RCTC: Rapid Concurrent Transmission Coordination in Full Duplex Wireless Networks Wenjie Zhou, Kannan Srinivasan, Prasun Sinha Department of Computer Science.

Slides:



Advertisements
Similar presentations
Wireless Networks Should Spread Spectrum On Demand Ramki Gummadi (MIT) Joint work with Hari Balakrishnan.
Advertisements

Università degli Studi di Firenze 08 July 2004 COST th MCM - Budapest, Hungary 1 Cross-layer design for Multiple access techniques in wireless communications.
Doc.: IEEE /0765 r1 Submission Co-time Co-frequency Full Duplex for WLAN July 2013 Hongliang Bian (China Telecom) Slide 1 Date:
Co-time Co-frequency Full Duplex for WLAN
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
XORs in The Air: Practical Wireless Network Coding
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Fine-grained Channel Access in Wireless LAN SIGCOMM 2010 Kun Tan, Ji Fang, Yuanyang Zhang,Shouyuan Chen, Lixin Shi, Jiansong Zhang, Yongguang Zhang.
BBN: Throughput Scaling in Dense Enterprise WLANs with Blind Beamforming and Nulling Wenjie Zhou (Co-Primary Author), Tarun Bansal (Co-Primary Author),
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
MIMO As a First-Class Citizen in Kate C.-J. Lin Academia Sinica Shyamnath Gollakota and Dina Katabi MIT.
O ptimal routingpower allocation full-duplex o ptimal routing and power allocation for wireless networks with imperfect full-duplex nodes David Ramírez.
Interference Centric Wireless Networks Sachin Katti Assistant Professor EE&CS, Stanford University.
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
1 Link Characteristics in Sensor Networks. 2 Why Such a Study? (in)validate whether the basic model used in design is accurate or not  Remember you have.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Outline What is an ad hoc network Smart Antenna Overview
DAC: Distributed Asynchronous Cooperation for Wireless Relay Networks 1 Xinyu Zhang, Kang G. Shin University of Michigan.
Submission doc.: IEEE /0838r0 July 2014 Woojin Ahn, Yonsei Univ. Slide 1 Discussion on dual-link STR in IEEE ax Date: Authors:
MIMO and TCP: A CASE for CROSS LAYER DESIGN Soon Y. Oh, Mario Gerla Computer Science Dept. University of California, Los Angeles {soonoh,
DOMINO: Relative Scheduling in Enterprise Wireless LANs Wenjie Zhou (Co-Primary Author), Dong Li (Co-Primary Author), Kannan Srinivasan, Prasun Sinha 1.
SourceSync: A Distributed Architecture for Sender Diversity Hariharan Rahul Haitham Hassanieh Dina Katabi.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Overcoming the Antennas-Per-AP Throughput Limit in MIMO Shyamnath Gollakota Samuel David Perli and Dina Katabi.
Harnessing Mobile Multiple Access Efficiency with Location Input Wan Du * and Mo Li School of Computer Engineering Nanyang Technological University, Singapore.
RobinHood: Sharing the Happiness in a Wireless Jungle Tarun Bansal, Wenjie Zhou, Kannan Srinivasan and Prasun Sinha Department of Computer Science and.
Full-duplex Backscatter for
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
AutoMAC : Rateless Wireless Concurrent Medium Access Aditya Gudipati, Stephanie Pereira, Sachin Katti Stanford University.
Symphony: Orchestrating Collisions in Enterprise Wireless Networks Tarun Bansal (Co-Primary Author), Bo Chen (Co-Primary Author), Prasun Sinha and Kannan.
Joint PHY-MAC Designs and Smart Antennas for Wireless Ad-Hoc Networks CS Mobile and Wireless Networking (Fall 2006)
BBN: Throughput Scaling in Dense Enterprise WLANs with Blind Beamforming and Nulling Wenjie Zhou (Co-Primary Author), Tarun Bansal (Co-Primary Author),
1 Yue Qiao Computer Science and Engineering Sep AirExpress: Enabling Seamless In-band.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
Link layer Murat Demirbas SUNY Buffalo CSE Dept..
Decoding Collisions Shyamnath Gollakota Dina Katabi.
Doc.: IEEE /1421r0 Submission November 2013 Philip Levis, Stanford UniversitySlide 1 STR Radios and STR Media Access Date: Authors:
Mayank Jain, Jung Il Choi Tae Min Kim, Dinesh Bharadia, Siddharth Seth, Kannan Srinivasan, Philip Levis, Sachin Katti, Prasn Sinha MobiCom 2011.
Cross-Layer Approach to Wireless Collisions Dina Katabi.
Enhancing Wireless Networks with Directional Antenna and Multiple Receivers Chenxi Zhu, Fujitsu Laboratories of America Tamer Nadeem, Siemens Corporate.
Cooperative MIMO Paradigms for Cognitive Radio Networks
mZig: Enabling Multi-Packet Reception in ZigBee
INFOCOM What is MMAC? ▣ Multi-Channel MAC  Channel negotiation and assignment (sender – destination pair)  Destination discovery (same channel)
An Adaptive, High Performance MAC for Long-Distance Multihop Wireless Networks Sergiu Nedevschi *, Rabin K. Patra *, Sonesh Surana *, Sylvia Ratnasamy.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
CDMA Based MAC Protocol for Wireless Ad Hoc Networks Alaa Mouquatash & Marwan Krunz Presentation by: Moheeb Abu-Rajab.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
FD-MMAC: Combating Multi-channel Hidden and Exposed Terminals Using a Single Transceiver Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, and Swetha Shivaramaiah.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
1 Yue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan and Anish Arora Department of Computer Science and Engineering PhyCloak: Obfuscating Sensing from.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
© Saravanan Kandasamy, Ricardo Morla, and Manuel Ricardo,INESC Porto 1 Improving the Performance of IEEE802.11s Networks using Directional Antennas over.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Achieving Single Channel, Full Duplex Wireless Communication
Wireless Communication
Wireless LANs Wireless proliferating rapidly.
SENSYS Presented by Cheolki Lee
Practical, Real-time, Full Duplex Wireless
Full-duplex Technology for HEW
Full Duplex Benefits and Challenges
On the Physical Carrier Sense in Wireless Ad-hoc Networks
Achieving Single Channel, Full Duplex Wireless Communication
CSMA/CN: Carrier Sense Multiple Access with Collision Notification
Subject Name: Adhoc Networks Subject Code: 10CS841
Full Duplex Benefits and Challenges
E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
Full Duplex Date: Authors: January 2018
Presentation transcript:

