The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.

Slides:



Advertisements
Similar presentations
Impact of Interference on Multi-hop Wireless Network Performance
Advertisements

The Capacity of Wireless Networks
Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
1 Capacity Scaling in Delay Tolerant Networks with Heterogeneous Mobile Nodes Michele Garetto – Università di Torino Paolo Giaccone - Politecnico di Torino.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Capacity of ad-hoc wireless Networks Vicky Sharma.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
DYNAMIC POWER ALLOCATION AND ROUTING FOR TIME-VARYING WIRELESS NETWORKS Michael J. Neely, Eytan Modiano and Charles E.Rohrs Presented by Ruogu Li Department.
By Groysman Maxim. Let S be a set of sites in the plane. Each point in the plane is influenced by each point of S. We would like to decompose the plane.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
The Capacity of Wireless Ad Hoc Networks
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (III) 12th Week
1 On the Performance of Slotted Aloha with Capture Effect in Wireless Networks Arash Behzad and Julan Hsu Professor Mario Gerla CS218 Project UCLA December.
Asymptotic Critical Transmission Radius for Greedy Forward Routing in Wireless Ad Hoc Networks Chih-Wei Yi Submitted to INFOCOM 2006.
Mobility Increases Capacity In Ad-Hoc Wireless Networks Lecture 17 October 28, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
Mobile Ad hoc Networks COE 549 Delay and Capacity Tradeoffs II Tarek Sheltami KFUPM CCSE COE 8/6/20151.
Capacity of Ad Hoc Networks Quality of Wireless links Physical Layer Issues The Channel Capacity Path Loss Model and Signal Degradation MAC for.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
Computing and Communicating Functions over Sensor Networks A.Giridhar and P. R. Kumar Presented by Srikanth Hariharan.
Link Layer: Wireless Mesh Networks Capacity Y. Richard Yang 11/13/2012.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
Delay-Throughput Tradeoff with Correlated Mobility in Ad-Hoc Networks Shuochao Yao*, Xinbing Wang*, Xiaohua Tian* ‡, Qian Zhang † *Department of Electronic.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Wireless Networks Spring 2005 Capacity of Ad Hoc Networks.
Minimum Average Routing Path Clustering Problem in Multi-hop 2-D Underwater Sensor Networks Presented By Donghyun Kim Data Communication and Data Management.
Convergecast with MIMO Luoyi Fu, Yi Qin, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Xue Liu Department of Computer.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
Converge-Cast: On the Capacity and Delay Tradeoffs Xinbing Wang Luoyi Fu Xiaohua Tian Qiuyu Peng Xiaoying Gan Hui Yu Jing Liu Department of Electronic.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
Capacity of Large Scale Wireless Networks with Directional Antenna and Delay Constraint Guanglin Zhang IWCT, SJTU 26 Sept, 2012 INC, CUHK 1.
Backbone Topology Synthesis for Multi- Radio Meshed Wireless LANs Huei-jiun Ju and Izhak Rubin University of California, Los angeles(UCLA) Keon Jang, SA.
TDMA scheduling algorithms for WSN Speaker: Chan-Yu Tsai Advisor: Dr. Ho-Ting Wu Date: 2015/5/6.
An Adaptive, High Performance MAC for Long-Distance Multihop Wireless Networks Sergiu Nedevschi *, Rabin K. Patra *, Sonesh Surana *, Sylvia Ratnasamy.
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Impact of Interference on Multi-hop Wireless Network Performance
Advanced Wireless Networks
Surviving Holes and Barriers in Geographic Data Reporting for
Hidden Terminal Decoding and Mesh Network Capacity
The Capacity of Wireless Networks
Throughput-Optimal Broadcast in Dynamic Wireless Networks
Su Yi (RPI) Yong Pei (Univ. of Miami) Shivkumar Kalyanaraman (RPI)
Introduction Wireless Ad-Hoc Network
CAPACITY OF POWER CONSTRAINED AD-HOC NETWORKS
Capacity of Ad Hoc Networks
Javad Ghaderi, Tianxiong Ji and R. Srikant
Pradeep Kyasanur Nitin H. Vaidya Presented by Chen, Chun-cheng
Ulas C. Kozat Leandros Tassiulas Mibocom’03
How MAC interacts with Capacity of Ad-hoc Networks – Interference problem Capacity of Wireless Networks – Part Page 1.
Presentation transcript:

