On Robust Neighbor Discovery in Mobile Wireless Networks

Slides:



Advertisements
Similar presentations
Request Dispatching for Cheap Energy Prices in Cloud Data Centers
Advertisements

SpringerLink Training Kit
Luminosity measurements at Hadron Colliders
From Word Embeddings To Document Distances
Choosing a Dental Plan Student Name
Virtual Environments and Computer Graphics
Chương 1: CÁC PHƯƠNG THỨC GIAO DỊCH TRÊN THỊ TRƯỜNG THẾ GIỚI
THỰC TIỄN KINH DOANH TRONG CỘNG ĐỒNG KINH TẾ ASEAN –
D. Phát triển thương hiệu
NHỮNG VẤN ĐỀ NỔI BẬT CỦA NỀN KINH TẾ VIỆT NAM GIAI ĐOẠN
Điều trị chống huyết khối trong tai biến mạch máu não
BÖnh Parkinson PGS.TS.BS NGUYỄN TRỌNG HƯNG BỆNH VIỆN LÃO KHOA TRUNG ƯƠNG TRƯỜNG ĐẠI HỌC Y HÀ NỘI Bác Ninh 2013.
Nasal Cannula X particulate mask
Evolving Architecture for Beyond the Standard Model
HF NOISE FILTERS PERFORMANCE
Electronics for Pedestrians – Passive Components –
Parameterization of Tabulated BRDFs Ian Mallett (me), Cem Yuksel
L-Systems and Affine Transformations
CMSC423: Bioinformatic Algorithms, Databases and Tools
Some aspect concerning the LMDZ dynamical core and its use
Bayesian Confidence Limits and Intervals
实习总结 (Internship Summary)
Current State of Japanese Economy under Negative Interest Rate and Proposed Remedies Naoyuki Yoshino Dean Asian Development Bank Institute Professor Emeritus,
Front End Electronics for SOI Monolithic Pixel Sensor
Face Recognition Monday, February 1, 2016.
Solving Rubik's Cube By: Etai Nativ.
CS284 Paper Presentation Arpad Kovacs
انتقال حرارت 2 خانم خسرویار.
Summer Student Program First results
Theoretical Results on Neutrinos
HERMESでのHard Exclusive生成過程による 核子内クォーク全角運動量についての研究
Wavelet Coherence & Cross-Wavelet Transform
yaSpMV: Yet Another SpMV Framework on GPUs
Creating Synthetic Microdata for Higher Educational Use in Japan: Reproduction of Distribution Type based on the Descriptive Statistics Kiyomi Shirakawa.
MOCLA02 Design of a Compact L-­band Transverse Deflecting Cavity with Arbitrary Polarizations for the SACLA Injector Sep. 14th, 2015 H. Maesaka, T. Asaka,
Hui Wang†*, Canturk Isci‡, Lavanya Subramanian*,
Fuel cell development program for electric vehicle
Overview of TST-2 Experiment
Optomechanics with atoms
داده کاوی سئوالات نمونه
Inter-system biases estimation in multi-GNSS relative positioning with GPS and Galileo Cecile Deprez and Rene Warnant University of Liege, Belgium  
ლექცია 4 - ფული და ინფლაცია
10. predavanje Novac i financijski sustav
Wissenschaftliche Aussprache zur Dissertation
FLUORECENCE MICROSCOPY SUPERRESOLUTION BLINK MICROSCOPY ON THE BASIS OF ENGINEERED DARK STATES* *Christian Steinhauer, Carsten Forthmann, Jan Vogelsang,
Particle acceleration during the gamma-ray flares of the Crab Nebular
Interpretations of the Derivative Gottfried Wilhelm Leibniz
Advisor: Chiuyuan Chen Student: Shao-Chun Lin
Widow Rockfish Assessment
SiW-ECAL Beam Test 2015 Kick-Off meeting
Chapter 6 并发:死锁和饥饿 Operating Systems: Internals and Design Principles
You NEED your book!!! Frequency Distribution
Y V =0 a V =V0 x b b V =0 z
Fairness-oriented Scheduling Support for Multicore Systems
Climate-Energy-Policy Interaction
Hui Wang†*, Canturk Isci‡, Lavanya Subramanian*,
Ch48 Statistics by Chtan FYHSKulai
The ABCD matrix for parabolic reflectors and its application to astigmatism free four-mirror cavities.
Measure Twice and Cut Once: Robust Dynamic Voltage Scaling for FPGAs
Online Learning: An Introduction
Factor Based Index of Systemic Stress (FISS)
What is Chemistry? Chemistry is: the study of matter & the changes it undergoes Composition Structure Properties Energy changes.
THE BERRY PHASE OF A BOGOLIUBOV QUASIPARTICLE IN AN ABRIKOSOV VORTEX*
Quantum-classical transition in optical twin beams and experimental applications to quantum metrology Ivano Ruo-Berchera Frascati.
The Toroidal Sporadic Source: Understanding Temporal Variations
FW 3.4: More Circle Practice
ارائه یک روش حل مبتنی بر استراتژی های تکاملی گروه بندی برای حل مسئله بسته بندی اقلام در ظروف
Decision Procedures Christoph M. Wintersteiger 9/11/2017 3:14 PM
Online Social Networks and Media
Limits on Anomalous WWγ and WWZ Couplings from DØ
Presentation transcript:

