The Fundamental Role of Hop Distance in IEEE 80.11 Multi-Hop Ad Hoc Networks IEEE ICNP 2005 Authors: Yan Gao, Dah-Ming Chiu and John C.S. Lui [1]: Offered Load Control in IEEE 802.11 Multi-Hop Ad-Hoc Networks, MASS’04 Ping Chung Ng and Soung Chang Liew The Chinese University of Hong Kong April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 1 Motivation How to maximize throughput of a multi-hop flow? Study the factor: Problem considered: • Hop distance (the link length) • • • • Hidden terminals Exposed terminals and Signal capture Collisions caused by contention ignored! Exemplary scenario: • Chain topology (one-dimension) April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 2 Outline Hidden terminal problem revisited • • Physical hidden nodes Protocol hidden nodes • Signal capture • Effect on throughput Analysis of one-dimension network • • • Collision probability Derive a fixed point equation Discussion – why hop distance is important? Conclusion April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 3 Hidden Terminal Problem Revisited Physical hidden nodes: 1->2 2 Rtx 3 d Rtx 4 1 Ri Rcs Rcs April 12, 2006 Protocol hidden nodes: 5->6 5 6 Rtx: transmission range Ri: interference range Signal transmitted in this range But outside of Rtx will corrupt the signal received by node 4 Assume loss factor = 4, Ri = 1.78d Rcs: Sensing range Chunyu Hu, University of Illinois at Urbana-Champaign 4 Timeline 2 Rtx 3 d Comment: Does this problem really exist? Hint: Check the implementation of the interference model in ns2. Rtx 4 1 Ri 5 Rcs Rcs 5 6 4 3 1 April 12, 2006 6 Chunyu Hu, University of Illinois at Urbana-Champaign 2 5 Signal Capture Focused scenario: Both node 4 and node 7 have packets to transmit. Assume capture threshold CPThresh = 10 and path loss factor = 4. At receiver node 5: SNR = P4/P7 = (2d/d)^4 =16 > 10 However, due to signal capture, if the transmission 7->8 starts first, then node 5 will experience a collision! (Q: why node 5 captures on a signal with strength below RXThresh? ) April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 6 Effect on Throughput Notations: • • • • [0, Time] – time interval considered (long duration) Si – the airtime within [0, Time] that node i transmits in “steady-state” • • Includes DATA + SIFS + ACK + DIFS + retransmission time Not include backoff time slots x – Si/Time – the collision probability experienced by a transmission Assumptions: • • Ignore collisions caused by contention and exposed terminal problems. That is, only consider collisions caused by the hidden nodes. April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 7 Vulnerable Period induced by Hidden Nodes The hidden terminal problem occurs when • • The transmission of nodes 4 and 7 overlaps, and The transmission of node 7 starts first. Note: • • • • • S4, S5 and S6 are non-overlapping Collision prob. S5, S6 and S7 are non-overlapping Node 5 and 6 use together 2x percentage of time in [0, Time] The remaining time in [0, Time] that S4 and S7 may overlap is 1-2x Node 7 uses x transmission time in [0, Time] x The vulnerable period induced by node 7 on node 4 is therefore: HT • a = DATA / (DIFS+DATA+SIFS+ACK) April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 1 2 x 8 a Outline Hidden terminal problem revisited Analysis of one-dimension network • Physical hidden nodes • Protocol hidden nodes • Signal capture • Effect on throughput • • • Collision probability Derive a fixed point equation Discussion – why hop distance is important? Conclusion April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 9 Analysis of One-Dimension Network Consider one-dimension network with arbitrary node density Analysis flow path • Derive the collision probability = ƒ (x) • Relate and hence x to the attempt prob. Pt • Already know Pt = G() • Solve the fixed point equation April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 10 The One-Dimension Network Notations: • • • • • – node density, uniquely characterize the network Rcs – sensing range (neighborhood size n = 2Rcs) npr – # of nodes that may cause protocol hidden node problem in the neighborhood of a node nph – # of nodes that may cause physical hidden node problem in the neighborhood of a node d – distance between transmitter and receiver In general, we have: April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 11 Derive Collision Probability Key idea • • Redefine the distance in terms of n (the neighborhood size) • Express the overlapped time between certain nodes based on topological information (that is, ) A generalization of the simple case Any two nodes more than (n-1)/2 apart cannot hear each other and may have overlapped tx time Cnk – the overlapped airtime of two nodes whose distance is (n-1)/2 + k apart. April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 13 Overlapped Airtime Cnk For k=1, For k=2, In general, April 12, 2006 x x n 1 1 x 2 Chunyu Hu, University of Illinois at Urbana-Champaign 14 Derive Collision Probability (cont’d) There are (n-(n-1)/2-k) node pairs that have Cnk as overlapped airtime. The collision probability caused by Cnk: By induction, it can be shown: and hence The overall collision probability April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 15 Outline Hidden terminal problem revisited Analysis of one-dimension network • Physical hidden nodes • Protocol hidden nodes • Signal capture • Effect on throughput • • • Collision probability Derive a fixed point equation Discussion – why hop distance is important? Conclusion April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 16 Derive A Fixed Point Equation Step 1. Derive = ƒ (x) (done) Step 2. x = Pt * T / , where T=DIFS+DATA+SIFS+ACK, = slot time. Step 3. Pt = Pidle * G(), G() is given in the previous presentation. Step 4: Express Pidle in terms of x: Step 5: Obtain the fixed point equation: April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 17 Derive the Throughput Solve the above fixed-point equation, we can obtain x, and so and Pt. Throughput: T Pt (1 ) D data _ rate Where April 12, 2006 Pt is the attempt probability, T/ is the packet transmission time in slots, is the collision probability, D is effective tx time, = DATA/T, data_rate is the data rate, e.g. 11Mbps. Chunyu Hu, University of Illinois at Urbana-Champaign 18 Discussions In single-flow networks, only one protocol hidden node is involved regardless of the hop distance and no physical hidden nodes In two-source string network (See the figure above), the optimal distance is the threshold beyond which physical hidden node problem appears. • • Before a physical hidden nodes joins, the advantage of increasing hop distance dominates the disadvantage Afterwards, the hidden node cause overall degradation April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 19 Simulation Validation Single source April 12, 2006 Two-source Chunyu Hu, University of Illinois at Urbana-Champaign 20 Conclusion Analyze the throughput in a one-dimension network with arbitrary density • • • Because it doesn’t exist in single-source flows Optimal hop distance is the distance beyond which the physical hidden node problem occurs • Consider the protocol hidden node problem Do not consider the physical hidden node problem That means, only occurs in multi-source flows How the physical hidden node problem affects the throughput? April 12, 2006 Chunyu Hu, University of Illinois at Urbana-Champaign 21
© Copyright 2026 Paperzz