188
TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN IN LOW-POWER WIRELESS NETWORKS by Dongjin Son A Dissertation Presented to the FACULTY OF THE GRADUATE SCHOOL UNIVERSITY OF SOUTHERN CALIFORNIA In Partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY (ELECTRICAL ENGINEERING) December 2007 Copyright 2007 Dongjin Son

TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN

IN LOW-POWER WIRELESS NETWORKS

by

Dongjin Son

A Dissertation Presented to theFACULTY OF THE GRADUATE SCHOOL

UNIVERSITY OF SOUTHERN CALIFORNIAIn Partial Fulfillment of theRequirements for the Degree

DOCTOR OF PHILOSOPHY(ELECTRICAL ENGINEERING)

December 2007

Copyright 2007 Dongjin Son

Page 2: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Dedication

To my Parents, my wife Namhee, and my son Ian.

ii

Page 3: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Acknowledgments

It has been my great honor and pleasure to work with Prof. Bhaskar Krishnamachari

and Prof. John Heidemann at the University of Southern California (USC) and Infor-

mation Sciences Institute (ISI). They have worked together with me and guided me

with wise and intelligent ideas for the entire period of this thesis work. I could learn not

only great research skills, but also their passion, joy for the work and deep love for their

family and people. I do not know how to thank them enough for their great support

and encouragement throughout my study at USC. They have been and will be my role

models for my research with their incredible enthusiasm and sincereness.

I would like to give my special thank to Prof. Cauligi S. Raghavendra, Prof. Ahmed

Helmy, Prof. Gaurav S. Sukhatme, and Prof. Cyrus Shahabi for serving on my qualify-

ing exam and dissertation committees and giving me invaluable suggestions and support

for my dissertation. I would like to also thank my colleagues in Autonomous Networks

Research Group (ANRG) and ISI Laboratory for Embedded Networked Sensor Exper-

imentation (ILENSE). I have been very fortunate to meet these talented and sincere

people with great enthusiasm for their work. They have been very supportive with my

work and always inspire me to greater efforts. I would like to give my special thanks

iii

Page 4: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

to Prof. Wei Ye and earlier graduates Shyam and Marco for their marvelous help and

friendship. Outside of research group members, I want to appreciate my beloved mem-

bers in Good Shepherds Korean Christian Group at USC for their encouragement and

love. Finally, I want to thank my family, especially my mother and wife who have always

supported and believed in me, and my dear Lord.

iv

Page 5: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Table of Contents

Dedication ii

Acknowledgments iii

List Of Tables ix

List Of Figures xi

Abstract xv

Chapter 1 Introduction 11.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.2 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.2.1 Reliable Communication . . . . . . . . . . . . . . . . . . . . . . . 31.2.2 Concurrent Communications Under Interference . . . . . . . . . 5

1.3 Thesis Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61.4 Summary of the Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71.5 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91.6 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Chapter 2 Background on Wireless Communications 122.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122.2 Signal Propagation and Link Quality Models . . . . . . . . . . . . . . . 132.3 Interference Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142.4 Channel Capture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Chapter 3 Related Work 193.1 Low-Power Wireless Channel Characteristics . . . . . . . . . . . . . . . 19

3.1.1 Understanding . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193.1.2 Modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203.1.3 Evaluating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

3.2 Transmission Power Control . . . . . . . . . . . . . . . . . . . . . . . . . 233.2.1 Topology Control . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

v

Page 6: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

3.2.2 Channel Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . 243.3 Concurrent Communication . . . . . . . . . . . . . . . . . . . . . . . . . 26

3.3.1 Capture Effects . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273.3.2 MAC for Concurrent Communication . . . . . . . . . . . . . . . 28

Chapter 4 Transmission Power Control and Blacklisting based Low-Power Wireless Link Quality Control 304.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304.2 Transmission Power Control on a Single Wireless Link . . . . . . . . . . 32

4.2.1 Experiment Methodology . . . . . . . . . . . . . . . . . . . . . . 324.2.2 The Effects of Transmission Power Control on Link Quality . . . 334.2.3 Effects of Different Transmitters on Link Quality . . . . . . . . . 364.2.4 Effects of Different Receivers on Link Quality . . . . . . . . . . . 374.2.5 Effects of Wireless Link Distance (Path Loss) on Link Quality . 384.2.6 Effects of Node Location (Multi-Path) on Link Quality . . . . . 394.2.7 The Effects of Time (Environment) on Link Quality . . . . . . . 434.2.8 Selecting a Transmission Power Level . . . . . . . . . . . . . . . 44

4.3 PCBL: Transmission Power Control with Blacklisting . . . . . . . . . . . 454.3.1 Key Characteristics and Benefits of Our Proposed Scheme . . . . 464.3.2 Basic PCBL Algorithm: Optimization Prior to Routing . . . . . 474.3.3 On-demand Transmission Power Optimization for Each Long-lived

Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494.3.4 Experiment Results for a Single Data Flow . . . . . . . . . . . . 504.3.5 Experiment Results for Multiple Data Flows . . . . . . . . . . . 55

4.3.5.1 PCBL vs M-BL with a Collision Avoidance Scheme . . 564.3.5.2 PCBL vs M-BL without a Collision Avoidance Scheme 594.3.5.3 Multi-hop, Multi-flow Experiments . . . . . . . . . . . . 624.3.5.4 Lessons from the PCBL and M-BL Comparison . . . . 63

4.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

Chapter 5 Experimental Study of Concurrent Transmission in WirelessSensor Networks 665.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665.2 Experimental Methodology . . . . . . . . . . . . . . . . . . . . . . . . . 68

5.2.1 Hardware and Software . . . . . . . . . . . . . . . . . . . . . . . 695.2.2 Measurement Design . . . . . . . . . . . . . . . . . . . . . . . . . 705.2.3 A Regression Model Mapping SINR to PRR . . . . . . . . . . . . 73

5.3 Experimental Study of Single Interferers . . . . . . . . . . . . . . . . . . 745.3.1 Interference and Black-Gray-White Regions . . . . . . . . . . . . 745.3.2 SINR Threshold and Transmitter Hardware . . . . . . . . . . . . 795.3.3 Effects of Location on PRR and SINR . . . . . . . . . . . . . . . 825.3.4 Effect of Sender Signal Strength on the SINR Threshold . . . . . 835.3.5 Testbed Experiments . . . . . . . . . . . . . . . . . . . . . . . . . 87

vi

Page 7: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

5.3.6 Modeling the SINR Threshold . . . . . . . . . . . . . . . . . . . 895.4 Experimental Study of Multiple Interferers . . . . . . . . . . . . . . . . 92

5.4.1 Joint Interference Estimator . . . . . . . . . . . . . . . . . . . . . 925.4.2 Additive Signal Strength Assumption . . . . . . . . . . . . . . . 93

5.4.2.1 Two interferer experiments . . . . . . . . . . . . . . . . 945.4.2.2 Additivity and RIS levels . . . . . . . . . . . . . . . . . 955.4.2.3 Additivity with Additional Interferers . . . . . . . . . . 96

5.4.3 Variation in JRIS Measurements . . . . . . . . . . . . . . . . . . 975.4.4 Effects of Joint Interference . . . . . . . . . . . . . . . . . . . . . 99

5.5 Preliminary evaluation of 802.15.4 Radio . . . . . . . . . . . . . . . . . . 1005.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

Chapter 6 Evaluating the Importance of Concurrent Packet Communi-cation 1056.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056.2 Motivating Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1086.3 Mathematical Modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

6.3.1 Power Setting for CCability . . . . . . . . . . . . . . . . . . . . . 1136.3.2 Topology Condition for CC . . . . . . . . . . . . . . . . . . . . . 1156.3.3 CCability with Limited Power Range . . . . . . . . . . . . . . . . 1166.3.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

6.4 Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1186.4.1 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1186.4.2 Defining Regions of Placement and the CCable Ratio . . . . . . 1206.4.3 Fixed Transmission Power Cases . . . . . . . . . . . . . . . . . . 1226.4.4 User Controllable Parameters . . . . . . . . . . . . . . . . . . . . 123

6.4.4.1 Location Change . . . . . . . . . . . . . . . . . . . . . . 1256.4.4.2 SINR Threshold . . . . . . . . . . . . . . . . . . . . . . 1276.4.4.3 Comparing Fixed and Dynamic Power Control . . . . . 1286.4.4.4 Power Control Granularity . . . . . . . . . . . . . . . . 130

6.4.5 Uncontrollable and Environmental Parameters . . . . . . . . . . 1306.4.5.1 Path Loss Exponent . . . . . . . . . . . . . . . . . . . . 1316.4.5.2 Path Loss Variance . . . . . . . . . . . . . . . . . . . . 132

6.4.6 Capturable Region . . . . . . . . . . . . . . . . . . . . . . . . . . 1336.5 Testbed Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

6.5.1 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1356.5.2 Results from the Outside Scenario . . . . . . . . . . . . . . . . . 1386.5.3 Results from the Inside Scenario . . . . . . . . . . . . . . . . . . 140

6.6 2D Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1416.6.1 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1436.6.2 CCability with Optimal Power Setting . . . . . . . . . . . . . . . 1446.6.3 CCability at Different Power Settings . . . . . . . . . . . . . . . 145

vii

Page 8: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

6.7 Making CCable Decisions in Practice . . . . . . . . . . . . . . . . . . . . 1466.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

Chapter 7 Towards Concurrent Communication in Wireless Networks 1487.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1487.2 MAC Protocol Designs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150

7.2.1 Today’s Practice: CS-RTS/CTS with Simple Power Control . . . 1517.2.2 A Upper Bound on Performance with an Oracle . . . . . . . . . 1517.2.3 Exploiting Power Control and Channel Capture . . . . . . . . . . 1537.2.4 GAPC: Gain-Adaptive Power Control and Capture . . . . . . . . 1547.2.5 Comparing MAC Protocols . . . . . . . . . . . . . . . . . . . . . 156

7.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

Chapter 8 Future Work and Conclusions 1608.1 Future Directions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1608.2 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162

References 164

viii

Page 9: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

List Of Tables

4.1 Key findings from transmission power control study . . . . . . . . . . . 31

4.2 Packet reception rate (%) for the links between node 11 and node 31 atincreased transmission power levels (dBm) . . . . . . . . . . . . . . . . . 34

4.3 Standard deviations for the links with different levels of PRR . . . . . . 44

4.4 Brief PCBL algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

4.5 PCBL algorithm for a long-lived communication . . . . . . . . . . . . . 50

4.6 The energy consumption difference in packet transmission compared tothe PCBL scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

4.7 Four experiment scenario comparison . . . . . . . . . . . . . . . . . . . . 54

4.8 PCBL and M-BL comparison with a collision avoidance . . . . . . . . . 57

4.9 PCBL and M-BL comparison without a collision avoidance . . . . . . . 60

4.10 PCBL and M-BL comparison with a collision avoidance . . . . . . . . . 62

5.1 Key findings from concurrent transmission study . . . . . . . . . . . . . 68

5.2 SINR-to-PRR mapping with region distinction . . . . . . . . . . . . . . 78

5.3 Parameter β1 and 95% confidence intervals for two different locations . . 81

5.4 β1, SINR threshold (SINRθ), and R2 (goodness-of-fit) value for sender SRC2for SRC1-SRC2 pair experiments when we use a fixed β0 . . . . . . . . . . . 84

ix

Page 10: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

5.5 Comparison of JRIS(e) and JRIS(m) metric for JRIS estimation at twodifferent individual RIS levels . . . . . . . . . . . . . . . . . . . . . . . . 96

6.1 Key findings from concurrent communication study . . . . . . . . . . . . 106

x

Page 11: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

List Of Figures

1.1 Effects of wireless communication models . . . . . . . . . . . . . . . . . 2

1.2 PC104 testbed at USC/ISI and a snapshot of link quality: weak, asym-metric, and good links . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.3 Stargate/Stayton testbed at USC/ISI and a snapshot of interferencecaused by one sender’s packet transmission . . . . . . . . . . . . . . . . 5

4.1 Effects of transmitter hardware change . . . . . . . . . . . . . . . . . . . 35

4.2 Effects of receiver hardware change . . . . . . . . . . . . . . . . . . . . . 37

4.3 Effects of link distance change . . . . . . . . . . . . . . . . . . . . . . . . 39

4.4 RSS change at different receiver positions . . . . . . . . . . . . . . . . . 40

4.5 Effects of node location change . . . . . . . . . . . . . . . . . . . . . . . 40

4.6 PRR, RSS and noise level change over time at different transmissionpower levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

4.7 Standard deviation change for different PRR value . . . . . . . . . . . . 44

4.8 Packet delivery rate (PDR) from the experiments with five different powercontrol schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

4.9 Topology changes with different power control schemes . . . . . . . . . . 53

4.10 Stargate node locations for the multiple data flow experiments. . . . . . 55

4.11 Packet delivery rate (PDR) from the experiments with three data flows 57

xi

Page 12: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

5.1 Overview of the testbed with experimental methodology used for timesynchronization, signal strength and PRR measurement . . . . . . . . . 70

5.2 Effects of varying only one sender’s transmission power level on the PRRand RSSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

5.3 Packet reception rate at different RSS combination from two concurrentsenders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

5.4 Effect of different packet sender and interferer hardware on SINR-to-PRRrelationship . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

5.5 Effect of different packet sender and interferer location on SINR-to-PRRrelationship . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

5.6 Experiments with wide range of sender and interferer signal strength.Sender: SRC2, Interferer: SRC1 . . . . . . . . . . . . . . . . . . . . . . . 83

5.7 SINR-to-PRR relationship categorized for different received signal strengthlevels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

5.8 SINR threshold for 0.9 PRR change at different received signal strengthlevel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

5.9 Testbed experiments with 12 neighbor nodes . . . . . . . . . . . . . . . 87

5.10 Effects of introducing new capture-aware simulation model . . . . . . . 88

5.11 The number of CCable link comparison between the two simulation models 90

5.12 Two interferer experiments varying the strength of interference from oneinterferer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

5.13 Experiment results with two interferers (IFR1 and IFR2) causing equiv-alent RIS at the receiver . . . . . . . . . . . . . . . . . . . . . . . . . . 94

5.14 Frequency distribution of JRIS measurement values for two interfererexperiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

5.15 SINR threshold changes with different number of interferers which changesthe received interference strength . . . . . . . . . . . . . . . . . . . . . . 98

xii

Page 13: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

5.16 SINR to PRR relationship: preliminary results with CC2420 radio . . . 102

6.1 Two concurrent packet communications at three different locations . . . 107

6.2 Example scenario with two concurrent packet sender-receiver pairs vary-ing R1-S2 distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

6.3 CCability for different schemes. SINR values are measured at -10 dBmfixed Tx power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

6.4 The CCable transmission power relationship between two senders . . . . 112

6.5 Simulation topology: two sender-receiver pairs . . . . . . . . . . . . . . 118

6.6 Simulation result with area index at fixed transmission power . . . . . . 119

6.7 CCable regions with different fixed transmission power levels . . . . . . 122

6.8 CCable regions and optimal Tx Power for two senders (S1 and S2) varyingdistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

6.9 Comparison of RSS from two concurrent senders (S1 and S2) . . . . . . 125

6.10 CCable regions with different SINRθ . . . . . . . . . . . . . . . . . . . 127

6.11 CCable region comparison with and without power control . . . . . . . . 128

6.12 CCable regions with 8 levels (Mica Z) and 25 levels Tx power control . . 129

6.13 CCable regions with different path loss exponent . . . . . . . . . . . . . 130

6.14 CCable regions with different path loss variance . . . . . . . . . . . . . . 133

6.15 Capturable Regions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

6.16 MicaZ experiment topology with two sender-receiver pairs . . . . . . . . 135

6.17 CCability in the outside testbed experiment as S2 is moved (presentedtogether with the expectation from simulation with our proposed formula)136

6.18 Experimental results at different S2 locations with variable transmissionpowers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

xiii

Page 14: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

6.19 CCability from the inside scenario . . . . . . . . . . . . . . . . . . . . . 141

6.20 2D simulation results with optimal transmission power settings . . . . . 142

7.1 MAC power control comparison of CCability . . . . . . . . . . . . . . . 152

7.2 Comparison of CCable area with limited power levels for five MACs . . 156

7.3 CC plus capture rate comparison with limited power levels . . . . . . . 157

xiv

Page 15: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Abstract

Wireless sensor networks deployed densely for fine-grained monitoring often experi-

ence high channel contention from concurrent packet transmission. The main cause of

concurrency in these networks is the bursty nature of event-based traffic. Co-channel in-

terference from simultaneous transmission is inevitable in wireless communication, and

a better understanding of it is essential for reliable and efficient communication protocol

design.

The central thesis of this dissertation is that interference-aware communica-

tion protocol design can significantly improve the performance of low-power

wireless networks. We substantiate this thesis through four studies. The first is a

systematic experimental evaluation of low-power wireless links involving variable trans-

mission power. The second is an implementation of transmission power control with

blacklisting which ensures link reliability and low-interference. The third is an analysis

of the effects of concurrent packet transmission under single and multiple interferers.

And the final study is an evaluation of how power control can be used to improve

concurrent communication.

xv

Page 16: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

These experimental studies and analyses provide fundamental insights and new

guidelines for interference-aware communication protocol design. They show that sig-

nificant improvement in utilizing constrained wireless channel resources is possible by

embracing concurrency through power control and channel capture.

xvi

Page 17: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Chapter 1

Introduction

1.1 Overview

The instability and unpredictability of low-power wireless channels due to fading, multi-

path, hardware non-ideality, and interference makes it extremely challenging to develop

efficient and reliable communication protocols. By the term low-power, we mean the use

of low cost RF transceivers which require very low power consumption and are normally

optimized for short-range communication with small number of components [10, 11].

Due to their limited cost and size, their overall performance can be different from more

delicate and expensive high-power devices. However, early studies in the context of

mobile ad hoc networks and wireless sensor networks have often been based on idealized

and simplified simulation approximations. While such approximations can be valuable

at establishing bounds on performance and exploring algorithms at a high level, they

can provide misleading results if not used carefully [35, 44, 53].

The most common approximations incorporated in prior wireless communication

protocol design regarding link quality and interference are: (a) distance-based binary

link quality estimation, which assumes perfect reception within a fixed communication

range, and (b) packet collision from any concurrent transmission, which considers any

1

Page 18: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Figure 1.1: Effects of wireless communication models

simultaneous transmission within a communication range from the receiver to be a

packet collision.

Recent empirical studies have shown the limitations of such simplified and conserva-

tive approximations and identified several important characteristics of low-power wire-

less channels [6, 25, 47, 93]. Due to dynamic link quality of low-power wireless networks

understanding and using realistic models of wireless channel is essential for reliable com-

munication protocol design. Understanding the effect of co-channel interference from

simultaneous transmission is important for designing more efficient communication pro-

tocol in densely deployed wireless networks.

We empirically study and understand low-power wireless channels by varying many

related conditions and tunable parameters, especially transmission power, with and

without co-channel interference. Then we provide useful models and guidelines for

interference-aware protocol design, and also propose some protocols that improve the

performance of wireless communications through transmission power control and con-

current packet communication.

2

Page 19: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Figure 1.2: PC104 testbed at USC/ISI and a snapshot of link quality: weak, asymmetric,and good links

1.2 Motivation

We present the relationship between the communication models adopted for wireless

networks and communication protocol design in Figure 1.1. The model of the network

topology depends on the adopted models. This affects the design of communication

protocols, applications, and their theoretical performance analysis. Low-power wireless

networks have been studied and designed using conventional models and assumptions

that are rather simplified, idealized, and conservative. This is mainly due to the com-

plexities inherent in more accurate models and the lack of understanding of wireless

communication under different realistic conditions.

The differences between the reality and commonly used models and assumptions

deteriorate the performance of communication protocols in real systems. In this section,

we introduce two motivations and related problems that initiated our research and that

become the main objectives pursued throughout our study.

1.2.1 Reliable Communication

If we give any wireless network a closer look, we can easily find dynamic communication

links of varying quality. Figure 1.2 shows a snapshot information of the link quality in

3

Page 20: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

packet reception rate (PRR) for every link in our PC104 [23] testbed; We define and

indicate two types of unreliable links with PRR metric in this figure: weak links (with

less than 10% PRR) and asymmetric links (with a good link only in one direction).

In our testbed, every pair of PC104 nodes are connected through a reliable commu-

nication route, in which every communication link is classified as a good link. However,

it is often the case that unreliable links are utilized instead of good communication links

and the throughput of the network is badly affected in our testbed experiments. We

have tested with two variants of the directed diffusion [36, 38] routing protocols; one

phase pull and two phase pull. While two phase pull checks the quality of the links in

communication route between the sender and sink in both directions, one phase pull

checks the link quality of the route only in one direction from the sink to the source.

The end-to-end packet delivery rates with single data flow (at the same experiment

setting as Section 4.3.4) range between 43 to 58 % with one phase pull diffusion and 72 to

83% with two phase pull diffusion experiments without any link quality control scheme.

The performance drop for two phase pull routing mainly originates from the weak links

and dynamic link quality and one phase pull loses many packets from asymmetric link

qualities in selected route.

As the experiment results show, having unreliable links could be worse than having

none of these links at all when bi-directional communication is required and there is a

good communication route to use between two nodes. Therefore, unreliable links need

to be either converted to good links or prevented from use.

If we use transmission power control, we can elevate the quality of wireless links.

However, it comes with some side effects. First, increased transmission power may

generate new weak links with extra signal power that is not yet enough to build new

reliable communication links. Secondly, increased transmission power uses up more

network capacity with stronger interfering signal strength. There is a trade-off between

4

Page 21: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

90

71

70

188

91

193

87

88

72

186

190

85

83

194

75

185

183

192

184

81

191

73

89

76

187

Figure 1.3: Stargate/Stayton testbed at USC/ISI and a snapshot of interference causedby one sender’s packet transmission

the link quality and interference level, but the actual effect of transmission power and its

optimal setting is not obvious for different situations. Our early testbed experience with

some conventional wireless communication protocols motivates the study of low-power

wireless link with transmission power control and its effects; mainly to take the most

advantage from limited channel resource while improving communication reliability by

carefully adjusting transmission power.

1.2.2 Concurrent Communications Under Interference

When we think of a wireless communication, we often imagine it over clear channel

without any interference. However, it is not true in many cases regardless of the strength

of the interference, and it is too ideal and wasteful condition to ensure.

Figure 1.3 shows a snapshot of interference caused by one node’s packet transmission

to its neighbor nodes. Interference level is indicated in two levels based on the measured

received signal strength (RSS) from this packet sender; Solid line means the receiver

can always receive a packet from this interferer meeting the minimum RSS requirement

for successful packet reception, and dotted lines means the lower than required RSS for

packet reception which provides intermediate link quality (i.e., packet reception rate

5

Page 22: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

between 10% and 90%). Each packet transmission in wireless domain causes co-channel

interference to the network and the level of interference is important by deciding the

probability of packet collision under the concurrent transmission or the probability of

control packet reception used by some channel acquisition protocols prior to data packet

transmission.

While interference from packet transmission is endemic in wireless communication,

there is no empirical understanding of the effects of interference on packet communi-

cation (i.e., packet delivery) in low-power wireless networks. It is often the case that

wireless communication protocols are designed to avoid any concurrent packet commu-

nication within the same channel to prevent any possible packet collision caused by

interference from other simultaneous transmissions. This conservative approach low-

ers the utilization of the channel while help improving reliable packet communication.

However, it is not obvious how much benefit we can obtain by having better understand-

ing of co-channel interference and increasing the number of concurrent communications

under interference; particularly with how much additional complexity. In our study, we

want to build up the knowledge about the low-power wireless channel under co-channel

interference from concurrent packet transmission and provide a new design paradigm

towards concurrent communication for communication protocols.

1.3 Thesis Statement

The central thesis of the proposed dissertation is that interference-aware commu-

nication protocol design can significantly improve the performance of low-

power wireless networks.

We substantiate our thesis statement through the four studies summarized in the

following section. The general strategy we follow is that we first exert ourselves to obtain

a better empirical understanding of low-power wireless links under many conditions.

6

Page 23: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Thorough analysis and consequent modeling provides the basis of practical design and

implementation of interference-aware protocols.

1.4 Summary of the Work

First, we perform a systematic experimental study to understand low-power wireless link

characteristics under different settings that are closely related to wireless link quality

(in Section 4.2). Not only we do study the causes of dynamic link quality at static

power level, but we also study the effects of variable transmission power on the link

quality control and evaluate several link quality metrics. Even though there have been

some prior experimental studies [25, 47, 84, 93], there was no systematic study with

variable transmission power and its role as a wireless link quality controller under various

scenarios. This study provides empirical understanding of low-power wireless channel

under transmission power control, which is the key component of interference-aware

protocol design.

Second, we propose a transmission power control with blacklisting (called PCBL)

scheme based on the insights from the low-power wireless link study under variable

transmission power (in Section 4.3). PCBL addresses the problems caused by unreli-

able communication links prevalent in the low-power wireless networks by either adding

or subtracting transmission power to control signal and interference strength, and by

blacklisting unresolved unreliable links with power control. PCBL is implemented and

evaluated on a real testbed both with single and multiple data flows. PCBL provides en-

ergy efficient, low-interference (i.e., better spatial reuse), and reliable multi-hop wireless

communication under traditional collision avoidance scheme which do not allow plural

communications within the same channel.

Third, we study the effects of Concurrent packet transmission (CTX) —by two or

more senders within maximum communication range of each other’s receiver at the same

7

Page 24: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

time over the same channel— under the case with both single and multiple interferers.

Nearly all wireless MAC protocols are designed today with the very conservative as-

sumption that concurrent transmissions should be prevented, because sender-receiver

pairs within radio range sending on the same channel will corrupt each other’s communi-

cation. While recent work has suggested that channel capture effects can be significant

in reality, we thoroughly study the effect of concurrent packet transmission with real

testbed experiments. We introduce a new metric and quantify the significance of cap-

ture effects on the ability to have concurrent communications among two sender-receiver

pairs that are within range of each other.

We have confirmed the capture effect and the existence of the SINR threshold which

ensures the successful delivery of the strongest packet under the concurrent packet

communication situations with single and multiple interferers. We have also observed

some discrepancy between theory and effects of measured interference in low power

RF transceiver hardware. This study provides a better understanding of the effects

of concurrent transmissions, especially on packet delivery, and suggests richer interfer-

ence models and useful guidelines for interference-aware protocol design and improves

performance analysis of higher layer protocols.

Finally, we evaluate the importance of communication protocol design towards con-

current communication (CC)—allowing successful transmissions by two senders within

maximum communication range of each other’s receiver at the same time over the same

channel— in low power wireless networks. The large scale and distributed nature of low-

power wireless networks often requires multi-hop wireless communication. Traditional

collision avoidance schemes, such as RTS/CTS exchange, are proposed to solve hidden

node terminal problem for single hop, direct communication. However, this can be an

inappropriate solution for multi-hop communication. In a multi-hop wireless commu-

nication, resolving the exposed node problem, which define as the case with prohibited

8

Page 25: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

feasible concurrent communication, is as significant issue as providing a collision-free

packet communication, because it can significantly lower the network throughput.

Instead of following conservative approach of traditional collision avoidance, we first

mathematically model the conditions for successful concurrent packet communication

(or packet collision) considering node topology and available power control capability.

Based on this model and new metric for CC, we estimate the benefits from allowing con-

current packet communications with thorough simulations and complementing testbed

experiments. We can observe a large range of topological settings where concurrent

communication is possible (CCable region) using an optimal CCable transmission power

control scheme called oracle, which is based on our mathematical modeling of CCable

conditions. The Oracle scheme provides on upper bound performance of CCability, but

it requires accurate topology and traffic information. As a practical alternative for the

oracle scheme, we introduce a sketch of new MAC protocol, called Gain-Adaptive Power

Control (GAPC), which provides significant benefit with only local information.

1.5 Contributions

The contribution of our study is two-fold. First, we perform systematic measurement

studies in real testbeds to understand and characterize low-power wireless channel bet-

ter. Several related environmental parameters and tunable controls are investigated,

and some useful guidelines of interference-aware protocol design are identified (summa-

rized in Tables 4.1, 5.1, and 6.1). Extensive experimental studies provide fundamental

knowledge about wireless channels and contemporary low-power RF transceiver hard-

ware. Our empirical studies are especially focused on the effect of transmission power

control and the effects of concurrent packet transmission because they are key elements

of our interference-aware protocol design.

9

Page 26: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Second, we introduce practical models and protocols based on the observations and

analysis obtained from testbed experiments. We propose a new model for interference

simulation (in Section 5.3.6) and identify topological conditions for concurrent commu-

nication (in Section 6.3.2) and its corresponding optimal transmission power setting (in

Section 6.3.1). We design two interference aware protocols; First one is called PCBL,

which combines transmission power control with link level blacklisting (introduced in

Section 4.3). This minimizes network interference while improving reliability of commu-

nication links in dense networks. The second one is called gain adaptive power control

(GAPC), which improves the probability of successful concurrent packet communica-

tion only with minimum local information (introduced in Section 7.2.4). We believe

this work establishes an essential direction for future wireless communication proto-

col, especially MAC design, away from the use of carrier sense and RTS/CTS to avoid

concurrent communication, instead embracing concurrency through power control and

channel capture.

1.6 Organization

The remainder of this dissertation is organized as follows. We first provide some back-

ground on wireless communication related to our study and discuss related work re-

spectively in Chapter 2 and 3. In Chapter 4, we study low power wireless links under

variable transmission power in real testbed and propose a link quality control scheme

which combines power control with link blacklisting. In Chapter 5, we present em-

pirical study of concurrent transmission in low-power wireless networks to understand

the effects of co-channel interference from simultaneous packet transmissions. Next, we

study the feasibility of concurrent communication on the same channel, and propose a

sketch of new medium access control protocol which allows concurrent communication

10

Page 27: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

and improves channel capacity in Chapter 6 and 7. Finally, we identify some remaining

challenges and discuss directions for future work and then conclude.

11

Page 28: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Chapter 2

Background on Wireless Communications

2.1 Introduction

Wireless communication is a general trend in networking personal computers as well as

prevalent ad-hoc, embedded systems including sensor nodes. The main advantage and

attraction of wireless communication is its convenience and the freedom and mobility

obtained from untethered communication. Deployments can be easier and faster, and

management of the system can be more convenient especially in harsh and dynamic

environment.

However, as an unstable and insecure communication medium, the wireless domain

brings huge complexity in communication protocol design. But this complexity has been

mostly hidden under simplified approximations.

Recently, there are increasing number of research efforts that revisit popular, tradi-

tional assumptions and unveil the complexities of wireless communication in order to

reduce the wastage of network capability due to simplified and inaccurate approxima-

tions, and to take advantage of special characteristics that exist in the wireless domain.

12

Page 29: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

In this chapter, we discuss some foundational details mostly developed by other

researchers to provide background knowledge of wireless communication; especially fo-

cusing on the topic related to our main work. We will also provide some basic definitions

we will use in the rest of the thesis.

2.2 Signal Propagation and Link Quality Models

Signal propagation in wireless communication is complicated due to significant change

in received signal mainly from large-scale path loss and small-scale multipath fading [65]

The simplest model is the free space propagation model. This predicts the received

signal strength solely based on the distance between the sender and receiver when there

exists clear line-of-sight path. However, the high variance in the effect of distance

make this model unsuitable for understanding and analyzing intricate details of wireless

communication.

The most commonly used model for many analytical studies on wireless network is

the exponential path loss model with log-normal fading (presented below). This model

reflects the fading around the same distance from environmental diversity.

PL(d)dB = PL(d0)dBm + 10n log(d/d0) + XσdB(2.1)

Pr(d)dBm = PtdBm− PL(d)dB

Here Pt and Pr are the transmission and reception power in dBm. The sender-

receiver distance is d, and d0 is the reference distance for path loss (PL). Xσ is the

variance in path loss due to multipath fading, modeled as Gaussian random variable

with zero mean and standard deviation σdB. This model defines the path loss and the

received signal strength (RSS) at the receiver at a given transmission power level. It

13

Page 30: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

is hard to use this model to estimate link quality in real systems because radio and

environment specific parameter values are necessary. However, this model is very useful

to create a realistic simulation of wireless channel and to analyze experimental results

to understand wireless link in more detail.

Link quality estimation is closely related topic to the signal propagation model.

Even though it is intuitive to use the signal propagation model to estimate the link

quality based on the estimated received signal strength, one of the most popular way of

link quality estimation has been only based on the maximum communication range of

the transmitter. This assumes 100% packet reception within this fixed communication

range and 0% packet reception outside of this range.

