The Shadowing Phenomenon: Implications of receiving during a collision Kamin Whitehouse Alec Woo Fred Jiang Joe Polastre Joint work with: Presented by:

Slides:



Advertisements
Similar presentations
How Effective is the IEEE RTS/CTS Handshake in Ad Hoc Networks Kaixin Xu,Mario Gerla, Sang Bae IEEE Globecom 2002.
Advertisements

An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
Investigating Mac Power Consumption in Wireless Sensor Network
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted.
Radio Stack Iteration How to improve the CC1000 Joe Polastre January 15, 2004 NEST Retreat.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
An Energy-efficient MAC protocol for Wireless Sensor Networks
A Transmission Control Scheme for Media Access in Sensor Networks Presented by Jianhua Shao.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
MAC Reliable Broadcast in Ad Hoc Networks Ken Tang, Mario Gerla University of California, Los Angeles (ktang,
Efficient MAC Protocols for Wireless Sensor Networks
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Wireless LAN Simulation - IEEE MAC Protocol
MAC Protocols and Security in Ad hoc and Sensor Networks
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo and David Culler University of California at Berkeley Intel Research ACM SIGMOBILE.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Naveen Santhapuri, Srihari Nelakuditi and Romit Roy Choudhury University of South Carolina Duke University WCNC 2008.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
1 Radio and Medium Access Control 2 Learning Objectives Understand important concepts about radio signals Understand radio properties of WSNs Understand.
PIP: A Connection-Oriented, Multi- Hop, Multi-Channel TDMA-based MAC for High Throughput Bulk Transfer Sensys2010.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Performance Evaluation of Multiple Access Protocols for Ad hoc Networks Using Directional Antenna Tamer ElBatt, Timothy Anderson, Bo Ryu WCNC 2003, March.
Fundamentals of Computer Networks ECE 478/578
DRP: An Efficient Directional Routing Protocol for Mobile Ad Hoc Networks Hrishikesh Gossain Mesh Networks Product Group, Motorola Tarun Joshi, Dharma.
A High-Throughput MAC Protocol for Wireless Ad Hoc Networks Wanrong Yu, Jiannong Cao, Xingming Zhou, Xiaodong Wang, Keith C. C. Chan, Alvin T. S. Chan,
1 Radio and Medium Access Control 2 Learning Objectives Understand important concepts about radio signals Understand radio properties of WSNs Understand.
Chih-Min Chao and Yao-Zong Wang Department of Computer Science and Engineering National Taiwan Ocean University, Taiwan IEEE WCNC 2010 A Multiple Rendezvous.
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
1 POWMAC: A Single-Channel Power-Control Protocol for Throughput Enhancement in Wireless Ad Hoc Network Alaa Muqattash and Marwan Krunz The University.
A new Cooperative Strategy for Deafness Prevention in Directional Ad Hoc Networks Andrea Munari, Francesco Rossetto, and Michele Zorzi University of Padova,
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
A Throughput-Adaptive MAC Protocol for Wireless Sensor Networks Zuo Luo, Liu Danpu, Ma Yan, Wu Huarui Beijing University of Posts and Telecommunications.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Turkmen Canli ± and Ashfaq Khokhar* Electrical and Computer Engineering Department ± Computer Science Department* The University of Illinois at Chicago.
Medium Access Control in Wireless networks
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
FD-MMAC: Combating Multi-channel Hidden and Exposed Terminals Using a Single Transceiver Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, and Swetha Shivaramaiah.
DOTS: A Propagation Delay-aware Opportunistic MAC Protocol for Underwater Sensor Networks IEEE ICNP 2010 (18.2%) Youngtae Noh, Mario Gerla (UCLA, CS) Paul.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
MACA-P: a MAC for concurrent transmissions in multi-hop wireless networks IEEE PerCom’03 Arup Acharya1, Archan Misra1, Sorav Bansal2 Speakrer:earl.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
TCP and MAC interplay in Wireless Ad Hoc Networks
EECS Department University of California, Berkeley
CS294-1 Joe Polastre September 9, 2003
What constitutes a useful experimental result?
REED : Robust, Efficient Filtering and Event Detection
Presentation transcript:

The Shadowing Phenomenon: Implications of receiving during a collision Kamin Whitehouse Alec Woo Fred Jiang Joe Polastre Joint work with: Presented by: NEST Retreat, January 2004

Got A ! Radio Collisions Got B ! Huh ?? A C B

Connectivity-interference Assumption Connectivity implies interference  Determine back-off times  Adjust transmission rates  Achieve fairness  Improve spatial reuse  Manage power consumption  Optimize bandwidth

The Shadowing Phenomenon 1 0 Collision 1 0

Got A ! The Shadowing Phenomenon Got B ! C B A

Contribution Shadowing is common Existing protocols do not presume shadowing Many techniques can exploit shadowing

Collision Detection and Recovery Delta t Stronger LastStronger First Preamble Sync Data Crc Preamble Sync Data Crc

Collision Detection and Recovery Recovery improves bandwidth/energy Detection different from RTS/CTS and Ack  More information  Applies to broadcast messages  Info available at receiver  Only works with stronger-last (maximum 50%) Could be augmented with termination symbol

Evaluation of Detection and Recovery B A C Vary Delta t = t B – t A

Collision Detection and Recovery Pream Sync Data Crc Pream Sync Data Crc Delta t = -23msDelta t = +23ms Vary Delta t = t B – t A B A

Evaluation of Detection and Recovery Detection: 42% success Recovery: 46% success

Implications of Shadowing in Protocol MAC  Acks  RTS/CTS Routing  Flooding  Clustering  Multi-hop Routing Scheduling  Localization

Acks and Shadowing Got B ! C Ack Got B ! Ack Got B ! Ack B A

RTS/CTS and Shadowing C CTS RTS CTS RTS CTS RTS B A

Flooding and Shadowing

Spatial Reuse and Shadowing ABCD

Localization and Shadowing

Open Questions How common are collisions in real life? How often does shadowing happen? How well does detection and recovery work? What is the spatial influence on shadowing?

Flooding Experiment 36 nodes in 9 x 4 grid, 2 meter spacing Each node transmits once in 25 experiments Newest CSMA for TinyOS 857 transmissions receptions 2036 collisions 1142 shadowings

Main Findings Detection: ~25% success rate Recovery: 30-40% success rate

Main Findings Collisions are common  15% of receptions were in a collision  Up to 40-50% transmissions collided somewhere Shadowing is common  % of collisions have shadowing  As low as 10% of neighbors provide the connectivity-interference assumption

Main Findings

Future Work Fix synch bytes problem Add termination symbol , , Bluetooth!

Conclusions RF engineers and Protocol Designers must talk!