On Robust Neighbor Discovery in Mobile Wireless Networks ACM CoNEXT 2015 On Robust Neighbor Discovery in Mobile Wireless Networks Tong Meng1, Fan Wu1, Aijing Li2, Guihai Chen1, Nitin H. Vaidya3 1Shanghai Jiao Tong University, China 2PLA University of Science and Technology, China 3University of Illinois at Urbana-Champaign, US Two key words

Keyword 1: Neighbor Discovery Prerequisite: Smart Devices Rising User Population Increasing Device Capabilities User population -> existence of neighboring devices Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Keyword 1: Neighbor Discovery Prerequisite: Smart Devices Rising User Population Increasing Device Capabilities Internet Social Media Music Games Phones Emails TV/Film Texting Books Camera Entertaining usages -> proximity-based applications Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Neighbor Discovery: Convenience Demand: Proximity-Based Applications Entertainment (e.g., FireChat) Thanks for Greeting! Hi! How You Doing Communicate with nearby users Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Neighbor Discovery: Convenience Demand: Proximity-Based Applications User-Provided Connection (e.g., OpenGarden) Connect to nearby users to enjoy Internet, which is called UPC All such applications rely on neighbor discovery ability. Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Previous Focus Requirement: Neighbor Discovery Protocol Energy Efficiency: Battery Power Time Efficiency: Mobile Users Active Slot Sleeping Slot Till now, previous works mainly focus on designing ND protocols. They typically use a time-slotted model. Active/sleep model Deterministic active-sleep schedule Exchange beacons to discover neighboring nodes. Beacons (MAC) Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Keyword 2: Robustness Beacon Decoding Bottleneck Cause: Interfering Background Signals WiFi AP Have to decode beacons, impeded by the interference WiFi Extender WiFi AP Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Searchlight [Mobicom’12] Existing Drawbacks Beacon Decoding Bottleneck Problem: Longer Latency Problem: No Successful Discovery Guarantee Long Tail Median Increment ≈ 20% > 70% Unfortunately, such decoding bottleneck can significantly prolong the discovery latency. … Therefore, the decoding bottleneck seriously restrict the robustness of ND. Searchlight [Mobicom’12] Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Why Decoding Purpose of Beacon Decoding MAC Address: Distinguish Neighbors So Many Names … Record the Voice How do We Distinguish Strangers in Practice? Makes us think that what is the purpose of such decoding process? But is that necessary? Let’s imagine another case: how people distinguish strangers in real life? So, we can increase the robustness of ND by designing a similar discovery mechanism w/o decoding. Decoding MACs(Names): not Necessary Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Design Challenges Decoding-Free Mechanism Resist Strong Interference Detect Neighbor Discovery Messages Distinguish Neighbor Identities Resist Strong Interference Discovery Technique? Message Structure? That will involve these main challenges. Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Technique: Correlation Pseudo-Random Sequence: “𝒔” (L bits) Received Symbol Sequence: “𝒚” 𝐶 𝒔, 𝒚, ∆ = 𝑖=1 𝐿 ( 𝑠 𝑖 ∗ ∙ 𝑦 𝑖+∆ ) = 𝑖=1 𝐿 ( 𝑠 𝑖 ∗ ∙ 𝑛 𝑖+∆ ) Receive Interference/Noise In this work, we utilize the technique of correlation, which is a common technique in wireless communication to detect a pre-defined sequence. Say, there is a fixed well-designed pseudo-random sequence s. When we only receive some interference and noise, the correlation with s only produce some low magnitudes. Low Magnitude Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Technique: Correlation Pseudo-Random Sequence: “𝒔” (L bits) Received Symbol Sequence: “𝒚” 𝐶 𝒔, 𝒚, ∆ = 𝑖=1 𝐿 ( 𝑠 𝑖 ∗ ∙ 𝑦 𝑖+∆ ) = 𝑖=1 𝐿 ( 𝑠 𝑖 ∗ ∙ 𝑛 𝑖+∆ ) + 𝑖=1 𝐿 ( 𝑠 𝑖 ∗ ∙ 𝑠 𝑖 ) Receive “s” Peak Only when an actual copy of sequence s is received, there will be a peak in the correlation magnitude, Which denotes the appearance of s. Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Technique: Correlation Pseudo-Random Sequence: “𝒔” (L bits) Received Symbol Sequence: “𝒚” 𝐶 𝒔, 𝒚, ∆ = 𝑖=1 𝐿 ( 𝑠 𝑖 ∗ ∙ 𝑦 𝑖+∆ ) = 𝑖=1 𝐿 ( 𝑠 𝑖 ∗ ∙ 𝑛 𝑖+∆ ) + 𝑖=1 𝐿 ( 𝑠 𝑖 ∗ ∙ 𝑠 𝑖 ) Resist Low SINR Moreover, such correlation technique can resist very low SINR, For example, As low as -6dB shown here. Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