There are more realistic link quality metrics introduced to overcome problem of bi-

nary type link quality approximation, often simply based on link distance [98]. In the

testbed, successful packet reception rate (PRR) can be actually measured with multi-

ple packet transmission efforts. Measured link quality is a good, realistic link quality

estimator, but not ideal metric to use due to its significant overhead, especially for

the dynamic environment. Some radios provide a link quality information; for example

CC2440 radio provide link quality indicator (LQI) values as well as RSS measurements.

Close correlation between RSS and PRR is experimentally presented in [16].

We will discuss further about some novel link quality estimators in related work (in

Section 3.1.3).

2.3 Interference Models

Developing a realistic interference model has a significant importance in low-power wire-

less sensor networks. This is because of the high probability of concurrent packet trans-

missions that become a major source of interference. Fine grained monitoring in wireless

sensor networks necessitates dense deployment of inexpensive nodes, and it increases the

14

Page 31: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

chance of concurrent packet transmission. Moreover, sensor-actuated or user-initiated

(or sink-initiated) bursty nature of packet transmissions, which normally travel mul-

tiple hops, also increase channel contention and the probability of concurrent packet

transmissions within a shared wireless medium.

Interference models are introduced and used mainly for two purposes. First, to

define the conditions for a successful packet communication (or a packet collision), and

set the boundary of communication and interference. Second, they are used to estimate

and represent the level of interference on the network or on each node based on the

network topology either with or without considering traffic condition.

There are again two kinds of conditions and requirements for a successful packet

communications. First are the conditions which decide the success of packet reception

at the receiver, and the second are the conditions implied by the upper layer proto-

col to meet their design requirements. For example, some MAC protocols only require

the clear channel at the receiver (called Receiver Conflict Avoidance), while some re-

quires the clear channel at the sender as well as receiver for a feedback reception (called

Transmitter-Receiver Conflict Avoidance). While we are interested in understanding

wireless channels and improving protocol design rather than studying the effect of in-

terference under a certain protocol, we mainly focus on the first condition in our work.

There are two widely utilized models for successful wireless communication: the pro-

tocol model, and the physical model [32]. In the protocol model, which is implemented

by many state-of-the-art wireless network simulators, concurrent transmissions from

any node within a given range (referred to as the interference range) of the intended

receiver is considered to cause a packet collision that results in the loss of a packet from

its corresponding sender. This model is solely based on the distance between the nodes,

but many recent measurement studies [6, 12, 25, 47, 77, 93] provide conclusive proofs

that communication distance cannot be a good estimator of wireless link quality.

15

Page 32: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

However, in the physical model, the decision of packet reception is based on the

signal-to-interference-plus-noise-ratio (SINR) instead of the physical distance between

the nodes. The physical model is capable of providing more complicate and realistic

modeling and analysis of interference effects because it can distinguish the effect of

different number of interferers and its interfering signal strength which protocol model

cannot.

Design of wireless communication protocol grounds on a certain selected interfer-

ence model. While there are increasing number of interference-aware protocols over all

network stacks besides link layer, a realistic interference model is essential factor for the

success of wireless communication protocols.

2.4 Channel Capture

In wireless communication, the phenomenon of strongest packet reception under con-

current packet transmissions within a same channel is called capture effect. This is also

known as physical layer capture [80] or FM capture [48].

There is a minimum ratio value between the signal and interference plus noise

strength which ensures the reception of the strongest packet. We define this as a signal-

to-interference-plus-noise ratio threshold (SINR threshold), and the following formula

presents this relation.

SINRdB =Pt(S)GS,R∑

i∈IFR Pt(i)Gi,iR + NR≥ SINRθRdB

(2.2)

Here S and R indicate an intended sender and its receiver. IFR means the set of

interferers, and i and iR indicate a single interferer and its corresponding receiver. Pt(s)

denotes the transmission power of the sender or interferer s, and Gs,r denotes the gain

16

Page 33: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

of the link between the sender s and receiver r. NR means the ambient noise level at

the intended receiver R. SINRθR means the SINR threshold required for the intended

receiver R.

SINR threshold varies with implementation details of modulation scheme. Modu-

lation techniques that increase the signal’s resistance to interference, such as spread

spectrum technique, can greatly reduce the SINR threshold value, and improves the

successful packet communication under co-channel interference.

With a given SINR threshold value and interference plus noise level, a node can

control its channel accessability with transmission power control. Extra transmission

power can improve the SINR value and power control capability is very important in

exploiting capture effect by controlling the signal and interference levels.

One caveat of capture effect is that timing of packet transmission could be an im-

portant factor to the success of channel capture. This is related to the implementation

of physical layer which detects and delivers a packet to the upper layer of the proto-

col stack. Normally once a node detects the preamble of a packet it stops preamble

searching until the end of the detected packet reception time. Therefore if the strongest

packet arrives at the receiver later than weaker packet, there is no chance of detect-

ing strongest packet at the receiver [83]; Similarly if the strongest packet arrives first,

collision of other weaker packets cannot be detected at the receiver. Therefore, imple-

mentation of a packet detection scheme (such as [43, 83]) is required in the context of

simultaneous packet transmission, especially with partial overlapping of transmission

time, to utilize capture effect. To simplify and ignore this caveat from our study, we

always use or assume synchronized packet transmission from concurrent senders.

From several recent empirical studies [39, 43, 79, 83] with low-power RF transceivers,

capture effects have been experimentally tested and the implication of this phenomenon

on protocol design have been presented. In our work, we suggest a interference-aware

17

Page 34: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

protocol design which takes advantages of capture effects. We use transmission power

control to improves the gains from exploiting capture effects.

18

Page 35: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Chapter 3

Related Work

There are three strands of research in the literature that are related to our work: (a)

recent studies of low-power wireless links based on testbed experiments (b) the large

literature on transmission power control in wireless ad hoc and sensor networks (c) study

of capture effect and wireless MAC protocols for concurrent communication.

3.1 Low-Power Wireless Channel Characteristics

3.1.1 Understanding

There have been many recent studies empirically present and address the characteristics

of low-power wireless links. Ganesan et al. present a large scale (about 150 nodes)

empirical study on a mote-based sensor network; identifying the presence of weak links,

link asymmetry and studying their impact on the performance of simple flooding [25].

Zhao and Govindan perform a detailed study of wireless links with motes under

different environments, distances, modulation schemes etc. and identify the existence

of a large gray region in distance between connected and disconnected regions where

links are highly variant and unreliable [93]. The transitional (i.e., gray) region is also

observed by Woo et al. who focus on the problem of neighborhood table management

19

Page 36: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

and propose mechanisms to blacklist unreliable neighbors in order to provide reliable

delivery [84].

Cerpa et al. introduce a system that can be used to study the characteristics of

low power wireless channel. By using the proposed system, called SCALE, they test the

spatial and temporal correlation with link quality. They could not find a clear correlation

between the link distance and any of packet delivery rate, temporal variation of link

quality, and asymmetric links [6]. Later, they further studied temporal properties of

low power wireless links using SCALE system, and proposed two new routing protocols

based on their observations from the large data set [8].

Kotz et al. revisits some of the most common assumptions considered in wire-

less communications with empirical measurements taken from outdoor routing exper-

iments. They provide some recommendations to consider as well as the weakness of

these assumptions [44, 45]. We also performed systematic empirical studies especially

to understand better of low power wireless links under transmission power control (in

Section 4.2.2) and co-channel interference (in Chapter 5, Section 6.5) .

3.1.2 Modeling

Based on growing experiences with low-power radio channels, new wireless communi-

cation models have been also proposed. Cerpa et al. identified the properties of group

links as well as individual links and proposed a series of individual wireless link models

and wireless network generators that can be used for design and simulation of low-power

wireless network protocols [7].

Zuniga and Krishnamachari [98, 99] focus their study on the causes of link unre-

liability and asymmetry observed in the transitional (e.g., gray) region of low-power

20

Page 37: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

wireless link quality. They quantified the impact of transitional regions and also pro-

posed a link quality simulation model mainly based on the link distance considering

related environmental and radio parameter settings.

Zhou et al. study the irregularity of propagated RF signals on different direction.

This study provides a useful radio irregularity model (RIM) reflecting realistic low-power

wireless channel behavior based on empirical results and analyze its impact on upper

layer protocols together with multiple solutions to address radio irregularity [94, 95].

In our study, we introduced several models for low power wireless links including

a regression model mapping SINR to PRR (in Section 5.2.3), SINR threshold simula-

tion model (in Section 5.3.6), and topology and power condition model for concurrent

communication for two senders (in Section 6.3). These models are mainly based on

empirical results from either Mica2 and MicaZ motes, but they can still provide some

useful guidelines and checklists for protocol design with different types of hardware

platforms.

3.1.3 Evaluating

There are multiple ways of evaluating and quantifying single wireless link and multi-hop

communication route with several proposed metrics.

Lal et al. introduce a link quality metric called link inefficiency, which is the mean

number of transmission required for the link to deliver a packet. They propose a rule

to determine this link inefficiency (or link cost) metric based on the measured signal-to-

noise-ratio (SNR) value. Using this rule together with their prior experimental results,

it requires only a few measurements of the channel to estimate link cost metric [47].

Aguayo et al. perform link measurements to study the causes of packet loss in a

802.11 mesh network (Roofnet). They experimentally study several packet loss related

factors such as SINR (which they refer to as S/N ratio), transmit bit-rate, interference,

21

Page 38: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

and multi-path fading. Their experimental results show a wide (greater than 3 dB) gray

region of SINR with intermediate values of packet delivery probability even for the same

receiver. They argue that, for this reason, SINR cannot be used as a reliable predictor

of delivery rate in 802.11 networks [3].

De Couto et al. performed experimental study on 802.11 network and show that why

multi-hop routing based on minimum hop count is not always an optimal answer [13].

They introduce a new link and path metric, called ETX (expected number of transmis-

sions), to improve the delivery performance of multi-hop packet routing [12].

Draves et al. compared three different link quality metrics for multi-hop packet

routing, including ETX, per-hop round trip time (RTT), and per-hop packet pair delay

(PktPair), with minimum hop count metric on 802.11a network. There experimen-

tal results show that ETX performs best for static networks and minimum hop count

performs best with mobile nodes [19].

Seada et al. propose and mathematically analyzed a new metric which is the product

of packet reception rate (PRR) and distance (PRR×DIST). Their proposed metric takes

into account both link distance and quality of the link. With automatic repeat request

(ARG), PRR×DIST metric was optimal choice for a forward metric in their analysis.

Their claim is supported with simulations and testbed experiments [73].

Srinivasan and Levis evaluate and affirm the value of RSSI as a link quality estimator

with CC2420 radio. They compared RSSI with link quality indicator (LQI) provided

by 802.15.4 radio [81]. RSSI and LQI are physical layer information for link quality

estimation, and recently Fonseca et al. proposed a new wireless link estimation which

use protocol independent feedbacks from multiple layers combining physical, link, and

network layer information. Proposed estimation technique can significantly improve

multi-hop packet delivery ratio and its cost [70].

22

Page 39: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

In our study, we mainly use either PRR or SINR metric to evaluate link quality. Our

experimental results show that PRR provides good link quality estimation with good

number of probe packets. This is because it is actual link quality measurement which

includes environmental and hardware factors in it. However, it requires costly process

in terms of packet exchange overhead and time, so we relate SNR/SINR value, which

is a physical layer metric, to PRR, which is a link layer metric (in Section 4.2.4, 5.3.1),

and combines blacklisting (in Section 4.3) to only provide reliable links to network layer.

3.2 Transmission Power Control

Transmission power control plays a key role in interference-aware protocol design by

controlling the intensity of the signal and interference strength. The literature on trans-

mission power control, though quite vast, has hitherto focused on slightly different

concerns and objectives. Two main research interests of the related work on power

control are energy efficient topology control and channel utilization.

3.2.1 Topology Control

One of the main purpose of prior studies with transmission power control was topology

control. The primary goals of topology control are ensuring desirable network connectiv-

ity in energy-efficient way and extending network lifetime. Kubisch et al. proposed two

distributed algorithms which ensures the network connectivity and increases the life-

time of the network [46]. A topology control scheme based on directional information is

discussed in [82], where transmission power is increased until at least one neighbor node

is found in each direction. Kawadia and Kumar proposed several clustering and routing

protocols with power control mainly to improve channel capacity while reducing the

23

Page 40: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

energy consumption for multi-hop packet communication [41]. Power controlled topol-

ogy control mechanisms based on geographical location information are also presented

in [52, 64, 69, 72] to ensure network connectivity with minimal energy consumption.

3.2.2 Channel Capacity

The other main purpose of transmission power control was to improve channel utilization

with a better spatial reuse.

In cellular network, transmission power control has been a key mechanism for im-

proving network capacity from early 1980’s for channelized [24, 31, 59, 91] and CDMA

system [26, 61]. Zander proposed a distributed iterative power control algorithm based

on signal-to-interference ratio which significantly improves network capacity [90] and

synchronous and asynchronous convergence of iterative power control algorithms has

been also presented [24, 88]. Rulnick and Bambos proposed a power control scheme

to provide required level of quality of service for mobile terminals under time-varying

interference [71]. Later, Bambos and Kandukuri advanced this power control scheme

by both considering interference level from its transmission at increased power and the

backlog size from withholding its transmission under strong interference [4].

In multi-hop packet communication network, there is a trade-off between the number

of hops in packet delivery and the level of interference when we adjust packet transmis-

sion power. ElBatt et al. proposed a power management protocol to improve end-to-end

throughput in wireless network by trading increased number of hops with reduced col-

lision and interference. They introduce a concept of cluster and adjust transmission

power for defined clusters to reduce interference and improve network throughput while

providing appropriate network connectivity [21]. Similarly, transmission power control

24

Page 41: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

schemes to increase the network throughput by controlling the number of hops in multi-

hop packet delivery are also discussed in [28, 49, 55]. Park and Sivakumar proposed

transmission power control scheme which considers load condition in the network [62].

There are more than a few MAC protocols which utilize transmission power control,

mainly for energy saving, but which also help to improve spatial reuse of the network.

Basic power control approach is to use minimum required power for data packet com-

munication while preventing collision by transmitting RTS/CTS packets at maximum

power level [2, 29].

Jung and Vaidya proposed a power control MAC (PCM) which use different trans-

mission power for control and data packet. PCM is mainly proposed to improve energy

efficiency while addressing the hidden node problem from asymmetric power allocations

for different data packet communications. PCM uses periodic busy tone to avoid packet

collision from hidden terminals [40]. There are also some other protocols utilize busy

tones for collision avoidance and use RTS/CTS type control packets to estimate optimal

transmission power levels [54, 86].

Transmission power control can cause unfairness problem as well as hidden node

problem. Sheth and Han proposed a reactive power controlled MAC protocol (SHUSH)

to resolve both of these problems. This protocol gives higher priority for the interrupted

node which use extra power for the RTS and first frame of the data packet to silence

interferer [75]. Shih and Chen also address hidden node problem caused by transmission

power control mechanism. They propose a MAC protocol, called Collision Avoidance

Power Control (CAPC), which assigns extra transmission power to resist from possible

interference [76]. This can possibly improve the possibility of concurrent communication,

but the main purpose of their additional power allocation is to mitigate hidden node

problem from asymmetric transmission power distribution.

25

Page 42: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Even though there have been extensive research efforts with transmission power

control in wireless communication, there are few empirical studies that consider trans-

mission power control. We study (in Chapter 4) the effects of transmission power control

on wireless link quality on real sensor network testbed with Mica2 motes. Based on the

insight obtained from testbed experiments, we propose a power control scheme with

link blacklisting to improve link reliability and energy efficiency [77]. Later Lin et al.

proposed an adaptive transmission power control (ATPC) protocol based on the em-

pirical measurements from the MicaZ motes with 802.15.4 radios [11] which reacts to

the temporal change of the link quality with explicit on-demand feedback packets [50].

However, both of these works do not explicitly study the benefits from transmission

power control for concurrent packet communication.

3.3 Concurrent Communication

As described in previous sections, a great deal of prior work has empirically studied

low-power wireless links channel. These works have improved our understanding of the

wireless communication and also provides better communication models and metrics.

However, most of these studies do not consider the situation with co-channel interference

from simultaneous transmission by multiple senders. In fact, a design goal of most

current media-access protocols have been to avoid concurrent transmissions, often within

a two-hop neighborhood of the sender. In this section, some of the works, which are

closely related to our study with concurrency in transmission, will be discussed mainly

focusing on capture effect and MAC protocol design towards concurrent communication.

26

Page 43: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

3.3.1 Capture Effects

In wireless communication community, capture effect, whereby a packet with the stronger

signal strength can be received in spite of a collision, has been a well known phe-

nomenon [18, 30, 48, 87] and various capture models have been proposed and evaluated

mostly for ALOHA networks [33, 60, 67, 68, 74, 92, 97] and recently for some 802.11

networks [34, 42]. The most common model use a constant threshold (called capture ra-

tio) for each modulation and coding scheme with the ratio of the signal strength and the

summation of interference strength. However, these are primarily theoretical studies.

In densely deployed wireless sensor networks, concurrent packet transmission is en-

demic, and recently there have been more than a few empirical studies that explore the

implications of concurrent transmission. One recent paper by Whitehouse et al. [83]

does address wireless link quality in the presence of concurrent transmissions. They

propose a technique to detect and recover packets from collisions taking advantage of

capture effects. Their scheme works by allowing the detection of preambles even during

packet reception. They study the performance of the proposed scheme through exper-

iments with a single interferer and show that the simplistic protocol model (in which

the communication range is chosen to be the interference range) significantly overesti-

mates interference and can result in inefficient MAC design. Our study (presented in

Chapter 5) complements their work by quantifying the SINR conditions under which

the capture effect can be observed (that are the conditions under which their proposed

scheme shows performance gains).

Kochut et al. empirically study capture effect in 802.11b and show that the stronger

signal can still capture a channel even when it does not arrive first at the receiver if

it is still earlier than the end of the first start frame delimiter of weaker signals. They

introduce some fixes for wireless network simulators considering their new capture model

to make them more realistic [43]. However, unlike the ultimate focus in our work, which

27

Page 44: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

is having more concurrent communications, they both study the case where multiple

transmitters send to a common receiver mainly to test capture effects.

Zhou et al. proposed a radio interference detection protocol (RID) which can be

used to measure and share interference information among the neighboring nodes. High

powered control packet is introduced for interference detection and collected information

is stored in the table and can be used for interference-aware protocol design [96].

Reis et al. introduce two physical layer models that provide effective prediction of

the probability of packet delivery under interference from concurrent transmission [66].

These models are based on the RF measurements from real 802.11 testbed.

Recently, Moscibroda et al. analytically and empirically study the inaccuracy and

inefficiency of protocol design based on graph-based model [58], and analyze the capacity

of wireless network with a physical model allowing concurrent communications [56, 57].

3.3.2 MAC for Concurrent Communication

Medium access control protocol manages channel access from multiple contenders, and

several MAC protocols are suggested to improve the number of concurrent communica-

tion taking advantages of capture effects in the wireless networks.

Acharya et al. suggested modification of 802.11 DCF to improve the spatial reuse

by allowing more concurrent communication. There are two main modifications. First,

they add extra time space between the control and data packet. This allow time for

multiple RTS/CTS control packet exchange. Second, RTS/CTS packets include exact

time information for DATA and ACK packet. This extra information enables synchro-

nized transmission for multiple senders [1]. However, they do not utilize transmission

power control, and therefore topologies for concurrent communication is very limited.

Later, Muqattash and Krunz proposed a power control MAC protocol, called POW-

MAC. This protocol utilizes both transmission power control and extra time for a series

28

Page 45: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

of control packet exchange before a data packet transmission, which they call access

window (AW).

Maniezzo et al. proposed an interference-aware (IA) MAC protocol which consider

measured SINR value for medium access decision. By measuring and including addi-

tional information about signal strength within their RTS/CTS type control packets,

they expect up to 30% performance enhancement compared to the basic 802.11 by im-

proving spatial reuse in the network. Their proposed scheme and analysis does not use

transmission power control and does not consider asymmetric link quality prevalent in

low-power radio [9, 51].

ElBatt and Ephremides introduce an algorithm which can identify a set of feasible

concurrent communication and appropriate transmission power settings to make these

communication successful. It uses two alternating phases of scheduling and power con-

trol. Scheduling phase selects a probable set of concurrent communications, and power

control phase finds proper power for each communication. This protocol requires cen-

tral controller for scheduling phase and separate feedback channel to notify SINR value

measured at receiver to its corresponding transmitter [20].

Jamieson et al. [39] consider concurrent transmissions when they investigate MAC

protocol performance by turning on and off the carrier sense functionality at different bit

rates in an 802.11 testbed. They argue that a capture-aware carrier sense mechanism

that considers the bit rates and SINR will improve network efficiency. Our research

shares the same belief. We study SINR threshold for successful packet reception (in

Chapter 5), which provides useful background knowledge for the development of simi-

lar techniques for low-power wireless networks. Subsequently, we verify the feasibility

concurrent communication (in Chapter 6) and introduce a sketch of new medium access

control protocol (in Chapter 7).

29

Page 46: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Chapter 4

Transmission Power Control and Blacklisting based

Low-Power Wireless Link Quality Control

4.1 Overview

Protocol design and its evaluation in low-power wireless networks have considered some-

what simplified and idealized wireless channel approximations. However, recent empir-

ical studies show that communication protocols in real system operation do not match

the results obtained from idealized simulations or analysis. Unstable link quality causes

dynamic network topology, ant this ends up with significant loss in performance and

difficulty in protocol design.

The central thesis of the work presented in this chapter (which appears in [16], [77])

is that efficient control of the link quality is possible by combining transmission power

management with link blacklisting strategies. There has been extensive research on

transmission power control in wireless networks. However, to our knowledge, most

of these studies are based on theoretical analysis or simulations with idealized radio

models. In this chapter we instead take an experimental approach, thus capturing the

full complexities of radio propagation in our testbed. In addition, the primary foci of

prior studies have been the energy consumption and the network capacity gains from

transmission power control; we primarily consider the reliability of the resulting system.

30

Page 47: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Findings from single link experiments Section 4.2Having unreliable links can be worse than having no links 4.2.2Transmission (Tx) power is not an accurate link quality estimator 4.2.3RSS is not a good link quality estimator for different receivers 4.2.4Link distance is not always a good link quality estimator 4.2.5Node location significantly affects link quality due to multi-path 4.2.6Link quality variation over time can be reduced with Tx power control 4.2.7Tx power needs to be set high enough to reduce link quality variation 4.2.8

Findings regarding transmission power control with blacklisting Section 4.3Blacklisting can satisfy protocol’s idealized link quality assumptions 4.3.4Power control can significantly improve the throughput of the network 4.3.5

Table 4.1: Key findings from transmission power control study

Our contribution in the work presented in this chapter is twofold. First, we provide

a thorough experimental study of how low-power wireless communication links behave

with respect to variable transmission power under different settings. This gives us fun-

damental background knowledge of the effects of power control which becomes the main

tunable parameter we use throughout the work in this dissertation. Second, we propose

a transmission power control scheme with blacklisting and evaluate its effectiveness in

link quality control under multi-hop packet delivery scenarios. We list key findings of

this chapter in Table 4.1.

Our experiments investigate the possible reasons of link quality variation and identify

transmission power ranges where link quality shows high variation. Our observations

show that the impact of transmission power on quality of a given link is quite sensitive to

many factors such as node positions, surrounding environment, and individual hardware

differences. We also find that the quality of each link with respect to transmission power

can change over time, and the dynamics of the variable power link quality are different

for distinct links. We conclude that it is useful to develop a per-link quality control

mechanism that chooses a sufficiently high power to reduce link quality variation, while

using blacklisting to remove any links that cannot be made high-quality even with

power-control from the topology.

31

Page 48: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Based on our observations, we propose and evaluate a new transmission power con-

trol scheme called power control with blacklisting (PCBL). The distinguishing charac-

teristic of this scheme is its consideration of empirically determined link quality when

adjusting transmission power. It incorporates the following key elements: 1) packet-

based power control (considering both packet type and destination) 2) metric-based

link quality estimation 3) unreliable link removal (per link or per packet-based black-

listing).

The effectiveness of the transmission power control scheme is evaluated via further

testbed experiments that consider both single and multiple flow scenarios (single-hop as

well as multi-hop). We also consider the performance both with and without collision

avoidance using RTS/CTS messages. In these experiments, we compare the PCBL

scheme with constant power schemes without blacklisting as well as maximum power

with blacklisting. We find that PCBL shows improved reliability and energy-efficiency

under most settings.

4.2 Transmission Power Control on a Single Wireless Link

In this section, we identify the aspects of low power RF wireless links that make many

previously proposed power control schemes difficult to implement in practice. We per-

form systematic experiments on single wireless links varying several key parameters

under different transmission power levels.

4.2.1 Experiment Methodology

The link quality measurements in our testbed show inconsistency for some links within

the transmission range. To identify the cause of this discrepancy and the effects of

transmission power change on the wireless link, we perform systematic experiments

varying some key parameters presumably related to the wireless link quality: hardware

32

Page 49: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

difference, distance between the transmitter and receiver, locations of the nodes, and

time (i.e., surrounding environment change).

Our link quality experiments are performed on a Stargate [37] testbed with Mica2

motes which use CC1000 [10] radio operating at 433 MHz as a RF transceiver. The

Emstar [27] software platform is used for our experiments and data collection.

Experiment results present both packet reception rate (PRR) and received signal

strength (RSS) at the receiver given transmission power level at the sender. These

statistics are based on 50 packet experiments.

Thirteen different transmission power levels ranging from -13 to 10 dBm are tested

in the indoor environment. We also vary node positions and the link distance between

the transmitter and receiver for some experiments. The link distance between the

transmitter and receiver is varied between 6 m and 20 m, and we present some selected

distances which show interesting results.

4.2.2 The Effects of Transmission Power Control on Link Quality

The wireless link quality is closely related to the received signal strength and the trans-

mission power control can be used to adjust the quality of the communication links to

avoid asymmetric or weak links. We define the communication link between two nodes

as a weak link when the qualities of the links in both directions are below the required

reliability. We introduce a good link threshold (THg), which states this reliability re-

quirement, based on PRR. We also define the link with reliable connection in only one

direction as a asymmetric link.

Table 4.2 shows the effect of transmission power increase on the quality of links

between node 11 and 31. The transmission power values in the table represent the

output powers of packet transmitters in dBm. Supported output power range for the

transceiver [10] of mica2 motes ranges between -20 and 10 dBm. The PRR values in both

33

Page 50: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Pwr 0 1 2 4 6 8 10 (dBm)Link11→31 54.3 86.3 92.4 100 100 100 100 (%)31→11 0 27.2 83 85.7 96.8 100 100 (%)

Table 4.2: Packet reception rate (%) for the links between node 11 and node 31 atincreased transmission power levels (dBm)

directions are lower than 90% (which is our THg for reliable communication) at default

transmission power 0 dBm. The PRR of the link from ND11 to ND31 (which is denoted

by LINK11−>31) crosses over THg at the transmission power 2 dBm and the PRR of

LINK31−>11 exceeds THg at the transmission power 6 dBm. The symmetric and weak

links can become good quality with transmission power control as the example shown

in Table 4.2. Not only unreliable links can be converted to a reliable links, but new

communication links can be also discovered and used for packet delivery at the increased

transmission power level. Disconnected nodes in the sparse node area of the network and

in the harsh communication environment might be able to build their connection back

to the network at increased transmission power. The extra energy consumption needed

to convert an unreliable link to reliable link is often very small, especially when the

link quality is near the THg value at default transmission power. The benefits from the

converted reliable links often surpass the increased energy consumption. Our testbed

experiments (in Section 4.3) present the benefits of converted, reliable wireless links

with proposed transmission power control scheme and discuss the relationship between

the link reliability and energy consumption.

When transmission power control is involved in the link quality management, def-

initions of asymmetric links and weak links should be updated. The reason is that

the classifications made at default power may not be valid at other transmission power

levels. We could convert all of the five unreliable links identified in Figure 1.2 to good

links by increasing transmission power levels in our testbed experiments. Therefore, we

34

Page 51: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−12 −10 −8 −6 −4 0 2 4 6 8 100

10

20

30

40

50

60

70

80

90

100

Transmission power (dBm)

PR

R (

%)

From71From72From73From88From90

(a) Tx Power to PRR

−95 −90 −85 −80 −75 −70 −650

10

20

30

40

50

60

70

80

90

100

RSS (dBm)

PR

R (

%)

From71From72From73From88From90

(b) RSS to PRR

0 5 10 15 20 25 300

10

20

30

40

50

60

70

80

90

100

SNR (dB)

PR

R (

%)

From71From72From73From88From90

(c) SNR to PRR

Figure 4.1: Effects of transmitter hardware change. Five different transmitters to thesame receiver.

classify links into three different types (i.e., good, weak, asymmetric) considering the

supported power control capability from the used hardware.

Even though amplified transmission power elevates the quality of wireless links, it

comes with some side effects. First, increased transmission power may generate new

weak links with increased signal strength that is not yet enough to build new reliable

links. We merge a link blacklisting together with our proposed transmission power

control scheme to address this problem. Secondly, increased transmission power uses

up more network capacity. There is a trade-off between the improved link quality and

reduced network capacity.

Our proposed transmission power control scheme does not always increase the trans-

mission power. We only assign a minimum transmission power for the required commu-

nication reliability. Therefore, we lower the transmission power for the links which has

higher than necessary signal power at the receiver with a default transmission power.

Our proposed transmission power control scheme considers these two identified side

effects as well as the benefits of transmission power control.

35

Page 52: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

4.2.3 Effects of Different Transmitters on Link Quality

To see the effect of the transmitter hardware differences on wireless link quality, we

measure link qualities from five different transmitters to a same receiver. From this

experiment, we want to study the significance of transmitter hardware non-ideality

from low-power, low-cost hardware, and its effect on link quality. Every transmitter

uses the same software settings and sends packets from the exact same location to the

static receiver. Both transmitter and receiver are located in the hallway of the building.

The link distance between the transmitter and receiver is 20 m and we measure the link

qualities in both PRR and RSS metric at the receiver for each transmitter varying the

transmission power.

From the experiment results shown in Figure 4.1(a), we can see that the link quality

at the receiver becomes quite different for different transmitters even at the same node

location at the same output power level. When we plot the relationship between the

measured RSS and PRR in Figure 4.1(b), we can see that RSS to PRR relationship is

similar for the five different transmitters. From this experiment, we can see that the

the different link qualities observed with the PRR metric in Figure 4.1(a) results from

the different output signal strength from different transmitters at the same transmission

power setting. Hardware non-ideality causes this inconsistency in actual output power

among different nodes. Figure 4.1(c) shows the signal-to-noise-ratio (SNR) to PRR

relationship. The noise level at the same receiver is about the same and the graph looks

very similar to RSS to PRR relationship, other than the changed x-axis unit.

Some prior studies identified a transitional (or gray) region where PRR is different at

the same link distance [6, 25, 93]. Hardware non-ideality is factor causing transitional

region because it can distinguish link qualities at low transmission power level as the

Figure 4.1 shows. From these experiments, we can see that the transmission power level

cannot be a good estimator of link quality due to hardware variance, and the level of

36

Page 53: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−12 −10 −8 −6 −4 −2 0 2 4 6 8 100

10

20

30

40

50

60

70

80

90

100

Transmission power (dBm)

PR

R (

%)

To71To72To73To88To90

(a) Tx Power to PRR

-95 -90 -85 -80 -75 -70 -650

10

20

30

40

50

60

70

80

90

100

RSS (dBm)

PR

R (

%)

To71To72To73To88To90

(b) RSS to PRR

0 5 10 15 20 25 300

10

20

30

40

50

60

70

80

90

100

SNR (dB)

PR

R (

%)

To71To72To73To88To90

(c) SNR to PRR

Figure 4.2: Effects of receiver hardware change. Same transmitter to five differentreceiver.

link quality variance in real world is closely related to the default transmission power

selection.

4.2.4 Effects of Different Receivers on Link Quality

We also investigate the effects on the link quality when different nodes are placed as

packet receivers. Similar to the experiments with different transmitter hardware (pre-

sented in 4.2.3), we want to study the significance of receiver hardware non-ideality

from low-power, low-cost hardware, and its effect on link quality. We use the exact

same transmitter and receiver positions with 20 m link distance as our previous exper-

iments with transmitter change. Five different receiver nodes are tested with a same

transmitter.

