Backing out of Linear Backoff in Wireless Networks

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Medium Access Issues David Holmer
MAC3: Medium Access Coding & Congestion Control Devavrat Shah (MIT) Damon Wischik (UCL)
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Multiple access What if multiple machines are sharing the same link?
Achieving Quality of Service in Wireless Networks A simulation comparison of MAC layer protocols. CS444N Presentation By: Priyank Garg Rushabh Doshi.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Duke Selfish MAC Layer Misbehavior in Wireless Networks Author: Pradeep Kyasanur and Nitin H. Vaidya Some slides are borrowed from the author and others.
On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE Distributed Wireless LANs.
KAIST Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks Suho Yang (CS710: November 4, 2008) Kyle Jamieson, Hari Balakrishnan, Y.C. Tay LNCS.
Vivek Raghunathan (joint work with Min Cao, P. R. Kumar) Coordinated Science Laboratory University of Illinois, Urbana-Champaign Exploiting MAC layer diversity.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Wireless Network Design for Distributed Control Liu and Goldsmith - Appeared at CDC 2004 Presented by Vinod Namboodiri.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Distributed Fair Scheduling in a Wireless LAN Gautam Kulkarni EE206A (Spring 2001) Nitin Vaidya, Paramvir Bahl and Seema Gupta (appeared in Mobicom 2000.
1 QoS Schemes for IEEE Wireless LAN – An Evaluation by Anders Lindgren, Andreas Almquist and Olov Schelen Presented by Tony Sung, 10 th Feburary.
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Opersating Mode DCF: distributed coordination function
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Distributed Fair Scheduling in a Wireless LAN
Selecting Transmit Powers and Carrier Sense Thresholds in CSMA Jason Fuemmeler, Nitin Vaidya, Venugopal Veeravalli ECE Department & Coordinated Science.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Chapter 6 Multiple Radio Access
LOCAL AREA NETWORKS. CSMA/CA In a wired network, the received signal has almost the same energy as the sent signal because either the length of the cable.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Access Delay Distribution Estimation in Networks Avideh Zakhor Joint work with: E. Haghani and M. Krishnan.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Network System Lab. Sungkyunkwan Univ. Differentiated Access Mechanism in Cognitive Radio Networks with Energy-Harvesting Nodes Network System Lab. Yunmin.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
A Taxonomy of Mechanisms for Multi-Access
Wireless Sensor Networks 4. Medium Access
Wireless MAC.
Medium Access Control MAC protocols: design goals, challenges,
Lab 7 – CSMA/CD (Data Link Layer Layer)
Distributed Medium Access Control in Wireless Networks
Topics in Distributed Wireless Medium Access Control
MACAW: A Media Access Protocol for Wireless LAN’s
SENSYS Presented by Cheolki Lee
High Speed LANs – Ethernet and Token Ring
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
On the Physical Carrier Sense in Wireless Ad-hoc Networks
Full-Duplex based MAC enhancements
Provision of Multimedia Services in based Networks
Author: Giuseppe Bianchi
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
No Time to Countdown: Backing Off in Frequency Domain
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Wireless MAC Multimedia Extensions Albert Banchs, Witold Pokorski
Presentation transcript:

Backing out of Linear Backoff in Wireless Networks Mahanth Gowda University of Illinois (UIUC) Nirupam Roy Romit Roy Choudhury Srihari Nelakuditi University of Illinois (UIUC) Remove email id University of Illinois (UIUC) University of South Carolina

Coordination needed for medium access Collision In a wireless network, we all know that coordination is necessary for medium access. Without co-ordination, multiple nodes could attempt to tramsit together resulting in a collision at the receiver

802.11 Contention Resolution Backoff = 7 Backoff = 12 So how does today’s 802.11 resolve contention .. Nodes chose random numbers and countdown in time ..One of the node reaches 0 and transmits its packet whereas the other node senses the first transmission and freezes its counter. Once the first transmission is complete, the second node will resume countdown whereas the forst own will pick a fresh counter. They repeat the process again and the cycle continues such that one node accesses the medium at a time 7 18 13 Transmit Freeze and Wait Freeze and Wait Transmit 5 12 5

802.11 Contention Resolution Backoff = 7 Backoff = 12 Idle time However, we can clearly see that the counting down time is a source of pure overhead because the channel is idle during this time .. The overhead can be as large as xx% at yy condition # add curve lines 7 18 13 Transmit Freeze and Wait Freeze and Wait Transmit 5 12 5

802.11 Attempts Total Ordering 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 C4 C3 C2 C1 Contention Window Essentially 802.11 attempts to total order all the contending nodes. For example, 4 nodes can be ordered by making them choose cw form 16. .in genrel the random number range necessart totoal Lets take a step back and analyze 802.11 contention .. It attempts to totally order contending nodes .. For example, ordering 4 nodes may ideally require 16 slots Random number range to total order n nodes is superlinear ~ 𝑂 ( 𝑛 2 )

