Voice over the Dins: Improving Wireless Channel Utilization with Collision Tolerance Xiaoyu Ji Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Ke Yi, Yunhao.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Medium Access Issues David Holmer
Transmission Power Control in Wireless Sensor Networks CS577 Project by Andrew Keating 1.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,
Walking down the STAIRS: Efficient Collision Resolution with Constructive Interference Xiaoyu Ji Xiaoyu Ji, Yuan He, Jiliang Wang, Wei Dong, Xiaopei Wu.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Nov 2011 Neng Xue Tianxu Wang.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
SUCCESSIVE INTERFERENCE CANCELLATION IN VEHICULAR NETWORKS TO RELIEVE THE NEGATIVE IMPACT OF THE HIDDEN NODE PROBLEM Carlos Miguel Silva Couto Pereira.
Hitchhike: Riding Control on Preambles Xiaoyu Ji Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang and Yunhao Liu INFOCOM, 2014, Toronto Hong.
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Wireless Network Design for Distributed Control Liu and Goldsmith - Appeared at CDC 2004 Presented by Vinod Namboodiri.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
BMWnet Wshnt.kuas.edu.tw Mesh Networks Prof. W.S. Hwang.
Daibo Liu 1 Daibo Liu 1, Zhichao Cao 2, Xiaopei Wu 2, Yuan He 2, Xiaoyu Ji 3 and Mengshu Hou 1 ICDCS, 2015, Columbus TeleAdjusting: Using Path Coding and.
Harnessing Mobile Multiple Access Efficiency with Location Input Wan Du * and Mo Li School of Computer Engineering Nanyang Technological University, Singapore.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
On-Demand Traffic-Embedded Clock Synchronization for Wireless Sensor Networks Sang Hoon Lee.
Naveen Santhapuri, Srihari Nelakuditi and Romit Roy Choudhury University of South Carolina Duke University WCNC 2008.
Addressing Deafness and Hidden Terminal Problem in Directional Antenna Based Wireless Multi-hop Networks Anand Prabhu Subramanian and Samir R. Das {anandps,
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Mar 2008 doc:IEEE e Slide 1 Submission Paul Dixon, Pei Liu, Hisilicon Project: IEEE P Working Group for Wireless Personal Area.
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
A Reservation-based TDMA Protocol Using Directional Antennas (RTDMA-DA) For Wireless Mesh Networks Amitabha Das and Tingliang Zhu, Nanyang Technological.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
Cross-Layer Approach to Wireless Collisions Dina Katabi.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
ECE 256, Spring 2009 __________ Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver __________________.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks ACM MobiHoc 2011 (Best Paper Award) Lei Tang 1, Yanjun Sun 2,
CRMA: Collision Resistant Multiple Access Lili Qiu University of Texas at Austin Joint work with Tianji Li, Mi Kyung Han, Apurv Bhartia, Eric Rozner, Yin.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
Performance Evaluation of Multiple IEEE b WLAN Stations in the Presence of Bluetooth Radio.
FD-MMAC: Combating Multi-channel Hidden and Exposed Terminals Using a Single Transceiver Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, and Swetha Shivaramaiah.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Optimization-based Cross-Layer Design in Networked Control Systems Jia Bai, Emeka P. Eyisi Yuan Xue and Xenofon D. Koutsoukos.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
SENSYS Presented by Cheolki Lee
TCP and MAC interplay in Wireless Ad Hoc Networks
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
Hidden Terminal Decoding and Mesh Network Capacity
Wireless LAN Simulation IEEE MAC Protocol
Javad Ghaderi, Tianxiong Ji and R. Srikant
Aggressive Synchronous Transmissions with In-network Processing
Muhammad Niswar Graduate School of Information Science
Presentation transcript:

Voice over the Dins: Improving Wireless Channel Utilization with Collision Tolerance Xiaoyu Ji Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Ke Yi, Yunhao Liu ICNP, 2013, Göttingen Tsinghua UniversityHong Kong University of Science and Technology

Motivation 2 Collisions in wireless networks – Broadcast nature and lack of collision detection – Event-driven mode (WSNs) Network performance, e.g., channel utilization is harmed Researchers have designed a lot of medium access control protocols (MAC) – A-MAC, B-MAC, …, Z-MAC

The long-held philosophy Collision avoidance – Avoid simultaneous access from multiple users to a shared channel – Conservative strategy against collisions – Side effect: idle slots, as a result of random backoff 3 Collision avoidance limits the wireless channel to be better utilized!!!