Figure 4.2(a) shows that link quality changes for different receiver nodes even the

same transmitter transmits at the same output power level. RSS to PRR relationship

shown in Figure 4.2(b) still shows big difference for different receiver nodes. This is

because the difference is not coming from the transmitter side.

37

Page 54: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

When we compare the SNR to PRR relationship in Figure 4.2(c), there is much

smaller difference among different receiver nodes. Therefore, we can see that the ob-

served differences in link qualities at different receiver nodes can be attributed to the

different level of ambient noise at the receiver.

In Figure 4.1(a) and 4.2(a), the area in the transmission power range between -6 and

10 dBm shows high variation of link qualities. In this transmission power range, the

quality of each link is different at the same transmission power level and the different

transmission power is required for each link to reach the same PRR level. We call the

range of transmission power that generates this kind of variation unreliable transmission

power range. Outside (either higher or lower side) of the unreliable transmission power

range, the link quality is the same regardless of the selected transmission power level.

The link quality difference observed in unreliable transmission power range can be

avoided by transmission power control in two ways. First, we can assign the same

transmission power outside of the unreliable transmission power range. Second, we can

assign a distinct transmission power for each link to provide a desired link quality level.

From the experiment results, we realize that the transmission power level or the

measured received signal strength (RSS) level may not be an accurate link quality

estimator for different hardware. We can explicitly measure PRR with multiple packets

or use the SNR and PRR pair of information together for a better and efficient link

quality estimation.

4.2.5 Effects of Wireless Link Distance (Path Loss) on Link Quality

We empirically study the effects of the wireless link distance and transmission power

change on the link quality in this section. From this study, we want to examine the

correlation between link distance and link quality, and between transmission power and

38

Page 55: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−12 −10 −8 −6 −4 −2 0 2 4 6 8 100

10

20

30

40

50

60

70

80

90

100

Transmission power (dBm)

PR

R (

%)

6m8m10m12m14m16m

(a) Tx Power to PRR

−95 −90 −85 −80 −75 −70 −650

10

20

30

40

50

60

70

80

90

100

RSS (dBm)

PR

R (

%)

6m8m10m12m14m16m

(b) RSS to PRR

0 5 10 15 20 25 300

10

20

30

40

50

60

70

80

90

100

SNR (dB)

PR

R (

%)

loc1loc2loc3loc4loc5loc6

(c) SNR to PRR

Figure 4.3: Effects of link distance change

link quality. Experiments are performed in the hallway of the building where a clear

line of sight is available between the transmitter and receiver.

As the experiment result presented in Figure 4.3(a) shows, PRR changes as the link

distance and transmission power level change. The order of link distance that shows

better PRR at the same transmission power level is 6 m, 8 m, 12 m, 10 m, 16 m, 14 m

while this order changes among 10 m, 12 m, 16 m distances at different transmission

power levels.

The effect of path-loss can be observed at a relatively coarse granularity even though

the order is not linear to the link distance: closer distance (6 m, 8 m) show clearly better

link quality than longer distance (14 m, 16 m). The non-linear link quality order in our

experiment results can be attributed to the severe indoor multi-path effect. When we

plot the RSS to PRR and SNR to PRR relationship in Figure 4.3(b) and 4.3(c), we can

confirm that RSS as well as SNR is a good link quality estimator for the same hardware

pair. Experiment results show that link distance is not an accurate link quality metric.

4.2.6 Effects of Node Location (Multi-Path) on Link Quality

To better understand the effects of node location and to see if how severe the multi-

path effect is, we performed a series of link quality measurements in the hallway of the

building.

39

Page 56: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

2 4 6 8 10 12 14 16 18−85

−80

−75

−70

−65

−60

−55

Receiver location index

RS

S (

dBm

)

11m−P011m−P514m−P017m−P0

Figure 4.4: RSS change at 19 different receiver locations at around 11,14,17m distancebetween the transmitter and receiver. The transmitter uses 0 (and 5 only for 11m) dBmtransmission power (P0)

−12 −10 −8 −6 −4 −2 0 2 4 6 8 100

10

20

30

40

50

60

70

80

90

100

Transmission power (dBm)

PR

R (

%)

loc1loc2loc3loc4loc5loc6

(a) Tx Power to PRR

−95 −90 −85 −80 −75 −70 −650

10

20

30

40

50

60

70

80

90

100

RSS (dBm)

PR

R (

%)

loc1loc2loc3loc4loc5loc6

(b) RSS to PRR

0 5 10 15 20 25 300

10

20

30

40

50

60

70

80

90

100

SNR (dB)

PR

R (

%)

loc1loc2loc3loc4loc5loc6

(c) SNR to PRR

Figure 4.5: Effects of node location change

40

Page 57: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

We placed a transmitter in the middle of the hallway and measured a link quality

in both PRR and received signal strength (RSS) at the receiver located at around 11,

14, 17 m distance from the transmitter. At each of these three chosen distance, we

draw a perpendicular line (about 147 cm long) connecting two walls of the hallway

and performed experiments placing the same receiver at 19 different locations from the

leftmost position 1 to the rightmost position 19 (at every 7.5 cm interval) on this line.

Figure 4.4 shows that even for the links at around the same distance (i.e., on the

same line), the RSS changes depending on the specific node positioning. The measured

range of RSS on the same line (i.e., RSSmax−RSSmin) was between 7.9 and 12.7 dBm

in the four experiments results presented in this figure. Multi-path effect causes this

severe link quality variation. We can even observe that there is a better link quality

at 17 m distance than 11 m distance at the same transmission power level (0 dBm in

this example) due to multi-path effect at some combination of receiver node placements

(e.g., when two receivers are placed at the position 5 of 11 m and 17 m distance).

When we compare the RSS change at 0 and 5 dBm transmission power at 11 m

distance, we can clearly see the improvement of the link quality with increased output

power. However, the measurements show the RSS improvement varies between 3.51 and

7.49 at 19 different positions at the same amount of transmission power change.

Figure 4.5 shows a similar experiment results at 10 m link distance. A new pair

sender and receiver nodes is used and the receiver is placed at six different node location

on the same line at two inch intervals. We can see wide variation of link qualities,

between -7 and 8 dBm transmission power levels.

From these results we have shown that (1) the multi-path effects are severe in indoor

in both cases with a line of sight link between the transmitter and receiver, (2) severe link

quality variation can be expected with small movement of sensor nodes with low-power

wireless links, (3) we can expect significant link quality improvement in terms of PRR

41

Page 58: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

1400 1600 1800 2000 2200 2400 0200 0400 06000

20

40

60

80

100

Time (hhmm)

PR

R (

%)

P−4P0P4P8P10

(a) Link quality (in PRR) change over time

1400 1600 1800 2000 2200 2400 0200 0400 0600−100

−95

−90

−85

−80

−75

−70

Time (hhmm)

RS

S (

dBm

)

P−4P0P4P8P10NOISE

(b) Received signal strength (RSS) and noise level change over time

Figure 4.6: PRR, RSS and noise level change over time at different transmission powerlevels

42

Page 59: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

with small increase in transmission power for the links in the unreliable transmission

power range, (4) the effect of transmission power control (i.e., the change of RSS at the

receiver) varies with different hardware (i.e., transmitter and receiver pair) and different

node location.

4.2.7 The Effects of Time (Environment) on Link Quality

We continuously measured the link quality of the testbed for 18 hours between 13:00 pm

and 7:30 am to see the change of link quality over time. From this experiments, we want

to see the link quality variation from surrounding environment change and correlation

between the link quality variance and default transmission power level. Packet reception

rate (PRR), received signal strength (RSS) and ambient noise are measured every eight

minutes with 50 packets between -4 and 10 dBm transmission power levels.

Figure 4.6 presents link quality snapshots of communication link (LINK72−>91) in

the Stargate testbed (shown in Figure 4.10). We can clearly see high variations in the

link quality at the same transmission power level. Especially, there is much higher

variation in link quality (both in PRR and RSS) during the daytime (between 14:00

and 18:00) than at night time (between 2:00 and 6:00). We believe the dynamic changes

in surrounding environment during the daytime (mainly from the movement of objects

near the communication) causes much severe link quality variation.

When we compare the link quality variation between the cases with different trans-

mission power levels in Figure 4.6(a), we can see that the level of link quality variation

is higher at different transmission powers. When we use the transmission power level

outside unreliable transmission power range (e.g., transmission power of 8 dBm), this

link can be converted to a reliable link regardless of the time change. Even at the high

transmission power level, the change in RSS is similar to the low power cases as shown

in Figure 4.6(a). However, the PRR is less sensitive to the RSS variation at this level of

43

Page 60: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

50 60 70 80 90 980

5

10

15

20

25

30

35

40

45

PRRS

tard

ard

dev.

Figure 4.7: Standard deviation change for different PRR value

PRR (%) 60-70 70-80 80-90 90-100 90-95 95-98 98-99 99-100STDEV (%) 40.5 23 18.8 3.4 19.8 10.8 2.2 0.89

Table 4.3: Standard deviations for the links with different levels of PRR

signal strength and can tolerate dynamic environmental change with the extra received

signal strength than required for reliable communication.

4.2.8 Selecting a Transmission Power Level

Figure 4.7 and Table 4.3 show the link quality variation for the links with different

PRR levels in our seven day measurements in the testbed. We can see that the links

with lower than 90% PRR shows very high variation in link quality. When we take a

closer look at the links with link quality higher than 90%, the links with lower than

98% PRR still show relatively high quality variation. It is because the value is still

within the unreliable transmission power range where a small signal strength change

can significantly affect the link quality. Experiment results imply that it is better to

use only links with higher PRR close to 100% for a consistent link quality.

However, a blacklisting-only approach without transmission power control scheme

often chooses 80% or 90% PRR as a blacklisting threshold (BLθ) value. If we choose a

44

Page 61: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

higher blacklisting threshold to increase the link reliability, we will waste many links with

still reasonably good quality. Therefore, a blacklisting scheme under static transmission

power suffers from the frequent link quality changes. Fluctuation in link quality around

the blacklist threshold (BLθ) may result in frequent topology change that can harm the

performance of upper layer protocols.

With transmission power control scheme, it is feasible to use a higher blacklisting

threshold (e.g., 98% or even 100% PRR) because converting moderate quality links to

good, reliable links is often achievable with even small transmission power increase.

We have used a packet reception rate (PRR) as a metric to estimate a link quality and

collected a PRR at every transmission power level, and proper transmission power level

is selected based on the measured PRR at different transmission power levels. However,

it is hard to evaluate link quality with the PRR metric due to the high overhead of

PRR measurement from the repeated transmissions of multiple probe packets. If the

received signal strength (RSS) information is available at the receiver, we can use the

RSS information to maintain proper link quality easily and quickly in response to the

environmental change. The use of RSS for a link quality control is possible because the

PRR is proportional to the measured RSS within some variation range (as we can see in

Figure 4.1), and we can relate RSS value to the PRR for the same receiver. Therefore,

we can use the measured RSS as a good indicator of the link quality once we figure

out the relationship between RSS and PRR for the given receiver (as we discussed in

Section 4.2.4).

4.3 PCBL: Transmission Power Control with Blacklisting

Based on the experimental observations, we introduce a new transmission power control

mechanism.

45

Page 62: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

4.3.1 Key Characteristics and Benefits of Our Proposed Scheme

We propose a transmission power control scheme with the following key characteristics.

(1) Transmission power control for link quality management:

The primary purpose of transmission power control is to provide reliable commu-

nication links to the link users. Every communication including broadcast as well as

unicast is always using reliable links which meets user’s requirement and expectation.

PCBL can ensure reliable bi-directional communication links and the collision avoidance

scheme implemented based on RTS/CTS handshakes could perform better by eliminat-

ing asymmetric and weak links.

(2) Packet-based transmission power control:

A proper transmission power can be assigned to each packet based on the destination

and type of the packet considering link quality requirements (i.e., the link quality control

threshold: LQθ). We can expect reduced energy consumption for packet transmission by

using minimum transmission power which meets LQθ. The reduced interference from

minimizing the transmission power for each communication can improve the spatial

reuse of the network as well. We can also provide customized reliability to the packets

with different importance.

(3) Metric-based link quality estimation:

Link quality is empirically measured based on the packet reception rate (PRR)

metric rather than distance-based link quality approximation. We observe that the

link distance is not an accurate metric of link quality in our experimental study (in

Section 4.2.5). PCBL utilizes PRR metric empirically measured at different transmission

power for different links to reflect the diverse link qualities even at the same link distance

in real world.

46

Page 63: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

If received signal strength (RSS) information is available, (RSS,PRR) pair informa-

tion can be used together with transmission power level for more efficient and faster

link quality estimation and corresponding control.

(4) Blacklisting at adjusted transmission power level:

Not every link can be converted to a good link with transmission power control

even at the maximum transmission power level. Even new weak or asymmetric links

can be generated at adjusted transmission power level. We combine link blacklisting

approach together with transmission power control scheme to avoid the use of remaining

unreliable links at new transmission power control even for the broadcast packet. Both

link-based and packet-based blacklisting schemes will be discussed.

4.3.2 Basic PCBL Algorithm: Optimization Prior to Routing

We first explain the basic steps of implementing our proposed transmission power control

with blacklisting scheme (PCBL) in this section. A brief version of the algorithm is

presented in Table 4.4.

First of all, each node measures the quality of links to its neighbor nodes in PRR

metric for all discrete (or pre-selected) transmission power levels P = {Pmin ≤ Pi ≤Pmax}, where i is a transmission power in dBm. Let PRR(r)Pi denote the PRR at the

output power of i dBm at the receiver node r. At the receiver, it records the RSS value

for each transmission power level from each sender.

To select a unicast transmission power level, a link quality control threshold value

(LQθ) in PRR metric needs to be selected according to the required level of link relia-

bility (e.g., LQθ ← 0.95). Simply, a common LQθ value can be used for every link, or

each node can use different LQθ values for different links or even for different type of

packets based on the importance of each packet communication.

47

Page 64: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Step 1: Collect link statistics in PRR metric at every selectedtransmission power level

Step 2: Select a unicast transmission power for each link (i.e., foreach one hop neighbor) which minimize energy consumption whileproviding required link reliability

Step 3: Blacklist remaining or new unreliable links after transmissionpower control

Step 4: Select a broadcast transmission power for each node with themaximum unicast transmission power level

Table 4.4: Brief PCBL algorithm

We define Utxr as the minimum transmission power which satisfies the LQθ is

assigned for each link (i.e., for each receiver r) or for each packet type as a unicast

transmission power: Utxr = min Pi, such that PRR(r)Pi > LQθ. Otherwise, Utxr =

Pmax.

Based on the required link reliability and the intended connectivity level, PRR-based

blacklist threshold (BLθ) is selected. PCBL can use either a link-based blacklisting or

packet-based blacklisting scheme.

Link-based blacklisting blacklists every link with lower PRR than BLθ, thus deter-

mining the topology of the network. Each link can select a different BLθ for further

optimization if necessary. For example, sparse part of the network might be better to

use a lower blacklisting threshold. Packet-based blacklisting uses adaptive BLθ value

for each packet (e.g., based on the type of the packet or the type of application) rather

then for each link in the network. Packet-based blacklisting is necessary when the re-

quirements for the link qualities are different for each application or for each type of

packet. Finer control of transmission power in packet-based blacklisting can provide a

better utilization of the network.

LQθ is used to control the quality of the link and BLθ is employed to ensure the

minimum reliability of the link. LQθ should be greater than equal to BLθ and the gap

48

Page 65: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

between LQθ and BLθ reduces the variation of the link availability which may lower the

performance of upper-layer protocols from the frequent changes of the network topology

during the operation.

In the last step, each node (i) selects a broadcast transmission power (Btxi) with

the maximum unicast transmission power for all non-blacklisted links assigned in steps

2 and 3: Bi = max Utxr, for ∀ neighbor r, where PRR(r)Utxr > BLθ. This ensures

each sender transmits broadcast packets with enough transmission power to reach every

neighbor node.

Our goal in transmission power control is to assign a minimum transmission power

that provides required link quality for each packet transmission and also to remove the

negative effects caused by unreliable links. We choose a transmission power, which

is close to the optimal, for each link, for unicast transmission, and for each node, for

broadcast transmission, with our proposed algorithm (in Table 4.4). Transmission power

selection refers to the PRR values, which are realistic link quality metrics, collected at

different transmission power levels. Selected transmission powers satisfy the required

link quality and also minimize the interference to the network. Adjusted transmission

power from the default can expose new links that are not previously visible. The

unreliable links that cannot be converted to good links even with transmission power

control and newly generated weak and asymmetric links at changed transmission power

levels are blocked from the use with blacklisting scheme.

4.3.3 On-demand Transmission Power Optimization for Each Long-

lived Communication

Collection of link statistics before the start of each data communication is unacceptable

for some application where the prompt delivery of collected information is critical. Keep

49

Page 66: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Step 1: Collect link statistics only at the maximum transmissionpower level (Pmax)

Step 2: Blacklist unreliable links before finding a routing pathStep 3: Find a delivery path between the source and sink with

a chosen routing protocolStep 4: Identify unicast transmission powers to use only for

the links in the delivery path

Table 4.5: PCBL algorithm for a long-lived communication

maintaining up-to-date link quality information for every link in the network ahead of

time is unnecessary and inefficient when communication is infrequent.

A different transmission power control approach can be taken to reduce transmission

delay and overhead of the link statistics collection and the summary of this algorithm is

presented in Table 4.5. We can collect link statistics only for the links participating the

packet communication between the given source and sink. With this modified approach,

each node converges to a close to optimal transmission power level after a reliable routing

path is set up by a routing protocol with small prior link statistics collection efforts.

When we find an optimal unicast power level for each link, we can collect the link

quality during the idle data communication period or we can lower the transmission

power from the Pmax to the lower level and decide proper transmission power level

based on the number of retransmission experienced at each transmission power level.

4.3.4 Experiment Results for a Single Data Flow

We evaluate the performance of proposed transmission power control with blacklisting

scheme in the PC104 testbed shown in Figure 1.2. Even though we used relatively small,

manageable number of nodes for our experiments, this testbed satisfies our experimental

condition as it still possesses many unreliable links. Larger testbed experiments increases

the number of hops for packet delivery, and additional hops increase the probability of

50

Page 67: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

0

10

20

30

40

50

60

70

80

90

100

Power control schemes

Pac

ket d

eliv

ery

rate

(%

)

OPP−P0 TPP−P0 OPP−P5 TPP−P5 OPP−P10 TPP−P10 M−BL PCBL

Figure 4.8: Packet delivery rate (PDR) from the experiments with five different powercontrol schemes

including unreliable links in the delivery path. Therefore, we can expect even further

performance drop in multi-hop packet communication without any link quality control

scheme from the larger testbeds.

In our experiments, two nodes located farthest in the testbed are selected as a packet

sender (node 21) and a receiver (node 26). Directed diffusion [38] is used as a routing

protocol and fully active mode S-MAC [89] is used as a medium access control protocol.

We compare the following eight scenarios, categorized based on five different trans-

mission power control schemes, in this experiments: (1) OPP-P0 and TPP-P0 : One

Phase Pull (OPP) and Two Phase Pull (TPP) diffusion routing at default transmis-

sion power of 0 dBm (2) OPP-P5 and TPP-P5 : OPP and TPP routing at increased

transmission power of 5 dBm (3) OPP-P10 and TPP-P10 : OPP and TPP at the maxi-

mum transmission power of 10 dBm (4) M-BL: TPP with Blacklisting at the maximum

transmission power level (i.e., 10 dBm) and finally, (5) PCBL: TPP with our proposed

scheme for transmission power control with blacklisting. We set LQθ to 98% PRR and

BLθ to 90% PRR in this experiment. We perform experiment with only TPP for M-BL

51

Page 68: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

and PCBL schemes because both schemes remove asymmetric links and OPP and TPP

are expected to perform equally in terms of PRR when there is no asymmetric links.

The experiment results show average end-to-end packet delivery rate (PDR) over five

1200 second-long experiments.

Figure 4.8 presents PDRs measured from the eight different testbed experiments.

Error bars show standard deviations. First, we want to see if how much improvement we

can expect in multi-hop packet communication by increasing the default transmission

power of each node instead of using distinct transmission power for each link or for

each packet. When we compare the PDRs for OPP diffusion at different transmission

power levels, we can see that PDR gets higher at the higher transmission power level.

We can observe PDR improvement by increasing transmission power from 0 to 5 dBm.

Improved delivery rate mainly comes from the improved link quality of the weak links,

which are part of the packet delivery route. However, the improvement is negligible

when the default transmission power was increased from 5 to 10 dBm, the maximum

available output power.

When we compare the performance of OPP and TPP at 0 dBm transmission power,

TPP shows higher PDR because it avoids using asymmetric links that OPP diffusion

selected as a part of the routing path. At the higher transmission power of 5 dBm,

PDR even gets worse because this power level generates new unreliable links, that are

utilized by the routing protocol. At the maximum transmission power level, TPP shows

about the same PDR as with 0 dBm transmission power, and still loses about 21% of

the total packets.

The PDR in directed diffusion is highly dependent on the reliability of the delivery

route that is selected for use. In the wireless network which only uses a single hop

data communication, simply increasing the default transmission power is an effective

way to improve PDR. In a multi-hop wireless data communication, whether unreliable

52

Page 69: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

(a) without Tx power control (b) with M-BL scheme (c) with PCBL scheme

Figure 4.9: Topology changes with different power control schemes: a solid arrow rep-resents a realiable link with over 90% PRR and a dotted arrow represents a link with0 < PRR(%) < 90. Each link is also marked with corresponding (transmission power,observed PRR) pair information

wireless links exist or not is an important factor which decides the reliability of data

communication. Increasing default transmission power can convert some of the weak and

asymmetric links to reliable links, and help discover new links which was not available

at lower transmission power level, but it is not an effective way to improve PDR in

most cases because (1) it may not make every unreliable link reliable, and (2) it may

also generate new unreliable links at new transmission power level, and (3) it uses up

more network capacity because an increased transmission power level has larger spatial

footprint.

TPP with M-BL and TPP with PCBL result in close to 100% packet delivery rate:

99.2% and 98.7% respectively. Both schemes provide comparable link qualities at ad-

justed transmission power levels. Therefore, the same links are blacklisted and most

likely both schemes generate the same network topology. Figure 4.9 shows a simplified

four node example from the testbed that visually compares the links under three dif-

ferent schemes. The main differences between PCBL and M-BL are found in (1) the

amount of energy consumption and (2) the level of interference in packet transmission.

53

Page 70: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Difference Unicast Broadcast Total Per PacketM-BL +75.4% +53.2% +67% +66.2%

TPP-P0 +3.5% -40.3% -13% +10.8%

Table 4.6: The energy consumption difference in packet transmission compared to thePCBL scheme

Expr Flows DescriptionNo. A B1 89 ← 75 72 ← 73 low interference2 91 ← 70 72 ← 73 medium interference3 85 ← 81 72 → 87 one flow gets stronger interference4 73 ← 87 88 → 72 strong interference

Table 4.7: Four experiment scenario comparison

We compare the energy consumption in packet transmission between the PCBL

scheme with the case without any power control scheme (i.e., TPP-P0) and also with

the case with M-BL scheme in table 4.6. We add up the energy consumption from

every broadcast (control packets sent by the routing protocol) and unicast packet (data

packet) transmissions for TPP-P0 and M-BL schemes, and compare those against our

PCBL scheme. We exclude the energy consumption from MAC control packets (i.e.,

RTS, CTS, and ACK) from the calculation.

In our testbed experiments with single data flow, M-BL scheme shows 67% more

energy consumption than PCBL and both unicast and broadcast packets used up much

more energy than PCBL because it transmits every packet at maximum transmission

power. Original TPP scheme (TPP-P0), which transmits packets at default power of

0 dBm, consumes 13% less energy than PCBL scheme. When we compare energy con-

sumption for each successful packet delivery, however, PCBL saves 10.8% transmission

power compared to TPP-P0. This energy savings from PCBL shows an example of

the compensation gained from the increased network reliability that exceeds the extra

energy consumption in packet transmission.

54

Page 71: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Figure 4.10: Stargate node locations for the multiple data flow experiments.

4.3.5 Experiment Results for Multiple Data Flows

In a single flow packet communication experiment, both PCBL and M-BL perform well

in terms of packet delivery rate. To see the effect of over-amplified transmission signal

from the M-BL scheme, we performed experiments with multiple data flows in this

section.

First, we run four node experiments with two concurrent data communication flows

(called flow A and B) in our Stargate testbed (shown in Figure 4.10). Two packet

senders are synchronized to start the packet transmission and continuously transmit

packets one after another. We test PCBL and M-BL schemes with both turning on and

off the collision avoidance functionality. In this experiment, we use 100% PRR for LQθ

and 90% PRR for BLθ in this experiment for PCBL scheme. We repeat experiments

with four different sender and receiver node pairs (i.e., four different pairs of data flow)

as shown in Figure 4.10 and described in Table 4.7. Different node locations change the

signal strength at the receiver and the level of interference between the flows. We repeat

experiments five times for each setting and each result shows the mean value. Due to the

non-linearity in the measured signal strength value at the higher than -55 dBm, we used

estimated RSS value based on the output power level for SNR and SINR calculation for

the values measured in this region.

55

Page 72: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

4.3.5.1 PCBL vs M-BL with a Collision Avoidance Scheme

We enabled a collision avoidance scheme in S-MAC [89] which is a carrier sensing fol-

lowed by a RTX/CTS/DATA/ACK sequence in this experiment.

Table 4.8 compares the experiment results between the PCBL and M-BL. The colli-

sion avoidance scheme prevents packet collisoin by disallowing concurrent packet trans-

mission within the same channel. Therefore, the PDR is always 100% for both PCBL

and M-BL. However, additional packet sender and receiver in the same channel com-

pete for the limited bandwidth and reduce the throughput of both data flows. Each

additional active sender or receiver occupies the channel by deferring any other packet

transmission with RTS or CTS packet transmission when we use a collision avoidance

scheme.

When there is no competing packet sender, a sender could transmit 6.7 data packets

(excluding control packets) per second in our experiments with 230B data packets.

Experiment 1 results show close to 6.7 packets per second throughput for both flows with

PCBL scheme. In other words, there is almost no interference coming from the other flow

and concurrent packet communication was possible with PCBL in this case. However,

the throughput for M-BL in Experiment 1 was 3.9 packets per second. Reduced packet

transmission rate with M-BL means the data and control packet communications from

the other flow caused interference (i.e., share the channel together) and lowered the

throughput of communication links.

As we change the node location from Experiment 1 to Experiment 2, the level

of interference between the two flows is increased. The strength of interference (i.e.,

the signal strength of the data and control packet transmitted from the other flow) is

important even when the collision avoidance scheme is turned on because it changes both

the probability of the control packet reception and the probability of a packet collision

when the control packet is lost and concurrent packet transmission is not prevented.

56

Page 73: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Experiment PCBL MBLw/CS flow A flow B flow A flow B

1 data rate (pkts/sec) 6.7 6.5 3.9 3.9SNR (dB) 33.47 40.15 50.97 49.79PRR (%) 100 100 100 100

2 data rate (pkts/sec) 5.57 5.29 3.71 4.51SNR (dB) 27.57 38.4 39.13 49.83PRR (%) 100 100 100 100

3 data rate (pkts/sec) 4.42 4.33 3.54 4.08SNR (dB) 27.11 27.5 29.35 42.38PRR (%) 100 100 100 100

4 data rate (pkts/sec) 2.94 3.33 3.78 3.77SNR (dB) 29.35 31.08 42.59 43.91PRR (%) 100 100 100 100

Table 4.8: PCBL and M-BL comparison with a collision avoidance

0

10

20

30

40

50

60

70

80

90

100

Flow

Pac

ket d

eliv

ery

rate

(%

)

M−BLPCBL

Flow 1 & 2 Flow 3

Figure 4.11: Packet delivery rate (PDR) from the experiments with three data flows

57

Page 74: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Depending on the number of competing sender and receiver nodes and the quality

of signals from these nodes in the same channel, the throughput of each link changes.

As the Table 4.8 shows, the throughput of the PCBL drops as the interference from

the other flow increases. However, the throughput of the M-BL does not change much

with experiments at four different locations. The extra transmission power used in M-

BL help the delivery of the control packet to the other flow and prevent most of the

concurrent packet transmissions.

With a collision avoidance scheme, interference only increases the delay of the packet

communication instead of causing a packet lost from the collision. However, when mul-

tiple senders compete for the same channel for a long period of time, the delayed trans-

mission can lead to the packet drops from the queue overflow. We performed another

multi-hop packet communication experiments with multiple continuous data flows in

the testbed (shown in Figure 1.2). Three data flows are involved in this experiment.

Node 17 and 38 send packets to node 33 (flow 1 & 2) and node 20 sends packets to node

12 (flow 3) at 1 packet-per-second send rate for 700 seconds.

Figure 4.11 presents experiment results based on the five repeated experiments. This

figure shows the PDR for flow 1 & 2 and flow 3 under different power control schemes.

The standard deviation from repeated experiments is marked with an error bar. PDR

in flow 3 are similar for both schemes: 97.9% for TPP with M-BL and 97.6% for TPP

with PCBL. The PDR for flow 1 & 2, however, shows 21% difference in favor of TPP

with PCBL: 95.5% for PCBL and 74.5% for M-BL. Packets from node 17 and 38 are

all delivered through node 11 and the wireless channels around node 11 involves four

times more traffic than the traffic between node 20 and 12. The interference from over-

amplified transmission power in M-BL saturates the wireless channel around node 11

and cause more packet drops with M-BL in flow 1 & 2 while flow 3 could still get enough

channel access with both schemes.

58

Page 75: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

The collision avoidance scheme can prevent packet collisions, but the stronger inter-

ference from M-BL use up more channel capacity and builds up the queue size and ends

up with packet drop from queue overflow. Therefore, even with the collision avoidance

scheme, interference can still affect the delivery ratio of the packet from the inefficient

spatial reuse of the network.

4.3.5.2 PCBL vs M-BL without a Collision Avoidance Scheme

In this section, we compare the performance of PCBL and M-BL scheme in the situa-

tions where the interference from each communication can influence the communication

of others. We perform this experiment to identify performance of our proposed power

control scheme under different MAC design. We completely disabled collision avoidance

(including carrier sensing, random back-offs, and RTS/CTS) in the experiments pre-

sented in this section. This allows for a sender to transmit packets even when it hears a

on-going packet communication in the same channel. In other words, concurrent packet

transmission is always allowed regardless of the current channel condition.

There is no difference in packet send rate (packets per second) for different schemes

and different flows in this experiment because each sender can transmit a packet anytime

regardless of the channel condition without collision avoidance scheme. Therefore, the

send rate is about two times faster compared to the case with a collision avoidance

scheme in our experiment.

Table 4.9 shows the PRR together with signal-to-interference-plus-noise-ratio (SINR)

rather than SNR because there exists an interference from the other flow. We can see

that SINR value becomes lower as the distance between the two flows gets closer. Over-

all, higher number experiments experience greater interference from the other flow and

therefore present lower SINR values. When the level of interference is relatively low, like

59

Page 76: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Experiment PCBL MBLw/o CS flow A flow B flow A flow B

1 data rate (pkts/sec) 13.7 13.7 13.7 13.7SINR (dB) 33.47 40.15 36 32.63PRR (%) 100 100 100 100

2 data rate (pkts/sec) 13.7 13.7 13.7 13.7SINR (dB) 27.57 38.4 13.83 31.63PRR (%) 100 100 100 100

3 data rate (pkts/sec) 13.7 13.7 13.7 13.7SINR (dB) 9.56 12.16 -2.68 25.47PRR (%) 92.7 90 0 100

4 data rate (pkts/sec) 13.7 13.7 13.7 13.7SINR (dB) -1.62 2.36 3.29 -0.70PRR (%) 0 0 100 0

Table 4.9: PCBL and M-BL comparison without a collision avoidance

the Experiment 1 and 2, the intended sender’s signal strength is much stronger than the

interference from the sender in the other flow. As experimental studies prove [78, 85],

stronger signal could be delivered under the concurrent packet transmission situation

and both Experiment 1 and 2 show 100% packet reception rate for both PCBL and

M-BL for both flows. This phenomenon is called capture effect [85].

