How do Wireless Chains Behave? The Impact of MAC Interactions

Similar documents
Information in Aloha Networks

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

On Selfish Behavior in CSMA/CA Networks

Power Controlled FCFS Splitting Algorithm for Wireless Networks

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

Mathematical Analysis of IEEE Energy Efficiency

WiFi MAC Models David Malone

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

distributed approaches For Proportional and max-min fairness in random access ad-hoc networks

Flow-level performance of wireless data networks

Giuseppe Bianchi, Ilenia Tinnirello

P e = 0.1. P e = 0.01

Optimal Association of Stations and APs in an IEEE WLAN

Effective Carrier Sensing in CSMA Networks under Cumulative Interference

Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Radio Network Clustering from Scratch

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks

Discrete Random Variables

On the stability of flow-aware CSMA

First-Principles Modeling of Wireless Networks for Rate Control

Channel Allocation Using Pricing in Satellite Networks

Interference and SINR in Dense Terahertz Networks

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks

Performance Evaluation of Deadline Monotonic Policy over protocol

Outline Network structure and objectives Routing Routing protocol protocol System analysis Results Conclusion Slide 2

Random Linear Intersession Network Coding With Selective Cancelling

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

MegaMIMO: Scaling Wireless Throughput with the Number of Users. Hariharan Rahul, Swarun Kumar and Dina Katabi

A Capacity Upper Bound for Large Wireless Networks with Generally Distributed Nodes

Giuseppe Bianchi, Ilenia Tinnirello

Performance Analysis of a Network of Event-Based Systems

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Throughput-optimal Scheduling in Multi-hop Wireless Networks without Per-flow Information

End-to-End and Mac-Layer Fair Rate Assignment in Interference Limited Wireless Access Networks

Maximum-Weighted Subset of Communication Requests Schedulable without Spectral Splitting

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs

Wireless Internet Exercises

Cooperative HARQ with Poisson Interference and Opportunistic Routing

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT

Modeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals

Maximum Sum Rate of Slotted Aloha with Capture

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers

Asymptotics, asynchrony, and asymmetry in distributed consensus

Optimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Approximate Queueing Model for Multi-rate Multi-user MIMO systems.

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

Modeling and Simulation NETW 707

TCP over Cognitive Radio Channels

Analysis and Performance Evaluation of Dynamic Frame Slotted-ALOHA in Wireless Machine-to-Machine Networks with Energy Harvesting

On Channel Access Delay of CSMA Policies in Wireless Networks with Primary Interference Constraints

Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information

Robust Network Codes for Unicast Connections: A Case Study

The Complexity of Channel Scheduling in Multi-Radio Multi-Channel Wireless Networks

An algebraic framework for a unified view of route-vector protocols

I. INTRODUCTION. A. Wireless Sensor Networks

Network Control: A Rate-Distortion Perspective

Synchronization in Physical- Layer Network Coding

Lecture on Sensor Networks

On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems

Minimal Delay Traffic Grooming for WDM Optical Star Networks

Chapter 5. Elementary Performance Analysis

Efficient Algorithms to Solve a Class of Resource Allocation Problems in Large Wireless Networks

The Factor: Inferring Protocol Performance Using Inter-link Reception Correlation

Topology Control in Large-Scale Wireless Sensor Networks: Between Information Source and Sink

Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance

Delay-Based Connectivity of Wireless Networks

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

Cognitive WSN access based on local WLAN traffic estimation

MULTIPLEXING AND DEMULTIPLEXING FRAME PAIRS

Shortest Link Scheduling with Power Control under Physical Interference Model

Optimal Utility-Lifetime Trade-off in Self-regulating Wireless Sensor Networks: A Distributed Approach

NEAR-OPTIMALITY OF DISTRIBUTED NETWORK MANAGEMENT WITH A MACHINE LEARNING APPROACH

Fairness Index Based on Variational Distance

NOMA: Principles and Recent Results

Failure-Resilient Ad Hoc and Sensor Networks in a Shadow Fading Environment

HYPOTHESIS TESTING OVER A RANDOM ACCESS CHANNEL IN WIRELESS SENSOR NETWORKS

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

cs/ee/ids 143 Communication Networks

The k-neighbors Approach to Interference Bounded and Symmetric Topology Control in Ad Hoc Networks

