTS) # of drop packets at Node 2Throughput gain at Node 2

Result of exposed receiver (w/o RTS/CTS) Successful ratio at Node 2Throughput profile

Result of exposed receiver (with RTS/CTS) # of drop packets at Node 2Throughput gain at Node 2

Result of exposed receiver (with RTS/CTS) Successful ratio at Node 2Throughput profile

Hidden receiver Station 0 and 3 are hidden receivers to each other Station 0 and 3 are hidden receivers to each other

Normalized throughput x: with △ : w/o RTS/CTS DCF DCF SELECT SELECT

Normalized instantaneous throughput: 0->1

Random topology # of drop packets # of drop packets Throughput gain Throughput gain

Real experiment results by using MICA2 Throughput (pkt/second) RTS successful ratio

Conclusion The paper proposes SELECT The paper proposes SELECT –An effective and efficient self-learning collision mechanism SELECT improves throughput by up to 140 % and the successful ratio by 302 percent SELECT improves throughput by up to 140 % and the successful ratio by 302 percent

Thank you!!