Throughput Improvement in 802.11 WLANs using Collision Probability Estimates Avideh Zakhor E. Haghani, M. Krishnan, M. Christine, S. Ng Department of Electrical.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Medium Access Issues David Holmer
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,
2005/12/06OPLAB, Dept. of IM, NTU1 Optimizing the ARQ Performance in Downlink Packet Data Systems With Scheduling Haitao Zheng, Member, IEEE Harish Viswanathan,
1 of 56 Idle Sense: An Optimal Access Method for High Throughput and Fairness in Rate Diverse Wireless LANs Martin HeusseFranck Rosseau Romaric GuillierAndrzej.
Multi-Class QoS in Networks Using GDMC IEEE Globecom 2007 – Washington, DC Friday, November 30, 2007 Bushra Anjum North Carolina State University.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details Fouad A. Tobagi Stanford University “Broadnets.
Module C- Part 1 WLAN Performance Aspects
Presentation By: Daniel Mitchell, Brian Shaw, Steven Shidlovsky Paper By: Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda 1 CS4516.
CARA: Collision-Aware Rate Adaptation for IEEE WLANs Presented by Eric Wang 1.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Experimental Measurement of VoIP Capacity in IEEE WLANs Sangho Shin Henning Schulzrinne Department of Computer Science Columbia University.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Wireless Network Design for Distributed Control Liu and Goldsmith - Appeared at CDC 2004 Presented by Vinod Namboodiri.
Evaluate IEEE e EDCA Performance Tyler Ngo CMPE 257.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
Performance of DS-CDMA Protocols in Wireless LANS M.Parikh, P.Sharma, R.Garg, K. Chandra, C. Thompson Center for Advanced Computation and Telecommunications.
Modeling OFDM Radio Channel Sachin Adlakha EE206A Spring 2001.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
1 On the Performance of Slotted Aloha with Capture Effect in Wireless Networks Arash Behzad and Julan Hsu Professor Mario Gerla CS218 Project UCLA December.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
Doc.: IEEE /0861r0 SubmissionSayantan Choudhury Impact of CCA adaptation on spatial reuse in dense residential scenario Date: Authors:
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
On the Performance Behavior of IEEE Distributed Coordination Function M.K.Sidiropoulos, J.S.Vardakas and M.D.Logothetis Wire Communications Laboratory,
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Tamer Nadeem Dept. of Computer Science Lec #7: MAC Multi-Rate.
Department of Electrical and Computer Engineering The Ohio State University1 Evaluation of Intersection Collision Warning System Using an Inter-vehicle.
Opersating Mode DCF: distributed coordination function
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Selecting Transmit Powers and Carrier Sense Thresholds in CSMA Jason Fuemmeler, Nitin Vaidya, Venugopal Veeravalli ECE Department & Coordinated Science.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
Joint PHY-MAC Designs and Smart Antennas for Wireless Ad-Hoc Networks CS Mobile and Wireless Networking (Fall 2006)
MOJO: A Distributed Physical Layer Anomaly Detection System for WLANs Richard D. Gopaul CSCI 388.
Packet Dispersion in IEEE Wireless Networks Mingzhe Li, Mark Claypool and Bob Kinicki WPI Computer Science Department Worcester, MA 01609
A Distributed Relay-Assignment Algorithm for Cooperative Communications in Wireless Networks ICC 2006 Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department.
ECE 256: Wireless Networking and Mobile Computing
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks
1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE public NetwOrks Prof. JP Hubaux Mobile Networks
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
Access Delay Distribution Estimation in Networks Avideh Zakhor Joint work with: E. Haghani and M. Krishnan.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Throughput Enhancement in Wireless LANs via Loss Differentiation Michael Krishnan, Avideh Zakhor Department of Electrical Engineering and Computer Sciences.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
WLAN.
Medium Access Control in Wireless networks
Doc.: IEEE /457 Submission December 2000 Mathilde Benveniste, AT&T Labs - ResearchSlide 1 An Enhanced-DCF Proposal Based on ‘Tiered Contention’
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
FD-MMAC: Combating Multi-channel Hidden and Exposed Terminals Using a Single Transceiver Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, and Swetha Shivaramaiah.
On the Performance Characteristics of WLANs: Revisited S. Choi, K. Park and C.K. Kim Sigmetrics 2005 Banff, Canada Presenter - Bob Kinicki Presenter -
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
MAC Protocols for Sensor Networks
Topics in Distributed Wireless Medium Access Control
Idle sense.
A Rate-Adaptive MAC Protocol for Multi-Hop Wireless Networks
On the Physical Carrier Sense in Wireless Ad-hoc Networks
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
<month year> <doc.: IEEE doc> January 2013
of the IEEE Distributed Coordination Function
The System Issues of Rate Adaptation
Presentation transcript:

Throughput Improvement in WLANs using Collision Probability Estimates Avideh Zakhor E. Haghani, M. Krishnan, M. Christine, S. Ng Department of Electrical Engineering and Computer Sciences U.C. Berkeley October 2010

Outline Background Type of loss in wireless networks Estimating collision probabilities  two years ago Using estimates to improve throughput Modulation rate adaptation  last year This year: −Carrier sense threshold −Packet length adaptation −Experimental verification 2

Motivation & Goal Improve throughput: Differentiate between various loss events Estimate probability of occurrence of each type Adapt: −Link adaptation algorithm −Packet length −Carrier sense threshold −Contention window − Transmit power −FEC 3

4 Types of Loss Network DCF – contention window Direct Collision (DC): nodes start transmitting in same slot Hidden Terminal Staggered Collision: one node starts transmitting in the middle of another node’s packet −SC1: node in question is first −SC2: node in question is second Channel Errors Large pathloss due to distance/obstacles (large timescale) Random multipath fading (small timescale) 4 A B AP

5 Estimating Collision Probability Each node/AP collects binary-valued ‘busy-idle’ (BI) signal 1 when local channel is occupied, 0 otherwise AP broadcasts its BI signal periodically  ~14kb/s, 3% overhead Nodes use their BI signal along with AP’s to estimate P C Node A: Node B: AP1: A B AP1 C AP2 Krishnan, Pollin, and Zakhor, “Local Estimation of Probabilities of Direct and Staggered Collisions in WLANs”, IEEE Globecom 2009.

6 What to do with these estimates? Link adaptation: Current techniques assume all losses are due to channel error lower rate unnecessarily Make staggered collision problem worse  longer packets Adaptive packetization: if most collisions are staggered due to hidden nodes, need shorter packets Joint throughput optimization of: Modulation rate Packet length FEC Contention window Retransmit limit Transmit power Carrier sensing threshold Use of RTS/CTS Optimization might be different for delay 6 Fairness issues Data Rate 1-P e 1-P SC2 1-P DC 1-P SC1 Tx Power ++ CS Thresh -+ Contention Window -+ Modulation Rate +-+/- Length +-- FEC -+ RTS/CTS -++

Outline Background Type of loss in wireless networks Estimating collision probabilities  two years ago Using estimates to improve throughput Modulation rate adaptation  last year This year: −Carrier sense threshold −Packet length adaptation −Experimental verification 7

Carrier Sense Optimization in CSMA network - nodes transmit only if sensed power < CS threshold Trade-off between hidden node problem and exposed node problem CS threshold  => # of hidden nodes , # of exposed nodes  Tune CS threshold to: minimize # of hidden nodes + # of exposed nodes for the transmitter Increase throughput 8 A (the Station) is transmitting to B (the AP). : transmission range -- Signal can be decoded : CS range -- Received power > CS threshold) : interference range -- Any transmission in this range collides with A’s signal at B E is an exposed node and F is a hidden node to A.