Monoidal Cut Strengthening and Generalized Mixed-Integer Rounding for Disjunctions and Complementarity Constraints

Generating Random Variates II and Examples

ON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS. Michael G. Rabbat

Performance of Random Medium Access Control An asymptotic approach

Integrating an physical layer simulator in NS-3

Chalmers Publication Library

Effective Bandwidth for Traffic Engineering

On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks

Impacts of Channel Variability on Link-Level Throughput in Wireless Networks

Multi-Message Broadcast with Abstract MAC Layers and Unreliable Links

Implementing Information paths in a Dense Wireless Sensor Network

Optimal Channel Probing and Transmission Scheduling in a Multichannel System

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting

Transcription:

The Impact of MAC Interactions S. Razak 1 Vinay Kolar 2 N. Abu-Ghazaleh 1 K. Harras 1 1 Department of Computer Science Carnegie Mellon University, Qatar 2 Department of Wireless Networks RWTH Aachen University, Germany ACM MSWiM, 2009

Introduction Motivation Problem Statement Brief Introduction Multi-Hop Wireless Networks (MHWN) becoming increasingly important: Mesh networks, Sensor networks, Bluetooth,... But, MHWN performance is unpredictable Inefficient and well below analytical limits Interference has substantial and unpredictable impact at all network layers Analysis and design of systems difficult

High-level Motivation Introduction Motivation Problem Statement Interference in wireless systems are poorly understood Better understanding and characterizing is necessary Design interference-aware protocols Redesign complete layering schemes Interference effects at lower layers has a great impact on higher layers. MAC level interactions play a central role in governing performance of a route. Focus of the paper

High-level Motivation Introduction Motivation Problem Statement Interference in wireless systems are poorly understood Better understanding and characterizing is necessary Design interference-aware protocols Redesign complete layering schemes Interference effects at lower layers has a great impact on higher layers. MAC level interactions play a central role in governing performance of a route. Focus of the paper

Introduction Motivation Problem Statement Problem Statement Recently, a new approach for analyzing interference at the CSMA based MAC layer was proposed. Several interactions occur between any two links due to effect of interference. Our contribution: Analyze the interactions that occur in a single multi-hop chain. Chain is a sequence of nodes from source to destination.

Introduction Motivation Problem Statement Problem Statement Recently, a new approach for analyzing interference at the CSMA based MAC layer was proposed. Several interactions occur between any two links due to effect of interference. Our contribution: Analyze the interactions that occur in a single multi-hop chain. Chain is a sequence of nodes from source to destination.

Problem Statement and Motivation Introduction High-level Motivation Problem Statement Self-interference in chains Probability of occurrence Performance analysis Generalization for n-hop chains

Problem Statement and Motivation Introduction High-level Motivation Problem Statement Self-interference in chains Probability of occurrence Performance analysis Generalization for n-hop chains

CSMA interactions in MHWNs Two-flows under CSMA/CA Countable number of interaction patterns: 10 categories under SINR model [2] 4 promintent categories.

No Interaction NI Sender Connected SC D 1 S 1 S 2 D 2 D 1 S 1 S 2 D 2 Hidden Terminal HT (AIS) HT with Capture HTC D 1 S 1 D 2 S 2 D 1 S 1 D 2 S 2

No Interaction NI Sender Connected SC D 1 S 1 S 2 D 2 D 1 S 1 S 2 D 2 Hidden Terminal HT (AIS) HT with Capture HTC D 1 S 1 D 2 S 2 D 1 S 1 D 2 S 2

No Interaction NI Sender Connected SC D 1 S 1 S 2 D 2 D 1 S 1 S 2 D 2 Hidden Terminal HT (AIS) HT with Capture HTC D 1 S 1 D 2 S 2 D 1 S 1 D 2 S 2

