Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.

Slides:



Advertisements
Similar presentations
Impact of Interference on Multi-hop Wireless Network Performance
Advertisements

Analysis of a Cone-Based Distributed Topology Control Algorithm for Wireless Multi-hop Networks L. Li, J. Y. Halpern Cornell University P. Bahl, Y. M.
February 20, Spatio-Temporal Bandwidth Reuse: A Centralized Scheduling Mechanism for Wireless Mesh Networks Mahbub Alam Prof. Choong Seon Hong.
University At Buffalo Capacity Of Ad-Hoc Networks Ajay Kumar.
Wireless Network Capacity
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
The Capacity of Wireless Networks
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
ECE 667 Synthesis and Verification of Digital Circuits
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
~1~ Infocom’04 Mar. 10th On Finding Disjoint Paths in Single and Dual Link Cost Networks Chunming Qiao* LANDER, CSE Department SUNY at Buffalo *Collaborators:
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Predictable Performance Optimization for Wireless Networks Lili Qiu University of Texas at Austin Joint work with Yi Li, Yin Zhang,
1 Crosslayer Design for Distributed MAC and Network Coding in Wireless Ad Hoc Networks Yalin E. Sagduyu Anthony Ephremides University of Maryland at College.
Interference Considerations for QoS in MANETs Rajarshi Gupta, John Musacchio, Jean Walrand {guptar, musacchj, University of California,
1 Estimation of Link Interference in Static Multi-hop Wireless Networks Jitendra Padhye, Sharad Agarwal, Venkat Padmanabhan, Lili Qiu, Ananth Rao, Brian.
Distributed Algorithms for Secure Multipath Routing
Kuang-Hao Liu et al Presented by Xin Che 11/18/09.
Data Transmission and Base Station Placement for Optimizing Network Lifetime. E. Arkin, V. Polishchuk, A. Efrat, S. Ramasubramanian,V. PolishchukA. EfratS.
Placement of Integration Points in Multi-hop Community Networks Ranveer Chandra (Cornell University) Lili Qiu, Kamal Jain and Mohammad Mahdian (Microsoft.
ASWP – Ad-hoc Routing with Interference Consideration June 28, 2005.
ASWP – Ad-hoc Routing with Interference Consideration Zhanfeng Jia, Rajarshi Gupta, Jean Walrand, Pravin Varaiya Department of EECS University of California,
Network Coding Project presentation Communication Theory 16:332:545 Amith Vikram Atin Kumar Jasvinder Singh Vinoo Ganesan.
Achieving End-to-End Fairness in Wireless Networks Ananth Rao Ion Stoica OASIS Retreat, Jul 2005.
Mobility Increases Capacity In Ad-Hoc Wireless Networks Lecture 17 October 28, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor.
Effects of Interference on Wireless Mesh Networks: Pathologies and a Preliminary Solution Yi Li, Lili Qiu, Yin Zhang, Ratul Mahajan Zifei Zhong, Gaurav.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Quality of Service for Flows in Ad-Hoc Networks SmartNets Research Group Dept of EECS, UC Berkeley NMS PI Meeting, Nov 2004.
1 TDMA Scheduling in Competitive Wireless Networks Mario CagaljHai Zhan EPFL - I&C - LCA February 9, 2005.
Smart Networks Project University of California, Berkeley DARPA NMS PI Meeting Miami, Jan 21-23, 2004.
S. Suri, M, Waldvogel, P. Warkhede CS University of Washington Profile-Based Routing: A New Framework for MPLS Traffic Engineering.
Interference Minimization and Uplink Relaying For a 3G/WLAN Network Ju Wang Virginia Commonwealth University May, 2005.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
EE 685 presentation Distributed Cross-layer Algorithms for the Optimal Control of Multi-hop Wireless Networks By Atilla Eryılmaz, Asuman Özdağlar, Devavrat.
A Distributed Framework for Correlated Data Gathering in Sensor Networks Kevin Yuen, Ben Liang, Baochun Li IEEE Transactions on Vehicular Technology 2008.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
Message-Passing for Wireless Scheduling: an Experimental Study Paolo Giaccone (Politecnico di Torino) Devavrat Shah (MIT) ICCCN 2010 – Zurich August 2.
ANTs PI Meeting, Nov. 29, 2000W. Zhang, Washington University1 Flexible Methods for Multi-agent distributed resource Allocation by Exploiting Phase Transitions.
Stochastic Multicast with Network Coding Ajay Gopinathan, Zongpeng Li Department of Computer Science University of Calgary ICDCS 2009, June , Montreal.
Optimization Flow Control—I: Basic Algorithm and Convergence Present : Li-der.
EE 685 presentation Utility-Optimal Random-Access Control By Jang-Won Lee, Mung Chiang and A. Robert Calderbank.
Some Networking Aspects of Multiple Access Muriel Medard EECS MIT.
On the Topology of Wireless Sensor Networks Sen Yang, Xinbing Wang, Luoyi Fu Department of Electronic Engineering, Shanghai Jiao Tong University, China.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
On Selfish Routing In Internet-like Environments Lili Qiu Microsoft Research Feb. 13, 2004 Johns Hopkins University.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
CS223 Advanced Data Structures and Algorithms 1 Maximum Flow Neil Tang 3/30/2010.
1 Measuring and Modeling the Impact of Wireless Interference Lili Qiu UT Austin Rice University Nov. 21, 2005.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
Optimization-based Cross-Layer Design in Networked Control Systems Jia Bai, Emeka P. Eyisi Yuan Xue and Xenofon D. Koutsoukos.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Impact of Interference on Multi-hop Wireless Network Performance
Presented by Tae-Seok Kim
Group Multicast Capacity in Large Scale Wireless Networks
Abdul Kader Kabbani (Stanford University)
ElasticTree Michael Fruchtman.
Resource Allocation in Non-fading and Fading Multiple Access Channel
CS223 Advanced Data Structures and Algorithms
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
INFOCOM 2013 – Torino, Italy Content-centric wireless networks with limited buffers: when mobility hurts Giusi Alfano, Politecnico di Torino, Italy Michele.
Pradeep Kyasanur Nitin H. Vaidya Presented by Chen, Chun-cheng
Presentation transcript:

Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond

Motivation There has been a lot of research on capacity of multi- hop wireless networks in past few years. Inference is one of the main limiting factors Most of it talks about asymptotic, pessimistic bounds on performance. Also, they usually assume saturated traffic. –Gupta and Kumar 2000: O(1/sqrt(N)) We present a framework to answer questions about capacity of specific topologies with specific traffic patterns

Organization Propose an abstract and flexible method to model the impact interference. –Mainly based on protocol model –Can be extended to physical model, but doesnt seem easy to solve Prove solving this model is NP-hard Propose some heuristics to obtain both upper bound and lower bound in this model Use this method to derive best routing and scheduling protocol, which is better than known protocols –Assume there is an omniscient and omnipotent control center Some experiment results based on the protocol that may give us insights on future research

Overview of Our Framework 1.Model the problem as a standard network flow problem Described as a linear program 2.Represent interference among wireless links using a conflict graph 3.Derive constraints on utilization of wireless links using cliques in the conflict graph Augment the linear program to obtain upper bound on optimal throughput 4.Derive constraints on utilization of wireless links using independent sets in the conflict graph Augment the linear program to obtain lower bound on optimal throughput Iterate over Steps 3 and 4 to find progressively tighter bounds on optimal throughput

Assumptions No mobility Fluid model of data transmission Data transmissions can be finely scheduled by an omniscient central entity

Overview of Our Framework 1.Model the problem as a standard network flow problem Described as a linear program 2.Represent interference among wireless links using a conflict graph 3.Derive constraints on utilization of wireless links using cliques in the conflict graph Augment the linear program to obtain upper bound on optimal throughput 4.Derive constraints on utilization of wireless links using independent sets in the conflict graph Augment the linear program to obtain lower bound on optimal throughput Iterate over Steps 3 and 4 to find progressively tighter bounds on optimal throughput

Step 1: Network Flow Model Create a connectivity graph –Each vertex represents a wireless node –Draw a directed edge from vertex A to vertex B if B is within range of A Write a linear program that solves the basic MAXFLOW problem on this connectivity graph Several generalizations possible –Discussed later in the talk.

