Granting Silence to Avoid Wireless Collisions

Similar documents
Inverting Wireless Collision Avoidance

15-441: Computer Networking. Wireless Networking

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CSE 461: Wireless Networks

Mohamed Khedr.

CMPE 257: Wireless and Mobile Networking

Interference avoidance in wireless multi-hop networks 1

Wireless MACs: MACAW/802.11

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks

The MAC layer in wireless networks

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Multiple Access in Cellular and Systems

ICE 1332/0715 Mobile Computing (Summer, 2008)

Wireless Communications

Lecture 16: QoS and "

Wireless LANs. Wireless Network

IEEE Medium Access Control. Medium Access Control

Architecture and Evaluation of an Unplanned b Mesh Network

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Multiple Access Links and Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

EMAC: An Asynchronous Routing-Enhanced MAC Protocol in Multi-hop Wireless Networks

Congestions control through cloud computing with MANET

The MAC layer in wireless networks

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

CS263: Wireless Communications and Sensor Networks

EE 122: Ethernet and

Block-switched Networks: A New Paradigm for Wireless Transport

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Embedded Internet and the Internet of Things WS 12/13

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Media Access Control in Ad Hoc Networks

MAC in /20/06

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Mobile Communications Chapter 7: Wireless LANs

Low-Cost Wireless Link Capacity Estimation

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

Wireless Networks (MAC)

MAC LAYER. Murat Demirbas SUNY Buffalo

Analysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Crash Course in Wireless Video

Strengthening Unlicensed Band Wireless Backhaul

Wireless Network Security Spring 2014

Visibility: A New Metric for Protocol Design

Implicit MAC Acknowledgment: An Optimization to

Wireless Network Security Spring 2013

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details

Interference-Aware Wireless Network Optimization

Lecture 17: Wireless Networking"

Wireless Networking & Mobile Computing

Page 1. EEC173B/ECS152C, Spring Wireless Mesh Networks. Wireless LAN or Cellular Networks. Introduction Flow Control Issues Rate Adaptation

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

MSIT 413: Wireless Technologies Week 8

Introduction to IEEE

Collisions & Virtual collisions in IEEE networks

Implementation and Performance Analysis of Cooperative Medium Access Control protocol for CSMA/CA based Technologies

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Network Security Spring 2015

$ " Capacity of Ad Hoc Networks. Physical Layer Issues. Layer 1 Capacity. Path Loss Model. Path Loss Model. Bandwidth of 802.

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

CMPE 257: Wireless and Mobile Networking

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

FSA: A Fast Coordination Scheme for Opportunistic Routing

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Wireless Local Area Network (IEEE )

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks. Networks: Wireless LANs 1

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

High Performance Distributed Coordination Function for Wireless LANs

Link Layer. (continued)

CSMA based Medium Access Control for Wireless Sensor Network

WiFi-Mesh throughput validation

ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks

Ethernet Switches Bridges on Steroids. Ethernet Switches. IEEE Wireless LAN. Ad Hoc Networks

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Data and Computer Communications. Chapter 13 Wireless LANs

Link Layer II: MACA and MACAW

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Medium Access Control Sublayer Chapter 4

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Principles of Wireless Sensor Networks

Novel Techniques for Fair Rate Control in Wireless Mesh Networks

Transcription:

Granting Silence to Avoid Wireless Collisions Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, and Philip Levis October 6, 2010 ICNP 2010

Wireless Mesh and CSMA One UDP flow along a static 4-hop route in 802.11b mesh testbed 2

Wireless Mesh and CSMA One UDP flow along a static 4-hop route in 802.11b mesh testbed Sending more packets causes throughput decrease 3

Self-Interference Packets within a flow collide due to hidden terminals Known problem reported by Li et al.1 and Vyas et al. 2 A Packet 1 B Packet 1 C (1) J. Li, C. Blake, D. S. D. Couto, H. I. Lee, and R. Morris. Capacity of ad hoc wireless networks. ACM MobiCom, 2001 (2) A. Vyas and F. Tobagi. Impact of interference on the throughput of a multihop path in a wireless network. ICST BROADNETS, 2006 4

