1 Challenging the Modeling Assumptions of Mobile Networks Seminar 266 Michalis Faloutsos.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Università degli Studi di Firenze 08 July 2004 COST th MCM - Budapest, Hungary 1 Cross-layer design for Multiple access techniques in wireless communications.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Both RTS and CTS contains: The address of the sender The address of the receiver The sizeof the intended data short message size contention concentrated.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
1 Introduction to Wireless Networks Michalis Faloutsos.
Performance Comparison of Routing Protocols for Ad Hoc Networks PATTERN ENDIF Ferrara.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
1 Introduction to Wireless Networks Michalis Faloutsos.
Computer Networks Transport Layer. Topics F Introduction  F Connection Issues F TCP.
1 Introduction to Wireless Networks Michalis Faloutsos.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
MAC Protocol By Ervin Kulenica & Chien Pham.
MAC Reliable Broadcast in Ad Hoc Networks Ken Tang, Mario Gerla University of California, Los Angeles (ktang,
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
CIS 725 Wireless networks. Low bandwidth High error rates.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Lecture 9 Networked Systems Network Operating Systems Introduction to Sockets TCP Client-Server Applications.
802.11: Performance Reference: “Does the IEEE MAC protocol work well in multihop wireless ad hoc networks”; Xu, S.; Saadawi, T. IEEE Communications.
Mobile Routing protocols MANET
COM594 TCP and Wireless: Unforeseen Consequences.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Effects of Multi-Rate in Ad Hoc Wireless Networks
Cache Management of Dynamic Source Routing for Fault Tolerance in Mobile Ad Hoc Networks.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
 2004 Deitel & Associates, Inc. All rights reserved. Chapter 16 – Networking Outline 16.1Introduction 16.2Network Topology 16.3Network Types 16.4TCP/IP.
Evaluation of ad hoc routing over a channel switching MAC protocol Ethan Phelps-Goodman Lillie Kittredge.
Alleviating MAC Layer Self-Contention in Ad-hoc Networks Zhenqiang Ye, Dan Berger, Prasun Sinha †, Srikanth Krishnamurthy, Michalis Faloutsos, Satish K.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
12.Nov.2007 Capacity of Ad Hoc Wireless Networks Jinyang Li Charles Blake Douglas S. J. De Coutu Hu Imm Lee Robert Morris Paper presentation by Tonio Gsell.
MACAW: A Media Access Protocol for Wireless LAN’s
TCP and MAC interplay in Wireless Ad Hoc Networks
A comparison of Ad-Hoc Routing Protocols
ODMRP Enhancement.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Introduction to Wireless Networks
Other Routing Protocols
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
How MAC interacts with Capacity of Ad-hoc Networks – Interference problem Capacity of Wireless Networks – Part Page 1.
Presentation transcript:

1 Challenging the Modeling Assumptions of Mobile Networks Seminar 266 Michalis Faloutsos

2 Scope: Challenge the Assumptions Targeted to graduate students (ugrad nets req.) Reading papers Presenting Papers Your project Do a cool project Publish!

3 What is an ad hoc network A collection of nodes that can communicate with each other without the use of existing infrastructure Each node is a sender, a receiver, and a relay There are no “special nodes” (in principal) No specialized routers, no DNS servers Nodes can be static or mobile Can be thought of us: peer-to-peer communication

4 Example: Ad hoc network Nodes have power range Communication happens between nodes within range

5 What’s the problem? There is no systematic way to model and simulate such networks No clue what are the right assumptions Not sure how the assumptions affect the results

6 Consequences Simulation results are Meaningless Unrepeatable Incomparable between different analysis Prone to manipulation Claim: give me any statement, I can create simulations to prove it

7 What Will We Do Here? Identify assumptions Some of them are subtle Characterize the scenarios Study their effect on the performance results

8 Topics Of Interest The capacity of ad hoc networks What is the inherent capacity of a network Characterizing the topology Mobility and its effect Mobility models Characterizing the topology of mobility pattern The effect of power-range Simulating TCP over ad hoc networks Simulating multicasting in ad hoc networks

9 Some major assumptions The way-point model is a good model for mobility Homogeneity is a good assumption Links are bidirectional: I hear U, U hear me Uniform distribution of location is good will be used at the MAC layer Space is two dimensional

10 Some “proven” claims The smallest the range, the better the throughput Mobility increases the capacity of a network A node should aim for 6-7 neighbors We will challenge these claims

11 Some Introductory Things The MAC layer Typical Simulations The routing protocols TCP and ad hoc networks

12 The MAC protocol Introduced to reduce collisions Sender sends Request To Send (RTS): ask permission Case A: Receiver gives permission Clear To Send (CTS) Sender sends Data Receiver sends ACK, if received correctly Case B: Receiver does not respond Sender waits, times out, exponential back-off, and tries again A D C B RTS CTS

13 Why is this necessary? A: RTS, and B replies with a CTS C hears RTS and avoids sending anything D hears CTS so it does not send anything to B A D C B RTS CTS

14 Some numbers for Typical radius of power-range: 250m Interference range: 500m At 500m one can not hear, but they are bothered! RTS packet 40 bytes CTS and ACK 39 bytes MAC header is 47 bytes

15 Typical Simulation Environment A 2-dimensional rectangle Fixed number of nodes Static: uniformly distributed Dynamic: way-point model Power range: fixed or variable Sender-receivers uniformly distributed

16 Typical “Errors” Mobility: too slow or too fast Mobility speed may not be the expected Homogeneity may “hide” issues Few nodes are responsible for most traffic Some spots are more popular than others Power range is too large for the area Ie radius 250m, a grid of 1Km -> one broadcast covers “half” the area

17 Various Communication Paradigms Broadcasting: one nodes reaches everybody Multicasting: One node reaches some nodes Anycasting: One node reaches a subset of some target nodes (one) Application Layer protocols and overlays Applications like peer-to-peer

18 Layered and Cross Layer Protocols Layering: Modular Isolates details of each layer Cross Layer: Information of other layers is used in decisions Pros: efficiency Cons: deployability and compatibility application transport Network Link physical application transport Network Link physical

19 Example: application layer multicast Source unicasts data to some destinations Destinations unicast data to others Pros: easy to deploy, no need to change network layer Cons: not as efficient

20 Example: application layer multicast II Members need to make multiple copies It would happened anyway Link A B gets two packets Similarly in wireline multicast Node B sends and receives packet 4 times s A B

21 Contention in ad hoc networks A major difference with wireline networks Air-time is the critical resource Fact 1: connections that cross vertically interfere Fact 2: connections that do not share nodes interfere Fact 3: a single connection with itself interferes!

22 Example of contention Yellow connection bothers pink connection Yellow bothers itself When A-E is active E-F is silent F-G is silent (is it?) A B C D E G F H

23 We need to model contention First the obvious Adjacent edges Second, one edge away, considering RTS CTS Third, interference (500m instead of 250m) Modeling issue

24