Exploiting Diversity in Wireless Networks

43
1 Exploiting Diversity in Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign www.crhc.uiuc.edu/wireless Presentation at Mesh Networking Summit Snoqualmie, WA, June 23-24, 2004

description

Exploiting Diversity in Wireless Networks. Nitin H. Vaidya University of Illinois at Urbana-Champaign www.crhc.uiuc.edu/wireless Presentation at Mesh Networking Summit Snoqualmie, WA, June 23-24, 2004. Capacity of Wireless Networks. Limited by Interference Available spectrum - PowerPoint PPT Presentation

Transcript of Exploiting Diversity in Wireless Networks

Page 1: Exploiting Diversity in Wireless Networks

1

Exploiting Diversity in Wireless Networks

Nitin H. VaidyaUniversity of Illinois at Urbana-Champaign

www.crhc.uiuc.edu/wireless

Presentation at Mesh Networking SummitSnoqualmie, WA, June 23-24, 2004

Page 2: Exploiting Diversity in Wireless Networks

2

Capacity of Wireless Networks

Limited by

Interference Available spectrum

Need to find ways to get most out of availablespectrum

Page 3: Exploiting Diversity in Wireless Networks

3

Diversity / Multiplicity / Heterogeneity

Diversity provides flexibility in using available resources

Can help improve performance

Page 4: Exploiting Diversity in Wireless Networks

4

Diversity / Multiplicity / Heterogeneity

Research Agenda

Abstractions that capture diversity

Protocols that exploit diversity

Page 5: Exploiting Diversity in Wireless Networks

5

Diversity / Heterogeneity

Many dimensions:

Physical layer

Architecture

Upper layer

Page 6: Exploiting Diversity in Wireless Networks

6

Channel Diversity

Page 7: Exploiting Diversity in Wireless Networks

7

Channel Diversity

Multiple channels can help improve performance

Obvious approaches:

•Exploit diversity to choose channel with best gain

•Use multiple channels simultaneously to improve capacity

Developing practical protocols for the “obvious” approaches is still a challenge

Page 8: Exploiting Diversity in Wireless Networks

8

Alternative Approach

Exploit protocol characteristics to benefit from the diversity

Examples:•Pipelining

•Backup routes

Page 9: Exploiting Diversity in Wireless Networks

9

Backoff Data / ACKRTS/CTS

Channel contention resolved using backoff(and optional RTS/CTS)

IEEE 802.11

Page 10: Exploiting Diversity in Wireless Networks

10

Backoff Data / ACKRTS/CTS

Unproductive

Backoff keeps channel idle unproductive Most protocols have such idle contention periods

Simple Observation

Page 11: Exploiting Diversity in Wireless Networks

11

Data / ACK

Backoff RTS/CTS Backoff RTS/CTS RTS/CTSBackoff

Data / ACK

Pipelining Using Multiple Channels

Control Channel: Backoff and RTS/CTS Data Channel: Data and ACK

Stage 1

Stage 2

Page 12: Exploiting Diversity in Wireless Networks

12

Pipelining works well only if pipeline stages are balanced !

Data / ACK

Backoff RTS/CTS Backoff RTS/CTS RTS/CTSBackoff

Data / ACK

Control Channel

Data Channel

Page 13: Exploiting Diversity in Wireless Networks

13

Solution: Partial Pipelining

Only partially resolve channel contention in the pipelined stage

Page 14: Exploiting Diversity in Wireless Networks

14

Partial Pipelining

Stage 1: Narrow-Band Busy Tone Channel Stage 2: Data channel

Data / ACK

Backoff RTS/CTS Backoff RTS/CTS RTS/CTSBackoff

Data / ACK

Control Channel

Data Channel

Page 15: Exploiting Diversity in Wireless Networks

15

Partial Pipelining

No packets transmitted on busy tone channel

Bandwidth can be small

Page 16: Exploiting Diversity in Wireless Networks

16

Partial Pipelining

By migrating backoff to a narrow-band channel, cost of backoff is reduced

Data Channel Bandwidth

Busy Tone Channel Bandwidth Backoff Duration

Area = cost of backoff

Page 17: Exploiting Diversity in Wireless Networks

17

Moral of the Story

Looking beyond physical layerdiversity exploitation schemes helps

Protocol characteristics can be exploited

Page 18: Exploiting Diversity in Wireless Networks

18

Another Example

Page 19: Exploiting Diversity in Wireless Networks

19

Multiple Interfaces

Consider devices equipped with both 802.11a and b

802.11a 802.11b

Higher max rate Lower max rate

Lower range Higher range

Page 20: Exploiting Diversity in Wireless Networks

20

Channel Diversity

802.11b “network”

denser than the 802.11a network but provides lower rate

Example approach:

Use 802.11a as primary network

Use 802.11b network to provide backup routes when 802.11a routes fail

– The 802.11b network could be used for other things too

Page 21: Exploiting Diversity in Wireless Networks

21

Protocol Interactions

For TCP, route failure more painful than a degradation in available capacity

The backup routes can avoid a route failure

Benefits of added capacity can be magnified by exploiting protocol behavior

Page 22: Exploiting Diversity in Wireless Networks

22

Research Agenda

Develop practical protocols that can exploit diversity

Pay attention to protocol characteristics

Page 23: Exploiting Diversity in Wireless Networks

23

Antenna Heterogeneity

Page 24: Exploiting Diversity in Wireless Networks

24

Antenna Heterogeneity

“Fixed beam” antennas prevalent on mobile devices Omnidirectional antennas (often with diversity)

Other antennas likely to become more prevalent Switched, steered, adaptive, smart …

– Can form narrow beamforms, which may be changed over time

Re-configurable antennas– Beamforms can be changed over time by reconfiguring

the antenna, but not necessarily narrow beams

Page 25: Exploiting Diversity in Wireless Networks

25

Antenna Heterogeneity

Beamforms: All antennas are not made equal

Timescale: Can beamforms be changed at packet timescales?

Page 26: Exploiting Diversity in Wireless Networks

26

Protocol Design

Protocols designed for “fixed” beam antennas inadequate with “movable” beam antennas

State of the art

MAC Protocols for specific antenna capabilities

Page 27: Exploiting Diversity in Wireless Networks

27

Research Challenge

How to design “antenna-adaptive” protocols ?

Need to develop suitable antenna abstractions that span a range of antenna designs

Forces us to think about essential characteristics of antennas

– Example: Variability of beamforms a more fundamental property than directionality

Page 28: Exploiting Diversity in Wireless Networks

28

Diversity / Heterogeneity

Many dimensions:

Physical layer

Architecture

Upper layer

Page 29: Exploiting Diversity in Wireless Networks

29

Pure Ad Hoc Networks

No “infrastructure” All communication over (one or more) wireless

hops

EA

B CD

X

Z

Ad hoc connectivity

Y

Page 30: Exploiting Diversity in Wireless Networks

30

Hybrid Networks

Infrastructure + Ad hoc connectivity

EA

B CD

AP1 AP2

X

Z

infrastructure

Ad hoc connectivity

Y

Page 31: Exploiting Diversity in Wireless Networks

31

Hybrid Networks

Infrastructure may include wireless relays

A

CD

AP1 AP2

X

Z

infrastructure

Ad hoc connectivity

Y

B

RP

R

R

Page 32: Exploiting Diversity in Wireless Networks

32

Hybrid Networks

Heterogeneity Some hosts connected to a backbone, most are not Access points/relays may have more processing

capacity, energy

A

CD

AP1 AP2

X

Z

infrastructure

Ad hoc connectivity

Y

B

RP

R

Page 33: Exploiting Diversity in Wireless Networks

33

Heterogeneity Beneficial

Infrastructure provides a frame of reference– Provide location-aware services– Reduce route discovery overhead

AP0 AP1 AP2 AP3

A

B DR2R1 R3

A

Page 34: Exploiting Diversity in Wireless Networks

34

Heterogeneity Beneficial

Reduce diameter of the network Lower delay Potentially greater per-flow throughput

A

CD

AP1 AP2

X

Z

infrastructure

Ad hoc connectivity

Y

B

RP

R

Page 35: Exploiting Diversity in Wireless Networks

35

Infrastructure Facilitates New Trade-Offs (hypothetical curves)

User density distributionaffects the trade-off

Ad hoc-ness

co

nn

ec

tiv

ity

ov

erh

ea

d

Poor Man’s Ad Hoc Network

Page 36: Exploiting Diversity in Wireless Networks

36

Research Issues

How to trade “complexity” with “performance” ?

– Parameterize ad hoc-ness ?

Should the spectrum be divided between infrastructure and ad hoc components?

What functionality for relays / access points?

Page 37: Exploiting Diversity in Wireless Networks

37

Misbehavior

Page 38: Exploiting Diversity in Wireless Networks

38

Misbehavior

Misbehavior occurs with limited resources

Violating protocol specifications benefits misbehaving hosts

Example: Small backoffs in 802.11 higher throughput

Page 39: Exploiting Diversity in Wireless Networks

39

Research Agenda

Protocols that maximize performance while discouraging/penalizing misbehavior

Challenge: Wireless channel prone to temporal and spatial

variations Different players see different channel state Impossible to detect misbehavior 100% reliably

Page 40: Exploiting Diversity in Wireless Networks

40

Conclusions

Page 41: Exploiting Diversity in Wireless Networks

41

Conclusions

Diversity/Heterogeneity natural to wireless networks

Need better abstractions to capture the diversity

Need protocols that can exploit available diversity

Need to be able to survive misbehavior

Page 42: Exploiting Diversity in Wireless Networks

42

Other Research

Distributed algorithms for multi-hop wireless networks

Clock synchronization Message ordering Leader election Mutual exclusion

Page 43: Exploiting Diversity in Wireless Networks

43

Thanks! www.crhc.uiuc.edu/wireless

Advertisement:National Summit for Community Wireless Networks

Urbana-Champaign, IllinoisAugust 20-22, 2004

http://www.cuwireless.net