If You Can’t Beat Them, Augment Them

Slides:



Advertisements
Similar presentations
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Advertisements

Secure In-Band Wireless Pairing Shyamnath Gollakota Nabeel Ahmed Nickolai Zeldovich Dina Katabi.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Versatile low power media access for wireless sensor networks Joseph PolastreJason HillDavid Culler Computer Science Department University of California,Berkeley.
Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.
Practical TDMA for Datacenter Ethernet
Harnessing Mobile Multiple Access Efficiency with Location Input Wan Du * and Mo Li School of Computer Engineering Nanyang Technological University, Singapore.
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
An End-to-end Approach to Increase TCP Throughput Over Ad-hoc Networks Sarah Sharafkandi and Naceur Malouch.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
Call Admission Control in IEEE Wireless Networks using QP-CAT Sangho Shin Henning Schulzrinne Department of Computer Science Columbia University.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
DBAS: A Deployable Bandwidth Aggregation System Karim Habak†, Moustafa Youssef†, and Khaled A. Harras‡ †Egypt-Japan University of Sc. and Tech. (E-JUST)
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
An Adaptive, High Performance MAC for Long- Distance Multihop Wireless Networks Presented by Jason Lew.
OPERETTA: An Optimal Energy Efficient Bandwidth Aggregation System Karim Habak†, Khaled A. Harras‡, and Moustafa Youssef† †Egypt-Japan University of Sc.
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
MAC Protocols for Sensor Networks
Advanced Network Tap application for
MAC Protocols for Sensor Networks
Ready-to-Deploy Service Function Chaining for Mobile Networks
Multiple Access Methods
Accelerating Peer-to-Peer Networks for Video Streaming
Instructor Materials Chapter 6: Quality of Service
Chapter 13 Wired LANs: Ethernet
Ahmed Saeed†, Mohamed Ibrahim†, Khaled A. Harras‡, Moustafa Youssef†
University of Maryland College Park
Architecture and Algorithms for an IEEE 802
Data link layer divided into two functionality-oriented sublayers
Vision: The Case for Symbiosis in the Internet of Things
Connecting Network Components
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
Topics in Distributed Wireless Medium Access Control
MACAW: A Media Access Protocol for Wireless LAN’s
Impact of LTE in Unlicensed Spectrum on Wi-Fi
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Final Review CS144 Review Session 9 June 4, 2008 Derrick Isaacson
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Quality of Service Connecting Networks.
Data Link Issues Relates to Lab 2.
Multiple Access Methods
November 18 July 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Task Group 4e definitions Date.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Provision of Multimedia Services in based Networks
Shreeni Venkataramaiah
Lottery Meets Wireless
AMP: A Better Multipath TCP for Data Center Networks
Performance Issues & Improvement on MAC
Software models - Software Architecture Design Patterns
Self Organized Networks
High Throughput MAC layer Multicasting
Lecture 5- Data Link Layer
Data Link Layer 2019/2/19.
SUPPORTING MULTIMEDIA COMMUNICATION OVER A GIGABIT ETHERNET NETWORK
Multiple Access Methods
Feedback-jamming ARQ mechanisms
Cooperative AP Discovery
Modeling and Evaluating Variable Bit rate Video Steaming for ax
[SDMA operation within ]
Multi-rate Medium Access Control
Kyu-Han Kim and Kang G. Shin
Chapter 12 Media Access Control (MAC)
Wireless MAC Multimedia Extensions Albert Banchs, Witold Pokorski
Presentation transcript:

If You Can’t Beat Them, Augment Them Improving Local WiFi with Only Above- driver Changes Ahmed Saeed*, Mostafa Ammar*, Ellen Zegura*, Khaled Harras† *Georgia Institute of Technology †Carnegie Mellon University Qatar

Augmented and Virtual Reality 2013 1999 IEEE 802.11-ac 0.3-3 Gbps 2003 IEEE 802.11-b 11 Mbps 1997 IEEE 802.11-g 54 Mbps IEEE 802.11- Legacy 2 Mbps 2009 IEEE 802.11-n 288/600 Mbps 1998 1993 2001 2005 1995 2016 2007 Augmented and Virtual Reality Static Content Video

Augmented and Virtual Reality 2013 1999 IEEE 802.11-ac 0.3-3 Gbps 2003 IEEE 802.11-b 11 Mbps 1997 IEEE 802.11-g 54 Mbps IEEE 802.11- Legacy 2 Mbps 2009 IEEE 802.11-n 288/600 Mbps 1993 1995 1998 2005 2007 2016 2001 Static Content Video Augmented and Virtual Reality Evolving requirements

