Virtual MISO Triggers in Wi-Fi-like Networks

Similar documents
Wireless Networked Systems

Resilient Multi-User Beamforming WLANs: Mobility, Interference,

HOW DO MIMO RADIOS WORK? Adaptability of Modern and LTE Technology. By Fanny Mlinarsky 1/12/2014

MIMO I: Spatial Diversity

Cooperative MIMO schemes optimal selection for wireless sensor networks

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

Wireless in the Real World. Principles

A Performance Study of Deployment Factors in Wireless Mesh

Cooperation in Random Access Wireless Networks

ADVANCED WIRELESS TECHNOLOGIES. Aditya K. Jagannatham Indian Institute of Technology Kanpur

Partial overlapping channels are not damaging

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks

CIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum

Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks. Plenary Talk at: Jack H. Winters. September 13, 2005

AEROHIVE NETWORKS ax DAVID SIMON, SENIOR SYSTEMS ENGINEER Aerohive Networks. All Rights Reserved.

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Investigation and Improvements to the OFDM Wi-Fi Physical Layer Abstraction in ns-3 Workshop on ns-3 June 15, 2016

SourceSync. Exploiting Sender Diversity

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas

IEEE ax / OFDMA

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

CHAPTER 5 DIVERSITY. Xijun Wang

BASIC CONCEPTS OF HSPA

SpotFi: Decimeter Level Localization using WiFi. Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, Sachin Katti Stanford University

MIMO Systems and Applications

MIMO RFIC Test Architectures

1 Interference Cancellation

CS434/534: Topics in Networked (Networking) Systems

Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks

Relay Based Deployments for Wireless & Mobile Systems

Considerations about Wideband Data Transmission at 4.9 GHz for an hypothetical city wide deployment

[Raghuwanshi*, 4.(8): August, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

Randomized spatial multiplexing for distributed cooperative communications

Throughput Enhancement for MIMO OFDM Systems Using Transmission Control and Adaptive Modulation

Jeffrey M. Gilbert, Ph.D. Manager of Advanced Technology Atheros Communications

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

Predictable Packet Delivery from Wireless Channel Measurements. Daniel Halperin Wenjun Hu, Anmol Sheth, David Wetherall

Local Area Networks NETW 901

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Automatic power/channel management in Wi-Fi networks

Performance Analysis of n Wireless LAN Physical Layer

Frequency Reuse How Do I Maximize the Value of My Spectrum?

Rate Adaptation for Multiuser MIMO Networks

Link Adaptation in Mobile Communication Networks

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Power-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks

NAVAL POSTGRADUATE SCHOOL THESIS

UNDERSTANDING AND MITIGATING

Amplify-and-Forward Space-Time Coded Cooperation via Incremental Relaying Behrouz Maham and Are Hjørungnes

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

Communication Efficiency of Error Correction Mechanism Based on Retransmissions

On the Coexistence of Overlapping BSSs in WLANs

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

PERFORMANCE ANALYSIS OF MIMO-SPACE TIME BLOCK CODING WITH DIFFERENT MODULATION TECHNIQUES

Wireless LANs IEEE

Outline / Wireless Networks and Applications Lecture 5: Physical Layer Signal Propagation and Modulation

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

Multihop Routing in Ad Hoc Networks

Adaptive Modulation and Coding (AMC)

Augmenting Wireless Security Using Zero-Forcing Beamforming

Improvement of System Capacity using Different Frequency Reuse and HARQ and AMC in IEEE OFDMA Networks

MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance

4G Mobile Broadband LTE

Designing Reliable Wi-Fi for HD Delivery throughout the Home

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATIONS 2015/2016 WIRELESS NETWORKS AND SECURITY

Optimum Power Allocation in Cooperative Networks

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels

Wireless Physical Layer Concepts: Part III

#8 Adaptive Modulation Coding

Chapter 10. User Cooperative Communications

FAQs about OFDMA-Enabled Wi-Fi backscatter

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

Evolution of Cellular Systems. Challenges for Broadband Wireless Systems. Convergence of Wireless, Computing and Internet is on the Way