Busy/Idle Signal AP broadcasts its BI signal, BI AP, every Δ seconds Each station records multi-leveled sensed energy level for the same period of Δ seconds Station generates its own BI signal Depends on CS threshold ϒ. For p, q ∈ {0, 1}, 9

Hidden and Exposed nodes in BI signal Hidden node problem: BI STA = 0 and BI AP = 1 => collisions Exposed node problem: BI STA = 1 and BI AP = 0 => excess backoff Continuous-valued sensed power depends on other nodes sending, but node can affect binary-valued BI STA by adapting CST BI STA = 1{power > CST} Adapt to minimize +, or 10 Hidden node transmission Exposed node transmission

Optimization Function Hidden and exposed nodes reduce the throughput Can affect number of hidden and exposed nodes by tuning ϒ |Transmissions of Hidden Nodes| ∝ |Transmissions of Exposed Nodes| ∝ Optimization: where As increases: P 10 decreases – fewer exposed nodes P 01 increases – more hidden nodes 11

Algorithm Record energy level of the channel for Δ=3 seconds. Receive BI signal from AP. Calculate the value of function F for all possible values of carrier sense threshold. Find the value of the carrier sense threshold that minimizes F. Find the value of F for the previous value of carrier sense threshold. If the difference is more than 5% of previous value change the carrier sense threshold. 12

Simulation Setup 7 APs, 50 nodes APs have fixed CST for each simulation Different over various simulations 2 methods for comparison: Nodes have same fixed CST as APs Nodes asynchronously adapt using our algorithm: −Use current CST for 3+  seconds, where  is random −Solve optimization for data from most recent 3 seconds Consider all nodes in 10 different 60-second simulations with different topologies  500 total nodes Repeat this for each value of AP CST 13

Simulations: Aggregate Throughput vs AP CST Up to 50% total throughput improvement Moderate decrease when AP CST is very low – single collision domain The average of log-throughput is increased in all scenarios => adaptive CST algorithm behaves fairly. 14

Simulation Results: Node Throughput 80% of nodes gain throughput, only 10% lose Median: 81%, Mean: 131% Improvement depends on locations of hidden and exposed nodes 15

Simulation Result: Attempts and Losses Adaptive algorithm results in: Lower loss probability Fewer transmission attempts  More efficient channel use 16

Outline Background Type of loss in wireless networks Estimating collision probabilities  two years ago Using estimates to improve throughput Modulation rate adaptation  last year This year: −Carrier sense threshold −Packet length adaptation −Experimental verification 17

18 Effects of MAC Layer Packet Length Impact of packet size on effective throughput Protocol header overhead −Larger packet size is preferable Channel fading −Smaller packets are less vulnerable to fading errors Direct collisions −Direct collision probability is independent of packet size Staggered collisions in presence of hidden terminals −Smaller packets are less susceptible to collide with transmission from hidden terminals

Packet Loss Model Pure BER-based Used in length adaptation literature Assume constant BER over all packets over all time Simple analysis Does not account for packet-to-packet channel variation BER-SNR Assume constant BER over each packet Assume distribution on SNR: Rayleigh, Log-Normal, Rice BER known function of SNR and modulation rate Accounts for channel variation Pure BER is special case where SNR distribution is delta 19 L = payload lengthL h = header length R p = payload modulation rate R h = header modulation rate f  () = distribution of SNRBER() functions are known

Single-Node Throughput vs Length as a function of BER-SNR Variance 20 Optimal packet length increases with SNR variance

Approach: Gradient Search TP = throughput L = packet length sendFreq =# packets/sec P SC1 = P(SC1) P e = P(channel error) C’ constant Gradient of TP w.r.t. packet length: P e estimated as: L  known; sendFreq and P L  empirical counting, m 2 and P c  [1]  next page 21

Estimating where = P(error for packet with SNR  ) = P(header error for packet with SNR  ) Estimate Pe from [1]  look up Assume single parameter or two parameter distribution 22

Algorithm Observe for N seconds without adaptation, Estimate Adjust L by where  is adjusted as follows: 23

Verification of via NS Simulations Scenario: 7 Aps, 50 nodes, all using constant packet length Vary L for a single node to examine TP vs L Locally compute and compare to slope of empirical TP vs L curve 24 Node 1 Node 2

Example of Adapted Length and Throughput Change Periphery nodes choose shorter lengths Spatial correlation between gain/loss Highest % gain in T.P  lowest absolute T.P. nodes 25 Length % throughput change Total throughput =gain =loss =standard =adaptive 7 APs, 50 nodes, -89 dBm noise