Self-Interference Packets within a flow collide due to hidden terminals Known problem reported by Li et al.1 and Vyas et al. 2 A Packet 1 Packet 2 B Packet 1 Collision C Packet 1 (1) J. Li, C. Blake, D. S. D. Couto, H. I. Lee, and R. Morris. Capacity of ad hoc wireless networks. ACM MobiCom, 2001 (2) A. Vyas and F. Tobagi. Impact of interference on the throughput of a multihop path in a wireless network. ICST BROADNETS, 2006 5

Practical Solution? Can we fix this problem with existing hardware? One candidate: RTS/CTS A RTS B A CTS B A DATA B A ACK B Can help avoid collisions due to hidden terminals Incurs heavy overhead: Control packets are sent at 1 or 2 Mbps Bitrate CSMA RTS/CTS Overhead 1 Mbps 0.79 0.76 4.0% 2 Mbps 1.44 1.35 6.6% 5.5 Mbps 3.36 2.89 14.1% 11 Mbps 5.89 4.42 25.1% 6

Grant-To-Send (GTS) A novel collision avoidance mechanism for CSMA based wireless mesh networks Instead of avoiding collisions for packets a node would transmit, GTS avoids collisions with packets the node expects to hear A transmitting node grants a clear wireless channel to the receiver Generic: Works for both 802.11 and 802.15.4 No control packets, low overhead, compatible with existing hardware. 7

In a Nutshell Present Grant-to-Send (GTS). Analyze and evaluate GTS through simulations and experiments GTS outperforms CSMA and RTS/CTS 4-hop UDP throughput increases by 23%, 96% of the maximum possible GTS can replace existing per-protocol collision avoidance mechanisms in sensor networks Can prevent inter-protocol interactions 8

Talk Outline Grant-To-Send Mechanism Optimal Grant Duration GTS in 802.11 : UDP Limitations of GTS GTS in 802.15.4 : CTP and Deluge 9

Mechanism Every data transmission contains a grant duration The transmitter and nodes that overhear this transmission must be silent for the duration after the transmission Only the receiver can transmit for the grant duration i.e. the transmitter grants the receiver to send 10

Mechanism Every data transmission contains a grant duration The transmitter and nodes that overhear this transmission must be silent for the duration after the transmission Only the receiver can transmit for the grant duration i.e. the transmitter grants the receiver to send A Packet 1 Packet 2 B Packet 1 Collision C Packet 1 11

Mechanism Every data transmission contains a grant duration The transmitter and nodes that overhear this transmission must be silent for the duration after the transmission Only the receiver can transmit for the grant duration i.e. the transmitter grants the receiver to send A Packet 1 B C 12

Mechanism Every data transmission contains a grant duration The transmitter and nodes that overhear this transmission must be silent for the duration after the transmission Only the receiver can transmit for the grant duration i.e. the transmitter grants the receiver to send A Packet 1 B C 13

Mechanism Every data transmission contains a grant duration The transmitter and nodes that overhear this transmission must be silent for the duration after the transmission Only the receiver can transmit for the grant duration i.e. the transmitter grants the receiver to send A Packet 1 B Packet 1 C 14

Mechanism Every data transmission contains a grant duration The transmitter and nodes that overhear this transmission must be silent for the duration after the transmission Only the receiver can transmit for the grant duration i.e. the transmitter grants the receiver to send A Packet 1 B Packet 1 C 15

Mechanism Every data transmission contains a grant duration The transmitter and nodes that overhear this transmission must be silent for the duration after the transmission Only the receiver can transmit for the grant duration i.e. the transmitter grants the receiver to send A Packet 1 B Packet 1 C Packet 1 16

Mechanism Every data transmission contains a grant duration The transmitter and nodes that overhear this transmission must be silent for the duration after the transmission Only the receiver can transmit for the grant duration i.e. the transmitter grants the receiver to send A Packet 1 B Packet 1 C Packet 1 17