In Experiment 3, flow A and B are placed in a roughly parallel position while the

receiver of the flow A is somewhat closer to the sender of the flow B. With PCBL, both

receivers get much stronger signals from each sender and provide reliable concurrent

communication for both flows. When the M-BL scheme changes the sender’s transmis-

sion power to the maximum level, the interference strength from the sender in flow B

(node 72) becomes even stronger than then signal strength from the intended sender in

flow A (node 81). The SINR at the receiver (node 85) becomes negative and no packets

can be delivered successfully in flow A. However, the packets in flow B can be reliably

delivered because the sender in flow A is located much further than the intended sender

of flow B.

60

Page 77: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

When both flows are located very close, as in the Experiment 4, there is high proba-

bility that the interference strength from the other flow is strong enough to disturb the

intended packet communication even with PCBL scheme (which causes less interference

than M-BL). With PCBL, neither flow could successfully deliver packets to the receiver.

With M-BL, the interference strength is even higher than the case with PCBL on each

data flow. The SINR at the receiver of the flow B becomes negative and the PRR of

the flow B becomes zero. However, the signal strength from the sender in flow A is

even stronger than the high interference from flow B and it can capture the channel at

the maximum transmission power level of both senders in this case. Experiment 4 is a

special example of the benefits of extra signal strength from over-amplified transmission

power level. However, better performance of M-BL is coming from the fact that the

difference in the RSS between two senders are fortunately big enough to allow capture

effect at the maximum transmission power level. Extra signal strength from the M-BL

increases the interference to the network as well as the signal strength at the intended

receiver.

In general, PCBL performs better if the interference from the concurrent transmis-

sion becomes negligible at controlled power level at the other receiver. PCBL can reduce

energy consumption and interference in addition to equal or better performance in net-

work throughput to M-BL. M-BL is better only when the interference at controlled

transmission power from the PCBL still causes strong interference to each other and

results in packet collisions, while M-BL provides a channel capture for either communi-

cation.

61

Page 78: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

PCBL MBLPDR w/ CA w/o CA w/CA w/o CA

Upper flow (%) 53 67 54 34Lower flow (%) 45 53 37 46

AVG (%) 49 60 45 40

Table 4.10: PCBL and M-BL comparison with a collision avoidance

4.3.5.3 Multi-hop, Multi-flow Experiments

We performed multi-hop, multi-flow packet communication experiments in the 14 nodes

testbed to study the effects of interference from PCBL and M-BL on network through-

put. Multi-hop reduces the throughput because intermediate nodes need to share the

channel for both packet transmission and reception and multi-flow also reduces the

throughput from the increased amount of data packets and interference. The testbed is

divided into upper and lower sections and there are two senders and a receiver located

in each section. Each section is separated with a dotted line in Figure 4.10 and two

senders and a receiver are marked with S1, S2, and R respectively. We intentionally

blacklist incoming packets from the other section to maintain two separate data flows

one at each section. This is because we only want to evaluate the effect of interference

in the multi-hop packet communication using either PCBL or M-BL.

Each sender continuously transmits a 230 byte packet at one second intervals and

the packet reception rates are measured at the receiver nodes. We use two-phase-pull

directed diffusion routing protocols for a route-setup, and the actual data packet com-

munication is enforced to be started after a successful communication route discovery.

By doing this, the performance of the routing protocol is excluded from the comparison

between the PCBL and M-BL.

Table 4.10 shows the packet delivery rate (PDR) in our testbed experiment. There

are two flows, one in the upper section and the other one in the lower section of the

62

Page 79: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

testbed. Each flow has two senders and a receiver as described earlier. When we compare

the PDR between the cases with and without a collision avoidance scheme, PCBL shows

better performance without a collision avoidance scheme. On the contrary, M-BL can

deliver more packets when it performs with a collision avoidance scheme.

Reduced interference from PCBL increases the probability of concurrent packet

transmission in the wireless network, and we can reduce the number of missed con-

current communication opportunities by disabling the conservative collision avoidance

scheme implemented in S-MAC. This is the reason why PCBL without a collision avoid-

ance scheme can improve the packet delivery rate when the network is saturated with

continuous multihop packet transmissions from multi-data sources like our experimen-

tal scenario. The extra transmission power used for M-BL causes stronger interference

to more neighbor nodes and it drops the PDR and throughput of the network due to

higher probability of packet collision without a collision avoidance scheme.

The comparison between PCBL and M-BL in our multi-hop experiment shows that

both perform similar under the collision avoidance scheme (while the PCBL shows slight

advantage) due to the limited bandwidth of the network from multi-hop and extra con-

trol packets. When we disable the collision avoidance scheme, PCBL delivers more

packets, benefiting more from the removed control packets by gaining more bandwidth

for each node at lower interference level than M-BL.

4.3.5.4 Lessons from the PCBL and M-BL Comparison

We now summarize the lessons learned from Section 4.3.5.1 to 4.3.5.3.

• Benefits of PCBL: Reduction in transmission power consumption and interfer-

ence. PCBL improves the spatial reuse of the wireless channel and enables more

simultaneous communications with less energy consumption.

63

Page 80: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

• Weakness of PCBL: Vulnerability to the dynamic environment change. Envi-

ronmental change can lead to the link quality change even though it is not severe

compared to the case without transmission power control scheme. By setting the

link quality control threshold outside of the range of link quality variation, we can

avoid this problem and provide comparable performance with M-BL in providing

consistent link quality.

• Benefits of M-BL: Endurance of the minor interference and environmental

change. Extra transmission power (i.e., stronger than RSSθ signal strength)

ensures reliable communication under some environmental change or minor in-

terference that is not prevented from the collision avoidance scheme.

• Weakness of M-BL: Inefficiency in energy consumption and spatial reuse of the

wireless channel. Extra signal strength cause more interference to the network

and the throughput of the network becomes lower as the interference strength

gets stronger.

The main advantage of M-BL is more consistent link quality when it has higher than

RSSθ signal strength at the receiver. For PCBL, we can add some safeguard against

environmental change and every link can provide consistent link quality by setting the

RSSθ even higher than the RSSθ outside of the link quality variance range. PCBL can

reduce (or even remove) the variance in the link quality under the environmental change

with a little extra energy consumption.

4.4 Summary

In this chapter, we have presented an experimental study of the effects of transmission

power control on low-power wireless links. Our study identifies the causes of high

variance in link quality under different environmental conditions and hardware settings.

64

Page 81: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

We repeat experiments for various experimental settings varying transmission power

levels.

Based on our better empirical understanding of wireless link behavior under power

control, we propose a packet-based link quality control scheme called PCBL. It con-

verts unreliable asymmetric and weak links to reliable wireless links which provide

a consistent link quality. We incorporate a blacklisting approach together with our

power control scheme to address the problem of remaining unreliable links at adjusted

transmission power setting. Blacklisting improves reliability by preventing the use of

unreliable links and ensuring minimum link reliability for the network. The proposed

transmission power control with blacklisting scheme (PCBL) provides energy-efficient

link quality control with minimal channel interference, and provides a more stable and

reliable network topology. Throughout the study presented in this dissertation, we use

transmission power control as a main tunable parameter for interference-aware protocol

design improving reliability and channel capacity.

65

Page 82: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Chapter 5

Experimental Study of Concurrent Transmission in

Wireless Sensor Networks

5.1 Overview

There is growing awareness that realistic understanding of wireless links are essential

for developing efficient protocols for wireless networks and evaluating them meaning-

fully [44]. In the previous chapter, we have presented some efforts coherent to this

argument by evaluating a single wireless link without interference. However, a good

understanding of interference is essential, not only to improve the evaluation of existing

protocols under medium-to-high traffic loads, but also to aid in the future design of

novel interference-aware protocols for wireless networks.

Most research considering network interference normally assumes one of two inter-

ference models: the protocol model or the physical model [32]. In the protocol model,

which is implemented by many state-of-the-art wireless network simulators, concurrent

transmissions from any node within a given range (referred to as the interference range)

of a receiver will cause a collision that results in the loss of a packet from its corre-

sponding sender. A recent study by Whitehouse et al. [83] has argued that this protocol

model significantly overestimates packet loss during concurrent transmissions and can

therefore result in the design of inefficient medium access protocols. In the physical

66

Page 83: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

model, a packet from the sender is lost at the receiver only if the signal-to-interference-

plus-noise-ratio (SINR) falls below a given threshold. To our knowledge, the physical

model, which is widely used in communication theory, has not been previously tested

rigorously through real experiments in the context of low-power wireless networks.

Several recent empirical studies in the context of wireless sensor networks have given

us an understanding of the complex non-ideal behavior of low-power wireless links [7,

25, 47, 77, 93]. However, most of these empirical studies have focused on single links,

without concurrent transmissions from interfering nodes.

In the work presented in this chapter (which appears in [79]), we systematically

study the effects of concurrent transmissions through experimental measurements with

low-power Mica2 motes equipped with CC1000 radios. Our experiments involve the

measurement of received signal and interference strengths as well as packet reception

rates under carefully designed single-interferer and multiple-interferer scenarios. We

find the simplistic interference range-based protocol model to be inadequate from this

empirical study, which agrees the results from Whitehouse et al. [83]. Our experimental

results confirm some key aspects of the SINR-based physical model, while suggesting

significant ways in which it can be enhanced for applicability in real deployments.

There are several concrete findings from our experimental study that offer useful

insights; these are summarized in Table 5.1. Our measurements, conducted with Mica2

motes, confirm that guaranteeing successful packet reception with high probability in the

presence of concurrent transmissions requires that the SINR exceed a critical threshold.

However, groups of radios show a wide gray region of about 6 dB. We find that this

large gray region occurs because the SINR threshold can vary significantly depending

on the measured signal power and radio hardware (but not depending significantly on

the location). By contrast, we find that the gray region is quite narrow for a specific

hardware combination at a fixed signal strength level. We find that it is harder to

67

Page 84: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Finding SectionSingle interferer effects 5.3

Capture effect is significant 5.3.1SINR threshold varies due to hardware 5.3.2SINR threshold does not vary with location 5.3.3SINR threshold varies with measured RSS 5.3.4Groups of radios show ∼6 dB gray region 5.3.5New SINR threshold model 5.3.6

Multiple interferer effects 5.4Measured interference is not additive 5.4.2Measured interference shows high variance 5.4.3SINR threshold increases with more interferers 5.4.4

Table 5.1: Key findings from concurrent transmission study

estimate the level of interference in the presence of multiple (two or more) interferers

for two reasons: (a) the joint interference measurements show a much higher variation

when there are multiple interferers, and (b) the measured joint interference strength

is not always the sum of the individual interference strengths. We also find that the

measured SINR threshold generally increases with the number of interferers.

The rest of the chapter is organized as follows: We present our experimental method-

ology in Section 5.2. We discuss the results from experiments involving a single interferer

in Section 5.3, and those involving multiple interferers in Section 5.4. Finally, we present

our conclusions and discuss future work in Section 5.6.

5.2 Experimental Methodology

In this section, we discuss some key aspects of our experimental methodology. In Sec-

tion 5.2.1, we discuss the hardware and software used. We describe our experimental

design for carrying out synchronized measurements in Section 5.2.2. We conclude this

section by discussing the regression model we use for mapping SINR to packet reception

rates in Section 5.2.3.

68

Page 85: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

5.2.1 Hardware and Software

Our study is based on systematic experiments on a PC104 [23] testbed running Linux.

The experiments are conducted in a controlled indoor office environment where sur-

rounding objects are static, with minimal time-varying changes in the wireless channel

due to multi-path fading effects. Any code that can be used commonly by all PC104

nodes is accessed on a central computer through an NFS-mounted directory. We use

Mica2 motes, with the Chipcon CC1000 [10] radio operating at 433 MHz, as an RF

transceiver on the PC104 node. This device provides 38.4 Kbps data rate with Manch-

ester encoding and uses non-coherent FSK modulation scheme. We use the Linux-based

Emstar software framework to take advantage of its interactive interface with sensor

nodes in the testbed [27].

We use the S-MAC protocol [89], configured in fully-active mode without sleep

cycles. To study collisions in a controlled manner we intentionally disable carrier

sense and random backoff in the MAC. Disabling the collision avoidance scheme im-

plemented in S-MAC allows us to freely transmit concurrent packets even when there is

on-going packet transmission in the same wireless channel. We also omit the MAC-level

RTS/CTS/DATA/ACK sequence by sending packets as broadcasts, avoiding the com-

plications of ARQ. We thus disable much of the MAC functionality in order to focus on

the fundamental behavior of wireless links in the presence of interference.

There are several other important wireless platforms, including IEEE 802.11 and

IEEE 802.15.4. As an experimental study, we can only affirm that our results apply

to the CC1000 radio. However, hardware variation and large gray regions have been

previously observed for 802.11 radios [3] and it is likely that low power 802.15.4 radios

will show similar results. We have some preliminary results for 802.15.4 in Section 5.5.

69

Page 86: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Figure 5.1: Overview of the testbed with experimental methodology used for time syn-chronization, signal strength and PRR measurement

5.2.2 Measurement Design

Our study requires a careful configuration to synchronize both packet transmissions as

well as measurements of signal strength and packet loss. Figure 5.1 shows our experi-

mental configuration. Each experiment involves four types of nodes: a sender, a receiver,

one or more interferers, and a special synchronizer node. The synchronizer broadcasts

a sync packet just before each single or concurrent packet transmission. This serves

to synchronize the clock of every node in the testbed. The sync packet is a kind of

reference broadcast [22]. Each transmitting node (sender or interferer) sets its packet

transmission time and the receiver sets the received signal strength measurement time

based on this reference time.

In our controlled experiments the hardware identity and locations of the sender,

interferer, and receiver is fixed, but we vary the transmit power of the sender and

interferers over some range. We place nodes on office tables at about one meter in height.

Every transmitter, including a sender and one or more interferers, is placed about the

same distance from a receiver node forming an isosceles triangle at between five to seven

70

Page 87: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

meters in our experiments. For each specific combination of transmit power settings,

there is a series of packet transmission epochs. In each epoch, there is the following

sequence of transmissions, each interleaved with a sync packet (see Figure 5.1): (i) the

sender transmits alone; (ii) each interferer in turn transmits alone; (iii) all interferers

transmit concurrently; (iv) the sender transmits concurrently with all interferers. The

receiver measures signal strength in the middle of each single or concurrent transmission,

except the final one, which is used to record whether the packet was received successfully

or not. We also measure a signal strength right after each individual packet reception

when there is no signal on the channel. This approach measures ambient noise levels

during experiments.

If a total of n packet transmission epochs are used for a particular transmit power

combination, the packet reception rate (PRR) for that combination is calculated as

the total number of packets received successfully divided by n. We typically use 75

epochs to estimate PRR with a precision of about 1.3%. In addition, ambient noise

measurements at the receiver are taken at the end of reception of each of the single

packet transmissions.

Due to jitter in the testbed system, transmission start times vary with a mean of

3 ms. Further, obtaining reliable signal strength measurements can take up to 7 ms (this

is not a controllable parameter in the CC1000 radios [10]). Hence the signal strength

measurement times need to be carefully chosen at the receiver to ensure any intended

collision occurs. We take measurements in the middle of long packet transmission pe-

riods. With 230 byte packets, packet transmission time is about 97 ms and so we can

tolerate substantial jitter.

As second potential timing problem can occur depending on when packets transmis-

sions begin. When the sender and all interferers are transmit concurrently, variation in

the transmission starting times can cause the sender packet to arrive 8 ms or later than

71

Page 88: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

the first interferring packet. In such cases we observe that the packet is never recog-

nized at the receiver, even if its signal is strong enough to overwhelm the interferer. This

problem occurs because our implementation of the radio’s physical layer requires that

packet data immediately follow the start symbol of the packet. It will refuse to shift to

a later, stronger packet once it has read the start symbol of the earlier packet. The 8

ms period corresponds to the transmission time required for the 18 byte preamble and 2

byte start words. This problem was identified by Whitehouse et al. [83]; they solved it

by modifying the MAC software to retrain when it encounters subsequent start symbols

of higher power. We became aware of this approach mid-way through our work. To

keep a consistent methodology, rather than modify our MAC to retrain, we detect and

filter out cases when the strongest packet arrives later than 8 ms. To do this we add two

timestamps to each packet, recording transmission start and completion times. Fortu-

nately, because timing error is normally distributed with a mean of 3 ms, few packets

arrive late. From timestamps in logs, about 3% of epochs must be discarded due to

late arrival of the strongest packet. By removing these packets, we should get loss rates

comparable to a MAC that can retrain on later packets as proposed by Whitehouse et

al.

Signal strength measurements are used to estimate the received signal strength (RSS)

and received interference strength (RIS) for the concurrent packet transmissions at the

end of the epoch. Measured signal strengths include the strength of the transmission

and any ambient noise. Received signal strength measurements are taken in ADC

counts and converted to dBm following the manufacturer’s documentation [10, 14].

This documentation also indicates that signal strength measurements are inaccurate

when they exceed -55 dBm. We confirmed this claim with tests and therefore drop

measurements beyond this threshold.

72

Page 89: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Given the RSS, we define JRIS as the measured joint received interference strength

when all interferers transmit concurrently. If N is the average ambient noise level

measured at the receiver, we can then calculate the signal-to-interference-plus-noise-

ratio (SINR) as:

SINRdB = 10 log10

10RSSdBm/10 − 10NdBm/10

10JRISdBm/10(5.1)

Note that we base our SINR values from measurements taken directly at the receiver.

This approach is central to the experimental nature of our work. Alternatives such as

measuring transmit power at the sender would require the use of theoretical models

of path loss and ambient noise, neither of which we know for our environment. While

our approach avoids inaccurate signal strength estimation due to mismatches between

model and environment, we do not claim that the measured signal strength values

represent “true” signal strengths, since that would require a calibrated comparison with

a highly accurate RF measurement device. Instead, we claim that they represent signal

strengths as measured by actual radios. Our results may not directly apply to future

radios with more accurate measurements of signal strength, however we believe our

findings have great utility with regard to practical protocols which must depend on

similar measurements in real deployments.

5.2.3 A Regression Model Mapping SINR to PRR

While all of our findings are based on raw measurements, we add regression lines in some

of the graphs to clarify the SINR-to-PRR relationship. The link layer model presented

by Zuniga and Krishnamachari [98], especially SNR to PRR conversion formula, is the

basis for our regression model.

PRR = (1− 12

exp−β0SINR+β1)8(2f−l) (5.2)

73

Page 90: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

This regression model is intended for non-coherent FSK modulation and Manchester

encoding that is used in Mica2 motes. We introduce the parameters β0 and β1 to fit

the experimental dataset to the regression model. The β0 value controls the shape of

the regression curve and β1 induces horizontal shifts of the curve. Based on repeated

experiments, we determined that a constant β0 value provides excellent fits (e.g., see

Table 5.4); find the optimal β0 for each experiment improved our R2 values by at most

0.01. We therefore hold β0 constant at 2.6 in all our single-interferer figures. The

parameter f is the frame size (230 bytes for our experiments) of the packet and l is the

preamble size in bytes (20 bytes).

5.3 Experimental Study of Single Interferers

In this section, we describe our systematic experiments to understand how concurrent

packet transmissions affect packet reception when there is a single sender and a single

interferer. We begin by studying how different transmit powers cause different regions

of reception, from good to noisy to bad (or white to gray to black)(in Section 5.3.1). We

then define the signal-to-interference-plus-noise-ratio (SINR) threshold for good recep-

tion and show that it varies with hardware combinations (in Section 5.3.2) and signal

strength (in Section 5.3.4), and does not vary strongly due to location (in Section 5.3.3).

Next, we complement our detailed studies based on small numbers of nodes with a larger

12-node experiment (in Section 5.3.5). Finally, from these results we propose a realistic

simulation model (in Section 5.3.6).

5.3.1 Interference and Black-Gray-White Regions

It is well known that stronger packets can be received even in the face of weaker,

concurrent transmissions, and this result has recently been confirmed and exploited

experimentally [83]. We begin our study with experiments to carefully quantify this

74

Page 91: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−16 −14 −12 −10 −8 −6 −4 −2 0 20

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Tx power of SRC1 (dBm)

PR

R

SRC1SRC2

(a) Transmission power level to PRR

−16 −14 −12 −10 −8 −6 −4 −2 0 2−100

−95

−90

−85

−80

−75

−70

−65

−60

−55

Tx power of SRC1 (dBm)

RS

SI (

dBm

)

SRC1SRC2NOI

(b) Transmission power level to RSS

Figure 5.2: Effects of varying SRC1’s transmission power level on the PRR and RSSI.Ambient noise level (NOI) at the receiver is shown together. Error bars show 95%confidence intervals

75

Page 92: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

capture effect as a function of the measured signal strengths from concurrent packet

transmitters over a wide range of transmission powers.

In these experiments we consider two transmitting nodes, SRC1 and SRC2. By

definition, we call the stronger signal source the sender and the weaker signal source

the interferer. From this definition these roles change with the varying transmission

powers. To study how these roles change, we vary transmission powers as both sources

send 230-byte packets and calculate packet reception rate (PRR), here over 60 epochs.

Figure 5.2(a) presents the packet reception ratio (PRR) of SRC1 and SRC2 as the

transmit power of SRC1 varies. Here we fix the transmission power level of SRC2 at

-4 dBm and vary the output power of SRC1 from -17 dBm to 2 dBm. Without inter-

ference, either source has reliable communications with the destination. However, the

experiment shows that three distinct regions occur as SRC1’s transmit power varies.

Beginning at the left of the graph, when SRC1 is less than -10 dBm, SRC2’s trans-

missions are always received. In the middle of the graph, when SRC1 transmits at

powers between -7 and -5 dBm, packets from neither of the senders are recognized at

the receiver. At the right of the graph, with SRC1 at -1 dBm or more, SRC1 is always

successful. This experiment shows two clear regions of packet capture, for SRC2 at the

left, and SRC1 at the right. We call these regions the white regions, where one source

is assured reception even in the face of a concurrent transmission. These regions can be

compared to the black region in the middle where neither transmission is received. Fi-

nally, we observe two gray regions at intermediate power levels (from -10 to -7 dBm and

-4 to -1 dBm), where packets reception is intermittent. We define the gray region as any

combination of sender and interferer transmit power levels that result in PRRs between

10% and 90%. Our definition was inspired by the notion of the gray area described by

Zhao and Govindan [93]. As with their definition, our gray region corresponds to high

76

Page 93: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

variation in packet reception. However, the gray area defined in their work refers to a

spatial distance range, and is not related to power levels.

To measure the level of interference in the channel we directly measure the received

signal strength (RSS) in Figure 5.2(b). Recall that we measure RSS values at the re-

ceiver, first taking separate measurements for each transmitter and then during the

concurrent transmission. Measured ambient noise during our experiment shows consis-

tent values, with a standard deviation of less than 1 dBm. The measured noise floor is

also much lower than the interference level in all our experiments and contributes little

to the SINR.

We align the x-axes of Figures 5.2(a) and 5.2(b) to relate RSS to PRR. We observe

that when the RSS of both sources become similar (within 0.6 dBm, when SRC1 is

around -6 dBm), packet reception for both transmitters is zero as the transmissions

corrupt each other. Further from this point, more packet receptions are observed as the

received signal strength difference between two transmitters increases.

Table 5.2 reproduces the PRR, RSSI, and transmit power values from Figure 5.2 and

adds calculated signal-to-interference-plus-noise-ratio (SINR) values. SINR represents

the difference between the sender (by definition, the strongest transmitter) and the

interferer. We categorize each SINR value based on the corresponding PRR as being in

a black, gray, or white region for the dominant source.

For simplicity, Figure 5.2 varied only one source’s transmission power while holding

the other constant. By contrast, Figure 5.3 shows measured results when the transmit

powers of both sources are varied. This extensive set of experiments confirms that the

results of Figure 5.2 hold regardless of which transmitter is varied or what power levels

are considered. A horizontal or vertical slice through this figure would show white

regions for either SRC1 or SRC2, a black region in the middle, and gray regions on the

77

Page 94: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Tx Pwr RSS ofof SRC1 SINR PRR Region

SRC1 (dBm) (dB)-17 -76.55 9.51 1-14 -74.07 7.08 1 white (SRC1)-12 -72.59 5.87 1-10 -71.09 4.21 0.98-8 -69.76 3.00 0.72 gray (SRC1)-7 -68.22 1.56 0-6 -66.33 0.58 0 black-5 -65.78 1.73 0 (neither)-4 -63.99 2.98 0.03-3 -63.01 3.98 0.22 gray (SRC2)-2 -61.96 5.02 0.82-1 -60.36 6.54 0.980 -59.64 7.08 1 white (SRC2)1 -58.13 8.75 12 -36.85 9.93 1

Table 5.2: SINR-to-PRR mapping with region distinction. RSS of SRC2 is static around-66.8 dBm and ambient noise is around -94.6 dBm

−75 −70 −65 −60 −55−75

−70

−65

−60

−55

SRC1 RSS (dBm)

SR

C2

RS

S (

dBm

)

0.1 PRR0.9 PRR

Figure 5.3: Packet reception rate at different RSS combination from SRC1 and SRC2.Black-gray-white regions are marked with cross, triangle, and circle respectively

78

Page 95: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

border. We also observe that the edge of the gray region is not strictly linear as the

transmit power varies. We will study this issue in more detail in Section 5.3.4.

Figures 5.2 and 5.3 show that concurrently transmitted packets are all corrupted

when they have nearly equivalent signal strength at the receiver. However, there is

a significant range of transmission powers in which the capture effect occurs and the

stronger packet is received successfully. These results lend further evidence to show

that the simplistic protocol interference model can be highly misleading. Capture-aware

MAC schemes are indeed likely to provide significant improvements in efficiency.

These observations motivate us to analyze various factors that impact relationship

between SINR and PRR. We define the SINR threshold as the minimum SINR which

guarantees a reliable packet communication with PRR ≥ 0.9. In the following sections,

we examine the impact of hardware combinations, node locations, and signal strength

variations on the measured SINR threshold. In particular, we seek to know whether

there is a constant SINR threshold for all scenarios.

5.3.2 SINR Threshold and Transmitter Hardware

Section 5.3.1 demonstrated the packet capture effect and defined the SINR threshold.

We next study SINR threshold to see if it is affected by variance in transmitter hardware.

In this experiment, we use different Mica2 motes with the same type of CC1000 radio.

We consider two pairs of nodes, SRC1-SRC2 and SRC1-SRC3. As in Section 5.3.1,

we hold one transmitter’s received signal strength constant at -66 dBm and vary the

others from -66 to -77 dBm. We then measure the SINR threshold.

Figure 5.4 presents these experimental results. On the left side of the graphs, SRC1

is the sender and SRC2 or SRC3 is the weaker interferer. On the right side, the opposite

holds, with SRC1 being weaker. The x-axis shows the SINR (the negative signs on the

left hand side should be ignored as an artifact of the presentation). In addition, the solid

79

Page 96: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−10 −8 −6 −4 −2 0 2 4 6 8 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

SINR (dB)

PR

R

SRC2(with SRC1)

SRC3(with SRC1)

SRC1(with SRC2)

SRC1(with SRC3)

Figure 5.4: Effect of different packet sender and interferer hardware on SINR-to-PRRrelationship

and dotted lines fit our regression model (defined in Section 5.2.3) to the experimental

data.

First, we compare the experiment results from SRC1-SRC2 pair, shown as the solid

line model and asterisk points. The SINR threshold values are different for each trans-

mitter; SRC1 has an SINR threshold of 3.4 dB and SRC2 has an SINR threshold of 5.3

dB. There is a nearly 2 dB difference between these thresholds. When we compare the

experiment results with different pairs of hardware (i.e., between the solid and dotted

regression lines), we can see that SRC1 requires a stronger signal strength to reach the

same level of PRR at the same receiver when the interferer is changed from SRC2 to

SRC3. SRC1’s regression line (shown in the left side of the figure) moves about 1 dB

to the left with interferer SRC3 and SRC3 requires about 1.7 dB lower SINR threshold

compared to SRC2 when the same node SRC1 is the interferer. These results indicate

strongly that the specific hardware combination of sender and interferer change the mea-

sured SINR threshold. (We rule out location differences as an alternative explanation

in Section 5.3.3.)

80

Page 97: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−10 −8 −6 −4 −2 0 2 4 6 8 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

SINR (dB)

PR

R

Original LocationSwapped Location

Figure 5.5: Effect of different packet sender and interferer location on SINR-to-PRRrelationship

Location Source β1 (95% confidence)Original SRC1 -0.914 (±0.108)

SRC2 3.802 (±0.127)Swapped SRC1 -0.587 (±0.157)

SRC2 3.774 (±0.147)

Table 5.3: Parameter β1 and 95% confidence intervals for two different locations

Note that since our SINR calculations in all cases are based on measurements at the

same receiver, we can rule out differences that have to do with transmit-side calibration

settings, receiver sensitivities, or differences in the magnitude of the path loss from

different transmitter locations. We speculate that the hardware-combination-specific

variations in the SINR-threshold result from distorted signals due to non-linear effects

in the radio transmitters. Even at the same measured signal strength at the receiver,

the signals from different sources may have different levels of distortion, in turn affecting

the packet reception differently.

81

Page 98: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

5.3.3 Effects of Location on PRR and SINR

One possible explanation for the variations in hardware shown in Section 5.3.2 could

be that the nodes were in different locations, resulting in different multi-path effects

on the channel. We therefore next study the effect of location on the SINR-to-PRR

relationship.

To study the possible effect of packet sender and interferer location on the SINR-

to-PRR relationship, we swap the location of SRC1 and SRC2 and performed the same

experiments as in Section 5.3.2. Swapping the sender locations changes the channels

observed between the two transmitters and the receiver. Figure 5.5 compares the ex-

periment results from new, swapped location with previous experiment results at the

original node location. There is no noticeable difference in SINR-to-PRR relationship

between these two set of experiment results. When we compare the parameter β1 value

used for each regression model (presented in table 5.3), β1 values are very close for the

same sender, not for the same location. But, SRC1 β1 value is still located a little bit

outside of 95% confidence interval of β1 value used for switched location. This difference

is from the effect of location change but it is minor compared to the hardware effect, as

can be observed from the corresponding curves in figure 5.5.

From this comparison, we can verify that the main difference in SINR threshold

between two nodes is from the transmitter hardware (or signal distortion level) difference

rather than their location difference. We have run similar experiments with a two

additional pairs of nodes, as well as with different locations for the nodes used above. We

consistently find that location change does not make distinguishable difference in SINR

threshold. However, all our experiments have been carried out in an office environment.

An area of future work is to study if these results apply in other environments, both

indoors and outdoors.

82

Page 99: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

0 1 2 3 4 5 6 7 8 9 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

SINR (dB)

PR

R

Figure 5.6: Experiments with wide range of sender and interferer signal strength.Sender: SRC2, Interferer: SRC1

5.3.4 Effect of Sender Signal Strength on the SINR Threshold

Our studies with two senders showed that the edge of the white region does not exhibit

a linear relationship with unit slope (see Figure 5.3), which would be expected if the

SINR threshold remained a constant regardless of the measured signal strength. In

Section 5.3.2, we showed that different transmitter hardware results in different SINR

thresholds. We next study more carefully how the measured sender signal strength

affects the SINR threshold.

Here we vary the transmission power level of both packet sender and interferer over

a wide range so that the received signal strength range varies from -91 to -52 dBm at

the intended receiver. Figure 5.6 shows these experimental results, where SRC1 is an

interferer and SRC2 is a packet sender.

This figure shows a gray region that is about 4.2 dB wide from SINR values of just

above 2 to above 6 dB. This wide range applies even though locations and hardware are

both constant—the only difference we have made for this experiment was to vary the

transmit signal strength of the sender.

