Flush: A Reliable Bulk Transport Protocol for Multihop Wireless Networks Sukun Kim †#, Rodrigo Fonseca †, Prabal Dutta †, Arsalan Tavakoli †, David Culler.

Slides:



Advertisements
Similar presentations
XORs in The Air: Practical Wireless Network Coding
Advertisements

Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
XPRESS: A Cross-Layer Backpressure Architecture for Wireless Multi-Hop Networks Rafael Laufer, Theodoros Salonidis, Henrik Lundgren, Pascal Le Guyadec.
What do packet dispersion techniques measure? Internet Systems and Technologies - Monitoring.
XORs in the air: Practical Wireless Network Coding Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Medard, Jon Crowcroft SIGCOMM ‘06 Presented.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
More routing protocols Alec Woo June 18 th, 2002.
Wireless Sensor Networks for High Fidelity Sampling Sukun Kim Electrical Engineering and Computer Sciences University of California at Berkeley Committee:
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
Gentian Jakllari, Stephan Eidenbenz, Nick Hengartner, Srikanth V. Krishnamurthy & Michalis Faloutsos Paper in Infocom 2008 Link Positions Matter: A Non-Commutative.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, Mario Gerla INFOCOM2003,
IEEE INFOCOM 2005, Miami, FL RID: Radio Interference Detection in Wireless Sensor Networks Gang Zhou, Tian He, John A. Stankovic, Tarek F. Abdelzaher Computer.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
WBest: a Bandwidth Estimation Tool for IEEE Wireless Networks Presented by Feng Li Mingzhe Li, Mark Claypool, and.
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Reliable Transport Layers in Wireless Networks Mark Perillo Electrical and Computer Engineering.
Eric Rozner - ETX.ppt1 A High-Throughput Path Metric for Multi-Hop Wireless Routing Douglas S.J. Couto Daniel Aguayo John Bicket Robert Morris Presented.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks CENTS Retreat – May 26, 2005 Jaein Jeong (1), David Culler (1),
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Gursharan Singh Tatla Transport Layer 16-May
Ad Hoc Wireless Routing COS 461: Computer Networks
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Performance Evaluation and Improvement of an Ad Hoc Wireless Network Takayuki Yamamoto Graduate School of Engineering Science, Osaka University, Japan.
An End-to-end Approach to Increase TCP Throughput Over Ad-hoc Networks Sarah Sharafkandi and Naceur Malouch.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
Link Estimation, CTP and MultiHopLQI. Learning Objectives Understand the motivation of link estimation protocols – the time varying nature of a wireless.
Congestion Control in CSMA-Based Networks with Inconsistent Channel State V. Gambiroza and E. Knightly Rice Networks Group
An Adaptive, High Performance MAC for Long- Distance Multihop Wireless Networks Presented by Jason Lew.
PIP: A Connection-Oriented, Multi- Hop, Multi-Channel TDMA-based MAC for High Throughput Bulk Transfer Sensys2010.
A High-Throughput Path Metric for Multi- Hop Wireless Routing Douglas S. J. De Couto, Daniel Aguayo, John Bicket, Robert Morris MIT Computer Science and.
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan Networks and Mobile Systems Group MIT Computer Science and.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
TCP with Variance Control for Multihop IEEE Wireless Networks Jiwei Chen, Mario Gerla, Yeng-zhong Lee.
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks
Evaluation of ad hoc routing over a channel switching MAC protocol Ethan Phelps-Goodman Lillie Kittredge.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Medium Access Control in Wireless networks
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laborartory.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
1 TCP ProtocolsLayer name DNSApplication TCP, UDPTransport IPInternet (Network ) WiFi, Ethernet Link (Physical)
Bandwidth estimation: metrics, measurement techniques, and tools Presenter: Yuhang Wang.
Frame counter: Achieving Accurate and Real-Time Link Estimation in Low Power Wireless Sensor Networks Daibo Liu, Zhichao Cao, Mengshu Hou and Yi Zhang.
1 A Coordinate-Based Approach for Exploiting Temporal-Spatial Diversity in Wireless Mesh Networks Hyuk Lim Chaegwon Lim Jennifer C. Hou MobiCom 2006 Modified.
MAC Protocols for Sensor Networks
BASICS Gabriella Paolini (GARR) 27/05/11 - ICCU Roma 1 How INTERNET works !
Protocols and layering Network protocols and software Layered protocol suites The OSI 7 layer model Common network design issues and solutions.
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
Process-to-Process Delivery, TCP and UDP protocols
Ramakrishna Gummadi, Ramesh Govindan, Konstantinos Psounis
Transport Layer Unit 5.
Acoustic Monitoring using Wireless Sensor Networks
Process-to-Process Delivery:
TCP in Mobile Ad-hoc Networks
Goal Control the amount of traffic in the network
Presentation transcript:

Flush: A Reliable Bulk Transport Protocol for Multihop Wireless Networks Sukun Kim †#, Rodrigo Fonseca †, Prabal Dutta †, Arsalan Tavakoli †, David Culler †, Philip Levis*, Scott Shenker †‡, and Ion Stoica † University of California at Berkeley Samsung Electronics International Computer Science Institute Stanford University SenSys 2007 † ‡ * #

1/26  All data from all nodes are needed As quickly as possible Collecting data from one node at a time is completely acceptable Over 46 hop network ! Motivating Example 8 nodes 56 nodes 1125 ft4200 ft 500 ft 246 ft SF (south) Sausalito (north) Structural Health Monitoring of the Golden Gate Bridge

2/26 Introduction  Target applications Structural health monitoring, volcanic activity monitoring, bulk data collection  One flow at a time Remove inter-path interference Easier to optimize for intra-path interference  Built on top of MAC layer No merging with MAC layer for easy porting

3/26 Table of Contents  Introduction  Algorithm  Implementation  Evaluation  Discussion  Related Work  Conclusion

4/26 Flush Algorithm Overview  Receiver-initiated  Selective-NACK  Hop-by-hop Rate Control  Empirically Measure Interference Range

5/26 Rate Control / Rate = Packet Interval = δ 8 + δ 7 + δ 6 + δ 5 δ X : Packet transmission time at node X Interferer:6 5 4

6/26 Interference Range > Reception Range However, Signal Strength Noise Floor + SNR Threshold Noise Floor + 2 X SNR Threshold SNR Threshold – minimum SNR to decode a packet Jammer – a node which can conflict with the transmission, but cannot be heard JammerVulnerable to JammerNo problem to Jammer

7/26 Identifying the Interference Set Fraction of Links CDF of the difference between the received signal strength from a predecessor and the local noise floor A large fraction of interferers are detectable and avoidable

8/26 Implementation – Control Information  Control information is snooped δ: packet transmission time, 1 byte f: sum of δ’s of interfering nodes, 1 byte D: Packet Interval = 1 / Rate, 1 byte  δ, f, D are put into packet header, and exchanged through snooping

9/26 Implementation – Rate-limited Queue  16-deep Rate-limited Queue Enforces departure delay D(i) When a node becomes congested (depth 5), it doubles the delay advertised to its descendants  But continues to drain its own queue with the smaller delay until it is no longer congested

10/26 Table of Contents  Introduction  Algorithm  Implementation  Evaluation  Discussion  Related Work  Conclusion 100 MicaZ nodes – Purple nodes Diameter of 6~7 hops * Mirage Testbed in Intel Research Berkeley Sink

11/26 Packet Throughput of Different Fixed Rates Effective Throughput (pkt/s) Packet throughput of fixed rate streams over different hop counts No fixed rate is always optimal

12/26 Packet Throughput of Flush Overall Throughput (pkt/s) Effective packet throughput of Flush compared to the best fixed rate at each hop Flush tracks the best fixed packet rate

13/26 Bandwidth of Flush Overall Bandwidth (B/s) Effective bandwidth of Flush compared to the best fixed rate at each hop Flush’s protocol overhead reduces the effective data rate

14/26 Fraction of Data Transferred in Different Phases Fraction of data transferred from the 6th hop during the transfer phase and acknowledgment phase Greedy best-effort routing is unreliable, and exhibits a loss rate of 43.5%. A higher than sustainable rate leads to a high loss rate

15/26 Amount of Time Spent in Different Phases Fraction of time spent in different stages A retransmission during the acknowledgment phase is expensive, and leads to a poor throughput

16/26 Packet Throughput at Transfer Phase Transfer Phase Throughput (pkt/s) Effective goodput during the transfer phase Flush provides comparable goodput at a lower loss rate which reduces the time spent in the expensive acknowledgment phase, which increases the effective bandwidth

17/26 Packet Rate over Time for a Source Source is 7 hops away, Data is smoothed by averaging 16 values Flush approximates the best fixed rate with the least variance Flush-e2e has no in-network rate control

