muhammad mahmudul islam ronald pose carlo kopp school of computer science & software engineering...

44
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Post on 20-Dec-2015

218 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Muhammad Mahmudul Islam

Ronald Pose

Carlo Kopp

School of Computer Science & Software Engineering

Monash University, Australia

Page 2: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Problem Statement

Supporting real-time traffic in multi-hop ad-hoc network (e.g. a SAHN) with a contention based MAC protocol is a challenging task

In a previous paper in WOCN 2005

We have explained the challenges

&

Provided a solution with respect to a SAHN

using IEEE 802.11e operating in EDCA mode

In this paperExtend our previous work

Page 3: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

SAHN: Suburban Ad-Hoc Network

EDCA: Enhanced Distributed Channel Access, an improved version of DCF (Distributed Coordination Function) of legacy 802.11

SAHN-MAC: EDCA of 802.11e + Proposed protocol

Page 4: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Topics Covered

SAHN

Challenges

Solution

Simulation results

Page 5: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

SAHN (Suburban Ad-Hoc Network)

Multi-hop ad-hoc networkMulti-hop ad-hoc network Ideal for cooperative nodesIdeal for cooperative nodes,, ee.g. .g. connecting houses and businessconnecting houses and business Topology is quasiTopology is quasi--staticstatic Uses wireless technologyUses wireless technology Multi-hop QoS routing Multi-hop QoS routing DecentralizedDecentralized Multi MbpsMulti Mbps broadband broadband

serservicevice No charges for No charges for

SAHN trafficSAHN traffic Can run alonCan run alongside gside

TCP/IPTCP/IP Conceived byConceived by Ronald PoseRonald Pose && Carlo KoppCarlo Kopp inin 1997 1997 atat Monash University, A Monash University, Australiaustralia

Page 6: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Simulation Setup

Used GloMoSim (version 2.02)Nodes are separated by at most 240 meters, Nodes use same TX power with a TX range of 240 mUse EDCA of IEEE 802.11e in the link layerPhysical layer uses OFDM with a Physical layer operates at the TX rate of 54 MbpsSession consists of UDP type CBR trafficRouting is done with DSR

Default setup

Page 7: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Challenges (1/9)How to support QoS for real-time traffic?

Prevent network saturation

Why? (Explaining next)

Page 8: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Challenges (2/9) Effect of saturation in network performance (1/2)

B C D EA

For 512 bytes payload, max achievable throughput between AE 5.2 Mbps

Establish a 2.6 Mbps session between AE

Since below saturation

Achieved throughput = 2.6 Mbps

End-to-end delay = 0.9 ms

Page 9: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Challenges (3/9) Effect of saturation in network performance (2/2)

Throughput degraded by 35% (1.7 Mbps)

End-to-end delay increased by 550% (559 ms)At over saturation

1000

0.1

1

10

100

1

2

3

4

5

0

En

d-t

o-en

d d

elay

(m

s)

Th

rou

ghp

ut

(Mb

ps)

End-to-end delay

Throughput

Unsaturated[2.6 + 1.0]

NearSaturation[2.6 + 2.4]

Saturated[2.6 + 2.7]

OverSaturated[2.6 + 4.1]

Initial Load Added Load

Page 10: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Challenges (4/9)

Prevent network saturation

How?

Prevent adding new sessions if they saturate the network

How?

Reserve bandwidth

Bandwidth reservation for multi-hop ad-hoc network with contention based MAC protocol is not trivial

Why? (Explaining next)

Page 11: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Challenges (5/9) Throughput

Amount of data carried from one node to another in a given time period

Expressed in bps

Associated with the application layer

Bandwidth

Bandwidth and throughput are same at the application layer

For adding overheads of different layers

BW at the physical layer > Throughput

Bandwidth Utilization (U) = 100 %Bandwidth Consumed

Total Bandwidth

Page 12: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Challenges (6/9)

Adding

NW & MAC headers & RTS/CTS/ACK overheads

UA 18 % & UB 18 %

BA

B C D EA

Establish a 3.4 Mbps session between end nodes

Each packet = 512 bytes

Effect of multiple hops on U

Page 13: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Challenges (7/9)

Establish a 3.4 Mbps session between AE, Each packet = 512 bytes

B C D EA

G H I JF K Active Participant (α)

Passive Participant (ρ)

U of neighbors may be wasted

Page 14: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Challenges (8/9) Why we need to know U of passive participants?