All Beamforming Solutions Are Not Equal

Wireless TDMA Mesh Networks

ON THE USE OF MULTIPLE ACCESS CODING IN COOPERATIVE SPACE-TIME RELAY TRANSMISSION AND ITS MEASUREMENT DATA BASED PERFORMANCE VERIFICATION

Review on Improvement in WIMAX System

Implementation of Antenna Switching Diversity and Its Improvements over Single-Input Single-Output System

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks

DESIGN OF STBC ENCODER AND DECODER FOR 2X1 AND 2X2 MIMO SYSTEM

The Impact of Channel Bonding on n Network Management

Optimizing the Performance of MANET with an Enhanced Antenna Positioning System

Mobile Communications: Technology and QoS

Information Theory at the Extremes

Performance Evaluation of a Mixed Vehicular Network with CAM-DCC and LIMERIC Vehicles

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment

TTN Vehicular Communications Part II Transmission Techniques for Noise Limited Systems

A Distributed System for Cooperative MIMO Transmissions

Nomadic Communications n/ac: MIMO and Space Diversity

An Alamouti-based Hybrid-ARQ Scheme for MIMO Systems

2012 LitePoint Corp LitePoint, A Teradyne Company. All rights reserved.

Medium Access Control Protocol for WBANS

On the Average Rate Performance of Hybrid-ARQ in Quasi-Static Fading Channels

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICCE.2012.

Cellular systems 02/10/06

Adapting to the Wireless Channel: SampleRate

Transcription:

Virtual MISO Triggers in Wi-Fi-like Networks Oscar Bejarano Edward W. Knightly Thursday, April,

Signal Outage in Fading Channels Thursday, April,

Signal Outage in Fading Channels x Power Zero Throughput egion x Thresh S time Thursday, April,

Signal Outage in Fading Channels x Power Zero Throughput egion x Thresh S time x Power x Thresh S N time Thursday, April,

Signal Outage in Fading Channels x Power Zero Throughput egion x Thresh S time x Power x Thresh S N time How do we exploit this independence among different paths? Thursday, April,

Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX X Symbol Period Symbol Period Thursday, April,

Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX X S S Symbol Period Symbol Period Thursday, April,

Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) S TX S X S S Symbol Period Symbol Period Thursday, April,

Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX S S X S S Symbol Period Symbol Period Thursday, April,

Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX X S S Symbol Period Symbol Period Thursday, April,

Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX X S S S* -S* Symbol Period Symbol Period Thursday, April,

Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) S* TX -S* X S S Symbol Period Symbol Period S* -S* Thursday, April,

Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) S* TX -S* X S S Symbol Period Symbol Period S* -S* Thursday, April,

For maximal transmit diversity gains, we require antenna separation difficult to achieve in mobile devices Thursday, April,

Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X Thursday, April,

Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX TX X Thursday, April,

Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX TX X Thursday, April,

Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X TX Thursday, April,

Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X TX Thursday, April,

Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X TX Thursday, April,

Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X Use Alamouti Scheme TX Thursday, April,

vmiso Protocol Design Challenges Triggering vmiso - Establish a criteria and mechanism used to trigger vmiso transmissions, i.e., how and when? Cooperator/elay Selection - Select a neighboring user as cooperator Thursday, April, 7

vmiso Protocol Design Challenges Triggering vmiso - Establish a criteria and mechanism used to trigger vmiso transmissions, i.e., how and when? Cooperator/elay Selection - Select a neighboring user as cooperator Thursday, April, 8

Objective To develop a comprehensive understanding of vmiso in the context of WLANs: Gains for vmiso flow Implications on network graph due to increased spatial footprint Thursday, April, 9