No Interaction NI Sender Connected SC D 1 S 1 S 2 D 2 D 1 S 1 S 2 D 2 Hidden Terminal HT (AIS) HT with Capture HTC D 1 S 1 D 2 S 2 D 1 S 1 D 2 S 2

No Interaction NI Sender Connected SC D 1 S 1 S 2 D 2 D 1 S 1 S 2 D 2 Hidden Terminal HT (AIS) HT with Capture HTC D 1 S 1 D 2 S 2 D 1 S 1 D 2 S 2

Contributions Systematically classify all possible categories of isolated chains based on MAC interactions. Examine how frequently each category occurs. Evaluate the impact of MAC interactions on performance. Testbed and simulation.. Vulnerability of chains to cross-chain hidden terminals.

Factors that affect chain behavior MAC level interactions within a chain. Cross-chain interactions. Interactions that arise between links of two or more chains. Pipelining effect. Unfairness due to insufficient channel idle-periods.

Factors that affect chain behavior MAC level interactions within a chain. Cross-chain interactions. Interactions that arise between links of two or more chains. Pipelining effect. Unfairness due to insufficient channel idle-periods.

Pipelining H 1 H 2 H 3 H 4 Traffic on later hops depend on traffic transmitted by earlier hops. Implication: Effect of MAC interactions from later hops to earlier hops is controlled. Link Throughput (in bps) x 10 5 6 Total transmitted Successfully transmitted 5 4 3 2 1 0 H1 H2 H3 H4 Hops Figure: Throughput across chain pipeline

System description and notations We start with analysis of 4-hop chains. Minimum number of hops to observe non-trivial interactions. Extend it to n-hop chains later. Link-quality based routing (NADV) S H 1 H 2 H 3 H 4 I 1 I 2 I 3 D Three important self-interference interactions INT1 Between H1 and H4 INT2 Between H1 and H3 INT3 Between H2 and H4 Chain type nomenclature: INT1-INT2-INT3 chain (e.g. HT-SC-SC chain).

System description and notations We start with analysis of 4-hop chains. Minimum number of hops to observe non-trivial interactions. Extend it to n-hop chains later. Link-quality based routing (NADV) S H 1 H 2 H 3 H 4 I 1 I 2 I 3 D Three important self-interference interactions INT1 Between H1 and H4 INT2 Between H1 and H3 INT3 Between H2 and H4 Chain type nomenclature: INT1-INT2-INT3 chain (e.g. HT-SC-SC chain).

Probability of occurrence Performance analysis Generalization for n-hop chains Problem Statement and Motivation Introduction High-level Motivation Problem Statement Self-interference in chains Probability of occurrence Performance analysis Generalization for n-hop chains

Probability of occurrence Performance analysis Generalization for n-hop chains How often does each chain category occur? Simulations with random 4-hop chains in different node-densities. Vary carrier sensing range and observe interactions. For realistic carrier-sensing ranges: INT2 and INT3 are SCs: INT1 is the principal interaction. Only 3 type of chains are predominant. HTC/SC/SC chain (HTC-Chains) SC/SC/SC chain (SC-Chain) HT/SC/SC chain (HT-Chain)

Recap: Categories of isolated chains Probability of occurrence Performance analysis Generalization for n-hop chains Any two links on a chain have SC-interaction except H1-H4. H 1 H 2 H 3 H 4 S I 1 I 2 I 3 D Principal Interaction (PI) Three prominent categories based on PI: SC-Chain, HT-Chain, HTC-Chain.

Recap: Categories of isolated chains Probability of occurrence Performance analysis Generalization for n-hop chains Any two links on a chain have SC-interaction except H1-H4. H 1 H 2 H 3 H 4 S I 1 I 2 I 3 D Principal Interaction (PI) Three prominent categories based on PI: SC-Chain, HT-Chain, HTC-Chain.