The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03

Wireless ad hoc network No wired backbone No wired backbone No centralized control No centralized control Nodes may cooperate in routing each other s data packets Nodes may cooperate in routing each other s data packets At the Network Layer – problems are in routing, mobility of nodes and power constraints At the Network Layer – problems are in routing, mobility of nodes and power constraints At the MAC layer – problems with protocols such as TDMA, FDMA,CDMA At the MAC layer – problems with protocols such as TDMA, FDMA,CDMA At the Physical layer – problems in power control At the Physical layer – problems in power control

Lecture Minutes Arbitrary networks 1. Two models: protocol and physical 2. An upper bound on transport capacity 3. Constructive lower bound on transport capacity Random networks 1. Two models: protocol and physical 2. Constructive lower bound on throughput capacity Conclusions

Arbitrary Networks n nodes are arbitrary located in a unit area disc n nodes are arbitrary located in a unit area disc Each node is can transmit at W bits/sec over the channel Each node is can transmit at W bits/sec over the channel Destination is arbitrary Destination is arbitrary Rate is arbitrary Rate is arbitrary Transmission range is arbitrary Transmission range is arbitrary Will later add some assumptions on the network Will later add some assumptions on the network When does a transmission received successfully ? When does a transmission received successfully ? Allowing for two possible models for successful reception over one hop: The protocol model and the Physical model

Protocol Model Let X i denote the location of a node Let X i denote the location of a node A transmission is successfully received by X j if: A transmission is successfully received by X j if: For every other node X k simultaneously transmitting is the guarding zone specified by the protocol is the guarding zone specified by the protocol

Physical Model Let Let Be a subset of nodes simultaneously transmitting Let P k be the power level chosen at node X k Let P k be the power level chosen at node X k Transmission from node X i is successfully received at node X j if: Transmission from node X i is successfully received at node X j if:

Transport Capacity of Arbitrary Networks Network transport one bit-meter when one bit transported one meter toward its destination Network transport one bit-meter when one bit transported one meter toward its destination Main result 1: Main result 1: Under the Protocol Model the transport capacity is Main result 2: Main result 2: Under the Physical Model, While is not is feasible

Arbitrary Network – upper bound on transport capacity Assumptions: There are n nodes arbitrarily located in a disk of unit area on the plane There are n nodes arbitrarily located in a disk of unit area on the plane The network transport nT bits over T seconds, i.e. each node generate bits at rate The network transport nT bits over T seconds, i.e. each node generate bits at rate The average distance between source and destination of a bit is L The average distance between source and destination of a bit is L Transmissions are slotted into synchronized slots of length sec Transmissions are slotted into synchronized slots of length sec

Theorem In the protocol model, the transport capacity nL is bounded as follows: In the protocol model, the transport capacity nL is bounded as follows: In the physical model, In the physical model,

Arbitrary Network – constructive lower bound There is a placement of nodes and an assignment of traffic patterns such that the network can achieve under protocol model There is a placement of nodes and an assignment of traffic patterns such that the network can achieve under protocol model Proof – define r := Proof – define r := Place transmitters at locations: Place receivers at locations:

A constructive lower bound on capacity of arbitrary network r r (( )) r r >(1+ )r (( ))

Random Networks n nodes are randomly located on S 2 (the surface of a sphere of area 1sq m) or in a disk of area 1sq m in the plane n nodes are randomly located on S 2 (the surface of a sphere of area 1sq m) or in a disk of area 1sq m in the plane Each node has randomly chosen destination to send (n) bits/sec Each node has randomly chosen destination to send (n) bits/sec All transmissions employ the same nominal range or power All transmissions employ the same nominal range or power Two models: Protocol and Physical Two models: Protocol and Physical