Augmented and Virtual Reality 2013 1999 IEEE 802.11-ac 0.3-3 Gbps 2003 IEEE 802.11-b 11 Mbps Increasing bandwidth in > 10 Billion WiFi 1997 IEEE 802.11-g 54 Mbps IEEE 802.11- Legacy 2 Mbps 2009 IEEE 802.11-n 288/600 Mbps 1993 1995 1998 2005 2007 2016 2001 Static Content Video Augmented and Virtual Reality Evolving requirements

Augmented and Virtual Reality 2013 1999 IEEE 802.11-ac 0.3-3 Gbps 2003 IEEE 802.11-b 11 Mbps Increasing bandwidth in > 10 Billion WiFi 1997 IEEE 802.11-g 54 Mbps IEEE 802.11- Legacy 2 Mbps 2009 IEEE 802.11-n 288/600 Mbps Same MAC protocol 1993 1995 1998 2005 2007 2016 2001 Static Content Video Augmented and Virtual Reality Evolving requirements

WiFi Updates Dos Upgradable with minimal overhead through above-driver OS patches Backward compatible and interoperable with standard WiFi devices Improve on WiFi’s performance for certain applications and should not degrade its performance for traditional use cases Transparent to non-augmented devices and should not harm their performance

WiFi Updates Don’ts Assume edits in firmware can be easily adapted by all manufacturers Require strict time synchronization with both processing and networking overhead Operate in promiscuous mode to listen to or detect certain types of packets which leads to Power overhead to keep the network card on and listening Processing overhead to process all overheard packets

Can we develop an effective WiFi augmentation with only above-driver patches?

Can we develop an effective WiFi augmentation with only above-driver patches? Answer: soft scheduling at a coarse grain timescale

Related Work Look Who’s Talking: Protocols that rely on overhearing other nodes’ transmission to coordinate schedules [Shih et al. CoNEXT ‘15] TDMA: Leveraging time synchronization to coordinate schedules [Djukic et al. INFOCOM ‘09] Overlay MAC protocols: Introduces layer 2.5 above MAC to coordinate MAC protocols [Rao et al. MobiSys ‘05] Low Latency WiFi: Modified protocols to improve WiFi latency [Li et al. INFOCOM ‘15]

Outline Augmenting WiFi with Soft Scheduling Soft Token Passing Protocol (STPP) STPP for Low Latency Local Communication Evaluation Summary and Conclusions

Augmenting WiFi with Soft Scheduling Augmentation protocol Computes a a schedule based on objective (e.g., node priority) Attempts soft enforcement of schedule WiFi Enforces medium access control to handle failures of soft scheduler Time scale Augmentation Protocol Millisecond WiFi Microseconds

Soft Schedule Enforcement Time Division Multiple Access (TDMA) is a simple scheduling approach Typical schedule maintenance require time synchronization We rely on token passing Caveat: Tokens can be lost

Token Recovery Token Loss: Each link estimates the amount of time till it receives the token and timeouts after that period and assumes it has the token. Multiple Token: All nodes keep track of the schedule and ignore tokens for a Token Expiry Period after sending their own token. Node Failure: If a node is silent for more than two seconds, it is taken off the schedule.

STPP Example

STPP Example

STPP Example

STPP Example

STPP Example

STPP Example

STPP Example

STPP Use Case: Wireless Low Latency Links (WL4) AR and VR applications require low latency for a few links in a crowded network Low latency required between devices in the same room and same collision domain Controller collects demand/priorities and calculates schedule STPP enforces priorities for medium access

Implementation Implemented in linux kernel 4.10 in mac80211 module Our implementation operates only on direct links constructed using Tunneled Direct Link Setup (TDLS) Tokens are processed by a user-space client implemented as a Click module Code and tutorial https://www.cc.gatech.edu/~amsmti3/stpp/

Evaluation Setup Five nodes each with the modified kernel Direct links are constructed to allow all five nodes to communicate directly using TDLS Standard Direct links implementation is our baseline netperf is used to generate TCP traffic Estimated RTT measurements are collected from TCP sources every 100ms qmax determines the priority of the link

Impact on High Priority Link Higher priority can improve RTT by up to 40%

Impact on Average Network Behavior WL4 improves average RTT by up to 38% with minimal impact on throughput

Share Division WL4 can accurately prioritize medium capacity between competing links

Effect of Unscheduled Traffic Uncoordinated links do not impact the performance of WL4 links and vice versa

Summary and Conclusion Application demands have been growing while WiFi MAC has been mostly unchanged for almost 20 years WiFi improvements with minimal system modifications are feasible leveraging soft scheduling STPP can introduce up to 40% latency reduction without sacrificing throughput