Mechanism Every data transmission contains a grant duration The transmitter and nodes that overhear this transmission must be silent for the duration after the transmission Only the receiver can transmit for the grant duration i.e. the transmitter grants the receiver to send A Packet 1 Packet 2 B Packet 1 C Packet 1 18

Implementation for 802.11 Reuse the Network Allocation Vector field (NAV) Originally, NAV is used to protect the current packet exchange: RTS sets NAV duration CTS+DATA+ACK Original 802.11 Grant-to-Send NAV duration Protects current packet exchange Protects expected response from receiver Suppressed nodes Overhearing nodes Overhearing nodes and transmitter 19

Implementation 802.11 11 lines of driver code No overhead in data packets Works with MadWiFi and ath9k drivers with Atheros cards 802.15.4 50 lines of TinyOS code 9B RAM Both implementations work with existing hardware 20

Talk Outline Grant-To-Send Mechanism Optimal Grant Duration GTS in 802.11 : UDP Limitations of GTS GTS in 802.15.4 : CTP and Deluge 21

Optimal Grant Duration 4-hop experiment 6-hop simulation One packet time seems to be the optimal Intuition: the transmitter and its neighbors wait for the recipient to forward one packet 22

Long and Short Grants Long grants avoid more collisions may cause unnecessary idle times 2p + g = p + g + p Short grants prioritize forwarders waste more channel time due to collisions 3p + g = p + g + p + p Data Flow A B C a 1 a 1 a 1 a 2 Data Flow A B C a 1 a 1 a 1 a 2 a 2 COLLISION D D Backoff Time TX GTS Suppression Backoff Time TX GTS Suppression 23

Analysis 4-hop experiment From analysis, throughput T(g) = B 3+k if g = 0 B 3+ g p B 2+ g p 6-hop simulation if g < p if g p ( k : 0.3~3 ) 1 g : grant duration, p : packet time, B : link capacity (1) A. Vyas and F. Tobagi. Impact of interference on the throughput of a multihop path in a wireless network. ICST BROADNETS, 2006 24

Talk Outline Grant-To-Send Mechanism Optimal Grant Duration GTS in 802.11 : UDP Limitations of GTS GTS in 802.15.4 : CTP and Deluge 25

CSMA, RTS/CTS, and GTS 4-hop static route testbed experiment with 5.5Mbps bitrate GTS achieves 96% of the throughput upper bound 26

CSMA, RTS/CTS, and GTS 4-hop static route testbed experiment with 5.5Mbps bitrate GTS achieves 96% of the throughput upper bound Saturation Saturation 27

Effect of Hop Count 24-node large testbed Spread across 6 floors in our CS building 802.11 Channel 1 iperf measures the throughput of 23 pairs 28

Effect of Hop Count Shorter paths fewer collisions CSMA outperforms RTS/CTS due to no overhead GTS matches CSMA s performance Longer paths more collisions RTS/CTS outperforms CSMA due to better collision avoidance GTS outperforms both RTS/CTS and CSMA GTS matches/outperforms both in any case 29

Talk Outline Grant-To-Send Mechanism Optimal Grant Duration GTS in 802.11 : UDP Limitations of GTS GTS in 802.15.4 : CTP and Deluge 30

Collection Tree Protocol Collects sensor data to gateway by constructing a minimum-cost tree Gateway Multiple converging UDP-like flows: susceptible to intra-flow collisions 31

Collection Tree Protocol Collects sensor data to gateway by constructing a minimum-cost tree Gateway Multiple converging UDP-like flows: susceptible to intra-flow collisions Has built-in collision avoidance mechanism Delays back-to-back transmission by ~2 pkt times 32

Collection Tree Protocol Collects sensor data to gateway by constructing a minimum-cost tree Gateway Multiple converging UDP-like flows: susceptible to intra-flow collisions Has built-in collision avoidance mechanism Delays back-to-back transmission by ~2 pkt times GTS can substitute the layer 3 mechanism 33