Protocol Model Let X i denote the location of a node and r the common range Let X i denote the location of a node and r the common range A transmission is successfully received by X j if: A transmission is successfully received by X j if: For every other X k simultaneously transmitting

Physical Model Let Let Be a subset of nodes simultaneously transmitting Let P be the common power level Let P be the common power level Transmission from node X i is successfully received at node X j if: Transmission from node X i is successfully received at node X j if:

Throughput Capacity of Random Networks Main result 1: Main result 1: Under the Protocol Model the order of the throughput capacity Main result 2: Main result 2: Under the Physical Model, While is not is feasible

Random Networks: A constructive lower bound on capacity We will show a scheme such that each source-destination pair can be guaranteed a channel of capacity With probability approaching 1 as Steps Define the Voronoi tessellation Define the Voronoi tessellation Bound the number of interfering neighbors of a Voronoi cell Bound the number of interfering neighbors of a Voronoi cell Bound the length of an all-cell transmission schedule Bound the length of an all-cell transmission schedule Define the routes of a packet on the Voronoi tessellation Define the routes of a packet on the Voronoi tessellation Prove that each cell contains at least one node Prove that each cell contains at least one node Calculate the expected routes that pass through a cell and infer the expected traffic of each node Calculate the expected routes that pass through a cell and infer the expected traffic of each node

Spatial tessellation Let {a 1,a 2, ….a p } be a set of p points on S 2 Let {a 1,a 2, ….a p } be a set of p points on S 2 The Voronoi cell V(a i ) is the set of all points which are closer to a i than of the other a j s i.e.: The Voronoi cell V(a i ) is the set of all points which are closer to a i than of the other a j s i.e.: Point a i is called the generator of the Voronoi cell V(a i ) Point a i is called the generator of the Voronoi cell V(a i )

A Voronoi tessellation of S 2

For each >0, There is a Voronoi tessellation such that Each cell contains a disk of radius and is contained in a disk of radius 2 For each >0, There is a Voronoi tessellation such that Each cell contains a disk of radius and is contained in a disk of radius 2 We will use a Voronoi tessellation for which : 1.Every Voronoi cell contains a disk of area 100logn/n. Let (n) be its radius 2.Every Voronoi cell is contained in a disk of radius 2 (n) Tessellation properties

Adjacency and interference Adjacent cells are two cells that share a common point. Adjacent cells are two cells that share a common point. We will choose the range of transmission r(n) so that: We will choose the range of transmission r(n) so that: With this range, every node in a cell is within a distance r(n) from every node in its own cell or adjacent cell 8 (n) 2 (n)

A bound on the number of Interfering cells Two cells are interfering neighbors if there is a point in one cell which is within a distance of (2+ )r(n) of some point in the other cell Two cells are interfering neighbors if there is a point in one cell which is within a distance of (2+ )r(n) of some point in the other cell Lemma – Every cell in V n has no more than c 1 interfering cells. c 1 grows no faster than linearly in (1+ ) 2 Lemma – Every cell in V n has no more than c 1 interfering cells. c 1 grows no faster than linearly in (1+ ) 2 Proof – if V is an interfering neighbor of V, then V and similarly every other interfering neighbor, must be contained within a common large disk D of radius 6 (n)+ (2+ )r(n)

A bound on the length of an all-cell inclusive transmission schedule Lemma - In the protocol model, there is a schedule for transmitting packets such that in every (1+c 1 ) slots, each cell in V n gets one slot in which to transmit Lemma - In the protocol model, there is a schedule for transmitting packets such that in every (1+c 1 ) slots, each cell in V n gets one slot in which to transmit Proof – A graph of degree no more than c 1 can have its vertices colored by using no more than (1+c 1 ) colors. So color the graph such that no two interfering neighbors have the same color, so in each slot all the nodes with the same color transmit There is a schedule also for the physical model …. There is a schedule also for the physical model ….