Why not more aggressive? Collision tolerance – Allowing collisions to happen, i.e., the overlap of signals in time domain – Potential gain in channel utilization 4 AB CD R A B B C D B A C B D C B C C B D C D B A A B D B D C B B C D B A C B 4 senders with a common receiver ABD CBD A Tolerance Avoidance Collision tolerance enables one to approach the upper limit of channel utilization!

Formulation Np Suppose N senders choose probability p to transmit to the receiver, then three possible states for any given time slot: – Idle – Successful – Corrupted And the utilization ratio: 5

The potential gain For backoff-based approaches, the success probability is : The simulation results CT- Collision tolerance CA- Collision avoidance η: parameter related to T s, T c, T slot 20% improvement in general case! 6

Feasibility of collision tolerance PHY layer implementation – Redundancy – Stronger signal dominates the weak ones – Capture effect 1,2, message in message (MIM) 3 Therefore, even packets collide, the strongest one could still be correctly received under certain conditions! 7 1, The capture effect in FM receivers, KRIJN LEENTVAAR and JAN H.FLINT, IEEE TOC, , Sniffing out the correct physical layer capture model in b, MLA Kochut, Andrzej, et al., ICNP, , Order Matters: Transmission Reordering in Wireless Networks, Justin Manweiler etc, Mobicom, 2009

Investigating collision tolerance (1/2) Experiment setup – Indoor, TelosB nodes, Contiki-OS – 2 senders with a common receiver 8 1. Timing requirement 160μs Case 1: Strong first. The receiver receives the strong signal without knowing the weak ones. Case 2: Weak first, strong coming within the preamble window of the weak ones. Case 3: Weak first, strong coming out of the preamble window of the weak ones. Strong Weak P P P P Case 1 P P Case 3 P P Case 2

Investigating collision tolerance (2/2) 9 2. Concurrency requirement C(k): concurrency of 2, 3 even 4 are beneficial! Especially, the collision probability with concurrency 2 is very small. All packets should come within 160μs; Concurrency should be proper. All packets should come within 160μs; Concurrency should be proper.

Protocol overview (Coco) Timing requirement – ACK triggers the transmission Concurrency requirement p – Transmitting with probability p 9

ACK-triggered transmission ACK – Triggering transmissions (synchronization) p – Piggybacking the probability p – Coping with hidden terminals The offset can be controlled within 1 μs as shown in the evaluation. 10

p Transmitting with p p Optimum: How to decide whether p is proper or not? Adjustment: If not, how to adjust it? Convergence: How well can the adjustment converge? Errors: The error involved in the adjustment. 12

Optimum: Is p proper? The utilization is a function of N and p, and under some N, the best p should be: p Claim: when p is proper, which means Util(p) achieves its best value, P c, P i, P s and Util(p) converge when N  ∞ The criteria 12

Adjustment of p The feedback control algorithm Sliding window: recording status of past packets, to calculate P c The dichotomous algorithm 13

Convergence speed of p p p is in the range of [0:1] The resolution is when N=20 (Tab.1) p It takes at most 10 iterations to regulate p from initial 1 value to With 100 data packets in each iteration, a maximum ms for each packet, the maximum time is s 14

Error in the process The error introduced by ε: ΔUtil(p) For different ε, we calculate the errors: 15

Evaluation Metrics – The accuracy of timing – The adjustment algorithm – Overall performance Setup – 21 TelosB nodes, Contiki-OS – Single hop, single receiver 16

Timing accuracy 11 senders with a common receiver The offset between the tested sender and a reference sender at receiver side 18 The offset among senders can be as small as nano seconds!

The feedback control algorithm With N changing dynamically, p can converge to its best value quickly! 18

Overall evaluation (1/2) Comparing with B-MAC, default in Tiny-OS Performance evaluation with different network parameters Parameter EnvironmentIndoor: Hall, Testbed Outdoor: ground Packet length20, 60, 100 (bytes) TopologyLine, circle random 19

Overall evaluation (2/2) Packet length: longer packets are better. Topology: resistance to hidden terminals. Compared with B-MAC (linear and exponential) Avg. 20% improvement in general case. 20

Summary Question the avoidance principle and improve channel utilization with collision tolerance Investigate the sufficient condition in achieving beneficial collision tolerance Design a protocol to exploit collision tolerance for improving channel utilization Real implementation and extensive evaluation 21

THANK YOU! Xiaoyu JI 22