Routing in Ad-hoc Networks with MIMO links Karthikeyan Sundaresan and Raghupathy Sivakumar presented by Neeraj Gurdasani.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Jaringan Komputer Lanjut Packet Switching Network.
The Impact of Channel Estimation Errors on Space-Time Block Codes Presentation for Virginia Tech Symposium on Wireless Personal Communications M. C. Valenti.
AALTO UNIVERSITY School of Science and Technology Wang Wei
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks E. Gelal, K. Pelechrinis, T.S. Kim, I. Broustis Srikanth V. Krishnamurthy,
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
APPLICATION OF SPACE-TIME CODING TECHNIQUES IN THIRD GENERATION SYSTEMS - A. G. BURR ADAPTIVE SPACE-TIME SIGNAL PROCESSING AND CODING – A. G. BURR.
Introduction to Cognitive radios Part two HY 539 Presented by: George Fortetsanakis.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
Impact of Directional Antennas on Ad Hoc Routing Romit Roy Choudhury Nitin H. Vaidya.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Receiver-driven Layered Multicast Paper by- Steven McCanne, Van Jacobson and Martin Vetterli – ACM SIGCOMM 1996 Presented By – Manoj Sivakumar.
Network Coding vs. Erasure Coding: Reliable Multicast in MANETs Atsushi Fujimura*, Soon Y. Oh, and Mario Gerla *NEC Corporation University of California,
Wireless Transmission Fundamentals (Physical Layer) Professor Honggang Wang
MIMO Multiple Input Multiple Output Communications © Omar Ahmad
MULTIPLE INPUT MULTIPLE OUTPUT SYSTEMS (MIMO)
1. 2  What is MIMO?  Basic Concepts of MIMO  Forms of MIMO  Concept of Cooperative MIMO  What is a Relay?  Why Relay channels?  Types of Relays.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
CIS 725 Wireless networks. Low bandwidth High error rates.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
Coded Transmit Macrodiversity: Block Space-Time Codes over Distributed Antennas Yipeng Tang and Matthew Valenti Lane Dept. of Comp. Sci. & Elect. Engg.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Joint PHY-MAC Designs and Smart Antennas for Wireless Ad-Hoc Networks CS Mobile and Wireless Networking (Fall 2006)
Addressing Deafness and Hidden Terminal Problem in Directional Antenna Based Wireless Multi-hop Networks Anand Prabhu Subramanian and Samir R. Das {anandps,
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Wireless Sensor Networks COE 499 Energy Aware Routing
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Ch 11. Multiple Antenna Techniques for WMNs Myungchul Kim
نیمسال اوّل افشین همّت یار دانشکده مهندسی کامپیوتر مخابرات سیّار (626-40) ارتباطات همکارانه.
Iterative Multi-user Detection for STBC DS-CDMA Systems in Rayleigh Fading Channels Derrick B. Mashwama And Emmanuel O. Bejide.
Multiplexing FDM & TDM. Multiplexing When two communicating nodes are connected through a media, it generally happens that bandwidth of media is several.
S MART A NTENNA B.GANGADHAR 08QF1A1209. ABSTRACT One of the most rapidly developing areas of communications is “Smart Antenna” systems. This paper deals.
Wireless Multiple Access Schemes in a Class of Frequency Selective Channels with Uncertain Channel State Information Christopher Steger February 2, 2004.
Scalable Video Coding and Transport Over Broad-band wireless networks Authors: D. Wu, Y. Hou, and Y.-Q. Zhang Source: Proceedings of the IEEE, Volume:
TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Space Time Codes. 2 Attenuation in Wireless Channels Path loss: Signals attenuate due to distance Shadowing loss : absorption of radio waves by scattering.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
Evaluating Mobility Support in ZigBee Networks
Video Streaming Transmission Over Multi-channel Multi-path Wireless Mesh Networks Speaker : 吳靖緯 MA0G WiCOM '08. 4th International.
Power-Efficient Rendez- vous Schemes for Dense Wireless Sensor Networks En-Yi A. Lin, Jan M. Rabaey Berkeley Wireless Research Center University of California,
Cascading : An Overview of the Strategy Yujie Zhu and Raghupathy Sivakumar GNAN Research Group, Georgia Tech Energy-Efficient Communication Strategy for.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Multiple Antennas.
Puzzle You have 2 glass marbles Building with 100 floors
Improving Performance of Higher Layer Protocols with MIMO based MAC
Space Time Codes.
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Yiannis Andreopoulos et al. IEEE JSAC’06 November 2006
Presentation transcript:

Routing in Ad-hoc Networks with MIMO links Karthikeyan Sundaresan and Raghupathy Sivakumar presented by Neeraj Gurdasani

Outline Identify the capabilities of MIMO links and capture their relevance to routing layer protocols. Analyze the relative tradeoffs of exploiting the different capabilities of MIMO links. Propose a routing protocol called MIR for ad-hoc networks with MIMO link Simulations

Types of directive antennas Simple switched beams Switched beam antennas have predetermined beam patterns. Advantage – simple in the transceiver complexity. – They provide significant performance improvement in strong line of sight (LOS) environments where they increase the spatial reuse in the network owing to directional transmissions. Disadvantage They suffer significantly in rich multipath environments where signal scattering and fading causes loss of energy in the received beam.

Adaptive Arrays Adaptive array antennas are more sophisticated than the switched beam, since they are capable of adapting their beam pattern in response to channel conditions to improve the quality of the link, i.e. maximize the signal to noise (SNR) of the link. To be able to effectively optimize the link capacity and quality, one needs to know the channel state information (CSI) at both the transmitter and receiver. Adaptive Arrays merely mitigate the impacts of fading

Multiple Input Multiple Output A MIMO link consists of multiple element arrays at both ends of the link. MIMO systems exploit rich scattering and multipath fading to provide high spectral efficiencies that comes at the cost of no increased power or bandwidth. These high spectral efficiencies can be obtained even without the knowledge of CSI at the transmitter.

MIMO properties Spatial Multiplexing (rate links) They can be used to provide increased capacities on the link which is referred to as spatial multiplexing Diversity (diversity links) They can be used to increase the reliability of the link by exploiting diversity to decrease the bit-error rate or increasing Range

Spatial Multiplexing (MUX) This gain can be achieved when the transmit array transmits multiple independent streams of data, with each stream being transmitted out of a different antenna with equal power, at the same frequency, same modulation format, and in the same time slot. At the receiver array, each antenna receives a superposition of all of the transmitted data streams. However, each stream generally has a different spatial signature due to rich multipath, and these differences are exploited by the receiver signal processor to separate the streams. This multiplexing gain can provide a linear increase (in the number of elements) in the asymptotic link capacity, which is given by the following equation C=min(M,N)log(1+p) M,N are the number of transmitter & receiver antenna elements P=SNR

Diversity The rich multipath helps the transmitter data streams fade independently at the receiver probability of all the data streams experiencing a poor channel at the same time is significantly reduced, thereby increasing the communication reliability. the data streams transmitted from the different antenna elements must be dependent. Space-time block codes (STBC) are used for this purpose Lossy channel(more variance in channel) Diversity Gain is proportional to diversity order(d) In practical Lossy channels, diversity can help significantly reduce the bit error rate (BER) on the link. At high SNR, this reduction in BER (p) as a function of the diversity order (d) can be given as, P= 1/snr^d P=BER d=MN

Reduce BER(p) on the link(DIV-BER) for a required p on the link, the increased reliability provided by diversity can be translated to an increase in the SNR, which can then be used for increasing the communication range of the link (DIV-RANGE) for a given and SNR requirement, the transmit power consumption can be minimized

