1 / 95

Utilizing Beamforming Antennas for Wireless Multi-hop Networks

Utilizing Beamforming Antennas for Wireless Multi-hop Networks. Romit Roy Choudhury Dept. of Computer Science University of Illinois at Urbana-Champaign. Wireless Multihop Networks. Collection of wireless hosts Relay packets on behalf of each other Together form an arbitrary topology

nguyet
Télécharger la présentation

Utilizing Beamforming Antennas for Wireless Multi-hop Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Utilizing Beamforming Antennas for Wireless Multi-hop Networks Romit Roy Choudhury Dept. of Computer Science University of Illinois at Urbana-Champaign

  2. Wireless Multihop Networks • Collection of wireless hosts • Relay packets on behalf of each other • Together form an arbitrary topology • May be connected to wired infratructure • 2 reasons to prefer multihop • Capacity and Power constraint B D A C

  3. Applications • Multihop networks gained wide popularity • Began with military applications • New applications proving to be commercial • Already beginning to appear around us For Example …

  4. Wireless Multihop Networks Sensors RFID Readers RFID RFID

  5. Wireless Multihop Networks

  6. Wireless Multihop Networks

  7. Internet Wireless Multihop Networks

  8. Protocol Design • Numerous challenges • Connectivity (nodes can be mobile) • Capacity (increasing demand) • Reliability (channels fluctuate) • Security • QoS … • Many protocols designed • One commonality among most protocols

  9. Internet Omnidirectional Antennas

  10. RTS = Request To Send CTS = Clear To Send IEEE 802.11 with Omni Antenna M Y S RTS D CTS X K

  11. IEEE 802.11 with Omni Antenna silenced M Y silenced S Data D ACK silenced X K silenced

  12. D G B F C Y A E silenced silenced silenced silenced silenced silenced silenced silenced IEEE 802.11 with Omni Antenna silenced M `` Interference management `` A crucial challenge for dense multihop networks S Data D ACK silenced X K silenced

  13. Managing Interference • Several approaches • Dividing network into different channels • Power control • Rate Control … • Our focus • Exploiting antenna capabilities • Switched Beam Antennas • Steerable Antennas • Reconfigurable Antennas, etc. • Many becoming commercially available For example …

  14. Electronically Steerable Antenna [ATR Japan] • Higher frequency, Smaller size, Lower cost • Capable ofOmnidirectional modeandDirectional mode

  15. Switched and Array Antennas • On poletop or vehicles • Antennas bigger • No power constraint

  16. Antenna Abstraction • 3 Possible antenna modes • Omnidirectional mode • Single Beam mode • Multi-Beam mode • Higher Layer protocols select • Antenna Mode • Direction of Beam

  17. A Antenna Beam • Energy radiated toward desired direction Main Lobe (High gain) A Sidelobes (low gain) Pictorial Model

  18. Directional Reception • Directional reception = Spatial filtering • Interference along straight line joining interferer and receiver C C Signal Signal A B A B Interference D Interference D No Collision at A Collision at A

  19. Will attaching such antennas at the radio layer yield most of the benefits ? Or Is there need for higher layer protocol support ?

  20. We design a simple baseline MAC protocol (a directional version of 802.11) We call this protocol DMAC and investigate its behavior through simulation

  21. DMAC Example • Remain omni while idle • Nodes cannot predict who will trasmit to it Y S D X

  22. RTS DMAC Example • Assume S knows direction of D Y S D X

  23. RTS CTS RTS DATA/ACK X remembers not to initiate transmission toward D DMAC Example Y S D X

  24. Intuitively Performance benefits appear obvious

  25. However … Throughput (Kbps) Sending Rate (Kbps)

  26. Clearly, attaching sophisticated antenna hardware is not sufficient Simulation traces revealed various new challenges Motivates higher layer protocol design

  27. Research Contribution • Identified several new challenges • Designed MAC and Routing protocols • MMAC, ToneDMAC, CaDMAC • DDSR, CaRP • Cross-Layer protocols – Anycasting • Improved understanding of theoretical capacity • Developed prototype testbed