Throughput Improvement vs Noise Power High noise power  High P e  more nodes choose smaller L dBm-95 dBm

Outline Background Type of loss in wireless networks Estimating collision probabilities  two years ago Using estimates to improve throughput Modulation rate adaptation  last year This year: −Packet length adaptation −Carrier sense threshold −Experimental verification 27

Experimental Verification of Pc Estimation Implemented mechanism behind collision probability estimation technique using Ath5k open source wireless card driver Topology: Node 1 sends to AP 1, and computes estimates Node 2 sends to AP 2 to cause hidden node collisions Sniffers observe ground truth 28

29 Estimation Approach – ‘Busy-Idle’ Signal Each node/AP collects binary-valued ‘busy-idle’ (BI) signal 1 when local channel is occupied, 0 otherwise Also collect TX signal - 1 when transmitting, 0 otherwise Node A: Node B: AP1: A B AP1 C AP2

System Design 4 steps: Collect available carrier sense data from wireless card Process this data to generate BI and TX signals Align BI and TX signals of station and AP Compute estimates Ideally completely implemented at driver level Current implementation only collects data in real time Data is processed offline in MATLAB 30

Collecting Carrier Sense Data Access “profile count” registers; observe this behavior: AR5K_POFCNT_CYCLE: constantly incrementing like clock AR5K_PROFCNT_TX: increasing at same rate at CYCLE when transmitting, constant otherwise AR5K_PROFCNT_RXCLR: increasing at same rate at CYCLE when channel is occupied, constant otherwise In theory: BI signal is slope of RXCLR vs CYCLE TX signal is slope of TX vs CYCLE Practically: can capture sequentially – not simultaneously not necessarily regularly “time” of TX or RXCLR sample is bounded by value of previous and subsequent sampled value of CYCLE 31

Generating BI/TX signals 32 Candidate busy section is set of consecutive y-values (RXCLR or TX) which are strictly increasing: Equation 1: b + lower bound × upper bound

Aligning Station and AP signals 33 To estimate collision probability, need to line up TX and BI signals between station and AP Scale to adjust for different clock speeds Use large scale view of packet start times Align TX signals  more sparse than BI signals; easier AP TX consists of ACKS, some of them to station Line up inter-packet times BI signals follow since they are collected on same clock as TX Most packets aligned within 40  s of each other

Experimental Setup Topology: Node 1 sends to AP 1, and computes estimates Node 2 sends to AP 2 to cause hidden node collisions Sniffers observe ground truth Variables: Transmit power of node 1 −to affect Pe Sending rate of node 2 −to affect Pc 34

Experimental Results 75 total estimates: 5 levels of Pc with 15 estimates each: −6 estimates with Pe~0 −9 estimates with 20<Pe<40 35 =low Pe X =high Pe Pc estimates are within 5% accuracy

Future Work: Contention Window Adaptation Contention Window Adaptation strategy: Nodes wait for random number, drawn uniformly from {1,2,…,W} of idle time slots before transmitting If packet fails, W   W By default  =2 Can show this is asymptotically optimal as n   for single collision domain with no fading/noise, i.e. all losses are DCs What happens when we include other types of losses in the model? E.g. if all losses are due to channel, want  =0 What about more general schemes where we can choose arbitrary distributions for backoff time? 36

Future Work: Delay-sensitive traffic Effective throughput – throughput received within delay bound What bit rate & retransmit limit (γ) & delay limit (τ) maximize the effective throughput (η)? Derive an analytical expression/model for effective throughput Use the BI signal information Nodes make observations to estimate parameters of model Advantages: Can adapt fast in multi-dimensional parameter space Preferable to making one parameter at a time observations of throughput

Future Work: Application to asymmetric TCP Links 1,4 subject to network congestion Link 2 subject to channel errors Link 3 subject to channel errors AND collisions TCP assumes symmetric channel only limited by congestion Question: Can we take advantage of knowing collision probability to adjust parameters of asymmetric TCP algorithms? low Pc => channel is roughly symmetric higher Pc => increased asymmetry? 38 Internet client AP server asymmetry