MUX vs Diversity Mux increases capacity by increasing rate. Diversity Decreases BER(DIV-BER)- increases reliability, high SNR Diversity Increases SNR, hence range(DIV-RANGE) Diversity decreases rate hence decreases capacity

Routing Approaches In MUX, the routing protocol uses omni-directional communication range for route discovery, resulting in routes with all omni-links on which spatial multiplexing is performed (referred to as “rate” links) during data transfer. In DIV-RANGE, diversity and hence SNR gain is exploited by the routing protocol in route discovery itself, resulting in routes composed of links with larger communication ranges (“range” links). In DIV-BER, omni-directional communication range is first used to obtain routes with omni links, with diversity being exploited later on for data transfer, thereby reducing the BER on the link (“reliable” links). The area of inhibition due to a transmission is lesser in DIV-BER than in DIV- RANGE. While the same transmit power is used in both cases, since the links are much shorter in DIV-BER (higher SNR), the probability of capturing a packet at the receiver is much larger in DIV-BER, thereby providing better spatial reuse.

Density Partitions are a possibility in ad-hoc networks In cases of mobility, there is a finite probability for the partition to be bridged back again due to node mobility itself. However, the case of partitions in static sparse networks is much more severe since it disrupts communication permanently While MUX can increase throughput, it cannot increase the communication range this leads to a degradation in aggregate network throughput DIV-BER suffers from the same problem as MUX DIV-RANGE on the other hand, has the potential to bridge partitions through its increased communication range. However, it suffers from the reduced spatial reuse resulting from the increased communication range

the optimal strategy would be to use DIV-RANGE at lower network densities and MUX at higher network densities DIV-RANGE must be used only by those nodes that would not be able to deliver the packet to the next hop towards the destination using MUX

Mobility This implies that the impact of mobility is greatest on MUX at higher speeds followed by DIV-RANGE and DIV- BER.

the links are considered to be non-lossy, DIV-BER suffers a degradation in rate compared to MUX. However, the increase in reliability helps sustain the links longer during mobility, but then results in routes with increased range per hop (number of hops remaining unaltered), thereby resulting in highly sub-optimal routes. These sub-optimal routes tend to degrade performance more than the case wherein route failures occur

MUX outperforms DIV-RANGE for most of the mobilities. This is because the region silenced by a transmission is more in DIV-RANGE due to the increased communication range. This in turn increases the number of contending nodes to any node and hence increases the number of collisions due to distributed MAC operations MUX performing the best under most mobility conditions, is the optimal base strategy of operation. However, the ability to provide increased communication ranges using diversity should be used in tandem with MUX

Link Quality It can be seen that both MUX and DIV-RANGE suffer degradation Appropriate strategy would be to use MUX as long as packet error rates are negligible, and have mechanisms to detect persistent channel errors and switch to DIV-BER to increase reliability

MIR Routing Protocol MIR is thus an on-demand (reactive) adaptive routing protocol that adapts between the different strategies based on the network conditions.

MAC Layer Support MAC protocol that is responsible for communicating the decision to the PHY layer and ensuring that the communication takes place using the appropriate strategy being used by the transmitter. Only then will it be able to decode Irrespective of the strategy employed, the PHY layer receiver must be aware of the strategy The MAC transmitter always transmits the preamble of the packet using diversity (STBC) in which it conveys the strategy to be employed for the actual packet transmission When a packet is transmitted through DIV-RANGE using k elements, it can reach upto K hops. However, at the end of the packet, the node adds short preambles, each being transmitted-received at unity rate similar to the packet but using lesser number of elements ([1,K-1]) and hence lower diversity order. These preambles correspond to the different K-1 range extensions and carry the respective extension information in them. Only a node within the i th hop will be able to decode the preamble that was transmitted-received using i