18/26 Maximum Queue Occupancy across All Nodes for Each Packet Flush exhibits more stable queue occupancies than Flush-e2e

19/26 Sending Rate at Lossy Link Both Flush and Flush-e2e adapt while the fixed rate overflows its queue Packets were dropped from hop 3 to hop 2 with 50% probability between 7 and 17 seconds

20/26 Queue Length at Lossy Link Flush and Flush-e2e adapt while the fixed rate overflows its queue

21/26 Route Change Experiment We started a transfer over a 5 hop path Approximately 21 seconds into the experiment forced the node 4 hops from the sink to switch its next hop Node 4’s next hop is changed, changing all nodes in the subpath to the root No packets were lost, and Flush adapted quickly to the change 0 1a 2a 3a 1b 2b 3b 4 5

22/26 Scalability Test Overall Throughput (B/s) Effective bandwidth from the real-world outdoor scalability test where 79 nodes formed 48 hop network with 35B payload size Flush closely tracks or exceeds the best possible fixed rate across at all hop distances that we tested

23/26 Table of Contents  Introduction  Algorithm  Implementation  Evaluation  Discussion  Related Work  Conclusion

24/26 Discussion  High-power node reduces hop count and interference Not an option on many structural health monitoring due to power and space problems  Interactions with Routing Link estimator of a routing layer breaks down under heavy traffic

25/26 Related Work  Li et al – capacity of a chain of nodes limited by interference using  ATP, W-TCP – rate-based transmission in the Internet  Wisden – concurrent transmission without a mechanism for a congestion control  Fetch – single flow, selective-NACK, no mention about rate control

26/26 Conclusion  Rate-based flow control Directly measure intra-path interference at each hop Control rate based on interference information  Light-weight solution reduces complexity Overhearing is used to measure interference and to exchange information Two rules to determine a rate  At each node, Flush attempts to send as fast as possible without causing interference at the next hop along the flow  A node’s sending rate cannot exceed the sending rate of its successor  In combination, Flush provides as good bandwidth as fixed rate, and also gives a better adaptability

Questions

28/26

29/26 Reliability , 4, 5 4, 9 SourceSink

30/26 Rate Control: Conceptual Model Rate: Assuming disk model N: Number of nodes, I: Interference range

31/26 Rate Control d 8 = δ 8 + H 7 = δ 8 + δ 7 + f 7 = δ 8 + δ 7 + δ 6 + δ 5 1. At each node, Flush attempts to send as fast as possible without causing interference at the next hop along the flow 2. A node’s sending rate cannot exceed the sending rate of its successor

32/26 Implementation  RSSI is measured by snooping  Information is also snooped δ, f, D are put into packet header, and exchanged through snooping δ, f, D take 1 byte each, 3 bytes total  Cutoff A node i considers a successor node (i− j) an interferer of node i+1 if, for any j > 1, rssi(i+1) − rssi(i−j) < 10 dBm The threshold of 10 dBm was chosen after empirically evaluating a range of values

33/26 Implementation  16-deep Rate-limited Queue Enforces departure delay D(i) When a node becomes congested (depth 5), it doubles the delay advertised to its descendants  But continues to drain its own queue with the smaller delay until it is no longer congested  Protocol Overhead Out of 22B provided by Routing layer, 2B sequence number + 3B control field + 17B payload

34/26 Test Methodology  Mirage testbed in Intel Research Berkeley, consists of 100 MicaZ  -11 dBm  Diameter of 6~7 hops  Average of 4 runs

35/26 Bottom line performance  High-power node reduces hop count and interference Not an option on the Golden Gate Bridge due to power and space problems  Interactions with Routing Link estimator of a routing layer breaks down under heavy traffic  Bottom line performance???

36/26 Average Number of Transmissions per node for sending 1,000 packets

37/26 Bandwidth at Transfer Phase Transfer Phase Throughput (B/s) Effective goodput during the transfer phase Effective goodput is computed as the number of unique packets received over the duration of the transfer phase

38/26 Details of Queue Length for Flush-e2e

39/26 Memory and Code Footprint

40/26

41/

42/

43/26 0 1a 2a 3a 1b 2b 3b 4 5

44/26  Every data from every node is needed Partial data has no or little value  Should work over 46 hops 8 nodes 56 nodes 1125 ft4200 ft 500 ft 246 ft SF (south) Sausalito (north) Motivating Example