Add another 3.4 Mbps

session GK

U of some of the nodes exceed their working limits

E.g. UC has to be

128.724%

(72.619 + 56.105)

B C D EA

G H I JF K

Page 15: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Challenges (9/9)

At each α measure U for itself (Usα) and for neighboring ρ (Us

ρ)

At each ρ measure U for itself (Usρ)

How?

How?

Support QoS for real-time traffic

Do not allow new session if it causes the network to get saturated

Allocate BW before establishing a session

Measure BW without choking ongoing sessions

How?

How?

Page 16: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Challenges (9/9)

How?

How?

Support QoS for real-time traffic

Do not allow new session if it causes the network to get saturated

Allocate BW before establishing a session

How?

How? Solution in previous work

At each α measure U for itself (Usα) and for neighboring ρ (Us

ρ)

At each ρ measure U for itself (Usρ)

Measure BW without choking ongoing sessions

Page 17: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Challenges (9/9)

How?

How?

Support QoS for real-time traffic

Do not allow new session if it causes the network to get saturated

Allocate BW before establishing a session

How?

How? In this work

At each α measure U for itself (Usα) and for neighboring ρ (Us

ρ)

At each ρ measure U for itself (Usρ)

Measure BW without choking ongoing sessions

Page 18: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (1/14) Basics of the analytical model

RTS CTS

DATA ACK

A B C D

Interference Zone T1-T2

Step 1 starts at T1 Step 2

Step 3 Step 4 finishes at T2

A single transaction

A B C D A B C D

A B C D A B C D

Page 19: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (2/14)

Base case (it consists of 2 nodes) UsA U of session s at node A

Us(b) base case U of session s

UsA= Us

B = Us(b)

ACKDATACTSRTS

ACK

CTSDATA

RTS

UsB = Us (b)Us

A = Us (b)

A B

Page 20: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (3/14)

Other case (3 nodes)

ACKDATACTSRTS

ACK

CTSDATA

RTS

ACKDATACTSRTS

ACK

CTSDATA

RTS

UsB = 2 x Us (b)

UsC = 2 x Us (b)

UsA = 2 x Us (b)

A B C UsA= Us

B = UsC = 2 x Us(b)

Page 21: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (4/14)

Other case (4 nodes)

ACKDATACTSRTS

ACK

CTSDATA

RTS

ACKDATACTSRTS

ACK

CTSDATA

RTS

ACKDATACTSRTS

ACK

CTSDATA

RTS

UsB = 3 x Us (b)

UsC = 3 x Us (b)

UsA = 2 x Us (b)

UsD = 2 x Us (b)

A B C D

UsA= Us

D = 2 x Us(b)

UsB= Us

C = 3 x Us(b)

Page 22: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (5/14)

Other case (5 nodes)

ACKDATACTSRTS

ACK

CTSDATA

RTS

ACKDATACTSRTS

ACK

CTSDATA

RTS

ACKDATACTSRTS

ACK

CTSDATA

RTS

ACKDATACTSRTS

ACK

CTSDATA

RTS

UsB = 3 x Us (b)

UsC = 4 x Us (b)

UsA = 2 x Us (b)

UsD = 3 x Us (b)

UsE = 2 x Us (b)

A B C D E

UsA= Us

E = 2 x Us(b)

UsB= Us

D = 3 x Us(b)

UsC = 4 x Us(b)

Page 23: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (6/14)

Other case (6 nodes)

ACKDATACTSRTS

ACK

CTSDATA

RTS

ACKDATACTSRTS

ACK

CTSDATA

RTS

ACKDATACTSRTS

ACK

CTSDATA

RTS

ACKDATACTSRTS

ACK

CTSDATA

RTS

UsB = 3 x Us (b)

UsC = 4 x Us (b)

UsA = 2 x Us (b)

UsD = 4 x Us (b)

UsE = 3 x Us (b)

A B C D E

ACKDATACTSRTS

ACK

CTSDATA

RTS

F

UsF = 2 x Us (b)

UsA= Us

F = 2 x Us(b)

UsB= Us

E = 3 x Us(b)

UsC= Us

D = 4 x Us(b)

Page 24: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (7/14)

We can infer Us

α depends on the number of transactions α can hear transferring the same data packet for s

