1 Introduction to Wireless Networks Michalis Faloutsos.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine.
Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
XORs in The Air: Practical Wireless Network Coding
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Multicasting in Mobile Ad-Hoc Networks (MANET)
Wireless Mesh Networks 1. Architecture 2 Wireless Mesh Network A wireless mesh network (WMN) is a multi-hop wireless network that consists of mesh clients.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
1 Introduction to Wireless Networks Michalis Faloutsos.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
1 Introduction to Wireless Networks Michalis Faloutsos.
Focused Beam Routing protocol for Underwater Acoustic Networks Josep Miquel Jornet Montana, Milica Stojanovic, Michele Zorzi, Proc. WuWNet 2008.
1 Challenging the Modeling Assumptions of Mobile Networks Seminar 266 Michalis Faloutsos.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
MAC Protocol By Ervin Kulenica & Chien Pham.
MAC Reliable Broadcast in Ad Hoc Networks Ken Tang, Mario Gerla University of California, Los Angeles (ktang,
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Capacity of Ad Hoc Networks Quality of Wireless links Physical Layer Issues The Channel Capacity Path Loss Model and Signal Degradation MAC for.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Ad Hoc Wireless Routing COS 461: Computer Networks
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
CIS 725 Wireless networks. Low bandwidth High error rates.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
10/1/2015 9:14 PM1 TCP in Mobile Ad-hoc Networks ─ Split TCP CSE 6590.
COM594 TCP and Wireless: Unforeseen Consequences.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
1 Transport Layer for Mobile Ad Hoc Networks (MANETs) Cyrus Minwalla Maan Musleh COSC 6590.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
Multiuser Receiver Aware Multicast in CDMA-based Multihop Wireless Ad-hoc Networks Parmesh Ramanathan Department of ECE University of Wisconsin-Madison.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
TCP OVER ADHOC NETWORK. TCP Basics TCP (Transmission Control Protocol) was designed to provide reliable end-to-end delivery of data over unreliable networks.
Evaluation of ad hoc routing over a channel switching MAC protocol Ethan Phelps-Goodman Lillie Kittredge.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
1 A Coordinate-Based Approach for Exploiting Temporal-Spatial Diversity in Wireless Mesh Networks Hyuk Lim Chaegwon Lim Jennifer C. Hou MobiCom 2006 Modified.
Impact of Interference on Multi-hop Wireless Network Performance
MACAW: A Media Access Protocol for Wireless LAN’s
A comparison of Ad-Hoc Routing Protocols
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
TCP in Mobile Ad-hoc Networks
Introduction to Wireless Networks
TCP in Wireless Ad-hoc Networks
Capacity of Ad Hoc Networks
Presentation transcript:

1 Introduction to Wireless Networks Michalis Faloutsos

2 What is an ad hoc network A collection of nodes that can communicate with each other without the use of existing infrastructure Each node is a sender, a receiver, and a relay There are no “special nodes” (in principal) No specialized routers, no DNS servers Nodes can be static or mobile Can be thought of us: peer-to-peer communication

3 Example: Ad hoc network Nodes have power range Communication happens between nodes within range

4 Some Introductory Things The MAC layer Typical Simulations The routing protocols TCP and ad hoc networks

5 What Is Different Here? Broadcasts of nodes can “overlap” -> collision How do we handle this? A MAC layer protocol could be the answer If one node broadcasts, neighbors keeps quite Thus, nearby nodes compete for air time This is called contention

6 Contention in ad hoc networks A major difference with wireline networks Air-time is the critical resource Fact 1: connections that cross vertically interfere Fact 2: connections that do not share nodes interfere Fact 3: a single connection with itself interferes!

7 Example of contention Yellow connection bothers pink connection Yellow bothers itself When A-E is active E-F is silent F-G is silent (is it?) A B C D E G F H

8 The MAC protocol Introduced to reduce collisions Sender sends Request To Send (RTS): ask permission Case A: Receiver gives permission Clear To Send (CTS) Sender sends Data Receiver sends ACK, if received correctly Case B: Receiver does not respond Sender waits, times out, exponential back-off, and tries again A D C B RTS CTS RTS CTS

9 Why is this necessary? A: RTS, and B replies with a CTS C hears RTS and avoids sending anything C could have been near B (not shown here) D hears CTS so it does not send anything to B A D C B RTS CTS

10 Some numbers for Typical radius of power-range: 250m Interference range: 500m At 500m one can not hear, but they are bothered! RTS packet 40 bytes CTS and ACK 39 bytes MAC header is 47 bytes

11 Typical Simulation Environment A 2-dimensional rectangle Fixed number of nodes Static: uniformly distributed Dynamic: way-point model Pick location, move with speed v, pause Power range: fixed or variable Sender-receivers uniformly distributed