RCTC: Rapid Concurrent Transmission Coordination in Full Duplex Wireless Networks Wenjie Zhou, Kannan Srinivasan, Prasun Sinha Department of Computer Science and Engineering The Ohio State University {zhouwe, kannan, 1

2 Full Duplex “Hi Alice” “Hi Bob” Half Duplex “Hi Alice” “Hi Bob” Two Transmission slots One Transmission slot Full duplex doubles the throughput between two nodes

Full duplex doubles the throughput When both Alice and Bob have packets However, traffic tends to be asymmetric 3 Traffic Pattern and Full Duplex

Traffic Asymmetry and Full Duplex 4 I’m listening “Hi Bob” Busytone packet (fake packet) [MobiCom’11] A waste of channel resources How to use full duplex beyond 2 nodes?

Other opportunities exist… 5 Bob Ellie Alice Charlie Floyd Secondary transmission Introduced in ContraFlow [WiOpt’11] Gauss Enabling exposed and secondary transmission achieves 3X throughput More exposed transmissions enabled, even higher throughput Primary transmission Exposed transmission Hellen

Transmission Modes Bi-directional Transmission Mode Unidirectional Mode Secondary Transmission Mode 6 Bob AliceCharlie Bob Alice Bob Alice Ellie Floyd Ellie Floyd

Challenges in MAC Design 1.Rapid coordination among neighbors – Time efficient 2.Identify exposed transmission opportunities – Primary receiver should not be affected 3.Reliable reception at potential receivers – Exposed receivers and secondary receivers should experience little interference – Avoid exposed transmission collision 7

RCTC Design 8 1. Rapid Coordination 2. Exposed terminal identification 3. History based receiver selection 4. Exposed terminal suppressing

