Distance ADaptive (DAD) Broadcasting for Ad Hoc Networks.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
How Effective is the IEEE RTS/CTS Handshake in Ad Hoc Networks Kaixin Xu,Mario Gerla, Sang Bae IEEE Globecom 2002.
5/11/20151 Computer Networks COE 549 Random Access Tarek Sheltami KFUPM CCSE COE
1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
Progress Report Wireless Routing By Edward Mulimba.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
1 Challenging the Modeling Assumptions of Mobile Networks Seminar 266 Michalis Faloutsos.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks CENTS Retreat – May 26, 2005 Jaein Jeong (1), David Culler (1),
MAC Reliable Broadcast in Ad Hoc Networks Ken Tang, Mario Gerla University of California, Los Angeles (ktang,
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Doc.: IEEE /0797r2 SubmissionSlide 1 July 2009 W. Y. Lee et. al Topology Considerations on Contention- based Directional MAC Simulation Date:
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Ad Hoc Wireless Routing COS 461: Computer Networks
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
MAC Protocols and Security in Ad hoc and Sensor Networks
1 Power Control for Distributed MAC Protocols in Wireless Ad Hoc Networks Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua National University of Singapore.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Presented by Chaitanya Nemallapudi Understanding and Exploiting the Trade-Offs between Broadcasting and Multicasting in Mobile Ad Hoc Networks Lap Kong.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
TRANSMISSION POWER CONTROL FOR AD HOC WIRELESS NETWORKS: THROUGHPUT, ENERGY AND FAIRNESS Lujun Jia; Xin Liu; Noubir, G.; Rajaraman, R.; Wireless Communications.
Effects of Multi-Rate in Ad Hoc Wireless Networks
Reliable MAC Layer Multicast in IEEE Wireless Networks Min-Te Sun, Lifei Huang, Anish Arora, Ten-Hwang Lai Department of Computer and Information.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Power Control in Wireless Ad Hoc Networks Background An ad hoc network is a group of self configuring wireless nodes that lack infrastructure. Motivation—Power.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
DRP: An Efficient Directional Routing Protocol for Mobile Ad Hoc Networks Hrishikesh Gossain Mesh Networks Product Group, Motorola Tarun Joshi, Dharma.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Rami Melhem Sameh Gobriel & Daniel Mosse Modeling an Energy-Efficient MAC Layer Protocol.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Medium Access Control in Wireless networks
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
MAC Protocols for Sensor Networks
HoWL: An Efficient Route Discovery Scheme Using Routing History in Mobile Ad Hoc Networks Faculty of Environmental Information Mika Minematsu
A Power Control MAC Protocol for Ad Hoc Networks
SENSYS Presented by Cheolki Lee
On the Physical Carrier Sense in Wireless Ad-hoc Networks
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
<month year> <doc.: IEEE doc> January 2013
<month year> <doc.: IEEE doc> January 2013
Adaptive Topology Control for Ad-hoc Sensor Networks
Presentation transcript:

Distance ADaptive (DAD) Broadcasting for Ad Hoc Networks

Copyright: S. Krishnamurthy, UCR The Paper X. Chen, M. Faloutsos & S.V. Krishnamurthy, “Distance Adaptive Broadcasting for Ad Hoc Networks”, in IEEE MILCOM 2002.

Copyright: S. Krishnamurthy, UCR Objective To find a good way to perform effective broadcasting in an ad hoc network such that: Fewer number of rebroadcasts are needed. Achieve a higher coverage Achieve power efficiency Result in a fewer number of collisions

Copyright: S. Krishnamurthy, UCR Our Approach Only outmost nodes rebroadcast Outmost nodes are more likely to reach new nodes We achieve a reduction in contention Each node identifies the outmost nodes within its range based on some neighborhood information that is exchanged.