83

Page 100: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

0 1 2 3 4 5 6 7 8 9 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

SINR (dB)

PR

R

−56.0−57.5−59.0−60.5−62.0−63.5−65.0−66.5−68.0−69.5−71.0

1

11 1 2 3 4 5 6 7 8 9 10 11

RSS (dBm) 2 3 4

10 9 8 7 6 5

Figure 5.7: SINR-to-PRR relationship categorized for different received signal strengthlevels. Experiment results in each category are represented with a regression line.Sender: SRC2, Interferer: SRC1

Index RSS range β1 SINRθ R2

(Fig 5.7) (dBm) (dB)1 -55.2 – -56.7 0.425 3.99 0.9982 -56.7 – -58.2 3.827 5.30 0.9823 -58.2 – -59.7 6.894 6.48 0.9934 -59.7 – -61.2 7.183 6.59 0.9925 -61.2 – -62.7 6.873 6.47 0.9876 -62.7 – -64.2 6.373 6.28 0.9957 -64.2 – -65.7 3.856 5.31 0.9638 -65.7 – -67.2 3.802 5.29 0.9799 -67.2 – -68.7 2.589 4.82 0.99710 -68.7 – -70.2 1.232 4.30 0.99711 -70.2 – -71.7 0.223 3.91 0.992

Table 5.4: β1, SINR threshold (SINRθ), and R2 (goodness-of-fit) value for sender SRC2 forSRC1-SRC2 pair experiments when β0 is set to 2.6

84

Page 101: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

To better understand the data in Figure 5.6, we collected the RSS values into 1.5

dB intervals (10 raw ADC counts) and then fit our regression model to each set of

experimental data. Table 5.4 shows the RSS ranges and corresponding model parameters

(β1) and SINR thresholds, along with goodness-of-fit (R2) data. (We use a constant 2.6

of β0 based on the analysis from the experimental data set as described in Section 5.2.3.)

This table shows that our model provides an excellent fit to the data, even with a

constant value for β0, since the worst case R2 fit value is 0.963. We therefore conclude

that our regression model can accurately summarize the experimental data. We also

observe that the model parameter β1 varies non-linearly over these measured RSS values.

This variation in β1 shows that the SINR threshold also varies with measured RSS in

some non-linear manner, even when hardware and location are unchanged.

To investigate how the SINR value relates to transmission power we plot the regres-

sion models in Figure 5.7. These show that the SINR threshold is highest at medium

measured RSS values and lowest when the measured RSS value is strong or weak. For

example, in Figure 5.7 the fitted model shifts to the right (higher SINRs) as the RSS

shrinks from -56.0 to -60.5 dBm (see arrows 1, 2, 3, and 4), then shifts back to the left

as RSS reduces further to the lowest observed values of -71.0 (arrows 5 through 11).

To confirm that this experimental result was not peculiar to our hardware or location,

we repeated similar experiments with several other pairs of nodes. We do not reproduce

the raw SINR-PRR graphs, but instead fit a model to each experiment and compute

the SINR threshold. Figure 5.8 shows how the SINR threshold value (for 0.9 PRR)

changes over different levels of sender signal strength for three different pairs of node

experiments: SRC1 with each of SRC2, SRC3, and SRC4. For each pair of nodes, the

figure shows two lines, one line each for when one of the transmitters behaves as a packet

sender while the other behaves as an interferer.

85

Page 102: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−74 −72 −70 −68 −66 −64 −62 −60 −58 −560

1

2

3

4

5

6

7

Received signal strength (dBm)

SIN

R th

resh

old

SRC1(SRC1−SRC2)SRC2(SRC1−SRC2)SRC1(SRC1−SRC3)SRC3(SRC1−SRC3)SRC1(SRC1−SRC4)SRC4(SRC1−SRC4)

Figure 5.8: SINR threshold for 0.9 PRR change at different received signal strengthlevel

All six SINR thresholds in Figure 5.8, show maximum values when the sender’s

signal strength (measured at the receiver) is around -61 dBm. In this region, the SINR

threshold, the β1 parameter value, and the width of the black region are all highest. This

result suggest that MAC protocols designed to exploit the capture effect and simulations

designed to realistically model wireless collisions both must consider the magnitude of

the signal strengths in addition to the ratio of signal and interference powers. We

believe that curves such as those plotted in Figure 5.8 can be used as the basis for

realistic simulations.

An important open question is understanding what physical phenomena causes this

variation in SINR threshold. One possibility is that the radio transfer function exhibits

nonlinear effects that affect signals with high and low signal strengths; another is that

the RSSI measurement process itself is skewed at these extremes. A more detailed

understanding of the causes of this RSS-SINR-PRR relationship is an area of future

work.

86

Page 103: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

0 1 2 3 4 5 6 7 8 9 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

SINR (dB)

PR

R

Signal strength

Hardware

Figure 5.9: Testbed experiments with 12 neighbor nodes

5.3.5 Testbed Experiments

To confirm that our hardware and signal strength effects on SINR apply generally, we

performed testbed experiments that consider a wider range of hardware combinations

and RSS levels. We randomly deployed 12 PC104 nodes in two large rooms where the

distance between the intended receiver and the farthest node in the testbed was around

18 meters. We selected an intended receiver node and a time synchronizer (using the

procedure described in Section 5.2.2) and performed pairwise experiments with the

remaining 10 nodes in the testbed. For each pair, one node is the sender (with stronger

RSS) and the other node behaves as an interferer.

We set the interferer’s transmission power constant at -8 dBm so that it has a

constant received interference strength (RIS) at the receiver. Measured RIS values from

different interferers range from -81 to -63 dBm, but we observe a change of up to 1

dBm RIS from the same interferer at different times, presumably due to time-varying

changes in the environment. We then vary the transmission power of the sender from

strength equal to the interferer’s RIS value until a power level where the RSS is strong

enough to provide reliable (close to 100%) packet reception.

87

Page 104: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

90

71

70

188

91

193

87

88

72

186

190

85

83

194

75

185

183

192

184

81

191

73

89

76

187

(a) Interference from the sender

90

71

70

188

91

193

87

88

72

186

190

85

83

194

75

185

183

192

184

81

191

73

89

76

187

(b) CCable links under old model

90

71

70

188

91

193

87

88

72

186

190

85

83

194

75

185

183

192

184

81

191

73

89

76

187

(c) CCable links with new model

Figure 5.10: Effects of introducing new capture-aware simulation model

We calculate SINR values based on the measured RSS and RIS pair information as

well as the measured ambient noise and plot the SINR-to-observed-PRR relationship in

Figure 5.9. Experimental results show a large variation in the SINR-to-PRR relationship

(or in SINR threshold values). We speculate that this is because different interferers

in the testbed generate signals with different distortion levels and different RISs at the

intended receiver. Also, different senders have different SINR thresholds for the same

interferer.

The change in RIS level causes a similar effect as the RSS level change (presented in

Section 5.3.4). This change is because different interference levels require different RSS

levels to provide the same level of link reliability. For one pair of sender and interferer, we

intentionally change the default transmission power of the interferer (which results in the

RIS between -74.2 and -60.5 dBm) to see the effect of RIS change on the SINR threshold

apart from the hardware effect. Figure 5.9 marks these results with triangles. This RIS

88

Page 105: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

level change causes a change in SINR threshold similar to our previous observations,

with a 1.9 dB gray region.

In the figure, the circles represent experiment results corresponding to having dif-

ferent sender hardware for a given fixed interferer. This sender hardware change results

in about 3.1 dB gray region. The width of gray region varies between 1.6 and 3.6 dB

for different individual interferers with 9 different senders. Overall, we observe a 6.1 dB

wide gray region in the testbed experiments.

Thus, the testbed experiments confirm the two identified causes of SINR threshold

variation (hardware combination and measured signal strength). These causes can ex-

plain the high variation in SINR-to-PRR mapping observed in previous experimental

studies [3], and strongly suggest that constant SINR-to-PRR mappings will not model

all realistic situations. Upper layer protocols designed based on the constant SINR

threshold assumption may therefore be inefficient or work incorrectly.

5.3.6 Modeling the SINR Threshold

Now that we have identified that hardware and signal strength each affect the SINR

threshold, we propose a simple simulation model for single-interferer scenarios that

considers these effects. We also show that this model can allow very different commu-

nications patterns than simpler models of intereference.

Based on the collected data in the testbed (shown in Figure 5.8), we model the RSS

and SINR threshold relationship with a quadratic function. We then allow hardware

choice to shift this model with a normal distribution around our observed mean, selected

once each simulation for each pair of nodes. We have verified that a quadratic fits signal

strength reasonably well, but confirming the normal distribution of hardware is an area

of future work. (We do not have enough hardware combinations to confirm normality

89

Page 106: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

20 40 60 80 100 120 140 1600

20

40

60

80

100

120

140

160

Link number

Num

ber

of C

Cab

le li

nks Capture−aware

Capture−unaware

Figure 5.11: The number of CCable link comparison between the two simulation models

at this time.) The model for SINR threshold (SINRθ) for sender S at a given RSS is

therefore:

SINRθ(S, RSS) = α2RSS2 + α1RSS + α0 + ζS (5.3)

where ζS ∼ N (0, σ2)

Where we set α2 = −0.0305, α1 = −3.855, α0 = −116.91. The hardware effect is

modelled as a zero-mean Gaussian random variable ζS with a variance of σ2 = 1.33, that

moves the curve up and down. This single-interferer model represents one application

of our experiments to modeling the reception of real radios in simulation.

Figure 5.10 shows the effects of using our newly proposed capture-aware simulation

model compared to the traditional packet collision model which assumes a collision if

there is a concurrent packet transmission within range. This figure visually compares

90

Page 107: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

the concurrently communicatable links (in short, CCable links) together with the com-

munication from the node 183 to 81 (comm183−>81, two nodes in the middle of the

testbed joined by thicker line) under the two different simulation models.

Figure 5.10(a) shows the communication links from the sender node 183 to its neigh-

bor nodes. Each link represents the interference from the sender as well. Solid lines

show over 90% PRR links and dotted lines show the links with between 10% and 90%

PRR. We use link qualities empirically measured in the 25 node testbed shown in the

figure. We measure both PRR and RSS at 0 dBm transmission power with 50 packets.

Figure 5.10(b) shows the CCable links together with the comm183−>81 with the

traditional simulation model. Solid lines show the CCable links that are available with

over 90% PRR and the dotted lines represent the links that might be CCable when the

packet from the node 183 is not received due to unreliable connection.

In Figure 5.10(c), we present the links that can be CCable together with the comm183−>81

based on our capture-aware SINR threshold model. To be on the safe side from the ob-

served hardware variation, we added an extra 4 dB to the calculated SINR threshold

value from our model, which ensures the SINR threshold to be at least the maximum

SINR threshold value we observed in our testbed experiment. This guarantees that the

CCable links can be used regardless of hardware variation.

As we can easily compare between Figures 5.10(b) and 5.10(c), our new capture-

aware SINR threshold model shows significantly more CCable links. We performed

the same comparison for all links with PRR over 90% (174 total links) in the testbed

assuming every reliable link can transmit a packet using the link. Figure 5.11 com-

pares the number of CCable links between the new capture-aware model (top solid line)

and the traditional capture-unaware simulation model (bottom dahsed line). The new

capture-aware model typically provides about 3 times more CCable than the old model.

This example concretely illustrates the utility of our experimental study in enabling the

91

Page 108: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

development and evaluation of novel capture-aware MAC protocols. It also suggests

that that current RTS/CTS based medium access protocols are overly conservative, a

potential area of future work.

5.4 Experimental Study of Multiple Interferers

In this section, we consider concurrent packet transmissions involving more than two

transmitting nodes (i.e., involving two or more interferers). In Section 5.4.1, we define

how we empirically measure the joint interference as well as a conventional estimator

assuming additive interference strengths. We then show that the measured joint in-

terference generally does not match the additive assumption (Section 5.4.2). We then

show in Section 5.4.3 that it is difficult to estimate the joint interference in the presence

of more than one interferer, because measurements show high variance. Finally, we

investigate the impact of multiple interferers on the SINR threshold in Section 5.4.4.

5.4.1 Joint Interference Estimator

When there is a single interferer (IFR) (i.e., a concurrent packet transmitter), we can

estimate the interference strength from this interferer based on the individually mea-

sured received interference strength (RIS). We now consider how joint interference may

be estimated in the presence of multiple interferers.

The following two metrics are estimators of joint interference, with n interferers and

k measurements from a given setup:

JRIS(e) =n∑

i=1

RISIFRi

JRIS(m) =∑k

i=1 JRISi

k(5.4)

92

Page 109: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−16 −14 −12 −10 −8 −6 −4−90

−85

−80

−75

−70

−65

Tx power of IFR2 (dBm)

RIS

(dB

m)

Min

Max

JRIS(e)

JRIS(m)

IFR1

IFR2

Figure 5.12: Two node experiments IFR2 at -75 dBm and IFR1 between -82– -70 dBmRIS at the receiver

JRIS(e)1 is the estimation based on the summation of individual RIS measurements

from each interferer where RIS measurement for each interferer is taken without any

interference in the same channel. JRIS(e) is a conventional way to calculate the inter-

ference from multi-sources in theoretical studies.

JRIS(m) uses the mean of multiple JRIS measurements as the estimator of joint

interference. JRIS(m) is a more practical method to estimate the joint interference

from multiple interferers using the collected, actual JRIS measurements in real systems.

5.4.2 Additive Signal Strength Assumption

We first investigate the following question: “is the additive signal strength assumption

valid in the measurements with low-power RF radios?”. Here, our aim is to examine1Note that we must compute in linear units of power, so we convert values to milliwatts for addition,

then back to dBm.

93

Page 110: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−75 −73 −71 −69 −67 −65 −63 −61 −59 −57−90

−85

−80

−75

−70

−65

−60

−55

−50

Tx power of IFR2 (dBm)

RIS

(dB

m)

Max

Min

JRIS(e)

JRIS(m) IFR1

IFR2

Figure 5.13: Experiment results with two interferers (IFR1 and IFR2) causing equivalentRIS at the receiver

the validity of using the measurement-based JRIS(m) as an interference estimator in

practice.

5.4.2.1 Two interferer experiments

We carefully design experiments (as described in Section 5.2.2) to measure the JRIS at

the intended receiver. First, we run some experiments with two concurrent interferers

(IFR1 and IFR2) to see the effect of combined interference on the JRIS values. IFR2

uses constant transmission power and the RIS from IFR2 is around -75 dBm at the

receiver. IFR1 varies its transmission power between -17 to -4 dBm and this power

adjustment results in the RIS between -82 to -70 dBm at the receiver.

Figure 5.12 presents the following information:(1) IFR1 and IFR2: mean RIS at the

receiver from each interferer (IFR1 and IFR2) measured individually without any inter-

ference (2) JRIS(e): joint interference estimation based on the additive signal strength

assumption (3) JRIS(m): mean measured JRIS from both interferers (4) Min-Max: min-

imum to maximum value range of JRIS measurements in two dotted lines. Each data

94

Page 111: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

point represents a mean measurement value over 100 experiments with 230B packets.

Error bars show 95% confidence intervals for JRIS(m) values.

While it is intuitive to see the dominance of stronger interference signal over the

weaker interference due to the logarithmic nature of dBm unit, we still expect to measure

a higher JRIS(m) value from the intensified joint interference than single RIS when both

interferers have equivalent RIS at the receiver, as with the JRIS(e) estimates. However,

the JRIS(m) value follows the single stronger RIS value within the 95% confidence

interval even at the point where both interferers have about the same individual RISs

at the receiver (e.g. when transmission power of IFR1 is -10 dBm in Figure 5.12).

Even though JRIS(e) value is normally considered as an estimator of joint inter-

ference, our experiments show that the measured JRIS(m) values are generally always

lower than the estimated JRIS(e) values.

5.4.2.2 Additivity and RIS levels

To investigate if the observation from -75 dBm individual RIS level holds at different

interference strength levels, we perform further experiments with two interferers at

multiple RIS levels between -76 and -59 dBm. Figure 5.13 shows the experiment results

for the cases when both interferers generate equivalent RIS at the receiver at different

interference strength levels. While the JRIS(m) value normally follows the stronger RIS

value when the RIS values are not equal as well as at extreme values of RIS when they

are equal for all interferers, in this experiment we find some intermediate RIS levels

(around -68 dBm) where the JRIS(m) value is larger than the stronger value. However,

it is still the case that the JRIS(m) is smaller than the JRIS(e) value.

95

Page 112: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

# of Individual JRIS(e) JRIS(m)IFRs RISs (dBm) (dBm) (dBm)

1 -72.9 — — — -72.9 -72.92 -72.9 -73.4 — — -70.1 -72.73 -73.0 -73.5 -73.3 — -68.5 -70.44 -72.9 -73.5 -73.5 -73.0 -67.2 -68.9

(a) RIS from each interferer around -73 dBm

# of Individual JRIS(e) JRIS(m)IFRs RISs (dBm) (dBm) (dBm)

1 -68.8 — — — -68.8 -68.82 -69.0 -68.7 — — -65.8 -67.13 -69.1 -68.6 -68.7 — -64.0 -64.24 -68.9 -69.0 -68.8 -68.2 -62.7 -63.7

(b) RIS from each interferer around -68.8 dBm

Table 5.5: Comparison of JRIS(e) and JRIS(m) metric for JRIS estimation at twodifferent individual RIS levels

5.4.2.3 Additivity with Additional Interferers

To see the effect of additional interferers on JRIS(m) and JRIS(e), we have performed

experiments with one to four interferers each with equivalent individual RIS levels. We

incorporate the change in JRIS(m) value at different RIS levels (identified in previous

section) by repeating the same experiments at the following two RIS levels: -73.0 dBm

(where JRIS(m) is close to the single strongest RIS) and -68.8 dBm (where JRIS(m) is

higher than the single strongest RIS). We have individually measured RIS values from

each interferer and the JRIS value from different number of concurrent interferers over

the 75 packet experiments for each setup.

When we compare the JRIS(e) and JRIS(m) at two different RIS levels in Table 5.5,

there are smaller differences between the two interference estimators at -68.8 dBm in-

dividual RIS. This is in agreement with our previous results that shows higher signal

strength additivity at -68.8 dBm than at -73 dBm (presented in Figure 5.13). These

96

Page 113: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−78 −76 −74 −72 −70 −68 −66 −64 −62 −600

10

20

30

40

50

60

70

RIS (dBm)

Fre

quen

cy

JRISRIS1RIS2

Figure 5.14: Frequency distribution of JRIS measurement values for two interferer ex-periments

results with multiple interferers also confirm our previous observation that the JRIS(e)

estimates stronger interference than measured by JRIS(m).

5.4.3 Variation in JRIS Measurements

When we look at the each JRIS measurement value rather than the mean value (i.e.,

JRIS(m)), there is significant variation in the JRIS measurements especially when IFR1

and IFR2 have close interference strength at the receiver. The wide minimum to maxi-

mum JRIS value range (in Figure 5.12 and 5.13) clearly represents a significant variation

in JRIS measurements. The standard deviation of the JRIS measurements is around 3

dBm (2.75 to 3.65 dBm) over the experiments with different levels of two equivalent in-

terference strength (shown in Figure 5.13). And the minimum-to-maximum JRIS range

is consistently very wide throughout the experimented signal strength levels.

Figure 5.14 shows one example of the frequency histogram from the 300 JRIS and

RIS measurements from two interferer experiments. While RIS measurements from each

interferer (RIS1 and RIS2) are clustered together near the mean value (-68.2 and -68.5

97

Page 114: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−74 −72 −70 −68 −66 −64 −62 −603

4

5

6

7

8

9

10

11

12

Received interference strength (dBm)

SIN

R th

resh

old

1

2

3

4

2

3

4

1

2

3

2 3

1

2

2

1 IFR cases

JRIS(m) JRIS(e)

JRIS(m) JRIS(e) JRIS(m)

JRIS(e)

−73 dBm

−68.8 dBm −64.1 dBm

Figure 5.15: SINR threshold changes with different number of interferers which changesthe received interference strength

dBm respectively), the JRIS values are widely distributed around its mean value (-66.2

dBm). This histogram clearly shows the wide variation from the multiple interferers in

the JRIS measurements (where the standard deviation is 3.02 dBm) compared to the

single interference cases (where the standard deviation is 0.30 and 0.37 respectively) and

some additive behavior (about 2 dBm increase in JRIS(m)) from multiple interference

at the given individual RIS level. The JRIS values are still normally distributed. Similar

frequency distributions are observed from the experiments with two to four interferers.

In wireless communication protocols, collecting the received signal strength indi-

cation (RSSI) is a natural way to estimate the current interference plus noise level.

However, single RSSI measurement (which we call RIS for interference measurement)

cannot be an appropriate estimator of current interference if there is any possibility of

having multiple interferers, due to the significant variance in the measurement values.

98

Page 115: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

5.4.4 Effects of Joint Interference

By comparing JRIS(m) and JRIS(e), we have evaluated how measured joint interference

levels from multiple interferers compare to estimated joint interference. We next relate

this back to the SINR threshold for reliable packet reception.

To evaluate the SINR threshold with multiple interferers, we vary both the number

of interferers and the individual RIS levels. We consider from 1 to 4 interferers, and RIS

levels of -73, -68.8, and -64.1 dBm, matching the experiments in Table 5.5 and adding

the -64.1 dBm level.

Figure 5.15 shows the experiment results, comparing the SINR threshold against the

received interference strength (RIS). We mark each data point with the number of inter-

ferers in each experiment and also indicate the method of joint interference estimation

(either JRIS(e) or JRIS(m)) for each branch. The experiments in the same branch use

the same individual RIS level. As indicated in Section 5.4.1, JRIS(e) values are predicted

from individually measured RIS values, while JRIS(m) are joint measurements.

We draw three conclusions from this experiment. First, we consider how SINR varies

as we add interferers at a given RIS level. We have three examples in the strings of

experiments starting at -73, -68.8, and -64.1 dBm. Regardless of the estimator used

(JRIS(m) or JRIS(e)), we observe that additional interferers raises the SINR level re-

quired to successfully receive a packet. This trend is clearest for the -73 dBm case where

1 to 4 interferers are considered, but it holds for all three cases.

Second, we can compare SINR threshold for two different estimators JRIS(e) and

JRIS(m) (i.e., the dotted and solid lines in the figure). We find that JRIS(e) has

consistently lower SINR threshold than JRIS(m). Recall from Section 5.4.2 that JRIS(e)

has a consistently higher estimation of interference level. A lower SINR threshold with

higher interference estimation sounds counterintuitive, but this is a consequence of the

way in which the SINR threshold is calculated. We have the measured received signal

99

Page 116: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

strength and its corresponding packet reception rate from the experiments. The only

difference is in the interference level obtained by the two different estimators. We

calculate the SINR threshold with this pre-identified RSS and the estimated interference

with both methods, taking into account the ambient noise level. Hence the JRIS(e)

estimator, which offers a higher level of interference, results in a lower SINR threshold.

This illustrates the point that a careful selection of interference estimator is important

because that can significantly affect the calculated SINR threshold value.

Finally, we can compare SINR threshold values as the JRIS increases. JRIS will

rise either due to increase in the individual RIS in our three sets of experiments, and

also due to increase in the numbers of interferers. In Section 5.3.4 and 5.3.5 we show

that SINR threshold values changes at different signal strength levels. We highlight

the variation in SINR threshold with a single interferer at different RIS levels with

an arched, dashed line at the bottom. We may perhaps expect multiple interferers

to generally follow a similar trend. Unfortunately we do not have enough data to

conclusively support or refute this trend for multiple interferers. The trend in two

interferers shows a monotonically decreasing trend but this could be due to missing

points at lower power levels. Investigating this further is an area of future work.

5.5 Preliminary evaluation of 802.15.4 Radio

We performed brief experiments with MicaZ motes equipped with CC2420 [11] radios

to verify that our results apply to other low-power radios such as 802.15.4. The CC2420

uses O-QPSK modulation with direct sequence spread spectrum (DSSS), unlike the

CC1000’s FSK, and it operates at 2.4GHz at 250Kbps instead of 465MHz at 56Kbps.

We performed experiments using the same methodology from Section 6.4.1 with the

802.15.4 radios. We use one synchronizer and one receiver and two concurrent packet

senders, one as a sender and the other as a interferer. Each concurrent packet sender

100

Page 117: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

varies its transmission power between -25 and 0 dBm at eight different power levels.

For one set of experiments, we run experiments at 64 different transmission power

combinations of two concurrent senders (SRC1 and SRC2). We measure a PRR with

50 data packets at each transmission power level.

We performed 25 sets of repeated experiments at two different concurrent sender

locations. The distance from the senders to a receiver was 3 and 4 meters respectively

for SRC1 and SRC2 for the first node location, and only SRC1 is repositioned to 5 meter

distance from the receiver in the second node location. We use a 128 byte packet size

(the maximum packet size for 802.15.4 radio) for our experiments. The experiment was

performed in a closed room with no movement.

Figure 16 shows the SINR-to-PRR relationship as both SRC1 and SRC2 power

varies. As in Figure 5.4, we can see that SRC1 captures the channel on the left of the

figure, while SRC2 transmits successfully on the right when its power is stronger. These

results confirm that the capture effect we observe in the CC1000 also occurs with an

802.15.4 radio in the CC2420, in spite of a higher bit rate and different modulation

scheme. We also observe that some hardware variation still exists in this new radio (as

we observed previously in Section 5.3.2). This can be seen around SINR 0 in Figure 5.16,

when on the right, SRC1 is able to capture the channel at SINR values between 0 and

1, while on the left, SRC2 is unable to receive until SINR is greater than 1dB (to the

left of -1 dB on the graph). The minimum SINR value which always provides 90% PRR

was 3.87 dB for SRC2 and 2.69 dB for SRC1.

Finally, two differences between the radios. While we observe around 4 dB gray

region for the CC1000 (Figure 5.6) with received signal strength change, the CC2420

shows 2–3 dB gray region, also providing lower SINR threshold. Most of the time

higher than 2 dB of SINR value consistently provide reliable packet communication

in our experimental results. A likely explanation for this difference is that the DSSS

101

Page 118: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−10 −8 −6 −4 −2 0 2 4 6 8 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

SINR (dB)

PR

R

Figure 5.16: SINR to PRR relationship: preliminary results with CC2420 radio

modulation is better at rejecting noise than the simpler approach in the CC1000. Also,

we did not observe a strong relationship between SINR threshold and received signal

strength (Section 5.3.4).

Although these preliminary results suggest that several of our findings hold on this

newer radio, additional experiments are needed to draw more careful conclusions.

5.6 Summary

In this chapter we have presented experimental analysis of the effects of concurrent

packet transmissions in low-power wireless link communications. We have confirmed

the capture effect and the existence of the SINR threshold which ensures the successful

delivery of the strongest packet under the concurrent packet communication situations.

Our main contributions and findings are as follows:

• We have performed the first systematic experimental study which verifies a dif-

ference between the conventional approximation of the interference effect and the

102

Page 119: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

real-world behavior of concurrent packet transmissions. Our experimental study

provides new guidelines for more realistic simulation models.

• Our study shows that the SINR threshold is not a constant value, but that it

depends on the transmitter hardware and the signal strength level. While the

combinations of different hardware and signal strength in the testbed generate

large (about 6 dB) gray region with mixed reception rate at the same SINR value,

the gray region is small for a fixed hardware combination at the same signal

strength level.

• Upper layer protocols that assume a constant SINR threshold can fail or be in-

efficient due to the significant variation in SINR threshold. Protocols designed

considering capture effects and variability in SINR threshold will be more de-

pendable and efficient.

• Single RSSI value measurement is not always a good estimator of current inter-

ference level because there is a large variation in measured signal strength in a

multiple interference situation.

• The measured interference from multiple transmitters is generally less than the-

oretically predicted by the assumption that interference is additive. For a given

measured signal strength, therefore, the measured joint interference results in

higher calculated SINR threshold values than predicted by theory.

• The SINR threshold generally increases with the number of interferers.

Understanding the effects of concurrent packet transmissions in low-power wireless

networks provides a fundamental knowledge for more efficient interference-aware pro-

tocol design. In this study, we quantified SINR threshold for some selected hardware

and observed significant capture effect from concurrent transmissions. This implies high

103

Page 120: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

possibility of concurrent packet communication. With careful selection of transmission

power for simultaneous transmitters, we can provide successful packet reception (i.e.,

channel capture) at multiple receivers at the same time.

104

Page 121: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Chapter 6

Evaluating the Importance of Concurrent Packet

Communication

6.1 Overview

Concurrent packet transmission — transmission by two or more senders within max-

imum communication range of each other’s receiver at the same time over the same

channel — has been considered harmful and avoided in wireless communication. Pro-

tocols such as 802.11 explicitly prevent concurrent transmission with carrier sensing

and by exchanging RTS/CTS messages (as proposed earlier [5]). Approaches such as

RTS/CTS handshake reduce multi-hop wireless throughput by blocking all other trans-

mission around both the sender and receiver.

The possibility and promise of concurrent packet transmission has recently been

demonstrated in several studies [39, 43, 66, 79, 83] including our thorough experimental

study presented in the previous chapter. The benefits of concurrent communication seem

obvious, when it is possible, because it will improve spatial reuse, resulting in higher

throughput especially when traffic is heavy and network density is high. However, it is

not obvious that how often concurrent transmission is possible. For example, if one pair

of nodes always transmits at the lowest power level possible, then any other concurrent

transmissions will increase the effective noise and force the original pair to raise its

105

Page 122: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Contributions SectionCCable link and optimal Tx power decision rule 6.3New metric for CCability (concurrent communication) 6.4.2Quantification of CCability: User Controllable parameters

Higher Tx power increases CCability for fixed power 6.4.3Shorter link distance increases CCability 6.4.4.1Lower SINR threshold increases CCability 6.4.4.2Tx Power control increases CCability 6.4.4.3

Quantification of CCability: Uncontrollable parametersEffect of Path loss exponent on CCability is dependent 6.4.5.1

on location and power flexibilityCCable links are prevalent in real-world 6.4.5.2

Concurrent transmission is at least capturable in general 6.4.6Experiments with MicaZ motes validate simulation results 6.5

Table 6.1: Key findings from concurrent communication study

power. This coupling may mean that there is never a significant benefit to concurrent

transmission.

To illustrate this question, Figure 6.1 shows three configurations where two pairs of

nodes send concurrently, S1 to R1 and S2 to R2. We assume a nominal radio range of 8

m at -10 dBm transmission power. In case (a), the pairs are 10 m apart and can easily

send concurrently, even with an RTS/CTS-based MAC protocol, since nodes are out of

range of each other. On the other hand, in case (c), R1 and S2 are only 2 m apart, and

no attempt at concurrent transmission will be successful. Although S1’s transmission

can be received at R1, if S2 attempts to send concurrently, S1 must raise its power due

to interference from S2, and this higher power forces S2 to raise its power, ad infinitum.

However, there are intermediate cases where concurrent transmission is possible (as

suggested in [79]). For example, when the R1-S2 distance is 7 m as in case (b), then

802.11’s RTS or CTS will block concurrent transmission. However, with proper MAC

support both S1 and S2 can simultaneously capture the channel at its corresponding

receiver. We look at this example and others in more detail in this chapter.

106

Page 123: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

(a)

-5 m

S1

-0 m

R1

10 m

S2

15 m

R2

(b) S1 R1

7 m

S2

12 m

R2

(c) S1 R1

2 m

S2

7 m

R2

Figure 6.1: Two concurrent packet communications at three different locations

Table 6.1 summarizes the contributions of the work presented in this chapter (which

appears in [15]). First, we develop a simple decision rule to decide when concurrent

communication is possible while minimizing transmission power. With this decision

rule, we can determine if concurrent transmission is ever possible for a given topology,

and then compute the optimal (minimal) transmission power settings for successful

concurrent communication, if possible.

Through simulations, we then systematically quantify opportunities for concurrent

communication with and without transmission power control as many radio and envi-

ronmental parameters vary, including node position, mean and variance of path loss,

signal-to-interference-plus-noise-ratio (SINR) threshold, and granularity and range of

transmission power control.

We also introduce and use a new metric to estimate the feasibility and benefits from

allowing concurrent transmission for different environmental and hardware conditions.

Our simulations show that often, 40–75% of the time, depending primarily on distance

and location, two pairs of nodes can communicate concurrently. We can observe large

region where concurrent communication is possible even with fixed transmission power,

but dynamic power control significantly improves concurrent communications. We vali-

date key results through experiments over MicaZ motes with 802.15.4 radios, confirming

concurrent transmission is possible and validating our simulation results.

107

Page 124: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

S1 R1S11

(Dist: 5 m)

I12

S2 R2S22

(Dist: 5 m)I21

(dist: vary)

Figure 6.2: Example scenario with two concurrent packet sender-receiver pairs varyingR1-S2 distance. PL0 = 45, n = 4, SINRθ = 4, Xσ = 0, N1 = N2 = −95 dBm, FixedTx power= −10 dBm

6.2 Motivating Example

We define two (or more) transmissions as concurrently communicatable or CCable if

they can both successfully be received at the same time. Traditional MAC protocols

such as 802.11 ensure collision-free packet communication by carrier sensing followed by

RTS/CTS handshakes that bar communication from nodes within one hop of either the

sender or receiver, while other protocols (for example, TRAMA [63]) adopt a TDMA-

based schedule with two-hop neighbors in mind. In this chapter, we explore the use of

channel capture and transmission power selection to allow CCable communication when

nodes are within range of each other.