Node Signature Property of node signature: – Unique for every node – High self correlation value – Low cross correlation value Signature in previous work: – CSMA/CN [MobiCom’10] – E-MILI [MobiCom’11] – ec [MobiCom’12] Gold code: – Length: 127 bits – Number of signatures: 129 – Duration: 6.5 μs (BPSK, 20MHz bandwidth) 9 Self correlation results Cross correlation results

Bi-directional Transmission Mode 10 Alice : Bob : SBSB SASA SASA Packet for Bob Packet for Alice Alice’s signatureBob’s signature Bob Alice

Unidirectional Mode 11 Alice: Bob : SBSB SASA SHSH Packet for Bob Busytone for hidden terminal Ellie : Packet Floyd Half duplex signature Bob Alice Ellie Floyd

Secondary Transmission Mode 12 Alice : Bob : SBSB SASA SHSH Packet for Bob Packet for Charlie Bob Alice Charlie Ellie Floyd Ellie : Packet Floyd

RCTC Design Rapid Coordination 2. Exposed terminal identification 3. History based receiver selection 4. Exposed terminal suppressing

14 Bob Ellie Alice Floyd Exposed Terminal Identification Time Signal Strength (dB) Received signal from Alice SIR for data rate d AB Received signal from Ellie Time Signal Strength (dB) Received signal from Ellie SIR for data rate d EF Received signal from Alice Conflict constraints for exposed terminal

SBSB SASA Exposed Terminal Constraint at Bob 15 SBSB SASA Bob Alice Ellie SHSH SHSH

SBSB SASA Signal Strength Reflection 16 SBSB SASA Bob Alice Ellie SHSH SHSH

RCTC Design Rapid Coordination 2. Exposed terminal identification 3. History based receiver selection 4. Exposed terminal suppressing

Ellie History Based Receiver Selection 18 Set p to 1 upon a successful transmission Halve p upon a failed transmission SBSB SASA Bob Alice ExMap: {TX, RX, p} Primary TxExposed Rxp AliceMatt0.25 AliceFloyd1 AliceNeil0.125 AliceLeonard0 BobAlice0.125 ……… 1

RCTC Design Rapid Coordination 2. Exposed terminal identification 3. History based receiver selection 4. Exposed terminal suppressing

Exposed Terminal Suppressing 20 Unidirectional ModeBi-directional Mode How to distinguish? Bob Alice Ellie SASA Bob Alice Ellie SHSH

Exposed Terminal Suppressing 21 Bob Alice Ellie Bi-directional Mode SBSB SASA SFSF {RX, p lost } in certain period {Bob, 0.5} > ∆ Send S F Full duplex signature

Experiments USRP testbed – 5 USRPs Other schemes: – FDNative [MobiCom’11] : full duplex without exposed and secondary transmission – CF [WiOpt’11] : full duplex with secondary transmission enabled 22

USRP Testbed 23 ~59% ~78%

Simulations Simulation Setup: – Randomly picked links in AP and Ad hoc network – Varied number of flows, APs, and clients – 200 runs each setup Other schemes: – FDNative: full duplex without exposed and secondary transmission – CF: full duplex secondary transmission enabled – CMAP [NSDI’08] : exposed transmission enabled half duplex – Half-duplex: IEEE

Throughput Breakdown 25 Significant exposed transmission opportunities Limited secondary transmission opportunities 30 APs50 APs

AP Network X compared with FDNative Comparable fairness

Ad hoc network 27 54% gain over FDNative

Summary and future work Summary : Fast and low overhead signaling mechanism using node signatures Signal strength reflection to identify exposed terminals Throughput gain as high as 2.31X without losing fairness Future work: Multiple datarates Transmission priority 28

29

Backup Slides 30

Multiple Datarates 31 Bob Ellie SHSH

Different gain for AP and ad hoc network 32

Different gain for AP and ad hoc network 33

Throughput Breakdown 34 Average exposed throughput of 200 runs: - 30 APs : 31% - 40 APs : 39% - 50 APs : 46% (Compared with FDNative) Secondary transmission is not promising in AP network

AP network (different flows) 35 35% to 111% higher throughput

AP network (different parameter) 36

AP network (download ratio) % to 90.9% higher throughput

Ad hoc network 38 more opportunities for secondary tx Average gain over FDNative changes: (a) from 9% to 54%; (b) from 1% to 29%.