Evaluation on CTP 64-node Mirage testbed Event-triggered collection scenario GTS maintains the throughput while improving end-to-end delivery GTS provides the natural perregion rate limitation 34

Dissemination: Deluge Distributes a large piece of data from a Gateway or source to each node in network Gateway eg: distributing new binary 35

Dissemination: Deluge Distributes a large piece of data from a Gateway or source to each node in network Gateway eg: distributing new binary Steps: Advertisement I have new data 36

Dissemination: Deluge Distributes a large piece of data from a Gateway or source to each node in network Gateway eg: distributing new binary Steps: Advertisement I have new data Request I want new data 37

Dissemination: Deluge Distributes a large piece of data from a Gateway or source to each node in network Gateway eg: distributing new binary Steps: Advertisement I have new data Request I want new data Dissemination Data 38

Deluge and GTS! " # $!$)!$) *+, $!%! ------ ------ $!%! + *+, Deluge requests can lead to a flurry of losses due to hidden terminal %&'( Plain Deluge 39

Deluge and GTS!! " # $!$)!$) *+, $!%! ------ ------ $!%! " # $!$)!$) *+, $!%! -.//0(11(2 $!%! + *+, + *+, Deluge requests can lead to a flurry of losses due to hidden terminal %&'( Plain Deluge %&'( GTS-Deluge GTS: Embed grant for the whole data in requesting packets A non-forwarding example of GTS 40

Talk Outline Grant-To-Send Mechanism Optimal Grant Duration GTS in 802.11 : UDP Limitations of GTS GTS in 802.15.4 : CTP and Deluge 41

Imperfect Grants Granter must guess how long the channel will be used by the grantee Not obvious: variable bit-rate, different packet sizes, retransmissions Can be estimated: e.g. nodes can learn the bit-rate used at the next hop Small grants are better than no grant 42

Inter-Flow Collisions GTS does not address inter-flow collisions Can still benefit when multiple flows are in the same direction (e.g. CTP) Generally hard to address with link-layer mechanisms 2-hop reservation incurs overhead ( GTS + network coding ) can be an answer 43

Is Collision a Problem? Collision can be recovered using various PHY-layer techniques E.g. ZigZag, ANC, SIC, etc. Require a new hardware Does not mean any collision can be recovered Hard to recover collisions with more than 2~3 concurrent packets Can work together with GTS 44

Conclusions A simple and inexpensive collision avoidance mechanism for wireless mesh Backwards-compatible with existing 802.11 802.11 respects grants, GTS respects 802.11 Nodes talking to AP behaves like normal CSMA GTS outperforms CSMA and RTS/CTS without incurring overhead 45

Thank You! 46

Grant-To-Send (GTS) A novel collision avoidance mechanism for CSMA based wireless mesh networks Instead of avoiding collisions with packets to be sent, GTS avoids collisions with packets the node expects to hear Eg: Grant forwarding node channel access to forward data packet out of interference range No control packets. 0-2 bytes overhead in data packets Simple and general 802.11: completely backwards compatible with 11 lines of driver code change w/ existing hardware 802.15.4: 50 lines of TinyOS codes with 9B RAM 47

Backup: TCP Performance Similar performance gain for GTS as UDP RTS/CTS shows poor performance Larger overhead for short packets GTS and CSMA achieves only ~2/3 of the UDP throughput Hops # Pairs GTS CSMA RTS/CTS 1 2 2.25 2.21 (2%) 1.91 (18%) 2 6 0.77 0.72 (7%) 0.61 (26%) 3 6 0.51 0.44 (16%) 0.24 (113%) 4 8 0.46 0.31 (48%) 0.18 (156%) 5 1 0.50 0.39 (28%) 0.28 (79%) Total 23 0.71 0.62 (15%) 0.46 (53%) 48

Backup: Sending Fewer Acks TCP performance bottleneck in wireless mesh may be DATA-ACK collisions Filtering ACK packets gives higher GTS performance 49