Each transaction involvesa specific link that joins the TX and the RX active participants

5 Nodes

UsA= Us

E = 2 x Us(b)

UsB= Us

D = 3 x Us(b)

UsC = 4 x Us(b)

6 Nodes

UsA= Us

F = 2 x Us(b)

UsB= Us

E = 3 x Us(b)

UsC= Us

D = 4 x Us(b)

2 Nodes

UsA= Us

B = Us(b)3 Nodes

UsA= Us

B = UsC = 2 x Us(b)

4 Nodes

UsA= Us

D = 2 x Us(b)

UsB= Us

C = 3 x Us(b)

Generalized formUs

α= n Us(b) n = number of links an α hears carrying the same data packet for s

Generalized form of the analytical model for Usα

Page 25: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (9/14) Generalized form of the analytical model for Us

ρ (1/6)

G H I JF

A B C DE K

T1 T2 T3 T4

Consider the session s between AD

s consists of a single data packet

Total 3 transactions on links AB, BC & CD during T1-T2, T2-T3 & T3-T4 respectively

E-K are passive participants of s

Page 26: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (9/14)

G H I JF

A B C DE K

T1 T2

T1-T2: UsE = Us

F = UsG = Us

H = Us(b)

Generalized form of the analytical model for Usρ (2/6)

Page 27: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (9/14)

G H I JF

A B C DE K

T2 T3

T1-T2: UsE = Us

F = UsG = Us

H = Us(b)

T2-T3: UsG = Us

H = UsI = Us(b)

Generalized form of the analytical model for Usρ (3/6)

Page 28: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (9/14)

G H I JF

A B C DE K

T3 T4

T1-T2: UsE = Us

F = UsG = Us

H = Us(b)

T2-T3: UsG = Us

H = UsI = Us(b)

T3-T4: UsH = Us

I = UsJ = Us

K = Us(b)

Generalized form of the analytical model for Usρ (4/6)

Page 29: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (9/14)

G H I JF

A B C DE K

T1 T2 T3 T4

T1-T2: UsE = Us

F = UsG = Us

H = Us(b)

T2-T3: UsG = Us

H = UsI = Us(b)

T3-T4: UsH = Us

I = UsJ = Us

K = Us(b)

T1-T4: UsE = 1

Us(b)

UsF = 1

Us(b)

UsG = 2 Us(b) Us

H = 3 Us(b)

UsI = 2 Us(b) Us

J = 1 Us(b) UsK = 1 Us(b)

Generalized form of the analytical model for Usρ (5/6)

Page 30: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (9/14)

G H I JF

A B C DE K

T1 T2 T3

The relationship between UsG & Us(b) depends on the number of links

carrying the same packet for s

Similar relation holds for other passive participants too

T1-T4: UsE = 1

Us(b)

UsF = 1

Us(b)

UsG = 2 Us(b) Us

H = 3 Us(b)

UsI = 2 Us(b) Us

J = 1 Us(b) UsK = 1 Us(b)

Generalized form of the analytical model for Usρ (7/8)

Page 31: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (9/14)

Therefore we can write

Usα/ρ= n Us(b)

n = number of links an α/ρ hears carrying the same data packet for s

Generalized form of the analytical model for Usρ (8/8)

Page 32: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (10/14)

Each active participant has to measure Us

α= n Us(b) Us

ρ= n Us(b)

Each passive participant has to measureUs

ρ= n Us(b)

A session initialization request packet (SIREQ) is sent before a session starts

SIREQ containsThroughput requirement

List of active participants in the route

EstimateUs(b) from Info_1

Estimate the value of n

What to measure?

……….Info_1……….Info_2

………Trivial ………Explaining next

Page 33: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (11/14)

Let NH represent a neighbor of each node within 2–hop radius

Each node knows the following information about NH(1) NH’s geographical location(2) list of the NH’s neighbors and NH’s neighbors’ geographical locations(3) transmission ranges assigned to NH with its neighbors

Info_2 + Info_3

Estimate n

Estimate the value of n

Algorithm

……….Info_3

Page 34: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (12/14)

Let α be the active participant estimating the value of n

Initialize n to 0Makes a list of all active participants (APs) within 2-hop radius. The list (α1, α 2….. α k) including αFor each α i (α 1, α 2….. α k), add 1 to n if

