Jennifer C. Hou Department of Computer Science University of Illinois at Urbana-Champaign June 11, 2015June 11, 2015June 11, 2015 Jennifer C. Hou Department.

Slides:



Advertisements
Similar presentations
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Advertisements

Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
A Centralized Scheduling Algorithm based on Multi-path Routing in WiMax Mesh Network Yang Cao, Zhimin Liu and Yi Yang International Conference on Wireless.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
Wireless Mesh Networks 1. Architecture 2 Wireless Mesh Network A wireless mesh network (WMN) is a multi-hop wireless network that consists of mesh clients.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
Topology Control and Mobility Management in Mobile Ad Hoc Networks Fei Dai and JIe Wu Department of Electrical and Computer Engineering North Dakota State.
1 TTS: A Two-Tiered Scheduling Algorithm for Effective Energy Conservation in Wireless Sensor Networks Nurcan Tezcan & Wenye Wang Department of Electrical.
1 Using Multiple Channels and Spatial Backoff to Improve Wireless Network Performance Nitin Vaidya University of Illinois at Urbana-Champaign
Design and Analysis of an MST-Based Topology Control Algorithm Ning Li and Jennifer Hou Department of Computer Science University of Illinois at Urbana-Champaign.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Outline What is an ad hoc network Smart Antenna Overview
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Paper Presentation by Jeff Mounzer Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P.R. Kumar Published.
Adaptive Instantiation of the Protocol Interference Model in Mission-Critical Wireless Networks Xin Che, Xiaohui Liu, Xi Ju, Hongwei Zhang Computer Science.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
Selecting Transmit Powers and Carrier Sense Thresholds in CSMA Jason Fuemmeler, Nitin Vaidya, Venugopal Veeravalli ECE Department & Coordinated Science.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
10/5/20151 Mobile Ad hoc Networks COE 549 Topology Control Tarek Sheltami KFUPM CCSE COE
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
The Case for Addressing the Limiting Impact of Interference on Wireless Scheduling Xin Che, Xi Ju, Hongwei Zhang {chexin, xiju,
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Ch 11. Multiple Antenna Techniques for WMNs Myungchul Kim
Design and Analysis of an MST-Based Topology Control Algorithm Ning Li, Jennifer C. Hou, and Lui Sha Department of Computer Science University of Illinois.
1 Interplay of Spatial Reuse and SINR-determined Data Rates in CSMACA-based, Multi-hop, Multi- rate Wirless Networks Ting-Yu Lin and Jennifer C. Hou Department.
CSE 6590 Fall 2009 Routing Metrics for Wireless Mesh Networks 1 12 November, 2015.
Computer Network Lab. Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks SenSys ’ 03 Xiaorui Wang, Guoliang Xing, Yuanfang.
Evaluating Wireless Network Performance David P. Daugherty ITEC 650 Radford University March 23, 2006.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
An Adaptive, High Performance MAC for Long-Distance Multihop Wireless Networks Sergiu Nedevschi *, Rabin K. Patra *, Sonesh Surana *, Sylvia Ratnasamy.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks Jaehyun Kim, Dept. of Electrical & Electronic Eng., Yonsei University;
On Mitigating the Broadcast Storm Problem with Directional Antennas Sheng-Shih Wang July 14, 2003 Chunyu Hu, Yifei Hong, and Jennifer Hou Dept. of Electrical.
How Physical Carrier Sense Affects System Throughput in IEEE Wireless Networks Zheng Zeng, Yong Yang and Jennifer C. Hou Department of Computer.
Exploring the Energy-Latency Trade-off for Broadcasts in Energy-Saving Sensor Networks Matthew J. Miller, Cigdem Sengul, Indranil Gupta Department of Computer.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Presented by Barath Raghavan.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
1 A Coordinate-Based Approach for Exploiting Temporal-Spatial Diversity in Wireless Mesh Networks Hyuk Lim Chaegwon Lim Jennifer C. Hou MobiCom 2006 Modified.
Power-Aware Topology Control for Wireless Ad-Hoc Networks Wonseok Baek and C.-C. Jay Kuo Department of Electrical Engineering University of Southern California.
Routing Metrics for Wireless Mesh Networks
Routing Metrics for Wireless Mesh Networks
IEEE Protocol: Design and Performance Evaluation of An Adaptive Backoff Mechanism JSAC, vol.18, No.9, Sept Authors: F. Cali, M. Conti and.
Hyuk Lim, Chaegwon Lim, Jennifer C. Hou Department of Computer Science
Ning Li and Jennifer C. Hou University of Illinois at Urbana-Champaign
Wireless Sensor Network Architectures
On the Critical Total Power for k-Connectivity in Wireless Networks
On the Physical Carrier Sense in Wireless Ad-hoc Networks
Routing Metrics for Wireless Mesh Networks
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Topology Control and Its Effects in Wireless Networks
Speaker : Lee Heon-Jong
Presentation transcript:

Jennifer C. Hou Department of Computer Science University of Illinois at Urbana-Champaign June 11, 2015June 11, 2015June 11, 2015 Jennifer C. Hou Department of Computer Science University of Illinois at Urbana-Champaign June 11, 2015June 11, 2015June 11, 2015 DAWN: Dynamic Ad-hoc Wireless Networks Progress Report Presentation DAWN: Dynamic Ad-hoc Wireless Networks Progress Report Presentation

Energy Efficient Network Track Power, CS Threshold, and Rate Control

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou PHY/MAC Control Knobs To mitigate interference and maximize the network capacity, there are several control knobs: Transmit power  power/topology control Carrier sense threshold  trade-off between spatial reuse and interference level Spatial diversity  scheduling consecutive transmission for interference-free connections Channel diversity  use of non-overlapping channels

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Power Control  Definition: Each node adjusts its transmission power so as to maintain network connectivity using the minimum possible power.  Objectives:  Maintaining network connectivity  Reducing energy consumption  Mitigating MAC interference  Achieving network capacity and spatial reuse

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Preliminary Work on Power Control Local minimum spanning tree (LMST) [INFOCOM’03, IEEE TWC, IEEE TPDS] Localized algorithm  Relies only on local information Preserves connectivity. Ensures bi-directional links. Handles node heterogeneity (i.e., nodes have different maximal transmit powers) Bounds the degree of any node by 6.

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou X i : location of node i R i : transmission range of node i Link (j  i) exists if R j  | X i – X j |: Transmission power of node i Total power: k-connectivity: requires to remove at least k nodes to disconnect the network Critical total power W c : minimum total power W for maintaining k- connectivity 1 1 RiRi RjRj XjXj XiXi Preliminary Work on Total Power Required for K-Connectivity Poisson point process with density n in a unit- area square

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Question To Ask In what order does the critical total power W c increase/decrease as the node density increases? All nodes choose common power [Gupta & Kumar 98] studied the critical transmission range r n for 1-connectivity [Wan & Yi 04] for k-connectivity All nodes choose different power [Blough 02] critical total power for 1-connectivity Based on the total weight of minimum spanning tree Our study: critical total power or k-connectivity

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Major Results Main theory: [Infocom 2005, ACM/IEEE ToN 2006] The critical total power for maintaining k-connectivity is with probability approaching 1 Comparison with common power The critical total power for k-connectivity with common power is Allowing power control at each node reduces the total power by a factor of

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Rescaling to Expanded Networks Expanded networks Node density fixed Side length L  Expected number of nodes n= L 2 Allowing power control Average power is bounded Using common power The common power grows as 1 1 L L

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Cross Layer Aspects of Power Control Physical Layer MAC Layer Network Layer Power Control Incorporating Physical Layer Characteristics Cross Layer Design Effect of MAC- Layer Interference Dynamic Topology Control w.r.t. Network Traffic Network Capacity Network Lifetime Critical Power Analysis Network Capacity Network Lifetime Critical Power Analysis Physical Layer Incorporating Physical Layer Characteristics

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou When Power Control Meets SINR All the topology control algorithms in literature defined the neighbor relation based on the protocol model A link exists between nodes i and j if d ij <= d max. TC: L(n)  T(n) The protocol model ignores the effect of SINR. What is more appropriate to define a link is the use of physical model A link exists between i and j if TC: L(n) x C(n)  T(n) Set of node locations Set of configurations ( , max/min transmit power) Topology that defines the neighbor relations

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou When Power Control Meets SINR All existing topology control algorithms fail (i.e., cannot maintain network connectivity) under the physical model. We are re-investigating topology control under the physical model.

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Controlling Carrier Sense Threshold The contending area can also be adapted through tuning the carrier-sensing threshold A B C D distance Signal Strength CS Threshold E F

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou A large CS threshold leads to smaller contending area Less contending nodes within the contending area More concurrent transmission Higher interference Transmission rate depends on Signal-to-Interference-Noise Ratio Controlling Carrier Sense Threshold A B C D distance Signal Strength CS Threshold E F

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Tradeoff Analysis Spatial reuse can be achieved at the cost of higher interference level and lower transmission rate High rate links Low rate links What is the optimal CS Threshold? How does it relate to the transmit power?

