Download Mobility Control

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Zero-configuration networking wikipedia , lookup

Backpressure routing wikipedia , lookup

CAN bus wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Wireless security wikipedia , lookup

Distributed firewall wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Computer network wikipedia , lookup

Network tap wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Peer-to-peer wikipedia , lookup

Throughput wikipedia , lookup

Airborne Networking wikipedia , lookup

Transcript
Mobility Control for Throughput
Maximization in Ad Hoc
Networks
Tamer Nadeem
Siemens Corporate Research
Srinivasan Parthasarathy
University of Maryland
May 2006
Introduction
• Communication in wireless networks is
fundamentally different from wired
networks
– Broadcast nature of the wireless medium.
– Channel error-rates are several times higher
than their wired counterparts.
• Bandwidth is a premium resource in wireless networks.
– Peak data-rates are lower.
– Total available network bandwidth is far less than the sum of its parts.
Optimally utilizing the scarce bandwidth resources
in a wireless network is the key to delivering
acceptable throughput performance to end-users.
2
Throughput Maximization
• Multichannel multi-radio (MCMR) wireless networks [MobiCom
’05, MC2R ’04]
– Nodes equipped with multiple wireless interfaces
– Each operates on a non-interfering channel
• Use of directional antennas [MobiHoc ’03]
– localizes wireless signal propagation to a smaller region to limit
interference
• Hybrid networks [SIGCOMM Computer Communication Review ‘04]
– High-speed wired backbones for connecting different parts of a wireless
network.
Additional investment required for augmenting
network resources could be prohibitively expensive and
limit their applicability in cost-constrained scenarios !?
3
Mobility Control Approach
• Using Controlled Mobility to optimize the structure (topology)
of the network
– During the time of deployment using interference-aware network design.
– Adaptive (re)configuration of the network during its operation.
• Simple distributed mobility control algorithm which guides
nodes towards regions of low-interference in the network
– Using purely local-control strategies.
– Optimize many related objectives (packet losses, fairness, etc.)
• Application:
– Sensor network deployments for long term habitat and environmental
monitoring (Great Duck Island [ACM Communications ’04])
– Self-organizing network of sensing mobile robots for military
surveillance [IEEE Personal Comm. ‘00, ACM Comm. ‘00]
– Wireless mesh networks for connecting remote hosts in rural
communities to the wired Internet [MobiCom ’05]
4
Roadmap
•
•
•
•
•
•
•
•
•
•
Introduction
Proposed Solution
Related Work
Model Assumptions
Basic Idea
Impact of Interference Degree
Quadratic Programming Formulation
Distributed Mobility Control
Performance Evaluation
Conclusions
5
Related Work
• Goldenberg et al. [MobiHoc ‘04] minimize the total energy for routing a
given set of multi-hop flows through controlled mobility.
• Mechanisms for deploying and repositioning mobile gateways, sinks, or
base stations for minimizing energy consumption and prolonging
network lifetime.
– Minimum number of base stations and their locations for coverage in indoor
WLAN networks [ICON ’99, LNCS ’98]
– Gateways in sensor networks to alter its positions to maximize the efficiency of
inter-domain communications [MilCom ’01, Computer Networks ’02, …].
– Controlling the mobility of relaying sensors instead of controlling the sink in
order to prolong network lifetime [MobiCom ’05]
• Exploit mobility of one or more designated nodes in the network to
improve the success probability of end-to-end packet receptions in sparse
ad hoc networks [Infocom ’05, MONET ’05, …].
• Reposition of sensors in mobile sensor networks to compensate the loss
of coverage [MobiHoc ’05, PerCom ’05, …].
6
Model Assumptions
• Network Model
–
–
–
–
Transmission range rtx and Carrier-sense range rcs (> rtx)
Undirected graph G = (V,E), link (u,v)  E if d(u,v) ≤ rtx and data transmission
Interference graph H(V,F), link (u, v)  F if d(u,v) ≤ rcs
(u) is interference degree of u (degree of u in H), max = maxuV (u)
• Mobility Model: Nodes can employ a mobility control algorithm to
choose their locations subject to:
– Network connectivity constraint for each link (u; v)  E
– Physical boundary constraints for each node u of the form x(u)  [xlow(u);
xhigh(u)] and y(u)  [ylow(u); yhigh(u)]
• Metrics:
– Guaranteed throughput by every link in E ( = mineE(e))
– The total network throughput (μ = eE(e))
– The fairness index ( = (eE(e))2 / (|E| eE(e) 2))
7
Basic Idea
Each transmitter/receiver (transceiver) estimates the
amount of interference it experiences currently and
sequentially attempts to move to a new location with lesser
interference, subject to network connectivity and node
boundary constraints.
8
Roadmap
•
•
•
•
•
•
•
•
•
•
Introduction
Proposed Solution
Related Work
Model Assumptions
Basic Idea
Impact of Interference Degree
Quadratic Programming Formulation
Distributed Mobility Control
Performance Evaluation
Conclusions
9
Impact of Interference Degree
• Bianchi showed the total achievable saturation throughput μcliq can be
approximated as follows:
– E[P] is the expected size of the payload, Ts is the average time taken for a
successful packet transmission, Tc is the average length of time the channel is
sensed busy by each node during a collision,  is the duration of an empty slot, K
= √(Tc/(2))
– the guaranteed per-link throughput cliq = μcliq / m
• How does the saturation throughput
of a node depend upon its
interference degree in an arbitrary
multi-hop wireless network?
10
Impact of Interference Degree (cont’d)
• We establish this inverse relationship between the interference degree
and saturation throughput in an arbitrary multihop network using the
following theorem:
– For any given network G = (V,E) whose interference degree is max, the
guaranteed saturation throughput  = 6 μcliq / (max + 1)
• Bianchi equations for μcliq holds only when the number of backoff
