Opportunistic Use of Client Repeaters to Improve Performance of WLANs Victor Bahl 1, Ranveer Chandra 1, Patrick P. C. Lee 2, Vishal Misra 2, Jitendra Padhye.

Slides:



Advertisements
Similar presentations
$ Network Support for Wireless Connectivity in the TV Bands Victor Bahl Ranveer Chandra Thomas Moscibroda Srihari Narlanka Yunnan Wu Yuan.
Advertisements

MultiNet: Connecting to Multiple IEEE Networks Using a Single Radio Ranveer Chandra, Cornell University joint work with: Victor Bahl (MSR) and Pradeep.
Dept. of computer Science and Information Management
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Wide Area Wi-Fi Sam Bhoot. Wide Area Wi-Fi  Definition: Wi-Fi (Wireless Fidelity) n. – popular term for high frequency wireless local area networks operating.
XORs in The Air: Practical Wireless Network Coding
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Networking with Wi-Fi like Connectivity Victor Bahl, Ranveer Chandra, Thomas Moscibroda, Microsoft Research Rohan Murty*, Matt Welsh Harvard University.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Mitigating the Impact of Physical Layer Capture and ACK Interference in Wireless Networks Wang Wei.
How Effective is the IEEE RTS/CTS Handshake in Ad Hoc Networks Kaixin Xu,Mario Gerla, Sang Bae IEEE Globecom 2002.
University of Michigan Electrical Engineering and Computer Science Anatomizing Application Performance Differences on Smartphones Junxian Huang, Qiang.
MOBICOM'031 UCAN: A Unified Cellular and Ad-Hoc Network Architecture Haiyun Luo Ramachandran Ramjee Prasun Sinha, Li Erran Li, Songwu Lu.
CMAP: Harnessing Exposed Terminals in Wireless Networks Mythili Vutukuru Joint work with Kyle Jamieson and Hari Balakrishnan.
Pushing the Envelope of Indoor Wireless Spatial Reuse using Directional Access Points and Clients Xi Liu 1, Anmol Sheth 2, Konstantina Papagiannaki 3,
Wi-Fi Neighborcast: Enabling communication among nearby clients
1 Estimation of Link Interference in Static Multi-hop Wireless Networks Jitendra Padhye, Sharad Agarwal, Venkat Padmanabhan, Lili Qiu, Ananth Rao, Brian.
XORs in the air: Practical Wireless Network Coding Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Medard, Jon Crowcroft SIGCOMM ‘06 Presented.
CS541 Advanced Networking 1 Spectrum Sharing in Cognitive Radio Networks Neil Tang 3/23/2009.
1 Enhancing Cellular Multicast Performance Using Ad Hoc Networks Jun Cheol Park Sneha Kumar Kasera School of.
1 Solutions to Performance Problems in VOIP over Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi.
Peering in Infrastructure Ad hoc Networks Mentor : Linhai He Group : Matulya Bansal Sanjeev Kohli EE 228a Course Project.
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
SSCH: Slotted Seeded Channel Hopping for Capacity Improvement in Ad Hoc Networks Victor Bahl (Microsoft Research) Ranveer Chandra (Cornell University)
Selection Metrics for Multi-hop Cooperative Relaying Jonghyun Kim and Stephan Bohacek Electrical and Computer Engineering University of Delaware.
LCN 2007, Dublin 1 Non-bifurcated Routing in Wireless Multi- hop Mesh Networks by Abdullah-Al Mahmood and Ehab S. Elmallah Department of Computing Science.
Hidden Terminal based Attack, Diagnosis and Detection Yao Zhao, Leo Zhao, Yan Chen Lab for Internet & Security Tech, Northwestern Univ.
Handoff Delay for b Wireless LANs Masters Project defense Anshul Jain Committee: Dr. Henning Schulzrinne, Columbia University Dr. Zongming Fei, University.
Effects of a Bad Channel on the overall WLAN Performance. CS577 Advanced Networking Spring 05 Ashish Samant, Jon Gretarsson, Feng Li {Asamant, jontg,
MIMO and TCP: A CASE for CROSS LAYER DESIGN Soon Y. Oh, Mario Gerla Computer Science Dept. University of California, Los Angeles {soonoh,
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
1 A Distributed Algorithm for Joint Sensing and Routing in Wireless Networks with Non-Steerable Directional Antennas Chun Zhang *, Jim Kurose +, Yong Liu.
Wi-Fi Neighborcast: Enabling communication among nearby clients
Divert: Fine-grained Path Selection for Wireless LAN Allen Miu, Godfrey Tan, Hari Balakrishnan, John Apostolopoulos * MIT Computer Science and Artificial.
Qian Zhang and Christopher LIM Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE ICC 2009.
Dynamic Load Balancing through Association Control of Mobile Users in WiFi Networks 2013 YU-ANTL Seminal November 9, 2013 Hyun dong Hwang Advanced Networking.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
WiFiProfiler: Cooperative Diagnosis in Wireless LANs Ranveer Chandra, Venkat Padmanabhan, Ming Zhang Microsoft Research.
1 Architecture and Techniques for Diagnosing Faults in IEEE Infrastructure Networks Atul Adya, Victor Bahl, Ranveer Chandra, Lili Qiu Microsoft.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Link Quality Source Routing (LQSR) Girish Nandagudi.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
Addressing Deafness and Hidden Terminal Problem in Directional Antenna Based Wireless Multi-hop Networks Anand Prabhu Subramanian and Samir R. Das {anandps,
Multicast Scheduling in Cellular Data Networks Katherine Guo, Arun Netravali, Krishan Sabnani Bell-Labs Research Hyungsuk Won, Han Cai, Do Young Eun, Injong.
UCAN: A Unified Cellular and Ad Hoc Network Architecture Presenter: Tripp Parker Authors: Haiyun Luo Ramachandran Ramjee Prasun Sinha, Li Erran Li, Songwu.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Design and Implementation of a Multi-Channel Multi-Interface Network Chandrakanth Chereddi Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
MOJO: A Distributed Physical Layer Anomaly Detection System for WLANs Richard D. Gopaul CSCI 388.
Submission doc.: IEEE /0801r1 Akira Kishida, NTT Issues of Low-Rate Transmission Date: Authors:
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Performance Evaluation of WLAN for Mutual Interaction between Unicast and Multicast Communication Session Author: Aamir Mahmood Supervisor: Prof. Riku.
TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Fat Virtual Access Points Taken from Srikanth Kandula.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
Bandwidth Balancing in Multi- Channel IEEE Wireless Mesh networks Claudio Cicconetti, Ian F. Akyildiz School of Electrical and Computer Engineering.
Chang-Yeong Oh and Tae-Jin Lee JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 13, NO. 5, OCTOBER 2011 Cooperative MAC Protocol Using Active Relays for Multi-Rate.
1 11 Distributed Channel Assignment in Multi-Radio Mesh Networks Bong-Jun Ko, Vishal Misra, Jitendra Padhye and Dan Rubenstein Columbia University.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
2012 1/6 NSDI’08 Harnessing Exposed Terminals in Wireless Networks Mythili Vutukuru, Kyle Jamieson, and Hari Balakrishnan MIT Computer Science and Artificial.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
On the Performance Characteristics of WLANs: Revisited S. Choi, K. Park and C.K. Kim Sigmetrics 2005 Banff, Canada Presenter - Bob Kinicki Presenter -
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
Architecture and Algorithms for an IEEE 802
Distributed Channel Assignment in Multi-Radio Mesh Networks
Self Organized Networks
Presentation transcript:

Opportunistic Use of Client Repeaters to Improve Performance of WLANs Victor Bahl 1, Ranveer Chandra 1, Patrick P. C. Lee 2, Vishal Misra 2, Jitendra Padhye 1, Dan Rubenstein 2, Yan Yu 3 1 Microsoft Research 2 Dept of Computer Science, Columbia University 3 Google Inc. Dec 12, 2008

2 Outline Rate anomaly problem SoftRepeater design Fairness requirements Experimental results Conclusions

3 Rate Anomaly of Rate anomaly is well-known in WiFi networks Low-rate stations degrade throughput of high-rate stations Why does rate anomaly exist? Stations reduce data rates when signal strength is poor (auto-rate) Low-rate stations’ packets consume more airtime arbitrates transmissions on per-packet basis High-rate stations receive limited airtime  throughput degrades 54Mbps AP A 54Mbps B Throughput (Mbps) A, B near AP A far from AP B A B A 18Mbps

4 Limitations of Prior Solutions What’s new? Rate anomaly is well-known, with many solutions proposed. Assumptions of prior solutions: Require dedicated hardware (e.g., Cisco Aironet 1200 series APs) Change MAC layer (e.g., Lee et al., Infocom ’04; Liu et al., JSAC ’05) Construct ad-hoc mesh networks (e.g., Draves et al., Mobicom ’04) Drawbacks of prior solutions: More cost for hardware change Not compatible with widely deployed infrastructure networks Inflexible – solutions cannot be activated on demand

5 Our Solution: SoftRepeater SoftRepeater: A practical, deployable system that addresses rate anomaly Main idea: High-rate station (repeater) relays traffic for low-rate station (client) Key features: Repeater is opportunistic - activated only when both repeater and client receive “beneficial” throughput No changes to MAC and AP Deployable in infrastructure and adhoc networks AP A B client repeater traffic for A and Btraffic for A

6 Design Issues How can we detect existence of rate anomaly occurring? How do we formally define “beneficial” throughput? How do we support multiple interfaces on a wireless card? We need managed mode for communication between AP and repeater We need adhoc mode for communication between repeater and client What fractions of time should we give to managed/adhoc modes to ensure “beneficial throughput”? AP A B client repeater traffic for A and Btraffic for A