In this section we explore how transmission power and node location interacts to al-

low CCable communication in some cases. To introduce CCable communication we first

use simulation to explore how transmission power and source and destination location

affects the ability to communicate.

Figure 6.1 showed several scenarios where both senders (S1 and S2) concurrently

transmit packets to their corresponding receivers (R1 and R2). We generalize this

example with variable distance between R1 and S2 in Figure 6.2. We denote the signal

strength from sender i to receiver j as Sij , and the interference it generates at the other

receiver k as Iik. We define ambient noise at each receiver as Nj . Throughout this

simulation, we use the same link distance of 5 m between each sender and receiver. Under

108

Page 125: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

1 2 3 4 5 6 7 8 9 10−30

−25

−20

−15

−10

−5

0

5

10

15

Distance R1−S2 (m)

SIN

R (

dB)

SINR(R1)SINR(R2)

SINR threshold = 4

Capturable

CCable (w/o PC)

CSMARTS/CTS

CCable (w/ PC)

Figure 6.3: CCability for different schemes. SINR values are measured at -10 dBm fixedTx power

the constant radio and environmental parameter settings (presented in the caption of

Figure 6.1, we only vary the distance between the R1 and S2 and calculate signal

and interference value based on an exponential path loss model (details of this model

are explained in Section 6.3). We consider the SINR value greater than equal to 4

as a threshold for successful communication (i.e., SINRθ = 4) in this simulation. We

consider the signals arrived from unintended senders as interference in SINR calculation

at each receiver.

Figure 6.3 shows simulations as the S2-R2 pair of nodes moves right and left. We

compare the distance from R1 to S2 against the SINR values of the intended transmis-

sions when both senders transmit at a power of -10 dBm. At this transmission power,

either communication would succeed if it occurred separately, but here we can identify

four different regions of communication when both senders transmit at the same time.

Starting at the right of the figure, when R1-S2 is 9 m or further away, we call

this the CSMA RTS/CTS CCable region. Intuitively, at these distances, nodes just

cannot hear each other and so spatial reuse allows them to operate independently. With

109

Page 126: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

MAC protocols such as 802.11, carrier sensing and RTS/CTS handshake are used to

prevent concurrent transmission. The carrier sense threshold is always set to less than

equal value to the RSS which ensures successful packet reception. We use the received

signal strength (RSS) of -91 dBm as a packet reception threshold in our simulation

(based on the empirical results with MicaZ mote). We also choose the same RSS value

as packet reception threshold as the carrier sense threshold, which is the maximum

plausible value in this example. With lower carrier sense threshold (which is more

general setup in conservative 802.11 MAC), the 802.11 CC region becomes smaller. In

other words, longer than 9 m link distance between R1-S2 is required for 802.11 CC in

real implementations.

We call the next region from the right, when R1-S2 is just less than 7 m to 9 m,

CCable without transmission power control. Concurrent communication is possible

in this region at constant transmission power because both receivers can capture the

intended packet, since both have a higher SINR value than SINRθ at the given default

transmission power.

Next, we mark CCable region when we take advantage of transmission power control.

There is an even more expanded CCable region, starting from about 3 m, compared to

the case with a static power. We will show how to select the power appropriately to

enable CC in this region, in the next section. The combined region from 3 m to 9 m

thus represents the zone where a sophisticated MAC could allow communication that

would be prevented by MACs that use CSMA and RTS/CTS, similar to 802.11.

The next region, with R1-S2 distance starting at about 1.5 m, is a case where

one sender (in this case S2) can capture the channel, but the other sender cannot

communicate successfully (only one receiver’s SINR exceeds SINRθ). We define this

region as capturable region.

110

Page 127: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Finally, in the leftmost region, where R1-R2 is less than 1.5 m, neither pair can

communicate. The receivers are located too close together and neither can capture the

channel. Both receivers have SINR values lower than SINRθ and their transmissions

will always collide and corrupt each other. In this region, both senders need to increase

their transmission powers to meet the SINRθ condition for successful communication.

But, if one sender attempts to increase its transmission power to capture the channel,

this further increases the interference at the other receiver. The other sender requires to

increase its transmission power to overcome this extra interference and it only neutralizes

the benefits from the transmission power control. Therefore, CC is never possible even

with transmission power control in this region.

These different regions suggest the complex interaction between concurrent senders.

We next define and model concurrent communication more formally.

6.3 Mathematical Modeling

We begin by modeling mathematically when concurrent transmissions can occur for the

case of two senders and two receivers. For our modeling, we use the exponential path

loss model with log-normal fading [65, 98]:

PL(d)dB = PL(d0)dBm + 10n log(d/d0) + XσdB(6.1)

Pr(d)dBm = PtdBm− PL(d)dB

Here Pt and Pr are the transmission and reception power in dBm. The sender-

receiver distance is d, and d0 is the reference distance for path loss (PL). Xσ is the

variance in path loss due to multipath fading, modeled as Gaussian random variable

111

Page 128: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−25 −20 −15 −10 −5 0 5 10−25

−20

−15

−10

−5

0

5

10

Transmission power of S1 (dBm)

Tra

nsm

issi

on p

ower

of S

2 (d

Bm

)

SINR at R1 = SINRth1SINR at R2 = SINRth2

S2 Capture power settings

CCable power settings

S1 Capture power settings

(a) dR1−S2 = 10 m, lf 1 = 4, lf 2 = 2

−25 −20 −15 −10 −5 0 5 10−25

−20

−15

−10

−5

0

5

10

Transmission power of S1 (dBm)

Tra

nsm

issi

on p

ower

of S

2 (d

Bm

)

SINR at R1 = SINRth1SINR at R2 = SINRth2

S2 Capture power settings

CCable

S1 Capture power settings

(b) dR1−S2 = 4 m, lf 1 = 1.8, lf 2 = 0.8

−25 −20 −15 −10 −5 0 5 10−25

−20

−15

−10

−5

0

5

10

Transmission power of S1 (dBm)

Tra

nsm

issi

on p

ower

of S

2 (d

Bm

)

SINR at R1 = SINRth1SINR at R2 = SINRth2

S2 Capture power settings

No CCable power settings

S1 Capture power settings

(c) dR1−S2 = 2 m, lf 1 = 1.4, lf 2 = 0.4

Figure 6.4: The CCable transmission power relationship between S1 and S2. PL0 = 45,n = 4, SINRθ = 4, Xσ = 0

with zero mean and standard deviation σdB. This model defines the path loss and the

received signal strength (RSS) at the receiver for a given transmission power level.

112

Page 129: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

6.3.1 Power Setting for CCability

For concurrent transmission to be possible, the received SINR must be above the thresh-

old for each receiver (SINRθr for receiver r):

S11dBm− 10 log(10I21dBm

/10 + 10N1dBm/10) ≥ SINRθ1dB

(6.2)

S22dBm− 10 log(10I12dBm

/10 + 10N2dBm/10) ≥ SINRθ2dB

For a given distance-based path loss model, such as the one we described in Equa-

tion 6.1, we get the following non-linear inequalities relating the transmission powers of

both senders, given a sender x to receiver y distance of dxy and transmission power of

Pt(s) for sender s:

Pt(S1) ≥ PL(d11) + SINRθ1+ (6.3)

10 log(10(Pt(S2)−PL(d21))/10 + 10N1/10)

Pt(S2) ≥ PL(d22) + SINRθ2+

10 log(10(Pt(S1)−PL(d12))/10 + 10N2/10)

We can visualize these non-linear inequalities as regions in a plot where the axes rep-

resent the transmission powers Pt(S1) and Pt(S2). The intersection of regions would

then indicate when both conditions are satisfied simultaneously, i.e. when concurrent

transmissions are possible. From the above equation, we see that the shape of these

regions would be primarily determined by the path loss model and the inter-node dis-

tances. Figure 6.4 shows these regions for three different node topologies.

113

Page 130: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Figure 6.4(a) shows regions corresponding to the non-linear inequalities for the sce-

nario shown in Figure 6.2 at 10 m of R1-S2 distance. Each line indicates the sender’s

optimal transmission power which meets the SINR threshold requirement at its intended

receiver with equality. The line with circles shows calculated S1’s optimal transmission

powers if the S2’s transmission power varies between -25 and 10 dBm as shown in

the Y-axis. The region to the bottom-right of this curve represents all combinations

of transmission powers that allow receiver R1 to capture the message. The line with

crosses similarly shows S2’s calculated optimal powers for different S1’s transmission

power selections. The region to the top-left of this curve shows all combinations of

transmit powers that allow receiver R2 to capture the message. The overlapping re-

gion, therefore, shows the combination of transmission powers that allow for concurrent

transmission (i.e., these are the CCable power settings).

As shown in the plots in Figure 6.4, the extent and the existence of the overlapping

CCable region depends upon the inter-node distances. In particular, compared to (a),

(b) shows a smaller CCable region requiring higher transmit powers as the R1-S2 dis-

tance becomes smaller; when the R1-S2 distance is reduced even further in (c), we find

that the two regions no longer overlap.

The crossing point of the two lines in Figure 6.4 provides the optimal S1 and S2’s

transmission power combination, which is the minimum transmission power setting for

CC. We can actually solve analytically for this crossing point (when it is possible) by

treating the inequalities from Equation 6.3 as simultaneous non-linear equations. This

114

Page 131: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

yields the following expressions for the optimal transmission power settings for S1 and

S2:

Pt(S1) =PL(d11) + SINRθ1+ (6.4)

10 log(10(Pt(S2)−PL(d21))/10 + 10N1/10)

Pt(S2) =10 log(10(PL(d11)−PL(d12)+SINRθ1+N1)/10 + 10N2/10)

− 10 log(10−(SINRθ2+PL(d22))/10

− 10(PL(d11)−PL(d12)−PL(d21)+SINRθ1)/10)

Equation 6.4 provides the optimal transmission power to use for each sender S1

and S2 without exhaustive trial and error. Optimal power setting consumes minimum

energy for concurrent communication causing minimal interference to the network.

6.3.2 Topology Condition for CC

We can get some analytical insight into the impact of topology by deriving a neces-

sary and sufficient condition for CCability. In order to ensure that the simultaneous

non-linear equations have a bounded solution, it can be shown that the following topol-

ogy condition is necessary and sufficient (this condition ensures that the logarithm in

equation 6.4 has a positive argument):

SINRθ1+SINRθ2 < (6.5)

PL(d12)− PL(d11) + PL(d21)− PL(d22)

115

Page 132: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Adopting the exponential path loss model from Equation 6.1, this can be written

as:

SINRθ1 + SINRθ2 < 10n(log(d12

d11) + log(

d21

d22)) (6.6)

Let us define the location flexibility lfi for each sender i as the ratio of the distance

between a sender and its intended receiver to the distance between a sender and its

unintended receiver (i.e., interfered node). Thus lf 1 = d12d11

and lf 2 = d21d22

. The lf value

indicates the endurance level to the additional interference and noise under concurrent

transmission. Depending on the lf value of each sender (the higher the better), the

possibility of CC and the area of the CCable second sender location changes. This can

be seen in Figure 6.4.

6.3.3 CCability with Limited Power Range

We have now shown how to determine optimal transmission power for concurrent trans-

mission: evaluate the topology condition to determine if CCability is possible (Equa-

tion 6.5, and if so, compute the optimal transmission powers with Equation 6.4). Real

hardware, however, has limited control over transmission power in terms of supported

range and granularity. If the optimal power computed above is supported, we are done.

If not, we next consider how to adapt to constrained choice of power settings:

If either optimal transmission power level is greater than that supported by the

hardware, CC is not possible.

If either one of the optimal transmission powers is lower than supported power range,

we set the transmission power of this node to the minimum supported transmission

power for that node and calculate the transmission power of the other sender with

116

Page 133: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Equation 6.4. CC is possible only if the calculated transmission power is within the

supported power range.

If both selected transmission powers are below the supported minimum power levels,

we select the one with higher difference between the optimal transmission power and

its minimum supported power (let’s call this first sender). It attempts to send at its

minimum supported power level, and we compute the other required transmission power

accordingly. If this exceeds its range, CC is not possible. Otherwise we use the suggested

power for the second sender, or bring it to the minimal supported range if it was lower

than what is supported. This is because the increase of the second sender’s transmission

power level to its minimum supported power range is still less than the increase of the

first node’s transmission power. Therefore, the first sender can tolerate the increase of

the second sender’s transmission power level.

The basic rule is that the increase of the same amount of transmission power for both

CCable senders from the CCable power level always allows CC at their new transmission

power level, if new power levels are supported. This is because the effect from the noise

decrease at higher transmission power or higher received power level. Therefore, the

same amount of signal and interference increase always ends up with higher SINR at

the receiver.

6.3.4 Summary

To summarize, the following are the two controllable factors that play an important

role in CCability. First, CCability depends on the location flexibility. Higher location

flexibility increases the possibility of CC, represented by a greater gap between the two

lines in S1 and S2’s optimal power plot. Second, CCability depends on the transmission

power flexibility, which means the range of controllable transmission power (i.e., the

117

Page 134: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

0 m-50 m 50 m

S1 R1S11

S2 R2

Figure 6.5: Simulation topology: two sender-receiver pairs

minimum and maximum transmission power level). Higher transmission power flexi-

bility improves the CCability by increasing the chance of meeting the required CCable

transmission power for each sender. Therefore, we can expect higher CCability due to

higher flexibility from location and transmission power range.

6.4 Simulation

In this section we analyze the feasibility of concurrent packet transmission through sys-

tematic simulations to understand the effects of user controllable and radio parameters

such as node position, SINR threshold (SINRθ), range and granularity of transmis-

sion power control), and uncontrollable and environmental parameters like path loss

exponent (n), and the variance in path loss due to multipath fading (Xσ) on CCability.

6.4.1 Methodology

When we simulate a specific topology for a CCability test, the main variable parameter

of interest is the relative positions of the senders and receivers, rather than exact node

locations. To make exploration of the topology space manageable, we consider only

four nodes (two senders and two receivers) and place them on a line over 100 m as

shown in Figure 6.5. Even with this simple line topology we can test large number of

distance combinations; we will consider more general 2D topologies in our future work.

To characterize the topology we name the two sender-receiver pairs S1-R1 and S2-R2.

We define the origin of the line as the location of the receiver R1. In each simulation

118

Page 135: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

II*

RI

RRT

RRA

SSA

SST SI

IR IS

SR

RS

CCableRegion

CCableRegion

(a) Area index

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)S

2 lo

catio

n (m

)

Collision Region

(b) Collision Region

0 m-50 m 50 m

S1 R1

IIT

IIASSA

SSTRRT

RRAIS

SIRI

IRRS

SR

(c) Example for each area index

Figure 6.6: Simulation result example with area index: fixed transmission power of 10dBm for (a) and (b). S1, R1 = (−10, 0), n = 4, SINRθ = 4, Xσ = 0

119

Page 136: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

we position S1 and R1 and then vary the locations of S2 and R2, testing for CCability.

We typically fix other parameters (S1-R1 distance, transmission power, and noise) then

plot CCability as a function of locations of S2 and R2, showing the minimum required

transmission power of either S1 or S2 for concurrent communication.

Our tested CC related parameter values change for different hardware (especially

radio, antenna) and environmental conditions. Because there are many parameters to

explore, we generally hold all fixed but one for each section. We always use ambient noise

N of−95 dBm and path loss at reference distance PL(d0) = −35, and the following is the

most common setup for other parameters: path loss exponent n = 4, SINRθ = 4 dB,

Xσ = 0 dB. Our radios are modeled on the Chipcon CC2420 RF transceiver, an 802.15.4

radio widely deployed in the MicaZ and Telos-B motes. When we consider controllable

transmission power, we normally limit them between −25 dBm and 0 dBm as with this

radio.

6.4.2 Defining Regions of Placement and the CCable Ratio

To simplify discussion, we begin by presenting an example and showing potential relative

placement of the two pairs of nodes. Figure 6.6(a) shows one set of simulation results.

In this chapter, we list the locations of sender and receiver in order in parentheses (in

meters on the line) followed by sender and receiver id. This figure shows a sample

simulation result when both senders use a fixed transmission power level of 0 dBm and

S1, R1 = (−4, 0). X-axis shows the R2 location in meters and Y-axis shows the S2

location. S1 and R1 locations are fixed for each simulation set.

To compare CCability with an RTS/CTS-based protocol we bound the nominal

communication range (without collision) with horizontal and vertical lines. Vertical

lines indicate the one-hop area around R1 that would be blocked by its CTS, and

horizontal lines show the same region around R2. We define collision region as the region

120

Page 137: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

where concurrent packet transmission is prohibited by RTS/CTS-based protocol to avoid

packet collision. Each sender only transmits a packet when its intended receiver is

located within its communication range. Therefore, the actual collision region is smaller

than the whole areas within two vertical and horizontal lines. Figure 6.6(b) shows an

example of traditional collision region when S1, R1 = (−4, 0). For each simulation S1

and R1 locations are constant and the collision area is set based on these static node

locations.

Figure 6.6(a) shows two dark CCable regions. These regions let us quantify the

benefits of CCability. We define CCable ratio as CCable region within collision region.

CCableratio = CCable region / Collision region

This ratio reflects the fraction of area where a MAC protocol that supports concur-

rent transmission can send when a traditional MAC protocol would prohibit concur-

rent communication. A larger CCable ratio potentially allows greater overall network

throughput and more spatial reuse.

Next, to explain why these regions are CCable, Figure 6.6(c) shows twelve different

configurations of S2 and R2 relative to S1 and R1, and labels each with a three letter

code. The first two letters of each code indicate the location of S2 and R2 relative

to S1-R1: I means inside S1-R1, S means outside S1-R1 on S1 side, R means outside

S1-R1 on R1 side. We use the third character to indicates the direction of the S2-R2

communication, if necessary: A is away from S1, T is towards S1, or * is either.

Returning to Figure 6.6(a), we see that the regions which are CCable are typically

RR* or and SS*, where S2-R2 are on either side of S1-R1. They must be far enough

away not to interfere: CC is possible when S2-R2 are at 7 m and 12 m, and fails

when they are at 2 m and 7 m. These are similar cases as Figure 6.1(b) and (c).

121

Page 138: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

However, here we can see all possible combinations of distance for successful concurrent

packet communication. We broaden this discussion as we go to consider other parameter

settings and node locations.

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

−20

−20

−10

−10

−10

−10

0

0

0

0

Figure 6.7: CCable regions with different fixed transmission power levels. S1, R1 =(−4, 0), n = 4, SINRθ = 4, Xσ = 0

6.4.3 Fixed Transmission Power Cases

Many protocols are designed assuming that nodes always transmit at the same power,

because some radios do not support and protocols do not exploit power control. We

consider fixed transmission power here, and generalize to controllable power in the next

section.

Figure 6.7 shows CCability as S2 and R2 move for three fixed transmission power

levels of −20, −10, and 0 dBm. We hold all other parameters constant as the caption

shows. This figure shows that the CCable region is larger at higher transmission powers.

As transmission power grows from −20 to 0 dBm, we see the CCable ratio grow from

0.26 to 0.44.

122

Page 139: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

The CCable ratio grows for larger powers because the higher interference from

stronger transmission is more than offset by the increased signal strength. In addi-

tion, the larger transmission power increases the size of collision region that would

be reserved with an RTS/CTS protocol. Considering node placement (defined in Fig-

ure 6.6(c)), with fixed transmission power we only see CCability in the RR* and SS*

regions (we will later show that power control allows CCability elsewhere). This limi-

tation is because the flexibility is limited when transmission power is fixed — there is

no power flexibility — so communication distance is the only factor that contributes

the signal and interference strength. Therefore, the sender always needs to be located

closer than the interferer for every receiver to have a positive SINR value which meets

the intended receiver’s SINR threshold.

With fixed power, communication is only CCable when these conditions hold:

SINRθ1 ≤ 10n log(

d12

d11

)= 10n log(lf 1) (6.7)

SINRθ2 ≤ 10n log(

d21

d22

)= 10n log(lf 2)

As this condition implies, the leftover SINR value (i.e., signal strength) for each

communication cannot be used to increase the CCability in fixed power case; while we

can adjust SINR values between two receivers with distinct transmission power settings

for each sender (i.e., with power control) to improve CCability.

6.4.4 User Controllable Parameters

Users can control some aspects of their network, including their location and their choice

of radio. We next consider CCability when we vary these parameters.

123

Page 140: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

S1,R1=(−2,0)

(a) Optimal Tx Power of S1

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

S1,R1=(−2,0)

(b) Optimal Tx Power of S2

−50 −40 −30 −20 −10 0 10 20 30 40 50−60

−50

−40

−30

−20

−10

0

10

20

X Coordinate of S2 (m)

Tra

nsm

issi

on p

ower

(dB

m)

Tx Pwr of S1Tx Pwr of S2

min power

max power

(c) Optimal Power Settings

−25 −20 −15 −10 −5 0−25

−20

−15

−10

−5

0

Transmission power of S1 (dBm)

Tra

nsm

issi

on p

ower

of S

2 (d

Bm

)

SINR at R1 = SINRth1SINR at R2 = SINRth2

S2 Capture power settings

S1 Capture power settings

CCable power settings

(d) CCable Power Settings

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

S1,R1=(−12,0)

(e) Optimal Tx Power of S1

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

S1,R1=(−12,0)

(f) Optimal Tx Power of S2

−50 −40 −30 −20 −10 0 10 20 30 40 50−60

−50

−40

−30

−20

−10

0

10

20

X Coordinate of S2 (m)

Tra

nsm

issi

on p

ower

(dB

m)

Tx Pwr of S1Tx Pwr of S2

min power

max power

(g) Optimal Power Settings

−25 −20 −15 −10 −5 0−25

−20

−15

−10

−5

0

Transmission power of S1 (dBm)

Tra

nsm

issi

on p

ower

of S

2 (d

Bm

)

SINR at R1 = SINRth1SINR at R2 = SINRth2

No CCable power settings

S2 Capture power settings

S1 Capture

(h) CCable Power Settings

Figure 6.8: CCable regions and optimal Tx Power for S1 and S2 varying distance:S1, R1 = (−2, 0) for (a) − (d), S1, R1 = (−12, 0) for (e) − (h), n = 4, SINRθ = 4,Xσ = 0, S2, R2 = (x,−24) for (c) and (f), S2, R2 = (−5, 10) for (d) and (h)

124

Page 141: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−5 −2 0 10

−90

−80

−70

−60

−50

−40

−30

−20

−10

0

Location: X Coordinate (m)R

SS

(dB

m)

RSS from S1RSS from S2

Figure 6.9: Comparison of RSS from S1 and S2. S1, R1 = (−2, 0), S2, R2 = (−5, 10),n = 4, SINRθ = 4, Xσ = 0

6.4.4.1 Location Change

One of the most important parameters is node location. An important design consid-

eration of any sensornet deployment is how many nodes will be deployed and where.

With stationary nodes, particular locations will allow or preclude CCability; when nodes

moving or are randomly positioned, we can at least characterize the probability of con-

current communication. To systematically explore the effect of node location we fix R1

at 0 m and move the other nodes. For a given experiment we typically fix S1 (and so

the S1-R1 distance), then test all combinations of S2-R2 placement.

Figure 6.8 presents CCable regions and optimal S1 and S2 transmission powers

settings for two different S1-R1 distances of 2 m (top row) and 12 m (bottom row).

Transmission power is shown as grayscale on the right and center graphs (darker values

indicate greater transmission power, red is the darkest indicating the maximum power),

and called out specifically for one S2, R2 case in the rightmost graphs (6.8(d) and 6.8(h)).

In general, S1’s optimal transmission power is stable (Figures 6.8(a) and 6.8(e))

because neither S1 nor R1 move in these simulations. However, there are some locations

where interference from S2 forces S1 to increase its transmission power: darker region

125

Page 142: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

in Figure 6.8(a), for example, S2, R2 = (4, 27). S2’s transmission power spans a much

larger range (Figures 6.8(b) and 6.8(f)), mainly due to changes in the S2-R2 distance.

These figures show considerable amount of CCable region inside the collision region:

CCable ratio values are 0.77 for an S1-R1 distance of 2 m and 0.43 for 12 m. Greater

CCability is possible when S1 and R1 are closer because they can communicate at lower

power. In other words, longer distances imply higher interference and lower location

flexibility for CC.

Figure 6.8(c) and 6.8(g) show the S1 and S2’s optimal transmission power setting

for concurrent transmission both when we relax the power control limitation (shown

in filled symbols) and when we have −25 dBm and 0 dBm constrained power range

(shown in empty symbols). These figures presents the optimal power change due to

hardware limitations. We can also see that at higher S1-R1 link distance of 12 m,

optimal transmission power (noticeably for S1) increases. Worse location flexibility

for S1 increases required transmission power for concurrent communication. Lower

flexibility means reduced chance of concurrent transmission under the same condition.

We can see that CCability is greatly reduced at longer distance (in Figure 6.8(h)).

Finally, when we compare CCable region in Figure 6.8 to fixed power (Figure 6.7),

we see that concurrent communication is sometimes possible in the SR or RS regions

with power control. SR and RS communications mean that S2 and R2 are on opposite

sides of S1-R1—sometimes S2-R2 can transmit over the heads of S1-R1! This unin-

tuitive communication becomes possible with a proper transmission power setting for

each sender; If S2 selects an appropriate transmission power which only increases the

interference, but does not corrupt the packet from S1, while S2 can still provide strong

enough signal strength for a packet reception at R2. Figure 6.9 compares the RSS from

each sender at different node location under the same SR scenario presented in Fig-

ure 6.8(d), and using the optimal transmission power shown in this figure: −18.67 dBm

126

Page 143: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

for S1 and −6.77 dBm for S2. In this case, both R1 (at 0 m) and R2 (at 10 m) receive

stronger signal strength from its intended sender, also meeting SINR threshold of 2 dB.

This figure visually explains how concurrent communication is possible for this unlikely

situation with transmission power control.

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

(a) SINRθ=2

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

(b) SINRθ=5

−25 −20 −15 −10 −5 0−25

−20

−15

−10

−5

0

Transmission power of S1 (dBm)

Tra

nsm

issi

on p

ower

of S

2 (d

Bm

)

RSS at R1 = SINRth1RSS at R2 = SINRth2

SINR threshold = 5

SINR threshold = 2

CTXable power settings

(c) CCable Power Settings

Figure 6.10: CCable regions with different SINRθ: S1, R1 = (−4, 0), n = 4, Xσ = 0,S2, R2 = (15, 6) for (c)

6.4.4.2 SINR Threshold

A recent work has shown that different hardware requires different signal-to-interference-

plus-noise ratios (SINRθ) to reliably send data [79]. In this section, we want study the

effects of SINRθ on CCability.

Figure 6.10 shows the CCable region and CCable transmission power range for two

different SINRθ values of 2 and 5 (fixing S1 and R1 and -4 m and 0 m). We see that

a larger SINRθ value reduces the CCable region. A larger SINRθ reduces the power

flexibility of both senders, since each must have greater “headroom” to successfully

communicate (due to the summation of SINR thresholds in Equation 6.6 as shown in

Figure 6.10(c)). The CCable ratio of these cases are 0.75 and 0.61 for SINRθ of 2 and

5 respectively, so this loss of flexibility translates into 14% less opportunity for CCable

communication for this specific case.

127

Page 144: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

The effect of SINR threshold value changes under different communication environ-

ments. When we reduce the path loss exponent from 4 to 3, the CCable ratio difference

increases to 0.25 (0.77 and 0.52 for SINRθ of 2 and 5 respectively). Lower n value

decreases the signal strength difference at the same link distance and the link distance

between the sender and interferer need to be greater for the same SINRθ. In other

words, the same SINR gap (or location flexibility) covers larger distance (or region).

Therefore, SINR threshold plays more significant role under lower n value situation.

This simulation shows that the impact of SINR threshold change (due to hardware

differences) cannot be ignorable, and it varies under different environmental conditions.

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

Figure 6.11: CCable region comparison with and without power control. S1, R1 =(−15, 0), n = 4, SINRθ = 4, Xσ = 0

6.4.4.3 Comparing Fixed and Dynamic Power Control

Now that we understand the effect of node location, we next quantify the advantage

of dynamic power control over fixed transmission power. To do so we compare the

relative sizes of CCable region with and without power control at three different S1-R1

distances: 5 m, 10 m, and 15 m.

128

Page 145: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Figure 6.11 compares the CCable region with fixed power control (the dark gray

regions) with the additional area added with dynamic power control (the light gray

regions) when the S1-R1 distance is 15 m. For the fixed-power case S1 sends at the

maximum transmission power of 0 dBm, since this provides the largest CCable region

(Section 6.4.3). In this case the CCable ratio is 0.22 without power control and 0.36 with

power control; when the S1-R1 distances are 5 m and 10 m we see similar tendencies

(fixed vs. dynamic CCable regions of 0.42 vs. 0.63 at 5 m and 0.33 vs. 0.48 for 5 m and

10 m, respective).

From this comparison and the simulation results presented in previous sections, we

conclude that power control provides significantly greater CCability than fixed power

control for a given topology. The CCable region difference with and without power con-

trol becomes higher when the S1-R1 distance is greater. The location flexibility becomes

much worse at longer link distance, and the fixed power scheme cannot overcome lower

location flexibility because it does not have any power flexibility like dynamic power

control case.

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

C1:(−4,0)

(a) -4m, 8 levels

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

C1:(−4,0)

(b) -4m, 25 levels

Figure 6.12: CCable regions with 8 levels (Mica Z) and 25 levels (fine) Tx power controlat 4 m link distance between S1 and R1: PL0=35, n=3.5, SINRθ=4, Xσ =0

129

Page 146: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

6.4.4.4 Power Control Granularity

We have also simulated the effects of the granularity of transmission power control. The

Chipcon CC1000 supports transmission power levels between −20 dBm and 10 dBm,

selectable at 1 dBm increments across most of this range. The newer Chipcon CC2420

provides a similar range (from −25 dBm to 0 dBm), but it support only 8 distinct

settings over this range (−25,−15,−10,−7, −5,−3,−1, and 0 dBm).

Figure 6.12 compares the simulation results between the case with 8 levels and 25

levels of finer transmission power control at the same −25 dBm to 0 dBm power range.

Finer level of transmission power control slightly increases CCable region (about 3% in

CCable ratio) with more possible transmission power combinations in general, and it

also lowers the transmission power for some CCable locations. Therefore, we can expect

some minor benefits to the CCability and energy consumption with finer transmission

power control.

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

(a) n=3.5

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

(b) n=4.5

−25 −20 −15 −10 −5 0−25

−20

−15

−10

−5

0

Transmission power of S1 (dBm)

Tra

nsm

issi

on p

ower

of S

2 (d

Bm

)

SINR at R1 = SINRth1SINR at R2 = SINRth2

n=4.5

n=3.5

CCable power settings

(c) CCable Power Settings

Figure 6.13: CCable regions with different path loss exponent. S1, R1 = (−6, 0),SINRθ = 4, S2, R2 = (15, 6) for (c)

6.4.5 Uncontrollable and Environmental Parameters

While some parameters are under user control, wireless propagation itself is known to

be highly variable and unpredictable. We next consider CCability as we vary path loss

130

Page 147: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

exponent and path loss variance from the exponential path loss model with log-normal

fading (presented in Equation 6.1). These parameters correspond to greater variability

in propagations.

It is well known that this model only approximates wireless propagation, so we

supplement these results with testbed experiment in Section 6.5.

6.4.5.1 Path Loss Exponent (n)

Propagation environment distinguishes received signal strength and quality for the same

hardware at different node locations in wireless communication. The path loss exponent

n is a primary parameter that determines signal strength in different communication

environments. According to the prior study by Rappaport [65], we can model different

environments with path-loss exponents between 1.6 to 6. A larger n increases the path

loss, decreasing the viable reception distance and, for a given distance, decreasing the

received signal strength and interference.

Figures 6.13(a) and 6.13(b) compare CCability with path loss exponents (n) of 3.5

and 4.5. Note that the lower n corresponds to a larger effective transmission range,

as shown by the dashed line box indicating the collision region. When we compare

Figure 6.13(a) with Figure 6.13(b), we can clearly see the difference in CCable location

between these two cases, but not in the CCable ratio value. We observe the same CCable

ratio of 0.56 from both cases with different path loss exponent of 3.5 and 4.5.