Routing Metric “quality” routes is calculated through a careful use of the different strategies irrespective of the density in the network. We define “quality” of a route as its ability to allow for maximum spatial reuse in the network while at the same time incurring low multi-hop relaying burden and providing high rate for the flow itself. Hence, we consider a two-tuple route metric Q(R)=(Q n (R),Q f (R)) for a route R as the combination of network (Q n (R)) and flow (Q f (R)) metrics. We consider Q f (R) to be the minimum of the rates,Q f (R) can be captured by the total area inhibited (along with duration of inhibition) where f i and r i are the range extension factor and rate of transmission at the ith hop of a h hop route respectively

If the network metrics are the same, a high flow metric is used Optimizing Q n (R) indirectly means that the number of range links as well as the number of hops in the route should be kept low For the simple topology in Figure 2 where two elements (extension factor of two) are used, we have three possible routes from source S to destination D, namely, The two-tuple metric for the 3 routes are (5.5,1), (8.5,1) and (12,1) respectively. Hence, while several routes exist, the routing protocol should identify the route with the best metric (minimal impact from range links), namely

Route Request Every node on receiving a route request packet, goes ahead and propagates the request on the maximum range possible using DIV-RANGE. Whenever a route request is transmitted using DIV-RANGE, it is done on all elements (K), and can thus reach upto K hops. With support from the MAC layer through the use of short preambles, each node keeps track of the minimum range extension ([1,K]) with which the request was received from the upstream node Time weighted – ΦiT to bridge from range links to rate links. i is the range extension factor

Route response When a route reply finds its way back to the source using the information on the source route along with the extension factors to be used on the different links, it is checked by every intermediate node along the path. If the locally cached route to the source has a better route metric than that currently being used, then it replaces the portion of the route from itself to the source with the locally stored route Worst case time T[l+k-1] T[l-1] -> propagation to destination node TK -> weighting time at destination to bridge the range to rate links.

Route Failure The MAC in MIR addresses this challenge by switching from MUX to diversity after four trials of the RTS packet (RTS has a maximum retry limit of seven in IEEE b). When switching to diversity, the number of elements used towards diversity is initially two, since in most cases the range extension or increased reliability resulting from a diversity order of four is easily sufficient to sustain the link from breaking even at high speeds This keeps the reduction in rate and spatial reuse due to diversity to a minimum and exploits the remaining elements to increase the rate of transmission through MUX If the link is already operating in diversity, then an increase in number of elements exploited for diversity by one will still serve the purpose

If the increased communication range or reliability due to diversity is able to get the packet across, then there are two possible cases: (i) receiver was actually moving away and/or the channel quality was bad; or (ii) neither the receiver was moving away nor the channel quality was bad. Implies, it was a false alarm, which can be corrected easily Else “proactive” route error can be generated

Route Maintenance Once the link failure due to mobility or persistent channel errors has been “proactively” detected, the routing protocol at the node is informed. MIR at the detection node recognizes the proactive link failure and hence does not purge packets from the queue that are using the link. It generates a proactive route error to the source. The intermediate nodes delete routes from their caches (but do not purge packets) that contain the detected link as in a normal route error so that they do not respond back to the new proactive route discovery process with the stale route. Once the source receives the proactive route error, it initiates a new route request for the destination to obtain a better route with minimal impact from range links through the route discovery component. However, it does not purge the routes that contain the detected link until a new route is obtained or an official route error is received and uses the existing route for sending the packets currently in its buffer. a “route error cancel” notification is released if it receives a preamble at the same diversity order.

Performance Evaluation Ns2 simulator Φ=5 2 antenna elements Represent density of the network by the average node degree parameter p. p is varied from 3 (sparse networks, 100 nodes in 2500m*2500m) to as high as 19 (dense networks, 100 nodes in 1000m*1000m) with the transmission range being 250m. Mobility and link loss rates are varied upto 30 m/s and 30% respectively. The default values of load, mobility and loss rate are 30, 0 m/s and 0%. Each flow uses CBR as the traffic generating application at a rate of 100 Kbps on a 2 Mbps channel packet size of 1 KB and UDP serving as the transport protocol time-correlated Rayleigh fading

Performance Evalucation

Questions?