Objective To develop a comprehensive understanding of vmiso in the context of WLANs: Gains for vmiso flow Implications on network graph due to increased spatial footprint In particular, to provide the understanding needed to design trigger policies that maximize throughput performance gains trigger policies when should the cooperator be used? 9 Thursday, April,

vmiso Triggers Thursday, April,

vmiso Triggers. Method employed to invoke a vmiso transmission: Thursday, April,

vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission Thursday, April,

vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel Thursday, April,

vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,

vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,

eactive S NC S C time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

eactive S NC S C time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

eactive S S Data CN C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

eactive S S Data CN C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

eactive S S Data CN C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

eactive S S Data CN C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

eactive S S Data x CN C x x x NACK time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

eactive S S Data x CN C x x x NACK time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

eactive S S Data x CN C x x x NACK time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

eactive S S Data x e-tx CN C x x x NACK Tx x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,

Proactive S NC S C time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,

Proactive S NC S C time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,

Proactive S S Tx NC C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,

Proactive S S Tx NC C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,

Proactive S S Tx NC C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,

Proactive S S Tx e-tx NC C x x Tx x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,

vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel We will show results only for eactive. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,

vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel We will show results only for eactive. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,

Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Fully Connected Identify when the cooperator should or should not be used Thursday, April, 7

Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Fully Connected Identify when the cooperator should or should not be used Thursday, April, 8

Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Identify when the cooperator should or should not be used Thursday, April, 8

Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Identify when the cooperator should or should not be used Thursday, April, 8

Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Identify when the cooperator should or should not be used Thursday, April, 8

Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Identify when the cooperator should or should not be used Thursday, April, 8

Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S High throughput gains for F C Little to no cooperator interference with F F S Identify when the cooperator should or should not be used Thursday, April, 9

Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S High throughput gains for F C Little to no cooperator interference with F F S Identify when the cooperator should or should not be used Thursday, April, 9

Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S High throughput gains for F C Little to no cooperator interference with F F S Identify when the cooperator should or should not be used Thursday, April, 9

Trigger Policies in WLANs Interference ange Cooperator Footprint Intended Data Tx F S Low High throughput gains for F C Little to no cooperator interference with F F S Identify when the cooperator should or should not be used Thursday, April, 9

Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S F S Information Asymmetry Identify when the cooperator should or should not be used Thursday, April,

Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S Collisions F S Information Asymmetry Identify when the cooperator should or should not be used Thursday, April,

Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S Collisions C F S Information Asymmetry Identify when the cooperator should or should not be used Thursday, April,

Trigger Policies in WLANs Multi-Hop S N Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,

Trigger Policies in WLANs Multi-Hop S N Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,

Trigger Policies in WLANs Multi-Hop S N Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,

Trigger Policies in WLANs Multi-Hop S N High Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,

Trigger Policies in WLANs Multi-Hop S N High Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power More Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,

Trigger Policies in WLANs Multi-Hop S N High Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power More Fewer Losses Lower vmiso Gains vmiso S C Higher Identify when the cooperator should or should not be used Thursday, April,