  28. Research Contribution • Identified several new challenges • Designed MAC and Routing protocols • MMAC, ToneDMAC, CaDMAC • DDSR, CaRP • Cross-Layer protocols – Anycasting • Improved understanding of theoretical capacity • Developed prototype testbed

  29. New Challenges [Mobicom 02] Self Interference with Directional MAC

  30. Unutilized Range [Best Paper, PWC 03] • Longer range causes interference downstream • Offsets benefits • Network layer needs to utilize the long range • Or, MAC protocol needs to reduce transmit power Data A D B C route

  31. New Challenges II … New Hidden Terminal Problems with Directional MAC

  32. New Hidden Terminal Problem [IEEE TMC] • Due to gain asymmetry • Node A may not receive CTS from C • i.e., A might be out of DO-range from C CTS RTS Data B A C

  33. New Hidden Terminal Problem • Due to gain asymmetry • Node A later intends to transmit to node B • A cannot carrier-sense B’s transmission to C CTS RTS Data Carrier Sense B A C

  34. New Hidden Terminal Problem • Due to gain asymmetry • Node A may initiate RTS meant for B • A can interfere at C causing collision Collision Data RTS B A C

  35. New Challenges III … Deafness with Directional MAC

  36. Deafness [ICNP 04] • Node N initiates communication to S • S does not respond as S is beamformed toward D • N cannot classify cause of failure • Can be collision or deafness M Data S D RTS N

  37. Channel Underutilized • Collision: N must attempt less often • Deafness: N should attempt more often • Misclassification incurs penalty (similar to TCP) M Data S D RTS N Deafness not a problem with omnidirectional antennas

  38. Deafness and “Deadlock” • Directional sensing and backoff ... • Causes S to always stay beamformed to D • X keeps retransmitting to S without success • Similarly Z to X  a “deadlock” Z DATA RTS S D RTS X

  39. New Challenges IV … MAC-Layer Capture The bottleneck to spatial reuse

  40. Capture [HotNets 03] • Typically, idle nodes remain in omni mode • When signal arrives, nodes get engaged in receiving the packet • Received packet passed to MAC • If packet not meant for that node, it is dropped Wastage because the receiver could accomplish useful communication instead of receiving the unproductive packet

  41. C C D D A B A B B and D beamform to receive arriving signal Capture Example Both B and D are omni when signal arrives from A

  42. Research Contribution • Identified several new challenges • Designed MAC and Routing protocols • MMAC, ToneDMAC, CaDMAC • DDSR, CaRP • Cross-Layer protocols – Anycasting • Improved understanding of theoretical capacity • Developed prototype testbed

  43. C C D D A B A B Impact of Capture Beamforming for transmission and reception only is not sufficient Antenna control necessary during idle state also

  44. MAC Layer Solution • Capture-Aware MAC (CaDMAC) • D monitors all incident traffic • Identifies unproductive traffic • Beams that receive only unproductive packets are turned off • However, turning beams off can prevent useful communication in future C D A B

  45. CaDMAC Time Cycles • CaDMAC turns off beams periodically • Time divided into cycles • Each cycle consists of • Monitoring window + 2.Filtering window cycle 1 2 1 2 1 2 time All beams remain ON, monitors unproductive beams Node turns OFF unproductive beams while it is idle. Can avoid capture

  46. CaDMAC Communication • Transmission / Reception uses only necessary single beam • When node becomes idle, it switches back to appropriate beam pattern • Depending upon current time window

  47. Spatial Reuse in CaDMAC • During Monitoring window, idle nodes are omni C D E A B F

  48. Spatial Reuse in CaDMAC • At the end of Monitoring window CaDMAC identifies unproductive links C D E A B F

  49. Spatial Reuse in CaDMAC • During Filtering window  use spatial filtering Parallel Communications CaDMAC : 3 DMAC & others : ≤ 2 Omni 802.11 : 1 C D E A B F

  50. Network Capacity [TechReport ‘05] • Existing results show • Capacity improvement lower bounded by • Results do not consider side lobes of radiation patterns • We consider main lobe and side lobe gains (gm and gs) • We find capacity upper bounded by • i.e., improvement of CaDMAC still below achievable capacity

More Related