A MAC Interaction Aware Routing Metric in Wireless Networks

Similar documents
Anomalies in Optimal Rate-control and Scheduling Protocols for Cognitive Radio Networks

Living with Interference in Unmanaged Wireless. Environments. Intel Research & University of Washington

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

Opportunistic Routing in Wireless Mesh Networks

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

CS434/534: Topics in Networked (Networking) Systems

for Vehicular Ad Hoc Networks

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

Analysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

UNDERSTANDING AND MITIGATING

DOPPLER SHIFT. Thus, the frequency of the received signal is

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks. Plenary Talk at: Jack H. Winters. September 13, 2005

Medium Access Methods. Lecture 9

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Outline / Wireless Networks and Applications Lecture 2: Networking Overview and Wireless Challenges. Protocol and Service Levels

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

Mobile Computing. Chapter 3: Medium Access Control

SourceSync. Exploiting Sender Diversity

Safeguarding Wireless Service Access

Achieving Network Consistency. Octav Chipara

Wireless in the Real World. Principles

APS Implementation over Vehicular Ad Hoc Networks

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee

Wireless Network Security Spring 2016

Wireless Network Security Spring 2015

Medium Access Control

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Wireless TDMA Mesh Networks

ARCH: Prac+cal Channel Hopping for Reliable Home- Area Sensor Networks. Chenyang Lu

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Impact of Radio Irregularity on Wireless Sensor Networks

Wireless Communication

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Cross-layer Approach to Low Energy Wireless Ad Hoc Networks

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks

Cost-Aware Route Selection in Wireless Mesh Networks

The Impact of Channel Bonding on n Network Management

ZigBee Propagation Testing

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

Partial overlapping channels are not damaging

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service

Optimal Multicast Routing in Ad Hoc Networks

Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks

Link Activation with Parallel Interference Cancellation in Multi-hop VANET

Wireless Transmission & Media Access

Design and evaluation of multi-channel operation implementation of ETSI GeoNetworking Protocol for ITS-G5

On the Effects of Node Density and Duty Cycle on Energy Efficiency in Underwater Networks

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 ISSN Md. Delwar Hossain

Experimental Evaluation of Measurement-based SINR Interference Models

Low Spreading Loss in Underwater Acoustic Networks Reduces RTS/CTS Effectiveness

Wireless Network Security Spring 2012

Communication Networks. Braunschweiger Verkehrskolloquium

Local Area Networks NETW 901

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

Distance-Vector Routing

Half- and Full-Duplex FDD Operation in Cellular Multi-Hop Mobile Radio Networks

Minimum Transmission Power Configuration in Real-Time Wireless Sensor Networks

Towards Application Driven Sensor Network Control. Nael Abu-Ghazaleh SUNY Binghamton

Wireless Networked Systems

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Novel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

ns-3 and wifi - An overview of physical layer models

On Spatial Reuse and Capture in Ad Hoc Networks

A survey on broadcast protocols in multihop cognitive radio ad hoc network

Coding for Super Dense Networks 1. JAIST SAST 2015 Nomi, November 2015

Wireless Network Security Spring 2014

Wireless Internet Routing. IEEE s

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu

Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks

LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS

Joint Relaying and Network Coding in Wireless Networks

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks

Lecture 8: Media Access Control

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Evaluation of the 6TiSCH Network Formation

PULSE: A MAC Protocol for RFID Networks

CIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum

Low-Power Interoperability for the IPv6 Internet of Things

D3.2 MAC layer mechanisms and adaptations for Hybrid Terrestrial-Satellite Backhauling

Transcription:

A MAC Interaction Aware Routing Metric in Wireless Networks Saquib Razak 1 Vinay Kolar 1 Nael Abu-Ghazaleh 1,2 1 Department of Computer Science Carnegie Mellon University, Qatar 2 Department of Computer Science State University of New York, Binghamton ACM MSWiM, 2010

Introduction Routing in Multi-Hop Wireless Networks (MHWN) is becoming increasingly important: Mesh networks, Relay Networks,... But, performance of routing is inefficient and unpredictable Complexity of wireless PHY and MAC Far below analytical limits

Motivation There has been a vast number of routing metrics and protocols First generation: Hop-count based Second generation: Link-quality based (e.g., LQSR, ETT) Current routing metrics Account for effect of interference at PHY layer At MAC layer? CSMA effects? Performance penalties? CSMA protocols have many inefficiencies Different type of packet timeouts, exposed terminals, their impact...