39 Node 1->Node 2 : primary transmission P ij : the received signal strength from node i to node j Δ d : a predefine threshold related with data rate Node 2 Node 4 Node 1 Node 5 P 45 /P 15 > Δ d, AND P 12 /P 42 > Δ d Exposed Node Identification

Signal Strength Reflection 40 TX: RX: S RX S TX SHSH EX:

History Based Receiver Selection 41 Set p to 1 upon a successful transmission. Halve p upon a failed transmission TX: RX: S RX S TX SHSH EX: ExMap: {TX, RX, p} TX RX 1, 0.25 RX 2, 1 RX 3, RX 4, 0

Exposed Terminal Suppressing 42 TX: RX: S RX S TX SHSH EX: TX: RX: S RX S TX Collision at TX!!! TX: RX: S RX S TX Suppressing exposed transmission SFSF

Related Work 43 Full duplex system: – Choi et al. [MobiCom’10], three antennas – Duarte et al. [ASILOMAR’10], two antennas – Jain et al. [MobiCom’11], two antennas – Aryafar et al. [MobiCom’12], full duplex MIMO – Bharadia et al. [SIGCOMM’13], one antenna Full duplex MAC: – Singh et al. [WiOpt’11], fairness, secondary transmission – Jain et al. [MobiCom’11], busytone padding – Sahai et al. [Technical Report’11], full duplex triggering

Three Antenna Design (with 2 RF chains and some additional h/w) 44 “Achieving Single Channel, Full Duplex Wireless Communication”, MobiCom’10 ~ 30 dB ~ 25 dB ~ 15 dB

Two Antenna Design (with ~ 3 RF chains) 45 “Full-Duplex Wireless Communications Using Off-The-Shelf Radios: Feasibility and First Results”, ASILOMAR’10 Antenna separation (AS) Analog cancellation (AC) Digital cancellation (DC) c 1 = - (h ab /h z )x 1

Two Antenna Design (with 2 RF chains and some additional h/w) 46 “Practical, real-time, full duplex wireless”, MobiCom’11 ~ 30 dB ~ 43 dB

Two Antenna Design (with 2 RF chains and some additional h/w) 47 “Rethinking Indoor Wireless: Low Power, Low Frequency, Full-duplex”, Microsoft Research’09 - Self-interference at the receive antenna was 55 dB - Analog Interference Cancellation (30 dB) - Nulling Antenna (25 dB)

Two Antenna Design for MIMO-FD (with 2 RF chains and phase shifter) 48 “MIDU: Enabling MIMO Full Duplex”, MobiCom’12 Receive Cancellation Transmit Cancellation 20 dB - 30 dB22 dB - 30 dB

Two Antenna Design for MIMO-FD (contd.) (with 2 RF chains and phase shifter) 49 “MIDU: Enabling MIMO Full Duplex”, MobiCom’12

Feasibility of One Antenna Design (with 2 RF chains and addl. h/w) 50 “Picasso: Flexible RF and Spectrum Slicing”, SIGCOMM’12 Not a real full duplex system (TX, RX on different spectrum) 13 dB - 20 dB30 dB

Prior Art: MAC Layer for FD (1 of 3) 51 “Practical, real-time, full duplex wireless”, MobiCom’11 No exposed or secondary transmission

Prior Art: MAC Layer for FD (2 of 3) 52 “Pushing the limits of Full-duplex: Design and Real-time Implementation”, Technical Report’11 (Constraint: A node cannot start new transmission while receiving) AP->M 1, M 1 ->AP AP->M 1, M 2 ->AP No exposed transmissions

Prior Art: MAC Layer for FD (3 of 3) 53 “Efficient and Fair MAC for Wireless Networks with Self-interference Cancellation”, WiOpt’11 No exposed transmissions; Simulations only

RCTC Design Rapid Coordination 2. Exposed terminal identification 3. History based receiver selection 4. Exposed terminal suppressing