Copyright: S. Krishnamurthy, UCR Roadmap Description of problem Metrics of Interest Previous work Our approach Results and Discussion Future work

Copyright: S. Krishnamurthy, UCR Broadcasting in Ad hoc network Definition A session in which information is to reach all nodes. Multiple rebroadcasts (local) would be needed Objective Perform broadcasting in an efficient way so as to use fewer rebroadcasts while maintaining the requisite coverage

Copyright: S. Krishnamurthy, UCR Metrics and parameters Metrics Coverage – fraction of nodes reached Broadcast Efficiency Broadcast Latency or Duration Parameters Mobility -- speed Node density

Copyright: S. Krishnamurthy, UCR Previous work Flooding Expanding Ring Search – application specific. S.Y.Ni, Broadcasting storm problem Probabilistic Scheme wherein a node re-broadcasts a received packet with a certain probability.

Copyright: S. Krishnamurthy, UCR General probabilistic broadcast (GEN) Parameter k as the target rebroadcast size When node receives a packet, it randomly generates a number n that is between 0 and its neighborhood size If n < k, it will rebroadcast, otherwise it discards the packet. The protocol attempts to have ‘k’ new rebroadcasts for every broadcast.

Copyright: S. Krishnamurthy, UCR Broadcasting and outmost nodes Not every node is needed to rebroadcast It’s more efficient to let the outmost nodes rebroadcast Outmost nodes span the desired area more quickly E.g. outmost nodes 4,5,6,7,8 rebroadcast, it is not necessary for nodes 1,2,3 to rebroadcast.

Copyright: S. Krishnamurthy, UCR Our approach Using power level to decide outmost nodes Distance ADaptive: based on local information, a node decides certain number of outmost nodes that are to rebroadcast. Two variants  DAD-NUM, DAD-PER

Copyright: S. Krishnamurthy, UCR DAD-NUM Fixed number of outmost nodes performing rebroadcast Node keeps a neighbor table to records the received power level from each neighbor. This table is sorted to decide the threshold power level that identifies the outmost nodes Include this threshold in the broadcast packet When the packet is received, the receiver compares the threshold in the packet and the received power strength to decide whether it should rebroadcast

Copyright: S. Krishnamurthy, UCR DAD-NUM State diagram Init_state Pkt_recv. Set timerPkt_Gen Finished Received a packet Time out If receiving power is less than threshold power in packet, ignore packet. Time out Find threshold power and put it in packet, broadcast packet.

Copyright: S. Krishnamurthy, UCR DAD-PER Only difference from DAD-NUM: A fixed percentage of total neighboring nodes performing rebroadcast Not good for topologies wherein node density is small or variant.

Copyright: S. Krishnamurthy, UCR Simulation results System Setup Glomosim MAC CSMA/CA Hello Message: every 5 seconds Network topology in 3000m x 3000m Transmission radius 223m Result is average on 200 random topologies

Copyright: S. Krishnamurthy, UCR Broadcast efficiency DAD-NUM has the highest efficiency DAD-PER is better than GEN when the rebroadcast size is small.

Copyright: S. Krishnamurthy, UCR Coverage Bars represent the improvement in coverage of DAD- NUM over GEN. DAD-NUM can achieve up to a 20% increase in coverage.

Copyright: S. Krishnamurthy, UCR Efficiency v.s. Coverage DAD-NUM can achieve a better Coverage than GEN while attaining a higher broadcast efficiency.

Copyright: S. Krishnamurthy, UCR Latency DAD-NUM takes a short time to complete the broadcast session than GEN Improvement can be up to 21%

Copyright: S. Krishnamurthy, UCR Conclusion and future work Conclusion DAD is better than GEN with regards to: Coverage Efficiency Latency Future work Apply DAD to in power-heterogeneous ad hoc networks.

Copyright: S. Krishnamurthy, UCR Distributed Power Control in Ad Hoc Networks

Copyright: S. Krishnamurthy, UCR The Paper S.Agarwal, S.V.Krishnamurthy, R.H.Katz and S.Dao, “Distributed Power Control in Ad-hoc Wireless Networks”, IEEE PIMRC 2001.