7 Our Contribution Propose a handshaking protocol for detecting rate anomaly and reaching consensus on using SoftRepeater Formalize a set of utility maximization problems for different fairness requirements Implement SoftRepeater on Windows XP; conduct extensive testbed experiments and QualNet simulations

8 SoftRepeater Architecture Built on VirtualWifi – allowing two virtual interfaces for a wireless card: Primary Virtual Interface – communication between AP and repeater in managed mode Repeater Virtual Interface – communication between repeater and client in adhoc mode Repeater Virtual Interface activated only when beneficial to both repeater and client Alternate between primary and repeater interfaces with switching overhead < 40ms Optional Network Coding Engine that further boosts throughput, with slight modifications to AP Multiple radios can be supported (not in our current experiments)

9 Detecting Rate Anomaly Goal: Determine When SoftRepeater is beneficial Key steps: Collect information from nearby stations in promiscuous mode: Number of packets transmitted Average size of packets RSSI Data transmission rate BSSID Check utilization of medium. If neighbors send about the same number of packets, but at a low rate, rate anomaly may exist.

10 Repeater Utility Function Goal: capture throughput gain of both repeater and client Define α: fraction of time spent in managed mode Assumptions: Stations always have backlogged data to send (i.e., saturated case) Implying equal channel access Good approximation for file-transfer applications Zero switching overhead 1 - α = fraction of time spent in adhoc mode Can easily account for non-zero switching overhead Intuition: if utility improved for both repeater and client, activate SoftRepeater AP A B client repeater

11 Repeater Utility Function Without SoftRepeater: B’s throughput: T B A’s throughput: T A With SoftRepeater: B’s Throughput: αT B / 2 A’s throughput: min(αT B / 2, (1- α)T A,B ) T A,B = inferred throughput between A and B from RSSI measurement If max-min fairness is used, repeater utility function becomes T* = max α min{αT B / 2, min(αT B / 2, (1- α)T A,B )} If T* > T A and T* > T B (better for both) activate SoftRepeater AP A B client repeater TATA TBTB T A,B

12 Generalizing Repeater Utility Function For different objectives: Maximizing total throughput: starve client (bad) Max-min fairness Proportional fairness For different settings: In presence of interfering nodes In presence of multiple clients Multiple radios Multiple wireless cards Details in paper and tech report

13 Repeater Initiation Protocol Goal: confirm and reach consensus on activating SoftRepeater For now: simple 4-way handshake: B broadcasts SoftRepeater offer A infers data rate from A to B (from RSSI) and unicasts response B picks clients to serve (if utility improved) and broadcasts final “Take it or leave it” offer A unicasts accept/reject AP A B client repeater 1. broadcast offer 3. broadcast new offer 2. unicast response 4. unicast accept/reject

14 Testbed Experiments SoftRepeater is implemented on Windows XP Testbed experiments in office building AP located at X Repeater (node R) fixed at Y Client (node C) moved between Y, T, Z Use a, with auto-rate feature enabled Focus on Max-Min fairness

15 Experiment 1: Downlink UDP UDP throughput improved by 200% with SoftRepeater when rate anomaly exists AP R C rate anomaly scenario:

16 Experiment 2: Downlink TCP TCP throughput improved by 50% with SoftRepeater when rate anomaly exists, even communication alternates between managed and adhoc modes AP R C rate anomaly scenario:

17 Experiment 3: UDP with 2 clients UDP throughput improved with SoftRepeater when two clients served AP RC 1 C 2 rate anomaly scenario:

18 Qualnet Simulation: Effectiveness of Repeater Initiation Protocol SoftRepeater activated only when there is throughput gain AP in office 0 Client in office 9 Downlink UDP for both repeater and client

19 Qualnet Simulation: Multiple Clients SoftRepeater improves the baseline throughput by more than 65%. AP in office 0 Repeater in office 3 N clients in office 9 Downlink UDP

20 Summary of Experimental Results Main observation: throughput significantly improved for UDP/TCP flows when rate anomaly exists More experiments in paper/tech. report Correctness of repeater initiation protocol Extension with network coding Various traffic scenarios Qualnet simulation for more “complicated” scenarios (e.g., interfering nodes, multiple repeaters/clients)

21 Conclusions Propose SoftRepeater, a practical, deployable system that addresses rate anomaly problem Formulate different utility maximization problems for SoftRepeater Implement a prototype that demonstrates the improvement of SoftRepeater

22 Questions:

23 Security Issues Security concerns: Privacy End-to-end encryption (e.g., IPsec) can be used Greedy/malicious repeaters Client monitors channel; quits if performance becomes worse after SoftRepeater is used Conclusion: Security is no worse than SoftRepeater-free networks