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Network Capacity Network capacity as a function of transmit power and carrier sense threshold [ACM Mobicom 2006]

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Power Control vs. Data Rate Tx1 Tx2 Rx 1 Rx 2 d1 r2 r1 d2 D1 D2 SINR requirements

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Power Control vs Data Rate Tx1Tx2Rx 1 Rx 2 d1 r2 r1 d2 D1 D2 SINR requirements

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Power and Rate Control PRC algorithm: A localized algorithm that enables each transmitter to adapt to the interference level that it perceives and determines its transmit power. The transmit power is so determined that the transmitter can sustain the highest possible data rate, while keeping the adverse interference effect on the other neighboring concurrent transmissions minimal.

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Simulation Setup Modified ns-2 Ver The interference perceived at a receiver is the collective aggregate interference from all the concurrent transmissions Each node uses physical carrier sense to determine if the medium is free IEEE a radios supporting 8 discrete data rate (6 ~ 54 Mbps) Random topology 3, 10, 20, 30, and 50 transmitter-receiver pairs are randomly generated in a 300m X 300m area, and represent sparsely, moderately, and densely populated networks, respectively,. Algorithms used for evaluations Static Greedy Power Control (GPC) Power and Rate Control (PRC)

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Simulation Results Performance gain mainly because of Higher concurrent transmissions

Simulation Track 1. Expediting Wireless Simulation 2. Incorporating Model Checking into Simulation

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Expediting Wireless Simulation Our profiling work indicates more than 50% of the execution time is spent on event scheduling and channel related activity handling. Can we expedite simulation by reducing the number of unnecessary events while not impairing the accuracy. Proportion of the execution time that is spent on event enqueueing in a 100- node ad hoc network over a 1000mX1000m field. There are 40 CBR connections carrying a total of 120 packets/sec. Traffic (pkt. Size = 512B) [1] Chunyu Hu and Jennifer C. Hou, ``A reactive channel model for expediting wireless network simulation,'' ACM SIGMETRICS, Banff, Alberta, Canada, June 2005

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Reactive Channel Model R L The channel only notifies nodes in the following sets of the signal-arrival event Nodes in range R Nodes in (range L but not R) that are registered When does a node register? Whenever it needs to monitor the channel status, e.g., when it would like to gain access to the channel or when it is in the process of receiving a signal

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou A Case Study: IEEE MAC StateTo register? transmitting * ☒ receiving ☑ idle backing-off ☑ deferring ☑ -- ☒ sleep ☒ turn-off ☒ *: assuming half-duplex radio is used

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou RCM Performance (Execution Time) RCM

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou RCM Performance (Memory Consumption)

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Virtual Wireless Ad-Hoc Network (J-Sim) Champaign-Urbana Wireless Community Network (Currently 40 wireless nodes in downtown Urbana; expected to extend to 100 nodes providing full coverage of Champaign and Urbana). Integration of Real/Virtual Worlds Channel behavior modeling Physical capacity analysis Incentive-based resource management Multi-radio, multi-path routing Cross-layer optimization

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Marriage of Modeling Checking and Simulation s0s0 s1s1 s2s2 s3s3 s4s4 s5s5 s6s6 s7s7 X J-Sim [1] Ahmed Sobeih, Mahesh Viswanathan and Jennifer C. Hou, “Check and Simulate: A Case for Incorporating Model Checking in Network Simulation,” Proceedings of the ACM-IEEE International Conference on Formal Methods and Models for Codesign (ACM-IEEE MEMOCODE 2005), San Diego, CA, June s0s0 s1s1 s2s2 s3s3 s4s4 s5s5 s6s6 s7s7 X J-Sim w/ MC Stateful on-the-fly explicit-state model checking into J-Sim Explore the state space of a network protocol up to a (configurable) maximum depth of transitions No changes to the core design and implementation of J-Sim

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou An Overview of Our Work Build the model checker as a component in J-Sim P1P1 P2P2 PnPn Model Checker J-Sim Error Trace / No Error Initial State Current State Next State Component Port Communication via ports

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Evaluation and Results Two case studies: AODV and Directed Diffusion Representative routing and data dissemination protocols Reasonably complex network protocols 1200 – 1400 LOC (excluding the J-Sim library) Safety property: The loop-free property of routing/data dissemination paths [2] Ahmed Sobeih, Mahesh Viswanathan, Darko Marinov and Jennifer C. Hou, “Finding Bugs in Network Protocols Using Simulation Code and Protocol-Specific Heuristics,” Proceedings of the International Conference on Formal Engineering Methods (ICFEM 2005), Springer-Verlag LNCS 3785, Manchester, United Kingdom, November Summary of our discoveries: A previously unknown bug in the J-Sim implementation of AODV A previously unknown deficiency in directed diffusion

DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN Jennifer Hou Guiding Model Checking with Network Properties We have developed search heuristics that exploit properties inherent to the network protocol and the safety property being checked and better guide the model checker to discover counter examples. An interesting and important research question is how to determine a suitable BeFS strategy for a specific network protocol.