12 Various Communication Paradigms Broadcasting: one nodes reaches everybody Multicasting: One node reaches some nodes Anycasting: One node reaches a subset of some target nodes (one) Application Layer protocols and overlays Applications like peer-to-peer

13 Layered and Cross Layer Protocols Layering: Modular Isolates details of each layer Cross Layer: Information of other layers is used in decisions Pros: efficiency Cons: deployability and compatibility application transport Network Link physical application transport Network Link physical

14 Example: application layer multicast Source unicasts data to some destinations Destinations unicast data to others Pros: easy to deploy, no need to change network layer Cons: not as efficient

15 Example: application layer multicast II Members need to make multiple copies It would happened anyway Link A B gets two packets Similarly in wireline multicast Node B sends and receives packet 4 times s A B

16 Some major assumptions The way-point model is a good model for mobility Homogeneity is a good assumption Links are bidirectional: I hear U, U hear me Uniform distribution of location is good will be used at the MAC layer Space is two dimensional

17 Some “proven” claims The smallest the range, the better the throughput Mobility increases the capacity of a network A node should aim for 6-7 neighbors We can challenge these claims

18 End of Introduction Resources: Google: Citeseer: C. Perkins book: Ad Hoc Networking

19 Modeling Contention (based on Nandagopal et al MOBICOM 200) Seminar 260 Michalis Faloutsos

20 Problem: Find Hotspot in a graph Given a graph and source- destinations Where is the bottleneck? Or how much bandwidth can each connection have?

21 Solution: Find areas of contention Intuition Step 1: create graph “range connectivity” Step 2: create graph of flows (route flows on graph) Step 3: find which flows contend for airtime (find areas where only one flow can be active)

22 Clarification: interference When C->D A-B, B-C, D-E, E-F can not be active!

23 Clarification: Dual graph Each edge becomes a node in G’ An edge exists between two nodes in G’ iff the edges have a common node edge Interference

24 In more detail 1.Find topological graph 2.Find dual graph: edges -> nodes 3.Consider “interference” between non adjacent edges 4.Find Maximal cliques

25 Contention Modeling: conclusion Elegant approaches and tools are available The realism of the modeling must be considered Do not over-generalize results when heavy assumptions have been made

26 Considering Connections If we know which pairs want to communicate, we consider only these flows as contenders Routing could be independent of contention of an area If routing is contention aware, then we have a closed loop system: Routing -> contention -> routing -> ….

27 Question: what is optimal routing? Given a graph, source-destination pairs How do I route the flows to minimize contention? What happens if I do not know the connections ahead of time (online version of problem)?

28 Modeling the Physical Channel There are several ways depending on degree of accuracy Binary, simplified: in one prange you communication In two prange you interfere but do not communicate

29 Considering the power: path loss P_R: received power P_t: transmission power d: distance alpha: constant

30 The physical model Node Y hears node i, iff received power of i is above a threshold beta Needs to rise above noise and other transmissions Pi Noise + SUM_k Pk =

31 A more optimistic channel model Node Y hears i, if i is the “loudest” Interference from other nodes: per pair comparison Delta>0 is a protocol specified “guard zone”

32 Channel Modeling: Conclusion Several different models You need to find and justify the model you use

33 Topology Control We cannot always control the mobility We can control the network topology Power control Deciding to ignore particular neighbors From a given graph G of possible connections we keep a subset G’ of these connections What is good topology? …

34 Topology Control Metrics What is good topology? Energy efficiency, Robustness to mobility, Throughput - capacity

35

36 Topics Of Interest - Wireless Characterizing the ad hoc topology A snapshot Its evolution Mobility Realistic mobility models Effect of topology/mobility in Routing Multicasting in ad hoc networks

37 Topics of Interest - Wireline Generating a realistic directed graph Reducing a real (directed) graph to a small realistic Survey on graph generation models Measuring the Internet topology Router level AS level

38 We need to model contention First the obvious Adjacent edges Second, one edge away, considering RTS CTS Third, interference (500m instead of 250m) Modeling issue

39 Typical “Errors” Mobility: too slow or too fast Mobility speed may not be the expected Homogeneity may “hide” issues Few nodes are responsible for most traffic Some spots are more popular than others Power range is too large for the area Ie radius 250m, a grid of 1Km -> one broadcast covers “half” the area

40 What’s the problem? There is no systematic way to model and simulate such networks No clue what are the right assumptions Not sure how the assumptions affect the results

41 Consequences Simulation results are Meaningless Unrepeatable Incomparable between different analysis Prone to manipulation Claim: give me any statement, I can create simulations to prove it

42 What Will We Do Here? Identify assumptions Some of them are subtle Characterize the scenarios Study their effect on the performance results