stages b and the length of the smallest backoff window W for the
802.11 protocol at each node has been optimized w.r.t. its
interference degree.
– However, the current 802.11 DCF
standard specifies fixed values of
b and W which are specific to the
physical layer but independent of
the node’s interference degree and
the actual total saturation
throughput μ`cliq can be evaluated
11
Quadratic Programming Formulation
• We formulated the minimum-interference network design problem as
a Mixed Integer Quadratic Programming (MIQP).
– The objective of the MIQP is to minimize the network interference
degree max is the subject to network connectivity constraints (4) and
node location constraints (10). The indicator variable zu,v denotes if u and
v interfere with each other: if they do not interfere, i.e., zu,v = 0, then the
interference constraints (5) require that d(u; v) > rcs
12
Distributed Mobility Control
• Algorithm consists of two subroutines:
– Location management
– Token management
• The algorithm works in an iterative fashion
– In each iteration, the token management subroutine ensures that a special control
packet (the token) is passed around exactly once to all nodes within the network.
– The node which currently holds the token is the one which executes the location
management subroutine: this subroutine is responsible for relocating the node to
a new location where it experiences lesser interference without violating its
connectivity and boundary constraints.
• Together, both these subroutines ensure that nodes change their
locations in a coordinated manner such that the network migrates to
progressively better configurations with each iteration.
13
Location Management (Grid Exploration)
– The solid square of length 2rtx is the
box Bu explored by center node.
– The dotted square represents the
boundary constraints for u.
– Box Bu is partitioned into 11 x 11
grids.
– Grid numbers denote the spiral order
used by node u to visit the grids.
14
Roadmap
•
•
•
•
•
•
•
•
•
•
Introduction
Proposed Solution
Related Work
Model Assumptions
Basic Idea
Impact of Interference Degree
Quadratic Programming Formulation
Distributed Mobility Control
Performance Evaluation
Conclusions
15
Performance Evaluation
• ns-2 simulator
–
–
–
–
–
underlying MAC layer is the IEEE 802.11b
Four way handshake (RTS/CTS/DATA/ACK) scheme
data rate of 11 Mbps
Transmission range of 250m and a carrier sense range of 550m
Each connection is a saturated flow of UDP packets of 1000 bytes in size.
• Three distinct network settings:
– linear network of nodes placed on a line-segment of length 4000m with one-hop
data connections
– two dimensional network of nodes placed on a square 1000m X 1000m area with
one-hop connections
– two dimensional network of nodes placed on a square grid (of varying
dimensions) with multi-hop connections
• Independent variables
– total number of nodes
– communication degree of each node
16
Network Throughput
• Total network throughput vs. the
number of network nodes twodimensional networks respectively
– the ‘degree’ parameter for each curve
refers to the per-node communication
degree.
• Observations
– The total network throughput for the
original network topology does not
seem to vary much with the per-node
communication degree.
– The total throughput for the final network topology output by our mobility
control algorithm depends on the per-node communication degree. In
particular, while the mobility control algorithm always seems to yield a final
configuration with a better total throughput than the original configuration, the
extent of improvement is greater when the per-node communication degree is
smaller.
17
Interference Degree
• The maximum interference degree
increases with the number of nodes
in the network, as all of them occupy
a fixed network area.
– The mobility control algorithm is more
effective in reducing the maximum
interference degree, when the
communication degree is lower.
• Reflected in the measurement of
the minimum link throughput.
– High communication degree implies
more connections share the
throughput which accounts for the
low values of guaranteed per-link
throughput.
18
Fairness and Delay
• For communication degree of one, the
mobility controlled has a fairness of 0.9
or above which improves the fairness of
the original topology by above 50%.
– Mobility controlled fairness could be
actually lesser than the original fairness
when the communication degree increases,
even if the minimum link throughput and the
total network throughput increase.
• Mobility controlled topology
experiences a 50% or higher
reduction in the mean delay,
even when the number of
network nodes and the
communication degree
increase.
19
Multi-hop Scenarios
• The source and destination nodes of
each flow are located at the end-points
of the flow.
– The successive nodes in a flow are separated
by distance of 100m.
– The central relay node for three flows share
the same location in the original topology.
• Throughput increased from 3624640bps
to 5131040bps while the maximum
interference reduced from 13 to 2
• Two multi-hop flows
– source and destination nodes for both
the flows are constrained to be fixed in
their given locations.
• Throughput increased from
2045040bps to 3551680bps while
the maximum interference reduced
from 8 to 4.
20
Conclusions
• Explored significant question in ad hoc networks domain, namely,
intelligent mobility control schemes for maximizing the throughput
capacity of ad hoc wireless networks.
• Established the impact of network topology on network throughput.
• Formulated the problem of optimizing the network design to
maximize network capacity, using a mixed integer quadratic
program.
• Demonstrated through extensive packet-level simulations that the
final configurations yielded by our algorithm enjoy significantly
superior throughput and delay characteristics compared to the initial
configurations.
• In the future, we intend to build upon this study by developing
provably-good approximation algorithms for wireless network
design, as well as exploring controlled mobility strategy for
maximizing end-to-end throughput related objectives.
21