Probability of occurrence Performance analysis Generalization for n-hop chains SC-Chain H 1 H 2 H 3 H 4 S I 1 I 2 I 3 D SC interaction HT-Chain H 1 H 2 H 3 H 4 S I 1 I 2 I 3 D HT interaction HTC-Chain H 1 H 2 H 3 H 4 S I 1 I 2 I 3 D HTC interaction

Probability of occurrence Performance analysis Generalization for n-hop chains SC-Chain H 1 H 2 H 3 H 4 S I 1 I 2 I 3 D SC interaction HT-Chain H 1 H 2 H 3 H 4 S I 1 I 2 I 3 D HT interaction HTC-Chain H 1 H 2 H 3 H 4 S I 1 I 2 I 3 D HTC interaction

Probability of occurrence Performance analysis Generalization for n-hop chains SC-Chain H 1 H 2 H 3 H 4 S I 1 I 2 I 3 D SC interaction HT-Chain H 1 H 2 H 3 H 4 S I 1 I 2 I 3 D HT interaction HTC-Chain H 1 H 2 H 3 H 4 S I 1 I 2 I 3 D HTC interaction

Probability of occurrence Performance analysis Generalization for n-hop chains SC-Chain H 1 H 2 H 3 H 4 S I 1 I 2 I 3 D SC interaction HT-Chain H 1 H 2 H 3 H 4 S I 1 I 2 I 3 D HT interaction HTC-Chain H 1 H 2 H 3 H 4 S I 1 I 2 I 3 D HTC interaction

Performance analysis: Testbed Probability of occurrence Performance analysis Generalization for n-hop chains All chains consume different overall capacity to obtain the same end-throughput. Inefficient capacity utilization in HT- and HTC-Chains: Substantial impact on overall consumed bandwidth. Current routing protocols do not consider MAC interaction based routing.

Probability of occurrence Performance analysis Generalization for n-hop chains Generalization to n-hop chains Number of interactions grow rapidly as n increases (10 n(n 1) 2 ) We eliminate infrequent interactions by following these rules: Three prominent MAC interactions (SC, HT, HTC). Realistic carrier-sensing ranges eliminate some interactions. Node locality constraint: Intermediate hops are along the line from source to destination. Num interactions = 3 (n 3)

Probability of occurrence Performance analysis Generalization for n-hop chains Performance of n-hop chains Summary: Performance results follows same trend as in 4-hop scenario. All chains have similar overall end-throughput; wasted capacity in chains with HT/HTC. Observations: Throughput of chain is independent of number of SC, HTC or HT interactions. Number of dropped packets due to HT/HTC is a function of the hop number. Earlier the hop with HT/HTC, greater is the wasted capacity. Chains with only SC perform better than HT- or HTC-Chains

Problem Statement and Motivation Introduction High-level Motivation Problem Statement Self-interference in chains Probability of occurrence Performance analysis Generalization for n-hop chains

Cross-chain interaction characteristics MAC interactions: Independent links. Collisions possible at any node. Isolated chain interactions: Constrained. Node-locality. Cross-chain interactions: Independent interactions between chains Larger number of interactions. Constrained self-interference interactions. Characterizing cross-chain scenarios are harder. S D

Cross-chain interaction characteristics MAC interactions: Independent links. Collisions possible at any node. Isolated chain interactions: Constrained. Node-locality. Cross-chain interactions: Independent interactions between chains Larger number of interactions. Constrained self-interference interactions. Characterizing cross-chain scenarios are harder. S D

Cross-chain interaction characteristics MAC interactions: Independent links. Collisions possible at any node. Isolated chain interactions: Constrained. Node-locality. Cross-chain interactions: Independent interactions between chains Larger number of interactions. Constrained self-interference interactions. Characterizing cross-chain scenarios are harder. S D

Cross-chain interaction characteristics MAC interactions: Independent links. Collisions possible at any node. Isolated chain interactions: Constrained. Node-locality. Cross-chain interactions: Independent interactions between chains Larger number of interactions. Constrained self-interference interactions. Characterizing cross-chain scenarios are harder. D S D S

