Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine.
SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
Does the IEEE MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks? Shugong Xu Tark Saadawi June, 2001 IEEE Communications Magazine (Adapted.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
Hidden Terminal based Attack, Diagnosis and Detection Yao Zhao, Leo Zhao, Yan Chen Lab for Internet & Security Tech, Northwestern Univ.
Collisions & Virtual collisions in IEEE networks Libin Jiang EE228a Communication Networks.
Distance ADaptive (DAD) Broadcasting for Ad Hoc Networks.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Computer Networks: Wireless Networks Ivan Marsic Rutgers University Chapter 6 – Wireless Networks.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Ad Hoc Wireless Routing COS 461: Computer Networks
Link-Level Flow and Error Control
CIS 725 Wireless networks. Low bandwidth High error rates.
Transport Layer Issue in Wireless Ad Hoc and Sensor Network
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
MAC Protocols and Security in Ad hoc and Sensor Networks
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
802.11: Performance Reference: “Does the IEEE MAC protocol work well in multihop wireless ad hoc networks”; Xu, S.; Saadawi, T. IEEE Communications.
Mobile Routing protocols MANET
Presented by Fei Huang Virginia Tech April 4, 2007.
Recitation 8 Wireless Networks. Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS),
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Cache Management of Dynamic Source Routing for Fault Tolerance in Mobile Ad Hoc Networks.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
DRP: An Efficient Directional Routing Protocol for Mobile Ad Hoc Networks Hrishikesh Gossain Mesh Networks Product Group, Motorola Tarun Joshi, Dharma.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Recitation 8 Wireless Networks.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
A new Cooperative Strategy for Deafness Prevention in Directional Ad Hoc Networks Andrea Munari, Francesco Rossetto, and Michele Zorzi University of Padova,
Rami Melhem Sameh Gobriel & Daniel Mosse Modeling an Energy-Efficient MAC Layer Protocol.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Alleviating MAC Layer Self-Contention in Ad-hoc Networks Zhenqiang Ye, Dan Berger, Prasun Sinha †, Srikanth Krishnamurthy, Michalis Faloutsos, Satish K.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray,Jeffrey B. Carruthers and David Starobinski WCNC 2003.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
2005/12/14 1 Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness Xin Yu Department of Computer Science.
A Bidirectional Multi-channel MAC Protocol for Improving TCP Performance on Multihop Wireless Ad Hoc Networks Tianbo Kuang and Carey Williamson Department.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
MZR: A Multicast Protocol based on Zone Routing
Ad-hoc Networks.
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
TCP and MAC interplay in Wireless Ad Hoc Networks
Ad-hoc Transport Layer Protocol (ATCP)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Vinay Singh Graduate school of Software Dongseo University
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy + and Satish Tripathi +, * EPFL Lasaunne,+ University of California, Riverside Paper Presented by Dr.Nitin Vaidya, UIUC Presentation at UCLA on June 6 th, 2002

Copyright: UC Riverside Outline Motivation for Research Using Lower Layer Support to improve TCP performance Link Failures – True and False Signal Strength based methods to help improve TCP goodput Preliminary experiments and results

Copyright: UC Riverside Motivation TCP is unable to differentiate between true and false link failures – former due to mobility, latter due to congestion. Implement link layer mechanisms that can help: Anticipate real link failures by signal strength measurements – preemptively initiate route discovery. Reactively increase power level for transmission upon the detection of a real link failure to salvage TCP packets in transit. Requires mechanisms for differentiating between true and false link failures.

Copyright: UC Riverside Source Destination Link breaks RERR Background -- AODV Ad hoc On-Demand Distance-Vector Route discovered by queries. RERR message sent upon discovery of a link failure.

Copyright: UC Riverside RTS CTS Revisiting the IEEE MAC protocol RTS – CTS – DATA – ACK Solves the hidden and exposed terminal problem in most cases.