Tradeoff between collision probability and channel idle time Cost of Total Ordering Tradeoff between collision probability and channel idle time 802.11 attempts to total order all the nodes with high probability .. As we can see in the graph, a high total order probability needs large cw size On the other hand, low cw size means that proability for total ordering is small, thereby increasing collisions Clearly we have a tradeoff bw coll prob and chan idle time here

Breaking the tradeoff between collision probability and idle time Partial order nodes into groups Totally order within each group How can we break away from this tradeoff bw /..? The answer is to resolve contention in 2 rounds In the first round, we partially order nodes into groups And then in the second round, we totally order nodes within each group

Two round contention example Round1: Partial Order (R1) C4 C1 C2 C3 3 2 1 0 C3 C3 Round2: Total order each group (R2) C1 C2 C4 3 2 1 0 C2 C1 Here is an example for a 2 round contention scheme .. Nodes c1 to c4 choose the first round conuter from smaller cw therefore some of the nodes pick same random numbers. Consequently nodes are only partially ordered by forming two groups. IN the second round the order between nodes in each group is resolved .. 12 slots instead of 16 slots in 802.11

Two Round Gains via Partial Ordering Single Round Two Round Higher Gain at higher densities Here we plot the cw size necessary with a single round contention scheme like 802.11 and that required by a two round contention scheme. There is a lot of gain, particularly at higher node densities’ The key intuition is that %Simulations indicate how this is beneficial, particularly at high node densities Partial order (k) + k * Total order 𝑛 𝑘 < Total order (n)

Translating the intuition into a practical system Entails solving many challenges Groupwise Contention Multiple contention domains Reliable group signaling Adaptivity to collisions However, translating the intuition into a practical system entails solution to many challenges ..

Basic Two Round Contention Busy Signal R1 contention resumes R1 winners contend in R2 R1 contention R1:4 R1:6 R1:6 R2:3 C4 R1:4 3 3 R1:7 R2:6 C3 We first explain a basic timeline of a multi round contention scheme .. R1:6 2 R1:2 R2:1 C2 R1 loosers freeze here R1:6 2 R1:2 R2:3 C1

Two Round Contention After a packet-ack cycle, R2 nodes should resume before R1 Adjust IFS for R1 and R2 such that 𝐼𝐹 𝑆 𝑟1 >𝐼𝐹 𝑆 𝑟2 Ensures higher priority for R2 nodes for medium access Packet & ACK No R2 Nodes R1 Node 𝐼𝐹 𝑆 𝑟2 𝐼𝐹 𝑆 𝑟1 R1 Nodes progress when R2 nodes are done R2 Nodes have higher access priority Packet & ACK As we have seen in the previous slide, at the end of a packet/ack cycle, R1 nodes should continue to remain idle whereas R2 nodes should resume counting . In order to achieve these we make R1 and R2 nodes sense the channel for IFS_1 and IFS_2 resp such that IFS_1 < IFS_2 802.11 makes nodes to sense the channel for an IFS interval before beginning counting down. Similarly, in order to increase the priority of R2 nodes we assign them different IFS intervals such that IFS1 > IFS2 . The example shows .. R2 Node 𝐼𝐹 𝑆 𝑟2 R1 Node 𝐼𝐹 𝑆 𝑟1 𝑰𝑭 𝑺 𝒓𝟏 >𝑰𝑭 𝑺 𝒓𝟐

Multiple Contention Domains Nodes 1 and 3 do not interfere with each other R1 R2 Node 3 is needlessly kept idle, waiting on Node 2 which is blocked by node 1 C1 Here is an example where a naïve implementation causes problems in multiple contention domains. Consider topology such that C1 and C3 do not sense each other. Suppose they start 2d contention and C1 and C2 enter R2,at this point c3 will start freezing .. Suppose C1 wins .. Then C2 waits till which will result in prolonged waiting time for C3. However, this should not happen because c3 and c1 do not hear each other and should be able to transmit in parallel C2 C3

Multiple Contention Domains Transmit busy tones in alternate slots during R2 contention In the absence of busy tones, Node 3 resumes count down R1 R2 C1 We introduce busy toning to resolve this problem. Nodes contending in R2 send busy tones in alternate slots while counting down. In retrospect lets look at the timeline of C3, .. IN our given sitation, C3 senses absesnce of busy tones and infers that C2 is blocked. So, it resumes countdown and transmits subsequently C2 Nodes 1 and 3 transmit in parallel C3

Adapting to Collisions 802.11 doubles contention window on collisions How does two rounds of contention adapt to collisions? Equal size contention window in both rounds desirable Minimizes collisions for the same overhead (compared to 802.11) Upon a collision If R1 = R2 increase R1 so that R2 nodes do not block R1 nodes If R2 < R1, increase R2 so as to equalize R1 and R2 Contention window in R2 is never greater than R1 We now move to adaptivity, adapting the contention window size is necessary for protection from collisions. 802.11 adapts binary exponential backoff ..howver, the solution is not straightforward in our case, because …..two wind .. Ensuring ..