Copyright: S. Krishnamurthy, UCR The IEEE MAC AB C RTS CTS D RTS – CTS – DATA – ACK Solves the hidden and exposed terminal problem in most cases. E

Copyright: S. Krishnamurthy, UCR Why is Power Control Hard? No centralized controller as in cellular networks. Distributed decisions on what power to use.

Copyright: S. Krishnamurthy, UCR Benefits Energy Conservation Frequency Re-use – more number of simultaneous transmissions possible – translates into an increase in the network capacity.

Copyright: S. Krishnamurthy, UCR Transmission Range Models Typically models assume a circular range – 250 meters is the transmission range – within this range, data can be decoded. Interference range – larger than the transmission range – data cannot be decoded – only the interference can be sensed.

Copyright: S. Krishnamurthy, UCR Clustering Elect clusterheads for a group of nodes. The clusterhead is responsible for the transmit power for each node within its cluster. Imposing a cellular infrastructure onto an ad hoc framework. Refer to paper for reference.

Copyright: S. Krishnamurthy, UCR Power Control Extensions to the IEEE MAC Ten Quantized Power Levels The levels vary linearly  the difference between levels is about a tenth of the maximum power level. Implement a power control loop between a communicating pair.

Copyright: S. Krishnamurthy, UCR Modifications to control messages RTS/CTS messages modified to include a new field. When a node receives the RTS message it measures received signal strength (There is usually what is called a Received Signal Strength Indicator or RSSI in hardware). The receiver indicates the ratio of the received strength to the minimum acceptable strength in the CTS header.

Copyright: S. Krishnamurthy, UCR The Power Loop Closed The transmitter (the originator of data) then does a similar computation with the received CTS message. It then includes a similar ratio in the header of the DATA message. So both the transmitter and the receiver are now aware of the power situation on the link – how well are we doing!

Copyright: S. Krishnamurthy, UCR Basic Idea Increase power if the power requirements are not satisfied – packet loss. Decrease power if power requirements are satisfied Maintain table for each neighbor – to know the power level to be used in order to communicate with that neighbor.

Copyright: S. Krishnamurthy, UCR Nuances A single power measurement will not suffice. One would need to dampen fluctuations. Once a power level is chosen, ten transmissions at that level (a heuristic parameter). The power control loop is only used for unicast transmissions – routing updates etc. that are broadcast do not use this. For further details – read paper.

Copyright: S. Krishnamurthy, UCR Sample Simulation Results Simulations were done in ns 2.0 Various mobility models were considered. TCP Throughput (actually goodput – does not take into account duplicates) is the metric of interest.

Copyright: S. Krishnamurthy, UCR Parameters

Copyright: S. Krishnamurthy, UCR Sample Simulation Results Througput improvement is due to an increase in capacity – higher frequency re-use.

Copyright: S. Krishnamurthy, UCR Sample Simulation Results (Cont). Decrease in overall energy consumption (on average).

Copyright: S. Krishnamurthy, UCR Why can performance be worse ? Node 3 is receiving Data from Node 4 Node 2 does not know about the data transfer The high power CTS collides with the Data at Node 3 Node 1 establishes a high power link 1 2 RTS CTS 3 Data4

Copyright: S. Krishnamurthy, UCR Power Control leads to Asymmetry There is an inherent asymmetry resulting from power control. Simply changing power levels can lead to unfairness – and collisions and can in some scenarios degrade performance.

Copyright: S. Krishnamurthy, UCR Problems at the routing layer Traditional routing protocols may no longer be used. Uni-directional links are formed. How can they be used ? Neighbor discovery a challenge.

Copyright: S. Krishnamurthy, UCR Interesting topics for projects Few papers try to do power control Paper by Monks in INFOCOM 2001 Paper by Jung and Vaidya – Mobicom However, no capacity increase, use highest power for transmission of control signals. We will see these in next class. Open area – tough problems – but opportunities.