Evaluation oadmap 8 System Implementation Comprehensive vmiso Evaluation 8 Atomic Scenarios (Fundamental Small- Scale Topologies) Large-Scale Topologies (up to flows) Monday, December, Mbps vmiso Mbps Direct Tx. Mbps vmiso Mbps Direct Tx. Mbps vmiso 8Mbps Direct Tx. 8Mbps vmiso Number of Cooperative Number Packets of (x) Cooperative Pkts. (x) 9 8 9 8 BPSK QPSK QAM QAM BPSK Mbps QPSK Mbps QAM Mbps QAM 8Mbps 8 87 7 9 9 BPSK No Coop BPSK BPSK Coop Mbps Direct Tx. QPSK BPSK Mbps QPSK No Coop 8 QAM Mbps vmiso 8 QPSK Coop QAM QPSK Mbps 7 QAM No Coop Mbps Direct Tx. QAM Coop QAM 7 87 Mbps QAM Mbps No Coop vmiso QAM Coop QAM 8Mbps Mbps Direct Tx. No Direct Cooperation Tx. No Direct Cooperation Tx. Mbps Cooperation Cooperation vmiso NvMISO NvMISO 8Mbps Direct Tx. 9 9 7 8 8Mbps vmiso 8 Perfect NACK NvMISO 8 NvMISO 8 7 Direct Tx. 7 8-8 -8-8 -8-78 -7-7 -7-7 -8 Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Attenuation (db) F F (b) 8 8 8 8 8 78 7 7 7 7 8 8 8 8 8 78 7 7 7 Attenuation (db) Attenuation (db) Flow Experiment Flow Experiment Flow Simulation Flow Simulation -8-8 -8-8 -78-7 -7-7 -7 Flow -8 Experiment Flow -8 Experiment -8 Flow Simulation -8 Flow Simulation Flow Flow Flow Flow Flow F Flow Flow Flow -8-78 F -7-7 -7 Experiment Simulation Experiment Simulation Attenuation (db) Attenuation (db) (a) Hidden Terminal (b) Information Asymmetry (a) (b) Throughput (Mbps) Throughput (Mbps) Throughput (Mbps) Monday, December, Throughput (kbps) Throughput (kbps) Tuesday, February 8, Throughput (Mbps) X Position (meters) X Position (meters) X Position (meters) X Position (meters) 8 8 8 8 8 8 8 78 8 7 78 7 c) 7 Independent Flows 7 - Flow 7 7 7 d) Independent 7 Flows - 8 Flow 8 Throughput Gain/Loss (%) Throughput Gain/Loss (%) Attenuation Attenuation (db) Wednesday, March 7, (db) 8 8 8 8 8 8 8 8 Throughput (kbps) Throughput (kbps) Y Position (meters) Y Position (meters) 8 Number of Cooperative Pkts. (x) Number of of Cooperative Packets (x) Number of Cooperative Packets (x) X Position (meters) X Position (meters) a) Coupled Flows - Flow Flow Throughput Gain/Loss at d=7m (%) Flow Throughput Gain/Loss at d=7m (%) (%) 8 8 F F Node Index Y Position (meters) Y Position (meters) X Position (meters) X Position (meters) b) Coupled Flows - Flow Flow Throughput Gain/Loss at d=7m (%) Flow Throughput Gain/Loss at (%) d=7m (%) 8 8 F F Thursday, April,

8 Evaluation oadmap System Implementation Comprehensive vmiso Evaluation 8 Atomic Scenarios (Fundamental Small- Scale Topologies) Large-Scale Topologies (up to flows) Monday, December, Mbps vmiso Mbps Direct Tx. Mbps vmiso Mbps Direct Tx. Mbps vmiso 8Mbps Direct Tx. 8Mbps vmiso Number of Cooperative Number Packets of (x) Cooperative Pkts. (x) 9 8 9 8 BPSK QPSK QAM QAM BPSK Mbps QPSK Mbps QAM Mbps QAM 8Mbps 8 87 7 9 9 BPSK No Coop BPSK BPSK Coop Mbps Direct Tx. QPSK BPSK Mbps QPSK No Coop 8 QAM Mbps vmiso 8 QPSK Coop QAM QPSK Mbps 7 QAM No Coop Mbps Direct Tx. QAM Coop QAM 7 87 Mbps QAM Mbps No Coop vmiso QAM Coop QAM 8Mbps Mbps Direct Tx. No Direct Cooperation Tx. No Direct Cooperation Tx. Mbps Cooperation Cooperation vmiso NvMISO NvMISO 8Mbps Direct Tx. 9 9 7 8 8Mbps vmiso 8 Perfect NACK NvMISO 8 NvMISO 8 7 Direct Tx. 7 8-8 -8-8 -8-78 -7-7 -7-7 -8 Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Attenuation (db) F F (b) 8 8 8 8 8 78 7 7 7 7 8 8 8 8 8 78 7 7 7 Attenuation (db) Attenuation (db) Flow Experiment Flow Experiment Flow Simulation Flow Simulation -8-8 -8-8 -78-7 -7-7 -7 Flow -8 Experiment Flow -8 Experiment -8 Flow Simulation -8 Flow Simulation Flow Flow Flow Flow Flow F Flow Flow Flow -8-78 F -7-7 -7 Experiment Simulation Experiment Simulation Attenuation (db) Attenuation (db) (a) Hidden Terminal (b) Information Asymmetry (a) (b) Throughput (Mbps) Throughput (Mbps) Throughput (Mbps) Monday, December, Throughput (kbps) Throughput (kbps) Tuesday, February 8, Throughput (Mbps) X Position (meters) X Position (meters) X Position (meters) X Position (meters) 8 8 8 8 8 8 8 78 8 7 78 7 c) 7 Independent Flows 7 - Flow 7 7 7 d) Independent 7 Flows - 8 Flow 8 Throughput Gain/Loss (%) Throughput Gain/Loss (%) Attenuation Attenuation (db) Wednesday, March 7, (db) 8 8 8 8 8 8 8 8 Throughput (kbps) Throughput (kbps) Y Position (meters) Y Position (meters) 8 Number of Cooperative Pkts. (x) Number of of Cooperative Packets (x) Number of Cooperative Packets (x) X Position (meters) X Position (meters) a) Coupled Flows - Flow Flow Throughput Gain/Loss at d=7m (%) Flow Throughput Gain/Loss at d=7m (%) (%) However, our evaluation explored networks of up to flows 8 8 F F Node Index Y Position (meters) Y Position (meters) X Position (meters) X Position (meters) b) Coupled Flows - Flow Flow Throughput Gain/Loss at d=7m (%) Flow Throughput Gain/Loss at (%) d=7m (%) 8 8 F F Thursday, April,