ReCorder: Message Detection RCover Preamble: Pre-Defined, Pseudo-Random Received Symbols * Preamble (LC-bit) Considering such correlation process, we design a new neighbor discovery mechanism named ReCorder. In ReCorder, we implement a message structure that is specific to ND. First, we fix a pseudo-random sequence as an RCover preamble for neighbor discovery detection. Each node keeps calculating the correlation between the RCover preamble and the received symbols. The peak of the correlation magnitude represents the starting point of a discovery message. Correlation Position = Appearance of Discovery Message Correlation Magnitude Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

ReCorder: Neighbor Recognition ReCord Signature: Two-Level Identity Level-1: Pseudo-Random Sequence (L1-bit) Then, we design a unique ReCord signature for each node. It contains two levels of identity. On the first level, we use a randomly shifted pseudo-random sequence. Random Cyclic Shift Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

ReCorder: Neighbor Recognition ReCord Signature: Two-Level Identity Level-1: Pseudo-Random Sequence (L1-bit) Level-2: Randomly Generated (L2-bit) + 1 1 1 1 1 The second level is a totally random sequences. Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

ReCorder: Neighbor Recognition ReCord Signature: Two-Level Identity Level-1: Pseudo-Random Sequence (L1-bit) Level-2: Randomly Generated (L2-bit) Actual Shift Offset Then, the recognition of leve-1 identity is to identify the shift offset of the received signature, For that purpose, a node need to calculate its correlation with the pseudo-random sequence for level-1 identity generation on all possible shift offsets. As shown here, the offset that generates the highest correlation value is the actual shift offset. Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

ReCorder: Neighbor Recognition ReCord Signature: Two-Level Identity Level-1: Pseudo-Random Sequence (L1-bit) Level-2: Randomly Generated (L2-bit) Match with Stored Level-2’s 1 1 1 Guarantee Uniqueness Clearly, the number of different level-1 identities is restricted by the code length. That’s why we include the level-2 identity, which can guarantee the uniqueness of different signatures. In the case of level-1 name collisions, a node will need to match a new identity with the stored ones. Such level-2 identity is for secondary usage, only necessary in case of level-1 name collision. Secondary Usage Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Correlation Threshold Signal Strength Estimation Moving Average of Correlation Magnitude Correlation “minus” Average Received Energy Level Self-Correlation of Received Symbols As for the signal strength, we estimate that using the difference between the instant and average correlation value. Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Continuous OFDM Interference Source Implementation USRP-N210 Testbed Neighbor Discovery Continuous OFDM Interference Source In the following, to evaluate all the above designs, we use a USRP testbed. Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Feasibility Benchmark (RCover) RCover Detection Few False Positives in All 500 Samples Increased Overhead Increased Robustness 127-bit, -6 dB, 3.5% False Negative Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Feasibility Benchmark (ReCord) ReCord Recognition Even Lower False Possibility Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Feasibility Benchmark (ReCord) ReCord Recognition Even Lower False Possibility Below 2% Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Feasibility Benchmark (ReCord) ReCord Recognition Even Lower False Possibility -5 dB, 5% False Possibility Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Increased Robustness ReCorder vs. OFDM Beacon-Decoding 10 dB Increment in Robustness 10 dB More Robust Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Application in Protocols ReCorder (-5dB) vs. Beacon-Decoding (4dB) 5% duty cycle, 4 neighbors, 200 runs Long-Tail 55.2% Worst-Case Gain 11.9% Median Gain Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Application in Protocols ReCorder (-5dB) vs. Beacon-Decoding (4dB) 5% duty cycle, 4 neighbors, 200 runs Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Co-Existence with OFDM Continuous ReCorder Message Transmission No Degradation to Low Bit-Rate OFDM Packets Management/Control Frames Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Co-Existence with OFDM Low Duty-Cycle ReCorder Only Cause Random/Occasional OFDM Packet Loss E.g., 20ms Time Slot for ReCorder, 1500-Byte OFDM Packets ReCorder Duty Cycle UDP Throughput (Mbps) Degradation w/o ReCorder w/ ReCorder 1% 2 1.994 0.3% 5% 1.97 1.5% 5 4.994 0.12% 4.97 0.6% * Similar for TCP (PCC [NSDI’15]) Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

Conclusion Decoding-Based Discovery Mechanism in Existing Neighbor Discovery Protocols Lacks Robustness ReCorder Message Structure (RCover Preamble + ReCord two-level Signature) Eliminates Decoding ReCorder has 10 dB gain in Robustness and Promising Co-Existence with Background Signals Meng, Tong: On Robust Neighbor Discovery in Mobile Wireless Networks

THANK YOU ! Contact: mengtong.sjtu@gmail.com You’ll Never Walk Alone. – as a KOP