The routes of packets Source – destination pairs – let Y i be a randomly chosen location such that X i and Y i are independent. The destination X dest(i) is chosen as the node X j which is closest to Y i Source – destination pairs – let Y i be a randomly chosen location such that X i and Y i are independent. The destination X dest(i) is chosen as the node X j which is closest to Y i Corollary: The random sequence {L i } = {straight line connecting X i and Y i } is i.i.d. Corollary: The random sequence {L i } = {straight line connecting X i and Y i } is i.i.d. Routes of packets will be choose to approximate these straight line segments Routes of packets will be choose to approximate these straight line segments Final destination will be one hop away from Y i, with high probability Final destination will be one hop away from Y i, with high probability

Each cell contains at least one node Definition 1: Let F be a set of subset. A finite set of points A is said to be shattered by F if for every subset B of A there is a set F in F such that Definition 2: The VC-dimension of F, denoted by VC- dim( F ), is defined as the supremum of the sizes of all finite sets that can be shattered by F

Vapnic-Chervonenkis Theorem If F is a set of finite VC dimension d and {X i }is a sequence of i.i.d. random variables with common probability distribution P, then for every > 0,

VCdim of the set of disks in R 2 x1x1 x2x2 x3x3 x4x4

A cell contains at least one node Let F denote the class of disks of area 100logn/n. So VCdim( F ) is 3. Let V be a cell contained in a disk D. Hence:

Mean number of routes served by each cell First calculate the probability that a line L i or great circle intersect a cell V First calculate the probability that a line L i or great circle intersect a cell V Lemma: for every line L i and cell V So the expected number of lines L i that intersect a cell is bounded as: So the expected number of lines L i that intersect a cell is bounded as: The same as for great circles ! The same as for great circles !

Actual traffic served by each cell We bounded the mean number of routes passing through each cell. However, we need to bound the actual random number of routes served by each cell !! We bounded the mean number of routes passing through each cell. However, we need to bound the actual random number of routes served by each cell !! Remember the sequence {X i,Y i } is i.i.d. Remember the sequence {X i,Y i } is i.i.d. Therefore, we can appeal to uniform convergence Therefore, we can appeal to uniform convergence We will show that each great circle that intersect a disc D, can be mapped to a point on the band F(D) that is equidistant from the center of D We will show that each great circle that intersect a disc D, can be mapped to a point on the band F(D) that is equidistant from the center of D Then we can bound the VCdim of the band and so of the great circles Then we can bound the VCdim of the band and so of the great circles

Transforming great circles intersecting disks into points lying in equatorial bands Z C F(D)

Lower bound on throughput capacity Because of uniform convergence, we obtain: Because of uniform convergence, we obtain:

Lower bound on throughput capacity We have shown that there is a schedule for transmitting packets such that in every (1+c 1 ) slots, each cell can transmit. We have shown that there is a schedule for transmitting packets such that in every (1+c 1 ) slots, each cell can transmit. Thus the rate at which each cell transmit is W/(1+c 1 ) bits/sec Thus the rate at which each cell transmit is W/(1+c 1 ) bits/sec On the other hand, the rate a cell needs to transmit is less than: On the other hand, the rate a cell needs to transmit is less than: So with high probability, and because c 1 is grow linearly with (1+ ) 2 we have: So with high probability, and because c 1 is grow linearly with (1+ ) 2 we have:

Conclusions Designers may want to consider designing networks with small number of nodes Designers may want to consider designing networks with small number of nodes Communication with nearby nodes at constant bit rates can be provided in a dense clusters of nodes, since the source – destination distance shrink as Communication with nearby nodes at constant bit rates can be provided in a dense clusters of nodes, since the source – destination distance shrink as

Questions ?