Cross-chain interaction characteristics MAC interactions: Independent links. Collisions possible at any node. Isolated chain interactions: Constrained. Node-locality. Cross-chain interactions: Independent interactions between chains Larger number of interactions. Constrained self-interference interactions. Characterizing cross-chain scenarios are harder. D S D S

Cross-chain interaction characteristics MAC interactions: Independent links. Collisions possible at any node. D Isolated chain interactions: Constrained. Node-locality. D Cross-chain interactions: Independent interactions between chains Larger number of interactions. Constrained self-interference interactions. Characterizing cross-chain scenarios are harder. S HT S

Cross-chain interaction characteristics MAC interactions: Independent links. Collisions possible at any node. D D Isolated chain interactions: Constrained. Node-locality. Cross-chain interactions: Independent interactions between chains Larger number of interactions. Constrained self-interference interactions. S SC S Characterizing cross-chain scenarios are harder.

Cross-chain interactions There are 2 chains interacting with each other; and 3 categories of chains. Hence, 6 scenarios: 2 SC-chains, 2 HT-Chains, 2 HTC-Chains, SC- and HTC-Chains, SC- and HT-Chains, HT- and HTC-Chains We analyze cross-chain interactions in above scenarios: Does the type of chain affect its susceptibility to cross-chain interference? Priliminary analysis of the effect of HT and HTC on performance of chains.

Cross-chain interactions There are 2 chains interacting with each other; and 3 categories of chains. Hence, 6 scenarios: 2 SC-chains, 2 HT-Chains, 2 HTC-Chains, SC- and HTC-Chains, SC- and HT-Chains, HT- and HTC-Chains We analyze cross-chain interactions in above scenarios: Does the type of chain affect its susceptibility to cross-chain interference? Priliminary analysis of the effect of HT and HTC on performance of chains.

Vulnerability of chains to HT/HTC interactions HT-Chains and HTC-chains are more vulnerable to cross-chain HT and HTCs. 55% for SC-Chains and 80% for HT-/HTC-chains Routing hint: SC-Chains are more robust in dynamic environment.

Vulnerability of links to HT/HTC interactions We calculate the conditional probability that a link has cross-chain HT/HTC interaction, given a certain self-chain interaction. Links that had HT/HTC in self-chain are more vulnerable to cross-chain HT/HTC interactions.

Problem Statement and Motivation Introduction High-level Motivation Problem Statement Self-interference in chains Probability of occurrence Performance analysis Generalization for n-hop chains

Conclusion We classified the types of isolated chains based on MAC interactions. Empirically analyzed the occurrence probability and performance of chains. Testbed and simulation Three type of chains are most common: SC-, HT- and HTC-Chains. All chains have similar end-throughput, but capacity efficiency drastically differs. Examined the impact of cross-chain interactions. Stronger categories in self-chain are more robust under cross-chains.

Future work Recently, our paper on in-depth analysis of cross-chain behavior has been accepted [3]. Measurement-based interference estimation. Interaction based routing.

Thank you. For further information, please contact: Saquib Razak: srazak@cmu.edu Vinay Kolar: vinkolar@gmail.com

References M. Garetto, J. Shi, and E. W. Knightly, Modeling media access in embedded two-flow topologies of multi-hop wireless networks, in MobiCom 05, 2005. S. Razak, N. B. Abu-Ghazaleh, and V. Kolar, Modeling of two-flow interactions under SINR model in multi-hop wireless networks, in Proc. LCN, 2008, pp. 297 304. V. Kolar, S. Razak, N. Abu-Ghazaleh, P. Mahonen and K. A. Harras, Interference across multi-hop wireless chains., IEEE WiMob, 2009.

Backup slide: Related work Enumerates impact of MAC interactions Experimental validation of results Studies empirical probability of occurrence of each type of interaction based on routing rules and node density n-hop chain Two-chain interaction study SINR propagation model

Backup slide: Effect of HT and contention unfairness

Backup slide: Effect of HT and contention unfairness