Example: Network Flow Model Linear Program: Maximize Flow out of A Subject to: 1.Flow on any link can not exceed 1 2.At node B, Flow in == Flow out. Answer: 1 (Link 1, Link 2) A B C Connectivity Graph Link capacity =

Overview of Our Framework 1.Model the problem as a standard network flow problem Described as a linear program 2.Represent interference among wireless links using a conflict graph 3.Derive constraints on utilization of wireless links using cliques in the conflict graph Augment the linear program to obtain upper bound on optimal throughput 4.Derive constraints on utilization of wireless links using independent sets in the conflict graph Augment the linear program to obtain lower bound on optimal throughput Iterate over Steps 3 and 4 to find progressively tighter bounds on optimal throughput

Step 2: Model Interference using Conflict Graph A conflict graph that shows which wireless links interfere with each other Each edge in the connectivity graph represented by a vertex Draw an edge between two vertices if the links interfere with each other Several generalizations possible –Discussed later in the talk.

Example: Conflict Graph Connectivity Graph A B C Conflict Graph

Overview of Our Framework 1.Model the problem as a standard network flow problem Described as a linear program 2.Represent interference among wireless links using a conflict graph 3.Derive constraints on utilization of wireless links using cliques in the conflict graph Augment the linear program to obtain upper bound on optimal throughput 4.Derive constraints on utilization of wireless links using independent sets in the conflict graph Augment the linear program to obtain lower bound on optimal throughput Iterate over Steps 3 and 4 to find progressively tighter bounds on optimal throughput

Step 3: Clique Constraints Consider Maximal Cliques in the conflict graph –A maximal clique is a clique to which we can not add any more vertices At most one of the links in a clique can be active at any given instant –Sum of utilization of links belonging to a clique is <= 1 MAXFLOW LP can be augmented with these clique constraints to get a better upper bound

Example: Clique Constraints Link capacity = 1 Linear Program: Maximize Flow out of A Subject to: 1.Flow on any link can not exceed 1 * link utilization 2.Link utilization can not exceed 100% 3.Sum of utilizations of links 1, 2, 3 and 4 can not exceed 100% 4.At node B, Flow in == Flow out Clique = {1, 2, 3, 4} A B C Answer = 0.5 (Link1, Link 2)

Properties of Clique Constraints Finding all cliques can take exponential time –Moreover, finding all cliques does not guarantee optimal solution (will discuss later in talk) The upper bound is monotonically non-increasing as we find and add new cliques –As we add each clique, the link utilizations are constrained further More computing time can provide better solution

Overview of Our Framework 1.Model the problem as a standard network flow problem Described as a linear program 2.Represent interference among wireless links using a conflict graph 3.Derive constraints on utilization of wireless links using cliques in the conflict graph Augment the linear program to obtain upper bound on optimal throughput 4.Derive constraints on utilization of wireless links using independent sets in the conflict graph Augment the linear program to obtain lower bound on optimal throughput Iterate over Steps 3 and 4 to find progressively tighter bounds on optimal throughput

Step 4:Independent Set Constraints Consider Maximal Independent sets in the conflict graph All links belonging to an independent set can be active at the same time. No two maximal independent sets are active at the same time. MAXFLOW LP can be augmented with constraints derived from independent sets to get a lower bound

Example: Independent Set Constraints Link capacity = 1 Linear Program: Maximize Flow out of A Subject to: 1.Flow on any link can not exceed 1 * link utilization 2.Sum of utilizations of independent sets can not exceed 100% 3.Utilization of a link can not exceed the sum of utilization of independent sets it belongs to. 4.At node B, Flow in == Flow out Independent sets: {1}, {2}, {3}, {4} A B C Answer = 0.5 (Link1, Link 2)