α i = α

α i is neighbor as in Fig (1)

α i is a 2-hop neighbor as in Fig (2) & the TX range of α i+1 α i reaches α

α i is a neighbor as in Fig (3) & the TX range of α i α i+1 reaches α

Estimate n of Usα by an α, i.e. an α is estimating n for itself

αiαi+1 α

RTS, DATA

CTS, ACK CTS, ACK

αi+1αiαRTS, DATA

CTS, ACKRTS, DATA

αi αRTS, DATA

CTS, ACK

(1)

(2)

(3)

Page 35: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (13/14)

Let ρ be a passive participant of α

Initialize n to 0Makes a list of all APs within 2-hop radius of ρ The list (α1, α 2….. α k) including αFor each α i (α 1, α 2….. α k), add 1 to n if

α = α i & ρ is located as in Fig (1) & the TX range of α iα i+1 (α i+1α i) reaches ρ

α = α i & ρ is a 2-hop neighbor as in Fig (2) &the TX range of α i+1α i reaches ρ

α = α i & ρ is a 1-hop neighbor as in Fig (3) & the TX range of α i α i+1 reaches ρ

Estimate n of Usρ by an α, i.e. an α is estimating n for its passive neighbors

αi αi+1

ρ

RTS, DATA

CTS, ACK

CTS, ACK

αi+1αi

ρRTS, DATA

CTS, ACK

RTS, DATA

αi αi+1

RTS, DATA

CTS, ACK

(1)

(2)

(3)

ρCTS, ACKRTS, DATA

Page 36: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Solution (14/14)

Let ρ be a passive participant overhearing a SIREQ

Initialize n to 0Makes a list of all APs within 2-hop radius of ρ The list (α1, α 2….. α k)For each α i (α 1, α 2….. α k), add 1 to n if

ρ is located as in Fig (1) & the TX range of α iα i+1 (α i+1α i) reaches ρ

α i is a 2-hop neighbor of ρ as in Fig (2) &the TX range of α i+1α i reaches ρ

α i is a 1-hop neighbor as in Fig (3) & the TX range of α i α i+1 reaches ρ

Estimate n of Usρ by a ρ, i.e. a ρ is estimating n for itself

αi αi+1

ρ

RTS, DATA

CTS, ACK

CTS, ACK

αi+1αi

ρRTS, DATA

CTS, ACK

RTS, DATA

αi αi+1

RTS, DATA

CTS, ACK

(1)

(2)

(3)

ρCTS, ACKRTS, DATA

Page 37: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Simulation Setup

30 nodes on a 1500 × 1500 square meters flat terrainEach node had at most 6 neighborsEach simulation run consisted of at most 12 sessionsEach session was offered a load of 1 MbpsA new session was added every 2 secSimulation time for each test case was 50 secFor simplicity all sessions were of the same ACAll established sessions were executed till the end of the simulation runPath length of each route in each test case was fixedPath lengths among various test cases varied between 2-6The avg values of performance metrics were recorded at 1 sec interval

For performance evaluation

Page 38: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Simulation Result (1/5)

SAHN-MAC & 802.11e have been compared with respect to End-to-end delayThroughput Delivery ratio

Delivery ratio is the percentage of data received successfully at the final destination

With the given configurations both SAHN-MAC & 802.11e performed similarly up to path length 3

Page 39: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Simulation Result (2/5)

Path length = 5

Fairly stable

Not stable

Page 40: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Simulation Result (3/5)

Path length = 5

Not stable

Fairly stable

Page 41: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Simulation Result (4/5)

Path length = 5

Not stable

Fairly stable

Page 42: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Simulation Result (5/5)

Additions of new sessions increased network load802.11e cannot stop the network from overloading since it does not have any admission control mechanismSAHN-MAC did not allow any session to initiate if the new session could choke ongoing sessionsThus SAHN-MAC maintains fairly stable network performance compared to 802.11e

Summary of performance evaluation

Page 43: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Conclusion

Extended initial SAHN-MAC by considering neighboring nodes in bandwidth calculationSimulation results show SAHN-MAC can support fairly deterministic QoS which important for real-time trafficAt present we are extending SAHN-MAC for multiple frequency channels & directional antennasWe would also like to build a scheduling scheme at the MAC layer to handle different classes of traffic efficiently

Page 44: Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia

Questions

Thank you