Contribution Recent studies: A new approach that quantifies effect of interference at MAC layer Extended to study performance of chains. We propose a routing metric that accounts for detailed CSMA MAC effects

Introduction Introduction Motivation and Contribution Related Work MAC Interactions Interference in Chains CSMA aware routing metrics Self-interference based metric Cross-chain interference based metric Conclusions and Future work

Introduction Introduction Motivation and Contribution Related Work MAC Interactions Interference in Chains CSMA aware routing metrics Self-interference based metric Cross-chain interference based metric Conclusions and Future work

MAC interactions Two-flows under CSMA/CA Discrete number of interaction patterns: 10 categories under SINR model 4 prominent categories: No Interaction Sender Connected Classical Hidden Terminal Capture Effect

No Interaction NI Sender Connected SC D 1 S 1 S 2 D 2 D 1 S 1 S 2 D 2 Hidden Terminal HT (AIS) HT with Capture HTC D 1 S 1 D 2 S 2 D 1 S 1 D 2 S 2

No Interaction NI Sender Connected SC D 1 S 1 S 2 D 2 D 1 S 1 S 2 D 2 Hidden Terminal HT (AIS) HT with Capture HTC D 1 S 1 D 2 S 2 D 1 S 1 D 2 S 2

No Interaction NI Sender Connected SC D 1 S 1 S 2 D 2 D 1 S 1 S 2 D 2 Hidden Terminal HT (AIS) HT with Capture HTC D 1 S 1 D 2 S 2 D 1 S 1 D 2 S 2

No Interaction NI Sender Connected SC D 1 S 1 S 2 D 2 D 1 S 1 S 2 D 2 Hidden Terminal HT (AIS) HT with Capture HTC D 1 S 1 D 2 S 2 D 1 S 1 D 2 S 2

Interference in Chains CSMA interactions affect chain performance Self-interference End-throughput does NOT depend on the interactions Network efficiency depends on the interactions Cross-chain interference Efficiency and vulnerability of a chain depends on Type of interaction: NI > SC > HTC > AIS Location of interaction: Interactions nearer to sources matter the most S H 1 H 2 H 3 H 4 I 1 I 2 I 2 D

Introduction Introduction Motivation and Contribution Related Work MAC Interactions Interference in Chains CSMA aware routing metrics Self-interference based metric Cross-chain interference based metric Conclusions and Future work

CSMA aware routing metrics We propose two metrics MIAR-Self Uses self-interference to assign weights MIAR-Cross Considers interactions between all links in all chains

MIAR-Self Recall: Chain efficiency depends on (type, location) of interactions Idea: Assign route metric based on the type- and location- of its constituent links Approach: Type-cost: NI=0; SC=0; HTC=1; AIS=1.25 Location-cost: 1st hop=1, 2nd = 1 2, 3rd= 1 4,... MIAR-Self(ABCD) = T AB L AB + T BC L BC + T CD L CD

MIAR-Self Protocol A distributed approach to compute and propagate routing metric MIAR-Self(ABCD) = T AB L AB + T BC L BC + T CD L CD = T AB + T BC 2 + T CD 4 = T AB + MIAR-Self(BCD) 2 Propagate routing metric using traditional schemes (RREP, periodic broadcasts)

Performance of MIAR-Self 500 scenarios, 2-chains Average improvement=15% Network efficiency: Lesser network load in 80% of scenarios Self-interference is insufficient Poor performance in 45% of scenarios Cross-chain interactions MIAR-Self

MIAR-Cross Cross-chain interference has large impact But, direct extension of MIAR-Self is not scalable Requires computing of (type, location) tuples for all link-pairs e.g., two 4-hop chains: 10 16 combinations! We empirically learn from simulating large number of scenarios Assign weight to each (type, location) tuple Map the weighted sum of each chain to throughput Solve the system of equations

Centralized MIAR-Cross 1 Assign random min-hop (ETX) route to each connection 2 Evaluate MIAR-Cross for one chain, assume others constant 3 Iterate step 2 until convergence

Performance of MIAR-Cross Two and four 4-hop chains Average improvement=31% Throughput improves in 80% of scenarios Improvement of MIAR-Cross

Introduction Introduction Motivation and Contribution Related Work MAC Interactions Interference in Chains CSMA aware routing metrics Self-interference based metric Cross-chain interference based metric Conclusions and Future work

Conclusions and Future work Proposed two metrics that evaluate CSMA effectiveness in routes Self-interference in a chain Cross-chain interference Significantly improves throughput of weak chains Future Work Quantifying interference above MAC layer is complex, but important Statistical properties of metric that accounts for CSMA interactions Distributed MIAR-Cross protocol

Thank you. For further information, please contact: Saquib Razak: srazak@cmu.edu Vinay Kolar: vkolar@cmu.edu

MIAR-Self in example chain Node B Node A Route MIAR-Self Route MIAR-Self BCEKH 1.25 ABCEKH 2.0 BCEGH 0.0 ABCEGH 1.25 BCDGH 0.0 ABCDGH 0.0 BCFGH 0.0 ABCFGH 1.0 BCFLH 1.25 ABCFLH 1.75 Table: Route metric at nodes B and A. (AB, EK), (AB,EG), (BC,KH) and (BC,LH) have AIS interactions, and pairs (AB, FL) and (AB,FG) have HTC