Properties of Independent Set Constraints Lower bound is always feasible –LP also outputs a transmission schedule Finding all independent sets can take exponential time –If we do find all independent sets, the resulting lower bound is guaranteed to be optimal Lower bound is monotonically non-decreasing as we find and add more independent sets –More computing time provides better answers If upper and lower bounds converge, optimality is guaranteed

Putting It All Together Houses talk to immediate neighbors, all links are capacity 1, like MAC, Multipath routing

Advantages of Our Approach Real numbers instead of asymptotic bounds This is the optimal bound, unlikely to be achieved in practice for a variety of reasons The model permits several generalizations: Multiple radios/channels Directional antennas Single path or Multi-path routing Different ranges, data rates Different wireless interference models Different topologies Senders with limited (but constant) demand Optimize for fairness or revenue instead of throughput Useful for what if analysis

Some Generalizations Multiple radios on orthogonal channels –Represent with multiple, non-interfering links between nodes Directional antennas –Include appropriate edges in the connectivity graph –Conflict graph can accommodate any interference pattern Multiple senders and/or receivers –Write LP to solve Multi-commodity flow problem Non-greedy sender –Create a virtual sender –Include a virtual link of limited capacity from the virtual sender to the real sender in the connectivity graph –This link does not conflict with any other links –LP maximizes flow out of virtual sender

Some Generalizations: Physical model of interference Directed conflict graph Edge between every pair of vertices –Vertices in conflict graphs are wireless links. Weight on edge X->Y represents noise generated at the source of Y when X is active Non-schedulable sets instead of cliques Schedulable sets instead of independent sets

Limitations Linear programs can take a long time to solve –Exponentially many cliques and independent sets –Especially when single path routing is used There is no guarantee that optimal solution will be found in less than exponential time Upper bound might not converge to optimal even if we find all cliques –Graphs with odd-holes and anti-holes

Why Upper Bound Not Tight? Maximal clique size =2 Optimal throughput by LP is 2.5 Achievable throughput is 2

Experimental Results Compare 4 different routing/scheduling policies Experiment setup: –7*7 grid –distance between node is 200m –transmission range is 250m –interference range is 500m

Experimental Results

Does More Nodes Hurt Throughput? Experiment setup: –7*7 grid –distance between nodes is 200m –transmission range is 250m –interference range is 500m –randomly pick N nodes, half of which are senders and the others are receivers –senders send at rate D –we want to see connectivity and throughput versus N

Connectivity

Normalized Throughput

Results More nodes in the network helps connectivity If the demand of each node is low, more nodes help improve normalized throughput –Does not contradict P.R. Kumars result

Related Work Gupta and Kumar, –Asymptotic bound of 1/sqrt(N) Li et. al., 2001 –Impact of other traffic patterns, esp. power-law patterns Grossglauser and Tse, 2001 –Impact of mobility Gastpar and Vetterli, 2002 –Impact of network coding and arbitrary node co-operation

Related Work (cont) Nandagopal et. al., 2000 –Flow contention graphs to study MAC fairness Yang and Vaidya, 2000 –Flow-based conflict graph used to study unfairness introduced by interference Kodialam and Nandagopal, 2003 (previous presentation) –Same aim as ours! –Limited model of interference (node may not send or receive simultaneously) –Polynomial time algorithm to approximate throughput within 67% of optimal

Conclusion We presented a flexible framework to answer questions about capacity of specific topologies with specific traffic patterns The framework can accommodate sophisticated models of connectivity and wireless interference The framework computes upper and lower bounds on optimal throughput –Finding optimal throughput can take exponential amount of time.

Future Work Better convergence of upper and lower bounds Interference-aware routing –Can we generate/maintain the conflict graph, or its approximation in a distributed manner? –If yes, can we design a routing algorithm that attempts to minimize interference? –Initial idea: minimize number of links interfered with

Salient Features Out framework can accommodate sophisticated connectivity and interference models The problem of finding optimal throughput is NP complete, so we compute upper and lower bounds on optimal throughput –The previous example was simple enough to find optimal throughputs (i.e. upper and lower bounds were equal)