Copyright: UC Riverside Neighbor within reach Mac Layer cannot establish RTS/CTS Handshake Mac Layer reports link break to upper layers False Link Failure Reports

Copyright: UC Riverside How come? DataRTS Transmission Range: 250 m Interference Range: 550 m 4 is sending Data to 5 1 is sends an RTS to 2 2 does not send a CTS because it senses the transmission of 4 Node 1 gives up after seven times  False link layer report

Copyright: UC Riverside Objective In this preliminary work, we consider sparse scenarios and use a rather naïve approach to differentiating between true and false link failures. In reality, more sophisticated techniques might be needed.

Copyright: UC Riverside 300 x 1500 meters Distance between TCP source and sink: –about 1530 m or 8.8 hops in average Simulation Scenario 50 mobile nodes + 2 static nodes 1 TCP connection

Copyright: UC Riverside Reduce packet losses due to mobility (correct link breaks) Reduce packet losses due to false link failure reports Problems to be solved

Copyright: UC Riverside Low Mobility: False link failures dominate High Mobility: Correct link failures dominate Reasons for packet loss

Copyright: UC Riverside Neighbor IDTimestamp 1Distance 1Timestamp 2Distance … … Node computes distance from signal strength – simple model is assumed wherein the attenuation is inversely proportional to the square of the distance. The time stamps correspond to the last two instances when the node heard the neighbor. Each node maintains a Mac layer neighbor table: Tackling False Link Failures

Copyright: UC Riverside Tackling False Link Failures Persistent Mac –A Node sends RTS packets more than seven times if neighbor is likely to be within transmission range. – Simple naïve approach. – Seems to work in the sparse scenarios considered. – More sophistication may be needed in dense scenarios.

Copyright: UC Riverside Persistent Mac – Packet Loss

Copyright: UC Riverside Persistent Mac – Link Breakages

Copyright: UC Riverside Persistent Mac - Goodput

Copyright: UC Riverside Persistent Mac – TCP Retransmissions

Copyright: UC Riverside Salvage in transit packets: Source Destination Link breaks Lost packets due to Mobility

Copyright: UC Riverside Salvage Packets Two Approaches: 1.Proactive: Predict link breakage and stimulate the source to preemptively initiate a route discovery. 2.Reactive: Re-establish a broken link with a temporary higher transmission power level.

Copyright: UC Riverside T1T2 current time future time distance Mac layer informs routing layer when next hop is almost out of range Mac Layer: Proactive Nodes use neighbor table to predict node movement in the future: –Simple prediction: Assume linear node movement

Copyright: UC Riverside Mac Layer: Reactive Node raises transmission power temporarily if it cannot establish an RTS/CTS handshake

Copyright: UC Riverside 1 2 RTS RTS – Frame contains power value CTS Node 2 sends CTS with the same power Same for Data and ACK Node 2 moves out of range of Node 1 Reactive Mac

Copyright: UC Riverside Node 3 is receiving Data from Node 4 Node 2 does not know about the data transfer The high power CTS collides with the Data at Node 3 Node 1 establishes a high power link 1 2 RTS CTS 3 Data 4 Problems!

Copyright: UC Riverside Source Destination Stop sending! Salvaging Packets Routing layer informs source to stop sending But: Intermediate nodes keep forwarding packets

Copyright: UC Riverside Salvaging Packets Routing Layer –Three route states: Down: no route Up: route ok, answer route requests Going Down: “weak route”, use only to salvage packets, do not answer route requests!  NEW!

Copyright: UC Riverside Results – Packet Loss

Copyright: UC Riverside Results - Goodput

Copyright: UC Riverside Results – Retransmissions per transmitted packet

Copyright: UC Riverside Conclusions & Future Work The methods proposed seem to improve TCP performance by as much as 40 % in the scenarios considered. The reactive scheme might cause problems in highly congested scenarios – especially when the network is dense. More sophisticated methods may be needed to clearly differentiate between link failures due to mobility and congestion. A node might need to more intelligently decide upon when to increase its transmission power level.

Copyright: UC Riverside Thank You