System Implementation Host PC SCIPT VISUALIZE CONTOLLE WAPnet Client WAPnet Client WAPnet Client WAPnet Server Combination of over-the-air experiments (small topologies) and simulation (large topologies) WAP Platform [] and WAPnet - Clean slate MAC and PHY B A EBE D C (a) m G J F (b) H I Simulations in NS- Performance Metric: Throughput (bps) Protocol Implementation: Idealized NACK-based (benchmarking) vs practical NACK-based scheme. [] http://warp.rice.edu/ Thursday, April,

vmiso in Atomic Scenarios Thursday, April,

vmiso in Atomic Scenarios S F D S F D S F Fully Connected D S F Information Asymmetry D 7 Thursday, April,

vmiso in Atomic Scenarios S F D S F Fully Connected D S F D S F Information Asymmetry D 7 Thursday, April,

S vmiso in Atomic Scenarios F D S F D S F Fully Connected D S F Information Asymmetry D 7 Thursday, April,

S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D 7 Thursday, April,

S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D. Throughput (Mbps)... Flow Flow Fully Connected 7 Thursday, April,

S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D. Almost doubled throughput of flow Throughput (Mbps)... Flow Flow Fully Connected 7 Thursday, April,

S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D Throughput (Mbps)... Almost doubled throughput of flow No negative effect of the cooperator on competing flow:. Flow Flow Fully Connected 7 Thursday, April,

S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D Throughput (Mbps).... Flow Flow Almost doubled throughput of flow No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow Fully Connected 7 Thursday, April,

S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D. Almost doubled throughput of flow 9 8 Throughput (Mbps)... No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow Throughput (kbps) 7 Flow Flow Flow Flow Fully Connected 7 Information Asymmetry Thursday, April,

S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D As expected f>>f S F Information Asymmetry D. Almost doubled throughput of flow 9 8 Throughput (Mbps)... No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow Throughput (kbps) 7 Flow Flow Flow Flow Fully Connected 7 Information Asymmetry Thursday, April,

S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso. S F Fully Connected D Almost doubled throughput of flow As expected f>>f Big increase (~%), but still unsatisfactory performance S F Information Asymmetry 9 8 D Throughput (Mbps)... No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow Throughput (kbps) 7 Flow Flow Flow Flow Thursday, April, Fully Connected 7 Information Asymmetry

S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso Throughput (Mbps).... S F Fully Connected D Almost doubled throughput of flow No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow As expected f>>f Big increase (~%), but still unsatisfactory performance Why did it help? elay helps one link by providing further information about topology S F Information Asymmetry Throughput (kbps) 9 8 7 D Flow Flow Flow Flow Thursday, April, Fully Connected 7 Information Asymmetry