When we compare the possible transmission power combination in 6.13(c), we can

see the higher n value increases the minimum transmission power for CC (transmission

power for S1 and S2 respectively changes from -26.8 dBm and -21.3 dBm to -19.9 dBm

and -12.4 dBm) because it reduces the communication range at the same transmission

power level, but higher n value also increases the possibility for CC by increasing the

effect of location flexibility in right side of Equation 6.6.

131

Page 148: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Even though higher n value can increase CCable region (according to Equation 6.6),

this advantage comes together with higher transmission power requirement for CC at

the same topology. Therefore, higher path loss exponent can increases CCable region

only when it supports increased transmission power requirement. However, transmission

power range is very limited especially with low-power wireless networks in general.

On the contrary, lower n value decrease the minimum transmission power required

for CC, but if the path loss exponent value becomes too low, it greatly reduces the

location flexibility (i.e., distance effect), and this can make CCable two communications

(at higher n) non-CCable. Therefore, the relationship between the path loss exponent

and CCability varies depends on the given location and power flexibility.

6.4.5.2 Path Loss Variance: Xσ

There is significant evidence that wireless channels vary greatly over time and location [3,

77, 84, 93]. A common way to model this variance analytically is using a zero-mean

Gaussian random variable with standard deviation σ, or Xσ. Although this model does

not capture all real-world behavior, we use it here to simulate controllable levels of path-

loss variance. We vary the σ value and compare the results in Figure 6.14. This figure

shows the simulation results when we introduce non-zero Xσ value and use randomized

antenna gain for each different node location. This figure implies that there are wide

area where the CC is unexpected or inconsistently available (effectively gray regions of

CCability).

In addition, we observe that cross-pair communication, where S2-R2 surround S1-

R1, are more prevalent at higher path loss variance. We can observe the SR type

communication at Xσ = 2 (in Figure 6.14(a)), and both SR and RS type communication

at Xσ = 4 (in Figure 6.14(b)). But, there is no cross-pair type communication for the

132

Page 149: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

(a) Xσ=2

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

(b) Xσ=4

Figure 6.14: CCable regions with different path loss variance Xσ : S1, R1 = (−4, 0),n = 4, SINRθ = 5

same configuration (shown in Figure 6.10(b)) without path loss variance. We conclude

that, in practice, CCability will depend strongly on current environmental conditions.

6.4.6 Capturable Region

We mainly discussed about CCable region in our simulation results. However, we ob-

served large portion of power settings that allows only one successful communication

under concurrent packet transmission (for example, we can see large S1 or S2 capture

power settings in Figure 6.4). Understanding capturable situation is meaningful for both

unicast and especially for broadcast communication.

Figure 6.15 presents CCability obtained from the simulation with two concurrent

packet senders S1 and S2, with corresponding (only for unicast communication) receivers

R1 and R2. Both senders use a fixed transmission power of 0 dBm, which simulates

the maximum power available for MicaZ motes. We indicate different types of capture

regions in different colors. First, black shows the unicast capture region where at least

one of unicast communications (S1-R1 or S2-R2) is successful; this combines both S1

and S2 capturable regions. Unicast capture regions cover 90% of the collision region.

133

Page 150: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−50 −40 −30 −20 −10 0 10 20 30 40 50−50

−40

−30

−20

−10

0

10

20

30

40

50

R2 location (m)

S2

loca

tion

(m)

Figure 6.15: Capturable Regions. S1, R1 = (−4, 0), n = 4, SINRθ = 5, Xσ = 0, Txpower = 0 dBm

Gray indicates the broadcast capture region where transmitted packet can be received by

any neighbor node (i.e., either R1 or R2). Gray region is meaningful to broadcast type of

communication, and corresponds to 97% of the collision region (black region is a subset

of gray region). Light gray shows the collision region where successful communication is

not possible. There are only 3% of the collision region in which actual packet collision

happens.

These simulation results imply that we can expect significant number of successful

packet delivery under the traditional packet collision situation if MAC supports appro-

priate functionalities for concurrent packet communication (such as [83]).

6.5 Testbed Experiments

While the simulations in Section 6.4 are invaluable at systematically exploring the pa-

rameter space, multiple empirical studies suggest that analytic models do not capture

the complexity in wireless propagation [3, 77, 84, 93].

134

Page 151: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

-3.6 m

loc1

-3.0 m

loc2

-2.4 m

loc3

-1.8 m

loc4

-1.2 m

loc5

-0.6 m 0 m 0.6 m

loc6

1.2 m

loc7

1.8 m

loc8

2.4 m 3.0 m

loc9

3.6 m

loc10

S1 R1S2 R2

(a) Outside (S2 moves)

-2.0 m -1.0 m 0 m 1.0 m

loc1

2.0 m

loc2

3.0 m

loc3

S1 R1S2 R2

(b) Inside (R2 moves)

Figure 6.16: MicaZ experiment topology with two sender-receiver pairs. ExperimentedS1 locations: loc1–loc10 for scenario 1 and loc1–loc3 for scenario 2

We therefore next study key parameters in a testbed with real sensor nodes to verify

the findings of our simulations. We use low-power MicaZ motes equipped with CC2420

radios [11] to measure the received signal and interference strength and to test the

CCability under concurrent packet transmission situation with different node topolo-

gies. The main objective of our experimental study is to demonstrate the feasibility of

concurrent transmission in the real systems.

6.5.1 Methodology

Our testbed experiments follow the methodology of recent studies of concurrent trans-

mission [79]. Like our simulation study, we use two sender-receiver pairs of nodes,

S1-R1 and S2-R2. To coordinate the senders, our experiments add a fifth node, the

synchronizer, that transmits a a packet to synchronize the concurrent packet senders.

We disable carrier sensing and random backoff functionality from the MAC layer to

allow concurrent packet transmission from multiple senders.

We consider two scenarios, outside and inside, as shown in Figure 6.16. In the

outside scenario S2 is always outside the S1-R1 pair, and S2 moves. We vary the S2-R2

distance, considering ten different positions of S2, roughly every 60 cm. This scenario

corresponds to cases SR and RRA in Figure 6.6(c). In the second experiment, inside,

135

Page 152: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−25 −15 −10 −7 −5 −3 −1 0−25

−15

−10

−7

−5

−3

−10

Transmission power of S1 (dBm)

Tra

nsm

issi

on p

ower

of S

2 (d

Bm

)SINR at R1 = SINRth1SINR at R2 = SINRth2

(a) S2 at -3.0m

−25 −15 −10 −7 −3 −1 0−25

−15

−10

−7

−3

−10

Transmission power of S1 (dBm)

Tra

nsm

issi

on p

ower

of S

2 (d

Bm

)

SINR at R1 = SINRth1SINR at R2 = SINRth2

(b) S2 at -2.4m

−25 −15 −10 −7 −5 −3 −1 0−25

−15

−10

−7

−5

−3

−10

Transmission power of S1 (dBm)

Tra

nsm

issi

on p

ower

of S

2 (d

Bm

)

SINR at R1 = SINRth1SINR at R2 = SINRth2

(c) S2 at -1.8m

−25 −15 −10 −7 −5 −3 −1 0−25

−15

−10

−7

−5

−3

−10

Transmission power of S1 (dBm)T

rans

mis

sion

pow

er o

f S2

(dB

m)

SINR at R1 = SINRth1SINR at R2 = SINRth2

(d) S2 at -1.2m

−25 −15 −10 −7 −5 −3 −1 0−25

−15

−10

−7

−5

−3

−10

Transmission power of S1 (dBm)

Tra

nsm

issi

on p

ower

of S

2 (d

Bm

)

SINR at R1 = SINRth1SINR at R2 = SINRth2

(e) S2 at 0.6m

−25 −15 −10 −7 −5 −3 −1 0−25

−15

−10

−7

−5

−3

−10

Transmission power of S1 (dBm)

Tra

nsm

issi

on p

ower

of S

2 (d

Bm

)

SINR at R1 = SINRth1SINR at R2 = SINRth2

(f) S2 at 1.2m

−25 −15 −10 −7 −5 −3 −1 0−25

−15

−10

−7

−5

−3

−10

Transmission power of S1 (dBm)

Tra

nsm

issi

on p

ower

of S

2 (d

Bm

)

SINR at R1 = SINRth1SINR at R2 = SINRth2

(g) S2 at 1.8m

−25 −15 −10 −7 −5 −3 −1 0−25

−15

−10

−7

−5

−3

−10

Transmission power of S1 (dBm)

Tra

nsm

issi

on p

ower

of S

2 (d

Bm

)

SINR at R1 = SINRth1SINR at R2 = SINRth2

(h) S2 at 3.0m

Figure 6.17: CCability in the outside testbed experiment as S2 is moved (presentedtogether with the expectation from simulation with our proposed formula). Circlesare CCable, triangles and squares are S1 or S2 capturable, and Xs indicate a collision.Simulation results at the same topology are presented together with two dotted lines.

136

Page 153: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

we place S2 between S1 and R1 so that the S2-R2 communication crosses S1-R1. We

then move R2 to three positions, from 1 to 3 m beyond R1; this corresponds to the case

IR.

The MicaZ supports 8 different transmission power levels from −25 to 0 dBm. For

each position experiment, we first measure the signal and interference strength with 10

packets and then test the CCability with 25 concurrent packet transmissions for every

64 different combinations of two senders’ transmission power settings. We repeat the

same experiment twice for each topology to verify that the results are consistent; the

results were similar and we show only one experiment here.

−3.6 −3 −2.4 −1.8 −1.2 −0.6 0 0.6 1.2 1.8 2.4 3 3.60

10

20

30

40

50

60

S2 location (m)

Num

ber

of p

ower

com

bina

tions

(ou

r of

64)

CCS1 CaptureS2 CaptureCollision

(a) CCability

−3.6 −3 −2.4 −1.8 −1.2 −0.6 0 0.6 1.2 1.8 2.4 3 3.6−95

−90

−85

−80

−75

−70

−65

−60

−55

−50

−45

S2 location (m)

RS

S (

dBm

)

S11I21S22I12

(b) RSS at TxPwr = −5 dBm

−3.6 −3 −2.4 −1.8 −1.2 −0.6 0 0.6 1.2 1.8 2.4 3 3.6

−10

0

10

20

30

40

50

S2 location (m)

SIN

R (

dB)

SINR at R1SINR at R2topology condition

(c) SINR at TxPwr = −5dBm

−3.6 −3 −2.4 −1.8 −1.2 −0.6 0 0.6 1.2 1.8 2.4 3 3.6−25

−15

−10

−7

−5

−3

−10

S2 location (m)

Tra

nsm

issi

on p

ower

(dB

m)

Expriment S1 Expriment S2 Simulation S1 (w/ pwr limit)Simulation S2 (w/ pwr limit)

(d) Optimal transmission power

Figure 6.18: Experimental results at different S2 locations with variable transmissionpowers.

137

Page 154: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

6.5.2 Results from the Outside Scenario

Figure 6.17 shows the ability of nodes in our testbed to concurrently communicate (CC)

or capture the channel in our experiments at eight different locations of S2 (out of 10

due to space). Each figure shows 64 different CCability tests with power of each of the

two senders on each axis. These are all supported power combinations from two MicaZ

senders. Results of each test are shown by different symbols: filled circles are CCable,

while empty triangles or squares indicate capture by S1 or S2, and Xs indicate collisions

where neither receiver can capture data.

To compare our experiments with simulation, we predict the CCable power settings

through simulation and plot these as two lines (as in Figure 6.4). The simulations

require parameters for the channel propagation model that we do not know, so we use

actually measured path loss at each location using the data presented in Figure 6.18(b).

We also used observed values for SINR threshold (2 dB for MicaZ ) and ambient noise

level for each node (−96.3 dBm for R1 and −96 dBm for R2). We can see that our

simulation results provides very close match of experimentally observed CCability. We

will discuss the implication of this in Section 6.7.

Nine out of ten configurations supported concurrent communications at some power

settings. Only R2 placement at 0.6 m (very close to R1) was unable to concurrently com-

municate. This experiment demonstrates the large opportunity for concurrent transmis-

sion if MAC support for packet capture and appropriate power selection was available,

and RTS/CTS was revised. Nevertheless, current MAC protocols would prohibit many

of these opportunities to transmit in their carrier sense checks or through an RTS/CTS

handshake.

Figure 6.18(a) summarizes these experiments by comparing the number of power

configurations that support CCability, capture, or collision out of the 64 possible power

138

Page 155: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

combinations at each location. In some ways this the fraction of CCable power combi-

nations is not a useful metric, since an intelligent MAC would not select transmission

power randomly, but instead could select whatever power level was best (so ideally, even

a single CCable configuration could be exploited). However, the percentage of CCable

configurations does characterize the level of flexibility in selecting transmission powers,

the probability of a given outcome (CC, capture, or collision) with a fixed power scheme,

and perhaps the degree of tolerance to environmental noise and interference for each

location.

We can also see from Figures 6.17 and 6.18(a) that even if two transmissions are not

CCable, almost always one or the other can be delivered with the capture effect. The

SINR threshold of the MicaZ around 2 dB [79]. The low number of collisions in this

experiment shows that it is rare for RSSs from both senders to fall within this 2 dB

range. In our experiments, only 3% of power configurations resulted in collisions. This

observation confirms our simulation results presented in Section 6.4.6. Older radios

sometimes have larger SINR thresholds (the 2 to 6 dBm of the Mica2 [79]) and so may

show larger collision regions.

To measure the effect of location on the signal and interference strength we plot the

measured RSS and SINR values at fixed power level. Figure 6.18(b) shows the measured

received signal strength (RSS) for each pair S11, S22, I12, I21 at fixed transmission

power level of −5 dBm, and Figure 6.18(c) shows calculated SINR value at each receiver

based on these measurements. First, we can see that measured RSS does not always

correspond to link distance as we expect. This variation is due to environmental factors

such as multi-path reflections.

We show the topology condition (the difference between the right hand side and the

left hand side of the inequality in Equation 6.5) as the solid line. A positive value means

the topology condition is satisfied and the communication may be CCable; as we can

139

Page 156: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

see, this condition is only negative when S2 is 0.6 m, consistent with our findings in

Figure 6.18(a). In Figure 6.18(c) we can observe one of the receiver does not satisfy 2 dB

SINR threshold at the following three S2 locations: −3 m, −1.2 m, and 0.6 m. However,

concurrent communications become possible with power control for every experiment

other than when S2 is located at 0.6 m.

Figure 6.18(d) shows the optimal (i.e., minimum) transmission power selected for

each sender S1 and S2 for concurrent communication based on our experiment results,

together with optimal transmission power selected from our proposed formula (Equa-

tion 6.4), but with limited power range between -25 dBm and 0 dBm at 1 dBm intervals.

We can see that experiments with S2 locations at -3 m, -1.8 m, and -1.2 m, which have

much higher SINR at R1 (shown in Figure 6.18(c)), use higher optimal transmission

power for S2 to redistribute leftover SINR (i.e., signal strength) value to make CC

possible. We can also see that the simulated optimal power matches our experiments.

There is a difference in the plot, but this difference is coming from the limited power

level support from our tested nodes (MicaZ), and nodes can choose the same power level

as actual experiment based on simulation results.

6.5.3 Results from the Inside Scenario

In the second scenario in Figure 6.16(b), we place S2 inside the S1-R1 pair. Experimental

results (presented in Figure 6.19) show that CC is possible even with this configuration

if nodes can control their transmission power. We observed that CC is possible when

R2 was at 2 m or 3 m in our experiments (presented in Figure 6.19(a)). However, we

do not see any concurrent communication when R2 was at 1 m. This experimental

result confirms what is predicted in simulation based on measured path loss; From

Figure 6.19(b) we can see that topology condition fails only for location 1 m. This final

140

Page 157: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

1 2 3

10

20

30

40

50

60

R2 location (m)

Num

ber

of p

ower

com

bina

tions

(ou

t of 6

4)

CCS1 CaptureS2 CaptureCollision

(a) CCability

1 2 3−20

−15

−10

−5

0

5

10

15

20

R2 location (m)

SIN

R (

dB)

SINR at R1SINR at R2topology condition

(b) SINR, TxPwr: 0 dBm

Figure 6.19: CCability from the inside scenario

case illustrates the case where CC is not possible because the location fails to satisfy

the topology condition.

These two testbed experiments confirm our key simulation results: first, that concur-

rent communication is highly probable in many previously restricted cases with tradi-

tional 802.11 like medium access control. Second, complete collisions and full corruption

of both packets is rare and often at least one sender can capture a packet. Finally, con-

trollable transmission power significantly improves CCability.

6.6 2D Simulations

We presented our simulation results from line topologies mainly to understand the effects

of related radio and environmental parameters on concurrent packet communications. In

this section, we have set these parameter values constant while only varying the locations

of senders and receivers on two dimensional space. With more complete two dimensional

simulations, we can quantify and visually and numerically compare the benefits in terms

of spatial reuse from concurrent packet communications under different power control

schemes.

141

Page 158: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(a) CCable Region (S1)

−50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(b) CCable Region (S2)

−30 −20 −10 0 10 20 30

−30

−20

−10

0

10

20

30

X Coordinate of S2 (m)

Y C

oord

inat

e of

S2

(m)

PC CTxabilityS1:(−6,0)

(c) CCability varying S2 location

−50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(d) Max Power Collision Region

−50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(e) CCable Region (Min S2)

−50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(f) Min Power Collision Region

−50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(g) CCable Region

−50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(h) CCable Region MAX Power

Figure 6.20: 2D simulation results with optimal transmission power settings. S1=(-6 m,0 m), R1=(0 m,0 m), S2=(-11 m,0 m) for all figures except (c) where S2 locationvaries within the presented coordinate space, R2 varies within the presented space forall figures

142

Page 159: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

6.6.1 Methodology

Our focus of two dimensional simulation is not on the effects of detail parameter settings

anymore, and we use the following static values and only vary the location of nodes in two

dimensional spaces: PL0 = 35, n = 3.5, SINRθ = 2, Xσ = 0, N1 = N2 = −95 dBm.

We still use the static location S1 and R1 communication for each set of simulations

(the effect of changing this link distance has been presented in Section 6.4.4.1). Our

simulation use S1 location at x, y coordinates of -6 m, 0 m and R1 location at 0 m,

0 m on two dimensional space. We tested every S2 and R2 location combination within

the square region ranged between -50 m and 50 m range in both vertical and horizontal

space (i.e., x and y axis). Test location interval is 2 m for S2 and 1 m for R2.

We use three different power control schemes: (1) OptiPC : our proposed optimal

power control scheme for concurrent communication proposed in Section 6.3 (2) MinPC :

control transmission power to the minimum (supported) level that is good for the packet

reception at its own intended receiver under no interference (3) MaxP : use the maxi-

mum transmission power supported by the device. We limit the supported power for

transmission between -25 dBm and 0 dBm with 1 dBm level power control capability

matching the power range of MicaZ motes.

OptiPC uses the minimum transmission power which allows concurrent communi-

cations considering the interference from simultaneous transmissions. MinPC use the

minimum required transmission power for its own intended receiver ignoring the possible

interference. MinPC minimizes its interference to the network, but it also minimizes the

communication reliability under co-channel interference. MaxP always use the maxi-

mum supported power for packet transmissions. We can consider MaxP as a good,

simple approach to take, especially for sparse network where concurrent communication

is a rare event. MaxP provides reliable communication links while minimizing energy

efficiency and spatial reuse.

143

Page 160: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

6.6.2 CCability with Optimal Power Setting

In this section we present 2D simulation with optimal transmission power settings to

estimate the benefits from appropriate power settings in terms of spatial reuse. The first

two rows of Figure 6.20 present the 2D simulations results using our proposed optimal

transmission power setting scheme for two concurrent packet transmissions from S1 to

R1 and S2 to R2. These figures show the sample case of S2 at x, y coordinates of -11 m,

0 m. Color marked areas indicate the R2 locations which allow successful concurrent

communication and the color intensity of each point means the intensity of optimal

power required for S1 in Figure 6.20(a) and for S2 in Figure 6.20(b) (darker values

indicate greater transmission power, red is the darkest indicating the maximum power).

Figure 6.20(a) and Figure 6.20(b) mark CCable region with OptiPC scheme in S1

and S2’s transmission power respectively. We can observe about 93% of CCable R2

locations within the collision region with optimal transmission power settings; We use

normalized collision region considering the maximum transmission power of the node

for the comparison with the case without transmission power control (Shown in Fig-

ure 6.20(d). Extra transmission power assigned to overcome interference (i.e., darker

color) can be geographically identified near the communication from S1 to R1 as well

as non-CCable regions.

We repeated simulations varying the S2 locations and calculated the CCability test-

ing every R2 locations like previous examples (shown in (a) and (b)). Figure 6.20(c)

plots the average CCability we observed for each S2 location. Each S2 point in this

figure presents the probability of successful concurrent communication when R2 loca-

tion is randomly selected within the collision region. On average, 89% R2 locations are

CCable for S2 location changes between -35 and 35 m of both x and y directions. This

result projects us the expected, high improvement in spatial reuse from two dimensional

space when we use appropriate transmission power control.

144

Page 161: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

6.6.3 CCability at Different Power Settings

In this section we present 2D simulations results with several different power control

schemes to compare their performance for CCability. The last two rows of the Fig-

ure 6.20 show the simulation results when we use MinPC and MaxP power control

schemes; CCable regions colored based on S2’s transmission power. MinPC adjusts

senders transmission power to have the SINR at the receiver equal to the SINR thresh-

old. Therefore, theoretically MinPC scheme cannot endure any interference because

that will drop the SINR below the SINR threshold. However, the discrete 1 dBm level

(or even coarser level) of power control and limited power control range used in our

assumption and found in general for low-power radio may still give some room for extra

interference. Out of the total collision region with MinPC (presented in Figure 6.20(f),

only very small fraction (about 1%) of R2 locations can support concurrent communi-

cation. Figure 6.20(g) shows every R2 location which supports successful concurrent

communications with MinPC scheme, including the non-Collision region, but the CCa-

ble region is still quite small compared to the OptiPC scheme.

Figure 6.20(h) presents the CCable R2 locations when we use MaxP scheme. In

this example, some extra transmission power is used to sustain communication under

interference, but still only 15% of collision region can be CCable while causing high

energy consumption for transmission and unnecessarily high interference to the network.

From this comparison, we can see that more sophisticated transmission power control

can significantly improve CCability; Simple minimum power control scheme or maxi-

mum static power scheme does do very well in this regard. RTS/CTS based collision

avoidance often overestimates the effect from concurrent transmission and designing

a MAC protocol incorporating a more sophisticated power control could be useful to

improve spatial reuse of the network.

145

Page 162: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

6.7 Making CCable Decisions in Practice

Section 6.3.3 described how we select optimal transmission powers to enable CCability

when possible in simulation. Making this decision in practice is considerably more

difficult for several reasons: the decision must be made at distributed nodes with little or

no communication, node location is likely unavailable or inaccurate, and noise levels are

constantly changing. Even if locations are known, distance is not an accurate estimator

of signal and interference strength as we observe in our testbed experiments and others

have observed in the past [3, 77, 84, 93].

However, if we can actually measure the path loss at a given location, we can avoid

these real-world complexities and use this measurement directly our proposed formulae

(Equation 6.4 and 6.5). This simplification is possible because these model parameters

are used only to estimate path loss. Actual path loss information can be collected with

a single RSS measurement at any transmission power level (path loss = Tx power −RSS ), suggesting that a CCable decision is feasible in real systems.

Our initial testbed experiments suggest a close match between simulation and testbed

experiments (Figure 6.17). We design a practical MAC that supports CCability based

on our findings in this chapter. We presented our new MAC design in Chapter 7.

6.8 Summary

In this chapter, we have presented the first effort to quantify the opportunity for concur-

rent communication in low-power wireless networks. We proposed a simple rule which

determines when successful concurrent communication is possible, and how to select an

optimal transmission power for concurrent communication given global knowledge or

146

Page 163: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

with measured path loss. Through simulation we systematically explored the parame-

ter space, varying node position, mean and variance of path loss, signal-to-interference-

plus-noise-ratio (SINR) threshold, range and granularity of transmission power control.

We verified the key results of our simulations through testbed experiments with MicaZ

motes, demonstrating that concurrent communication is often possible with appropriate

power control and capture by at least one receiver is almost always possible.

147

Page 164: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Chapter 7

Towards Concurrent Communication in Wireless Networks

7.1 Overview

Avoiding collisions is one of the key roles of media-access (MAC) protocols. Research in

MACAW [5] and standards such as 802.11 employ carrier sense and exchange of request-

to-send (RTS) and clear-to-send (CTS) packets to prevent concurrent communications

and hidden terminal cases that might corrupt communication. Nevertheless, concurrent

communication—allowing transmission by two senders within maximum communication

range of each other’s receiver at the same time over the same channel—can be beneficial,

provided both receivers can successfully receive what is sent. We present the effects

of concurrent packet transmission in Chapter 5 and study the feasibility of concurrent

communication with quantifications of the benefits from concurrent communication with

appropriate power setting in Chapter 6. The benefits of concurrent communication

come because carrier sense and RTS/CTS greatly reduce opportunities for spatial reuse

of the channel. In a multi-hop network, RTS/CTS-enforced-silence reduces end-to-end

throughput. And for networks designed for relatively small data payloads, such as

802.15.4, the RTS/CTS exchange is avoided as control overhead.

Recent work has begun exploiting the richness of real-world wireless propagation

and richer MAC protocols. Experiments have shown that MAC protocols can exploit

148

Page 165: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

channel capture, either by retraining mid-reception [43, 83, 96], or using more aggres-

sive carrier sense [39]. Other work has shown that power control can allow transmission

“over the heads” of intermediate nodes [58]. Experiments have evaluated power control

to maximize spatial reuse [77, 50], and to develop better models of wireless propaga-

tion [56, 66, 79]. Experimental work has also suggested the importance of SINR-based

channel models that represent the intermittent, power- and location-sensitive reception

inherent in concurrent wireless communication [58, 79]. This range of work provides

components for interference-aware protocol design and has shown the feasibility of con-

current communication with modern radios that provide per-packet power control and

MAC-level channel capture. While very promising, this work has yet to suggest a specific

new MAC protocol or quantify trade-offs.

This chapter (the work presented in this chapter appears in [17]) seeks to answer

the following question: how close can a practical MAC approach optimal?

Our main contribution is to relate these bounds on concurrent communication to

what can be accomplished in a real-world MAC protocol. Our optimal bounds require

perfect knowledge of all channel state: all concurrent communication, node locations,

and noise; information impossible to maintain in a realistic network, and complex and

expensive to approximate. On the other hand, a very simple MAC might send at the

lowest possible power to maximize channel reuse. We evaluate the benefits of designs

that employ different amounts of information relative to our optimal performance bound

(Section 7.2).

While our work presented in this chapter does not advocate a complete new MAC,

we show that two pairs of transmitters can communicate concurrently more than 80%

of the time with sufficient source separation, given perfect channel knowledge. We also

show that a practical gain adaptive power control-based MAC protocol can provide

much of this benefit (73% on average). These results suggest that future MAC designs

149

Page 166: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

should embrace concurrent communication through power control and channel capture

and shift away from carrier sense and RTS/CTS.

7.2 MAC Protocol Designs

We have established that for the vast majority of topologies where senders have reason-

able separation, concurrent communication is possible given complete information (in

Chapter 6). Yet how close practice can come to this bound is not clear, since a practical

MAC protocol must make control decisions based only on prior knowledge and local

information.

We next consider five different power control algorithms for MAC protocols. Carrier

sense with RTS/CTS at maximum and minimum power represents the current state-

of-the-art. We present an oracle algorithm, to provide an upper bound on performance

given unachievably perfect information. We then introduce two simple MAC protocols

that use only local and prior information. MinPC sends at minimum power with channel

capture; a very simple way to improve spatial reuse given prior knowledge of node loca-

tions. Finally, gain-adaptive power control (GAPC) adds a transmit-power-dependent

boost to MinPC to overcome some potential interference.

We evaluate these protocols through simulation using the SINR-based model that

we validated in Section 6.5 with testbed experiments. We use an exponential path-loss

model with the option of log-normal multipath fading in our simulations to obtain the

pair-wise link gains. In each simulation we consider two sender-receiver pairs. We fix

the location of one pair and the second sender, move the second receiver over all possible

locations with possible reception, and measure which receivers can capture concurrently

sent packets.

Figure 7.1 shows CCability for each protocol, in this figure black indicates the CCable

region, gray shows where one communication or the other is capturable, and white shows

150

Page 167: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

inability to communicate, either due to power limitations (outside the circle) or due to

collisions (inside). The above two rows of this figure show simulation results without

considering link quality variance at the same distance, and bottom two rows show results

with variance in link gain due to model multi-path fading. As can be seen, while fading

effects do introduce a degree of noise, they do not fundamentally change the results. For

ease of exposition, therefore, we ignore fading in subsequent discussion as we consider

each design alternative.

7.2.1 Today’s Practice: CS-RTS/CTS with Simple Power Control

We begin by evaluating traditional control methods. Figures 7.1(a) and 7.1(b) show

the behavior of a traditional carrier-sense with RTS/CTS MAC. Simplest is to always

transmit RTS/CTS at maximum power to block any potential receivers. As shown in

Figure 7.1(a), this case always allows one sender, but never concurrent communication.

Slightly better is to send at minimum possible power needed to reach the indented

receiver (assuming unicast communication). Taking this step requires that each node

maintain a list of neighbors and estimates of the transmit power needed to exceed their

SNR threshold. We assume this information is collected and reasonably stable, a valid

assumption for slow-fading environments with little mobility [77]. In this case, the small

black crescent in Figure 7.1(b) shows that even with CS-RTS/CTS we can get some

concurrent communication when R2 is located near S2—approximately 2% of the area.

While better than maximum power, we suggest that this gain is too modest relative to

the measurement overhead to motivate use of power control with CS-RTS/CTS.

7.2.2 A Upper Bound on Performance with an Oracle

Given perfect knowledge of the gain (or path loss) between the nodes in the network,

any concurrent communication, and noise, one can compute the optimal (minimal)

151

Page 168: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−60 −50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(a) CS-RTS/CTS(Max)

−60 −50 −40 −30 −20 −10 0 10 20−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(b) CS-RTS/CTS(MinPC)

−60 −50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(c) Oracle

−60 −50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(d) MinPC

−60 −50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(e) GAPC

−60 −50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(f) CS-RTS/CTS(Max)

−60 −50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(g) CS-RTS/CTS(MinPC)

−60 −50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(h) Oracle

−60 −50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(i) MinPC

−60 −50 −40 −30 −20 −10 0 10 20 30−40

−30

−20

−10

0

10

20

30

40

X Coordinate of R2 (m)

Y C

oord

inat

e of

R2

(m)

(j) GAPC

Figure 7.1: MAC power control comparison of CCability. The bottom two rows showthe case with fading variance. S1 = (−6, 0), R1 = (0, 0), S2 = (−21, 0), and vary R2between -35 m and 35 m both in X and Y directions, n = 3.5, SINRθ = 2, Xσ = 0 forthe top two rows, Xσ = 3 for the bottom two rows. Black = CCable, Gray = Capture,White = No communication.

152

Page 169: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

transmit power for concurrent communication. We describe this approach in previous

chapter (in Section 6.3.1). While gain can be observed in the network and its variance

estimated, one cannot have perfect knowledge of all concurrent communications. We

next describe an oracle algorithm that uses this perfect knowledge establish an upper

bound on the benefit we can expect from concurrent communication. While this oracle

uses perfect knowledge, it is still subject to hardware limitations of discrete power levels

and minimum and maximum transmit power.

Figure 7.1(c) shows sample results with the oracle. Compared to CS-RTS/CTS at

different power levels (Figures 7.1(a) and 7.1(b)), we can see that there is considerable

room for concurrent communication. There is a small hole near the center, occupying

about 3% of the possible area, where only one communication can be allowed. In this

region receiver R2 is too close to sender S1 or receiver R1 for both to communicate given

a maximum transmit power. We call this region the region of impossible concurrency.

Of course, this scenario represents just one topology. However, we observe similar

results provided the two sources are separated by some minimum distance (outside the

region of impossible concurrency). We examine different source and receiver placement

in more detail below (Figures 7.2 and 7.3).

For this configuration, the oracle allows concurrent communication over 97% of the

R2 locations. This evaluation demonstrates the potential of channel capture and power-

control, if we define a MAC algorithm that uses practical information.

7.2.3 Exploiting Power Control and Channel Capture

Ignoring interference, we maximize spatial reuse by always sending at the minimum

power that will reach the intended receiver. Our capture(MinPC) algorithm takes this

approach to power control, and employs MAC-level channel capture [83]. It is therefore

equivalent to CS-RTS/CTS(MinPC), but replacing CS-RTS/CTS with channel capture.