PHY LAYER The main challenge is to make the group of first round winners signal reliably

Overexposed terminal: PHY layer Nodes 1 and 2 do not interfere at node 3 Combined energy of their busy signals might exceed node 3’s detection threshold and block it needlessly How to mitigate overexposed terminals? 1 3 We illustrate the overexposed terminal problem with the following topology .. 2

Handling Overexposed Terminals Add random jitter to the contending preambles Yields multiple correlation peaks at the receiver Distribute total received energy among the detected peaks Resolves per collider energy, eliminates over exposed terminals Energy Time 1 To handle overexposed terminals, we introduce random jitters between busy signals .. This transmates into multiple peaks on the Correlation energy curve. By counting the number of peaks, we can resolve the number of busy signal transmitters and avoid over exposed terinanls 2 Δ Busy Signals

Applications beyond WiFi oCSMA  o2CSMA Applies to other protocols beyond WiFi .. Like oCSMA .. Just read

oCSMA Distributed stochastic approximation algorithm to maximize a given utility function oCSMA prescribes channel access probabilities and mean channel access time and respectively Theoretically optimal Practical limitations of slot sizes make oCSMA a zero sum game between throughput and fairness 𝜆 𝜇 oCSMA 𝜆 (𝑜𝑟 𝐶𝑊) 𝜇 (or Packet Size) Network read

o2CSMA We break the access probabilities prescribed by oCSMA into probabilities for two round contention o2CSMA 𝜆 1 (𝑜𝑟 𝐶 𝑊 1 ) 𝜇 𝜆 2 (𝑜𝑟 𝐶 𝑊 2 ) Network read

o2CSMA By minimizing collisions, o2CSMA breaks the zero sum gain between efficiency and fairness (more details in paper) oCSMA 𝜆 1 (𝑜𝑟 𝐶 𝑊 1 ) 𝜇 𝜆 2 (𝑜𝑟 𝐶 𝑊 2 ) 𝐶 𝑊 2 = 𝐶𝑊 2 𝐶 𝑊 1 = 𝐶𝑊 2 𝜆 (𝑜𝑟 𝐶𝑊) Network Block diagram shows internals of o2CSMA ..

Evaluation PHY micro benchmarking on USRP N210 Protocol Simulations on NS3

Overexposed terminal problem The graph shows how the combined energy of multiple colliders passes the detection threshold even though they are individual nbelow the detection threshold ..This causes over exposed terminals

Energy Detection is not suitable Combined energy of colliders exceeds energy threshold

Peak counting based energy detection With our peak counting technique the qccuracy of detection of over exposed terminals is high with our scheme, whereas

Peak counting based energy detection HiBo accurately detects overexposed terminals, pure energy detection fails

Higher gains at higher node densities Comapres the throughput of hibo with 802.11 and static variants of two round cw .. Consistently offers high throuput in all density regimes .. 30% gains

Enhancing scalability of oCSMA We compare o2csma with ocsma for various simulation parameters ..one parameter setting works well for high density and other for low node density .. Whereas with hibo ,, we offer consistent performance withal node densiities

Enhancing scalability of oCSMA oCSMA (1000) poor performance at high density

Enhancing scalability of oCSMA oCSMA (200) poor performance at low density

Enhancing scalability of oCSMA o2CSMA (1000) scalable performance at all density regimes

Multiple Contention Domains Finally, the gains extend to multiple contention domans as well

Related Work Unconventional backoff techniques Back2F and WiFi Nano require more complexity Differential queue based optimal CSMA schemes Our proposal is complementary to oCSMA and IdleSense Tree Splitting based protocols (in sensor networks) They operate at the granularity of packets while we operate at slot level MrCA We address multi contention domains, adaptivity and phy layer signaling Whatever cw they prescribe can be ordered into 2 rounds and minimize collision .. Enromous literature exist on tree splitting nased protocols .. Hgowver .. Finally, mrca is closest to out work where theyt propose multi round contention for wigi like setting .. However .. Do not handle challenges like

Summary Revisiting the classical time domain backoff scheme Partial ordering followed by total ordering of nodes within the partially ordered groups is better than absolute total ordering Practical scheme for two-round contention Reliable group signal detection Handles multiple collision domains Promising results from simulation and micro benchmarking Throughput gain over 30% Enhanced scalability of oCSMA

Thank You SyNRG Research Group www.synrg.csl.illinois.edu