S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso Throughput (Mbps).... S F Fully Connected D Almost doubled throughput of flow No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow As expected f>>f Big increase (~%), but still unsatisfactory performance Why did it help? elay helps one link by providing further information about topology Why didn t it help that much? Low number of cooperative tx triggered S F Information Asymmetry Throughput (kbps) 9 8 7 D Flow Flow Flow Flow Thursday, April, Fully Connected 7 Information Asymmetry

S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso Throughput (Mbps).... S F Fully Connected Flow Flow Fully Connected D Almost doubled throughput of flow No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow 7 As expected f>>f Big increase (~%), but still unsatisfactory performance Why did it help? elay helps one link by providing further information about topology Why didn t it help that much? Low number of cooperative tx triggered MAC behavior completely dominates the PHY behavior S F Information Asymmetry Throughput (kbps) 9 8 7 D Flow Flow Information Asymmetry Thursday, April,

vmiso in Large-Scale Scenarios 8 Thursday, April,

vmiso in Large-Scale Scenarios. Aggregate effects observed in atomic scenarios. Complex interactions between nodes (specially between cooperator and neighboring nodes/flows) Thursday, April, 9

vmiso in Large-Scale Scenarios Inter-Packet Transmission Time (ms) 9 8 7 9 8 7 Perfect NACK NvMISO 9 9 to Perfect Perfect flow NACK NACK networks, NvMISO random 8 position, static 8 topology Inter Packet Transmission Time (ms) Inter Packet Transmission Time (ms) 7 7 Aggregate effects due to the cooperator (increased transmission footprint) hinder gains attained by vmiso Direct Tx. Direct Tx. NvMISO Direct Tx. Tx. NvMISO Perfect NACK NvMISO NvMISO NvMISO Throughput Throughput Gain Gain (Mbps) (Mbps) Time seconds Time seconds Gains decrease from 7% ( flows) to approximately % ( flows)............ Throughput Gain Gain (Mbps) (Mbps) Perfect NACK NvMISO Perfect NACK NvMISO NvMISO NvMISO NvMISO NvMISO Managed Network Managed Network Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows (a) Time Time seconds seconds Time seconds Perfect Perfect Perfect NACK NACK NACK NvMISO NvMISO NvMISO NvMISO Trigger Managed Managed Threshold Network Trigger Threshold Network Policy Policy............. Flows Flows Flows Flows Flows (b) Thursday, April,

vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Thursday, April,

vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Thursday, April,

vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Establish a Network Wide Trigger Policy Thursday, April,

vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Establish a Network Wide Trigger Policy Thursday, April,

vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Establish a Network Wide Trigger Policy e.g., Local Approach: only flows achieving γ% gains allowed to trigger vmiso Thursday, April,

vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso Direct Tx. Tx. NvMISO erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO 8 8 7 7 ect Tx. MISO rfect NACK NvMISO Inter Packet Transmission Time (ms) Time seconds Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows........... Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,

vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO 8 8 7 7 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) Time seconds Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows........... Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,

vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Time seconds Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows........... Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,

vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows........... Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,

vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Why it works? Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows........... Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,

vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Why it works? educe aggressiveness Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows........... Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,

vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Why it works? educe aggressiveness educe Footprint Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows........... Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,

vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Why it works? educe aggressiveness educe Footprint Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows........... (a) Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. Even a simple policy can be highly efficient in large networks (b) Flows Flows Flows Flows Flows..... Thursday, April,

Conclusion Objective: To develop a comprehensive understanding of vmiso in the context of WLANs that, leads to the design of trigger policies that maximize throughput performance gains Demonstrated that cooperation is able to achieve very high gains at atomic level scenarios However, the magnitude of these gains decrease at networkscale scenarios Nonetheless, simple trigger policies can have a significant positive impact on the performance of vmiso Thursday, April,

Thank You! Thursday, April,

Virtual MISO Triggers in Wi-Fi-like Networks Oscar Bejarano Edward W. Knightly Thursday, April,