153

Page 170: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

As with CS-RTS/CTS(MinPC), we assume nodes maintain a list of neighbors and can

track the gain needed to reach them.

In theory, sending at the minimum transmit power cannot tolerate any level of

interference. However, in practice, real hardware can be set only at discrete power

levels, providing some level of protection to noise. (We use discrete levels at 1 dBm

increments in this simulation; the CC2420 radio provides slightly coarser levels.)

Figure 7.1(d) shows a moderate size region where concurrent communication is pos-

sible, 20% of the total area in this case. Comparing this to CS-RTS/CTS (MinPC)

demonstrates the advantage of channel capture over communications prohibition. In

addition, the large grey region shows that, even when concurrent communication is not

possible, at least one receiver or the other will get their data through. In this case, CC

or capture is 87% of the total area.

The penalty of allowing concurrent communication is the small white crescent region

where transmit powers are evenly matched at the receivers, resulting in collisions without

capture. With RTS/CTS, one sender or the other would win the contention and send,

but with capture we depend on random backoff and retry when nodes are at this range.

7.2.4 GAPC: Gain-Adaptive Power Control and Capture

While discrete power levels provide some buffer against noise with the capture (MinPC)

algorithm, concurrent communication provides strong sources of interference that limit

the ability of min-power to approach oracle. This problem is particularly noticeable at

the edges of S2’s range, where interference for S1 prevents S2 reception. In Figure 7.1(d)

this case appears as the large grey doughnut surrounding the black CCable region.

This conditions can be overcome by systematically adding a boost of power in in-

verse proportion to the gain needed to reach the intended receiver. We call this algo-

rithm Gain-Adaptive Power Control. Since gain is roughly proportional to distance,

154

Page 171: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

this means that short-distance transmissions get large boosts while longer transmission

gets relatively less gain. Our intuition for this scheme comes from observations in a

detailed simulation study (presented in Chapter 6) [15]: we found that short distance

communication is often overwhelmed by interference from longer transmissions.

If we define Pmax and PS,R as the maximum possible transmit power and the power

needed for source S to reach receiver R, then we can define the power boost ε as:

ε = (Pmax − PS,R)εratio (7.1)

In this equation, εratio represents the fraction of remaining power to allocate to a

transmission. Large values of εratio will quickly assign all headroom to transmissions

and will increase the bonus given to shorter links. We varied εratio and found that

moderate values (0.3 to 0.7) provided the best levels of CCability (values that near 0

provide no boost, while values approaching 1 always operate at maximum power). We

adopt εratio = 0.5 as a reasonable, robust choice.

Figure 7.1(e) evaluates gain-adaptive power control with εratio = 0.5. We see that

this approach comes very close to optimal: concurrent communication is possible with

the receiver in 76% of the area compared to the oracle algorithm, much closer than

capture(MinPC).

The cost of gain-adaptive control relative to the oracle can be seen in two locations.

The moderate-size grey area when R2 is placed near (0, 0) is larger than optimal. This

area corresponds to cases where R1 and R2 are competing and the power boost prevents

concurrent communication. In this region it is best if only one sender transmits. Second,

communication in the narrow gray ring around the edge of the oracle cannot be reached

with gain-adaptive control because of slightly higher interference from the S1-R1 pair.

155

Page 172: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−30 −20 −10 0 10 20 300

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Coordinate X of S2 location (m)

CC

able

Are

a fr

actio

n

CS−RTS/CTS(Max)CS−RTS/CTX(MinPC)OracleMinPCGAPC (0.5)

Figure 7.2: Comparison of CCable area with limited power levels (-25 dBm to 0 dBm)for five MACs.

These results suggest that gain-adaptive power control is a practical scheme that

gets a significant fraction of optimal performance.

7.2.5 Comparing MAC Protocols

Figure 7.1 compares the five MAC algorithms for a particular topology. We can quantify

the benefit of concurrent communication by observing the ratio of area of concurrent

communication (anything black) to the total reachable area when there is no interference

(indicated by thin black circles, also equal to the the gray area with CS-RTS/CTS at

maximum power in Figure 7.1(a)). We define this ratio as the CCable area.

Figure 7.2 compares this CCable area for each of the MAC schemes we consider.

This graph provides a single slice through the 2-D simulation with nodes placed at

S1 = (−6, 0), R1 = (0, 0), S2 at coordinate (x, 0), with the x-coordinate indicated

on the horizontal axis of the graph, evaluated for all R2 locations over all potentially

receivable locations. Each point on the figure represents the fraction of R2 locations

that allow concurrent communication for a given S2 x position.

156

Page 173: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

−30 −20 −10 0 10 20 300

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Coordinate X of S2 location (m)

CC

plu

s C

aptu

re a

rea

frac

tion

CS−RTS/CTS(Max)CS−RTS/CTS(MinPC)OracleMinPCGAPC(0.5)

Figure 7.3: CC plus capture rate comparison with limited power levels (-25 dBm –0 dBm)

Even with power control, Figure 7.2 shows that CS-RTS/CTS provides little spatial

reuse of the channel through concurrent communication; this result is consistent with its

design goal of preventing any possible interference. Shifting to a channel-capture-based

MAC (min-power) provides considerably greater opportunity for concurrent communi-

cation. Finally, GAPC comes relatively close to the best possible oracle result. We find

that its CCable area is within 73% of the optimal, averaged over all S2 locations, and

is as high as 95% in regions with sufficient source separation.

We can also observe where concurrent communication is possible. All algorithms,

including the oracle, fail when both senders (or receivers) are nearly in the same place.

In this region of impossible concurrency, no level of power is sufficient to capture the

channel. The algorithms differ mainly in the width of this region—more sophisticated

algorithms are closer to the oracle’s best-possible result.

We can use this same methodology to evaluate not just opportunities for concurrent

communication, but for CC or channel capture. Figure 7.3 shows that the oracle per-

formance almost strictly dominates CS-RTS/CTS by this metric—CS-RTS/CTS always

gets exactly one packet through, while the oracle always gets one or two packets through.

157

Page 174: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Figure 7.2 shows where two are possible, while in region of impossible concurrency it

gets one packet through. By comparison, the realizable algorithms capture(MinPC)

and GAPC can get one or two packets through 77–88% of the time. Even when con-

currency is impossible, most often one sender captures the channel. The 12–23% gap

represents lost capacity in conditions where packet collision allows neither sender to

communicate. Most of this loss occurs at near the edge of maximum communication

range where GAPC cannot boost power adequately to exceed interference because of

hardware limitations.

7.3 Summary

It is now widely understood that wireless propagation is much more than receive/no-

receive links. Prior work (in Chapter 6) has demonstrated that channel capture are

possible with an appropriate power control [15].

The work described in this chapter has established that the benefit of exploiting

these characteristics is significant. We provide a theoretical upper bound on perfor-

mance given realistic hardware and perfect knowledge. We then showed that a practi-

cally implementable power control algorithm, the GAPC scheme, can get near-optimal

performance, averaging 73% of area of concurrent communication obtained the oracle,

with successful capture in 77–88% of the cases.

While promising, our work is still a preliminary step. We focused on two pairs of

concurrent communications; we believe the results generalize to n-node communication

(through preliminary simulations not shown here), but through evaluation is future

work. More importantly, full implementations of the MAC algorithms that we propose

are necessary to provide full experimental validation of our conclusions.

158

Page 175: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

We believe this work establishes an essential direction for future MAC research,

away from the use of carrier sense and RTS/CTS to avoid concurrent communication,

instead embracing concurrency through power control and channel capture.

159

Page 176: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Chapter 8

Future Work and Conclusions

We close by listing some open research questions and problems that can be addressed

in our future work, and by making some concluding statements.

8.1 Future Directions

First, an important challenge is to develop a good wireless channel (or link quality)

metric under dynamic environments. We first started our research by understanding

the behavior of low-power wireless links in static environments (in Chapter 4). We tested

some of the link quality metrics and studied the influence of power control mostly in

this static condition. However, it is often the case to find an environment with dynamic

communication channels, and there is no systematic study of identifying appropriate

metric to use in this condition. We think our measurement study that was mostly

limited to a static environment can be extended by measuring channel behavior under a

dynamic environment with a realistic traffic model. Identifying a good probabilistic link

quality metric for dynamic environments and studying optimal settings of transmission

power can lead to significant change and improvement in communication protocol design.

A second future direction is modeling co-channel interference from more than two

concurrent transmissions. In our experimental study (presented in 5.4.2), we observe

160

Page 177: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

that additive effect of multiple interference considered in theory is not always valid in real

systems. However, it was difficult to identify real causes of this phenomenon; though

we find that some of this behavior is attributed to non-ideal hardware used in low-

power wireless networks. That is the main difficulty of proposing interference simulation

models for more than two concurrent packet transmission. To further enhance the

accuracy and efficiency of interference-aware protocol design, it is essential to have

more precise modeling of multiple interference on packet communication with some

state-of-the-art low-power wireless radios.

Third, it would be useful to extend our proposed topology condition and rules to

optimal transmission power setting for concurrent packet transmission for the case with

more than two interferers in the same channel. Once we obtain more accurate model of

multiple interference, one can use it to extend our process of making concurrent packet

communication decision to entire network.

Finally, it is important to develop new communication protocols which allow con-

current packet communication within the same channel. We have proposed a sketch of

MAC protocol GAPC, that take advantages of capture effect and transmission power

control, which improves the spatial reuse of the network only with local information.

It would be good to test some variations of GAPC taking into account some extra in-

formation other than channel gain; probably with some extra decision rules of power

setting for the second attempt of packet transmission at failure. Medium access con-

trol protocols and multi-hop packet communication (such as scheduling and routing)

protocols could be possible immediate candidates.

As a large research direction, one can think of extending this new design paradigm

towards concurrent communications for systems with advanced hardware that supports

multiple channels, smart antenna, advanced modulation techniques such as orthogonal

161

Page 178: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

frequency division multiplex (OFDM), or for different networks such as 802.11 (wireless

LAN), 802.16 (WiMAX).

8.2 Conclusions

Early empirical studies in low-power wireless networks revealed that the reality of wire-

less communication is quite different from common approximations accepted for a proto-

col design and evaluation (which are normally done with simulations due to the difficulty

of real deployment).

In this dissertation, we presented experimental studies that lead to a better un-

derstand low-power wireless network, especially the effects of transmission power con-

trol and co-channel interference. Based on our empirical studies, we proposed some

interference-aware protocols that improve the performance of wireless communication

in terms of reliability and channel capacity of wireless networks.

First, we performed a systematic empirical study of low-power wireless links, espe-

cially with transmission power control to test its value as a link quality controller. Our

study identifies the causes of high variance in link quality under different environmental

conditions and hardware settings, and identified the transmission power range where

the link quality dynamically changes (i.e., unreliable transmission power range).

Based on this empirical understanding of wireless links and effects of power control

on wireless channel, link quality control scheme with packet-based power control with

link blacklisting (PCBL) has been introduced. PCBL converts unreliable asymmetric

and weak links to reliable wireless links which provide a consistent link quality. We

incorporate a blacklisting approach together with our power control scheme to address

the remaining unreliable link problem at adjusted transmission power level. We imple-

mented and tested performance of PCBL in real testbed with actual routing protocol

162

Page 179: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

to verify its performance and benefits. PCBL performs energy-efficient link quality con-

trol which provides more consistent and reliable network topology, and it also improves

spatial reuse of the network while minimizing channel interference.

Our first empirical study and protocol design is still limited by the prohibition of

concurrent packet transmission within the same channel with the simplified collision

avoidance scheme often implemented in medium access control layer. So next, we per-

formed and presented experimental analysis of the effects of concurrent packet trans-

missions in low-power wireless networks. We have confirmed the capture effect and the

existence of the SINR threshold which ensures the successful delivery of the strongest

packet under the concurrent packet communication situations with single and multiple

interferers. Our systematic experimental study verifies differences between the con-

ventional approximation of the interference effect and the actual impact of concurrent

transmission on packet delivery. Our experimental study provides new guidelines for

more realistic simulation models and capture-aware protocol design.

After confirming capture effects and seeming low probability actual packet collision

upon concurrent packet transmission, we have presented the first effort to quantify the

opportunity for concurrent communications (CC) in low-power wireless networks. We

proposed a simple rule to determine when communication is CCable and to select op-

timal transmission power given global knowledge or with measured path loss. Through

simulation we systematically explored the parameter space, varying node position, mean

and variance of path loss, signal-to-interference-plus-noise-ratio (SINR) threshold, range

and granularity of transmission power control. We verified the key results of our simu-

lations through testbed experiments with MicaZ motes, demonstrating that concurrent

communication is often possible and capture by at least one receiver is almost always

possible.

163

Page 180: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

Based on our mathematical modeling of CCable conditions and empirical experi-

ence, we proposed a simple sketch of MAC protocol, called GAPC, which controls its

transmission power based on the expected gain at intended receiver. GAPC uses only

localized information, but performs close to the optimal power setting that requires

global knowledge of the network.

From extensive experimental, simulation-based, analytical evaluation, we believe

that interference-aware communication protocol design can significantly improve the

performance of wireless communication protocol, mainly by embracing concurrency in-

stead of avoiding it, through capture effect and optimally tuned transmission power

settings.

164

Page 181: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

References

[1] A. Acharya, A. Misra, and S. Bansal. MACA-P: A MAC for concurrent trans-missions in multi-hop wireless networks. In IEEE PerCom, pages 505–508, Mar2003.

[2] S. Agarwal, R.H. Katz, S.V. Krishnamurthy, and S.K. Dao. Distributed power con-trol in ad-hoc wireless networks. In IEEE International Symposium on Personal,Indoor and Mobile Radio Communications, pages 59–66, Oct 2001.

[3] D. Aguayo, J. Bicket, S. Biswas, G. Judd, and R. Morris. Link-level measurementsfrom an 802.11b mesh network. In ACM SIGCOMM, pages 121–132, Aug 2004.

[4] N. Bambos and S. Kandukuri. Power controlled multiple access (PCMA) in wirelesscommunication networks. In IEEE Infocom, pages 219–228, Mar 2000.

[5] Vaduvur Bharghavan, Alan Demers, Scott Shenker, and Lixia Zhang. MACAW: Amedia access protocol for wireless lan’s. In ACM sigcomm, pages 212–225, London,UK, Sep 1994.

[6] A. Cerpa, N. Busek, and D. Estrin. SCALE: a tool for simple connectivity assess-ment in lossy environments. Technical Report CENS TR 03-0021, UCLA, 2003.

[7] A. Cerpa, J. L. Wong, L. Kuang, M. Potkonjak, and D. Estrin. Statistical modelof lossy links in wireless sensor networks. In IPSN, Apr 2005.

[8] A. Cerpa, J. L. Wong, M. Potkonjak, and D. Estrin. Temporal properties of lowpower wireless links: Modeling and implications on multi-hop routing. In MobiHoc,pages 414–425, May 2005.

[9] M. Cesana, D. Maniezzo, P. Bergamo, and M. Gerla. Interference aware (IA) MAC:an enhancement to IEEE802.11b DCF. In IEEE Vehicular Technology Conference,Oct 2003.

[10] Chipcon. CC1000 single chip very low power rf transceiver. http://www.chipcon.com/files/CC1000_Data_Sheet_2_3.pdf.

[11] Chipcon. CC2420 2.4 GHz ieee 802.15.4/ zigbee-ready RF transceiver. http://www.chipcon.com/files/CC2420_Data_Sheet_1_4.pdf.

165

Page 182: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

[12] D. Couto, D. Aguayo, J. Bicket, and R. Morris. A high-throughput path metricfor multi-hop wireless routing. In IEEE Mobicom, pages 134–146, Sep 2003.

[13] D. Couto, D. Aguayo, B.A. Chambers, and R. Morris. Performance of multihopwireless networks: Shortest path is not enough. In First Workshop on Hot Topicsin Networking (HotNets-1), Oct 2002.

[14] Crossbow. MPR/MIB user’s manual 7430-0021-06. http://www.xbow.com/Support/manuals.htm, Aug 2004.

[15] B. Krishnamachari D. Son and J. Heidemann. Evaluating the importance of con-current packet communication in wireless networks. Technical Report ISI-TR-639,USC/ISI, Apr 2007.

[16] B. Krishnamachari D. Son and J. Heidemann. Experimental study of transmissionpower control and blacklisting based link quality control in wireless sensor networks.Technical Report ISI-TR-629, USC/ISI, Jan 2007.

[17] J. Heidemann D. Son and B. Krishnamachari. Towards concurrent communicationin wireless networks. Technical Report ISI-TR-646, USC/ISI, Jul 2007.

[18] D. Dardari, V. Tralli, and R. Verdone. On the capacity of slotted aloha withRayleigh fading: The role played by the number of interferers. IEEE Communica-tion letters, 4, 5:155–157, May 2000.

[19] R. Draves, J. Padhye, and B. Zill. Comparison of routing metrics for static multi-hop wireless networks. In ACM Sigcomm, pages 133–144, Aug 2004.

[20] T. ElBatt and A. Ephremides. Joint scheduling and power control for wirelessad-hoc networks. In IEEE Infocom, pages 976–984, Jun 2002.

[21] T. ElBatt, S.V. Krishnamurthy, D. Connors, and S. Dao. Power managementfor throughput enhancement in wireless ad-hoc networks. In IEEE InternationalConference on Communications (ICC), pages 1506–1513, Jun 2000.

[22] J. Elson, L. Girod, and D. Estrin. Fine-grained network time synchronizationusing reference broadcasts. In Fifth Symposium on Operating Systems Design andImplementation (OSDI), pages 147–163, Dec 2002.

[23] ISI Laboratory for Embedded Networked Sensor Experimentation (ILENSE).PC104 based nodes. http://www.isi.edu/ilense/testbed/pc104/.

[24] G. Foschini and Z. Miljanic. A simple distributed autonomous power control al-gorithm and its convergence. IEEE Transactions on Vehicular Technology, 42,4:641–646, Nov 1993.

166

Page 183: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

[25] D. Ganesan, D. Estrin, A. Woo, D. Culler, B. Krishnamachari, and S. Wicker.Complex behavior at scale: An experimental study of low-power wireless sensornetworks. Technical Report CS TR 02-0013, UCLA, 2002.

[26] K. Gilhousen, I. Jacobs, R. Padovani, A. Viterbi, L. Weaver, and C. Wheatley.On the capacity of a cellular CDMA system. IEEE Transactions on VehicularTechnology, 40,2:303–312, May 1991.

[27] L. Girod, J. Elson, A. Cerpa, T. Stathopoulos, N. Ramanathan, and D. Estrin.EmStar: a software environment for developing and deploying wireless sensor net-works. Technical Report CENS TR34, UCLA, Dec 2003.

[28] J. Gomez and A.T. Campbell. A case for variable-range transmission power controlin wireless multihop networks. In IEEE Infocom, pages 1425–1436, Mar 2004.

[29] J. Gomez, A.T. Campbell, M. Naghshineh, and C. Bisdikian. Conserving trans-mission power in wireless ad hoc networks. In IEEE International Conference onNetwork Protocols (ICNP), pages 24–34, Nov 2001.

[30] D.J. Goodman and A.A.M. Saleh. The near/far effect in local ALOHA radio com-munications. IEEE Transactions on vehicular technology, 36, 1:19–27, Feb 1987.

[31] S. Grandhi, R. Vijayan, D. Goodman, and J. Zander. Centralized power control incellular radio systems. IEEE Transactions on Vehicular Technology, 42, 4:466–468,Nov 1993.

[32] P. Gupta and P.R. Kumar. The capacity of wireless networks. IEEE Transactionson information theory, 46, 2:388–404, Mar 2000.

[33] I.M.I. Habbab, M. Kavehrad, and C-E. W. Sundberg. ALOHA with capture overslow and fast fading radio channels with coding and diversity. IEEE Journal onselected areas in communications, 40, 3:79–88, Jan 1989.

[34] Z. Hadzi-Velkov and B. Spasenovski. Capture effect with diversity in ieee 802.11bdcf. In IEEE International Symposium on Computers and Communication (ISCC),pages 699–704, Jun 2003.

[35] J. Heidemann, N. Bulusu, J. Elson, C. Intanagonwiwat, K.C. Lan, W. Ye Y. Xu,D. Estrin, and R. Govindan. Effects of detail in wireless network simulation. InSCS Multiconference on Distributed Simulation, pages 3–11, Jan 2001.

[36] J. Heidemann, F. Silva, and D. Estrin. Matching data dissemination algorithms toapplication requirements. In ACM Sensys, pages 218–229, Nov 2003.

[37] I-LENSE. Stargate based nodes. http://www.isi.edu/ilense/testbed/stargate/.

167

Page 184: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

[38] C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed diffusion: A scalableand robust communication paradigm for sensor networks. In Mobicom, pages 56–67, Aug 2000.

[39] K. Jamieson, B. Hull, A. Miu, and H. Balakrishnan. Understanding the real-worldperformance of carrier sense. In SIGCOMM’05 Workshop, pages 52–57, Aug 2005.

[40] E-S. Jung and N.H. Vaidya. A power control MAC protocol for ad hoc networks.In ACM Mobicom, pages 36–47, Sep 2002.

[41] V. Kawadia and P.R. Kumar. Power control and clustering in ad hoc networks. InIEEE Infocom, pages 459–469, Apr 2003.

[42] J.H. Kim and J.K. Lee. Capture effects of wireless CSMA/CA protocols in rayleighand shadow fading channels. IEEE Transactions on vehicular technology, 48,4:1277–1286, Jul 1999.

[43] A. Kochut, A. Vasan, A.U. Shankar, and A. Agrawala. Sniffing out the correctphysical layer capture model in 802.11b. In IEEE International Conference onNetwork Protocols (ICNP), pages 252–261, Oct 2004.

[44] D. Kotz, C. Newport, and C. Elliott. The mistaken axioms of wireless-networkresearch. Technical Report TR2003-467, Dartmouth, Jul 2003.

[45] D. Kotz, C. Newport, R.S. Gray, J. Liu, Y. Yuan, and C. Elliott. Experimentalevaluation of wireless simulation assumptions. In MSWiM, pages 78–82, Oct 2004.

[46] M. Kubisch, H. Karl, A. Wolisz, L.C. Zhong, and J. Rabaey. Distributed algo-rithms for transmission power control in wireless sensor networks. In WirelessCommunications and Networking (WCNC), pages 558–563, Dec 2003.

[47] D. Lal, A. Manjeshwar, F. Herrmann, E. Uysal-Biyikoglu, and A. Keshavarzian.Measurement and characterization of link quality metrics in energy constrainedwireless sensor networks. In IEEE Globecom, pages 446–452, Dec 2003.

[48] K. Leentvaar and J. Flint. The capture effect in fm receivers. IEEE Transactionson Communications, 24, 5:531–539, 1976.

[49] L. Li and P. Sinha. Throughput and energy efficiency in topology-controlledmulti-hop wireless sensor networks. In Wireless Sensor Networks and Applications(WSNA), pages 132–140, Sep 2003.

[50] S. Lin, J. Zhang, G. Zhou, L. Gu, T. He, and J.A. Stankovic. ATPC: Adaptivetransmission power control for wireless sensor. In Sensys, pages 223–236, Nov 2006.

[51] D. Maniezzo, P. Bergamo, M. Cesana, and M. Gerla. How to outperformIEEE802.11: Interference aware (IA) MAC. In MED-HOC NET, Jun 2003.

168

Page 185: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

[52] K. Manousakis and J.S. Baras. Clustering for transmission range control and con-nectivity assurance for self configured ad hoc networks. In Military Communica-tions Conference (MILCOM), pages 1042–1047, Oct 2003.

[53] R. Min and A. Chandrakasan. Top five myths about the energy consumption ofwireless communication. In ACM Sigmobile Mobile Computing and Communica-tions Review, pages 65–67, Jan 2003.

[54] J.P. Monks, V. Bharghavan, and W.-M.W. Hwu. A power controlled multipleaccess protocol for wireless packet networks. In IEEE Infocom, pages 219–228, Apr2001.

[55] J.P. Monks, J.P. Ebert, A. Wolisz, and W.W. Hwu. A study of the energy savingand capacity improvement potential of power control in multi-hop wireless net-works. In Local Computer Networks (LCN), pages 550–559, Nov 2001.

[56] T. Moscibroda. The worst-case capacity of wireless sensor networks. In IPSN,pages 1–10, Apr 2007.

[57] T. Moscibroda, Y.A. Oswald, and R. Wattenhofer. How optimal are wirelessscheduling protocols. In IEEE Infocom, pages 1433–1441, May 2007.

[58] T. Moscibroda, R. Wattenhofer, and Y. Weber. Protocol design beyond graph-based models. In HotNets-V, pages 25–30, Nov 2006.

[59] T. Nagatsu, T. Tsuruhara, and M. Sakamoto. Transmitter power control for cel-lular land mobile radio. In Globecom, pages 1430–1434, Nov 1983.

[60] C. Namislo. Analysis of mobile radio slotted ALOHA networks. IEEE Transactionson vehicular technology, 33, 3:199–204, Aug 1984.

[61] R.W. Nettleton and H. Alavi. Power control for spread-spectrum cellular mobileradio system. In IEEE VTC, pages 242–246, May 1983.

[62] S.J. Park and R. Sivakumar. Load-sensitive transmission power control in wirelessad-hoc networks. In Global Telecommunications Conference, pages 42–46, Nov2002.

[63] Venkatesh Rajendran, Katia Obraczka, and J.J. Garcia-Luna-Aceves. Energy-efficient, collision-free medium access control for wireless sensor networks. In ACMSensys, pages 181–192, Nov 2003.

[64] R. Ramanathan and R. Rosales-Hain. Topology control of multihop wireless net-works using transmit power adjustment. In IEEE Infocom, pages 404–413, Mar2000.

[65] T. Rappaport. Wireless Communications: Principles and Practice. Prentice Hall,1996.

169

Page 186: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

[66] C. Reis, R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan. Measurement-based models of delivery and interference in static wireless networks. In ACMSigcomm, pages 51–62, Sep 2006.

[67] L.G. Roberts. ALOHA packet system with and without slots and capture. Com-puter Communication Review, 24, 4:28–42, 1975.

[68] R.C. Robertson and T.T. Ha. A model for local/mobile radio communications withcorrect packet capture. IEEE Transactions on communications, 40, 4:847–854, Apr1992.

[69] V. Rodoplu and T.H. Meng. Minimum energy mobile wireless networks. SelectedAreas in Communications, 17, 8:1333–1344, Aug 1999.

[70] R. Ronseca, O. Gnaawali, K. Jamieson, and P. Levis. Four-bit wireless link esti-mation. In Hotnets, Nov 2007.

[71] J.M. Rulnick and N. Bambos. Mobile power management for wireless communica-tion networks. Wireless Networks, 3, 1:3–14, Mar 2000.

[72] M. Sanchez, P. Manzoni, and Z.J. Haas. Determination of critical transmissionrange in ad-hoc networks. In MMT, pages 293–304, Oct 1999.

[73] K. Seada, M. Zuniga, A. Helmy, and B. Krishnamachari. Energy-efficient forward-ing strategies for geographic routing in lossy wireless sensor networks. In ACMSensys, pages 108–121, Nov 2004.

[74] A.U.H. Sheiki, Y.D. Yao, and X. Wu. The ALOHA systems in shadowed mobileradio channels with slow or fast fading. IEEE Transactions on vehicular technology,39, 4:289–298, Nov 1990.

[75] A. Sheth and R. Han. SHUSH: Reactive transmit power control for wireless MACprotocols. In IEEE Wireless Internet Conference, pages 18–25, Jul 2005.

[76] K-P. Shih and Y-D. Chen. CAPC: A collision avoidance power control MAC pro-tocol for wireless ad hoc networks. IEEE Communications Letters, 9, 9:859–861,Sep 2005.

[77] D. Son, B. Krishnamachari, and J. Heidemann. Experimental study of the effectsof transmission power control and blacklisting in wireless sensor networks. In IEEESECON, pages 289–298, Oct 2004.

[78] D. Son, B. Krishnamachari, and J. Heidemann. Experimental analysis of con-current packet transmissions in low-power wireless networks. Technical ReportISI-TR-609, USC/ISI, 2005.

170

Page 187: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

[79] D. Son, B. Krishnamachari, and J. Heidemann. Experimental study of concurrenttransmission in wireless sensor networks. In ACM Sensys, pages 237–250, Nov2006.

[80] M. Soroushnejad and E. Geraniotis. Probability of capture and rejection of primarymultiple access interference in spread spectrum networks. IEEE Transactions onCommunications, 39, 6:986–994, Jun 1991.

[81] K. Srinivasan and P. Levis. RSSI is under appreciated. In Emnets, May 2006.

[82] R. Wattenhofer, L. Li, P. Bahl, and Y.M. Wang. Distributed topology control forpower efficient operation in multihip wireless ad hoc networks. In IEEE Infocom,pages 1388–1397, Apr 2001.

[83] K. Whitehouse, A. Woo, F. Jiang, J. Polastre, and D. Culler. Exploiting thecapture effect for collision detection and recovery. In IEEE Workshop on EmbeddedNetworked Sensors (EmNetS-II), pages 45–52, May 2005.

[84] A. Woo, T. Tong, and D. Culler. Taming the underlying challenges of reliablemultihop routing in sensor networks. In ACM Sensys, pages 14–27, Nov 2003.

[85] A. Woo, K. Whitehouse, F. Jiang, J. Polastre, and D. Culler. The shadowingphenomenon: implications of receiving during a collision. In UCB Technical ReportUCB//CSD-04-1313, 2004.

[86] S.L. Wu, Y.C. Tseng, and J.P. Sheu. Intelligent medium access for mobile and adhoc networks with busy tones and power control. IEEE Journal on Selected Areasin Communications, 18,9:1647–1657, Sep 2000.

[87] Y.D Yao and A.U.H. Sheikh. The cpature effect in frequency-hop spread-spectrummultiple-access communications over fading channels with near/far problem. InIEEE International Conference on Communications (ICC), pages 194–198, Jun1988.

[88] R. Yates. A framework for uplink power control in cellular radio systems. IEEEJournal on Selected areas in Communications, 13, 7:1341–1347, Sep 1995.

[89] W. Ye, J. Heidemann, and D. Estrin. An energy-efficient MAC protocol for wirelesssensor networks. In IEEE Infocom, June 2002.

[90] J. Zander. Distributed cochannel interference control in cellular radio systems.IEEE Transactions on Vehicular Technology, 41, 3:305–311, Aug 1992.

[91] J. Zander. Performance of optimum transmitter power control in cellular radiosystems. IEEE Transactions on Vehicular Technology, 41, 1:57–62, Feb 1992.

171

Page 188: TOWARDS INTERFERENCE-AWARE PROTOCOL DESIGN by …anrg.usc.edu/www/thesis/DongjinThesis.pdf · models for my research with their incredible enthusiasm and sincereness. I would like

[92] K. Zhang and K. Pahlavan. Relation between transmission and throughput of slot-ted ALOHA local packet radio networks. IEEE Transactions on communications,40, 3:577–583, Mar 1992.

[93] J. Zhao and R. Govindan. Understanding packet delivery performance in densewireless sensor networks. In ACM Sensys, pages 1–13, Nov 2003.

[94] G. Zhou, T. He, S. Krishnamurthy, and J.A. Stankovic. Impact of radio irregularityon wireless sensor networks. In ACM MobiSys, pages 125–138, Jun 2004.

[95] G. Zhou, T. He, S. Krishnamurthy, and J.A. Stankovic. Models and solutionsfor radio irregularity in wireless sensor networks. ACM Transactions on SensorNetworks, 46, 2:221–262, Mar 2006.

[96] G. Zhou, T. He, J.A. Stankovic, and T. Abdelzaher. RID: Radio interferencedetection in wireless sensor networks. In IEEE Infocom, pages 891–901, Mar 2005.

[97] H. Zhou and R.H. Deng. Capture model for mobile radio slotted ALOHA systems.IEEE Transactions on communications, 145, 2:91–97, Apr 1998.

[98] M. Zuniga and B. Krishnamachari. Analyzing the transitional region in low powerwireless links. In IEEE SECON, pages 517–526, Oct 2004.

[99] M. Zuniga and B. Krishnamachari. An analysis of unreliability and asymmetry inlow-power wireless links. ACM Transactions on Sensor Networks, 3, 2, Jun 2007.

172