LEAD: Leveraging Protocol Signatures for Improving 802.11 Decoding Performance
نویسندگان
چکیده
Error correction is a fundamental problem in wireless system design as wireless links often suffer high bit error rate (BER) due to signal attenuation and interference. This paper presents a new cross-layer solution called LEAD to improve the performance of existing PHY layer error correcting codes. While the traditional wisdom of cross-layer wireless design is to expose and exploit PHY layer information at upper-layers, LEAD represents a paradigm shift in that it leverages upper-layer protocol signatures to improve PHY layer decoding performance. The design of LEAD is motivated by two key insights. First, error correcting code can correct more bit errors when the values of some bits, which we refer to as pilots, are known before decoding. Second, some header fields of upper-layer (MAC, logical link control, network, and transport) protocols are often fixed or highly biased toward certain values. These distinctive bit pattern signatures can thus be exploited as pilots to assist decoding. To realize this idea, we first characterize bit bias in reallife network traffic, and develop an efficient algorithm to extract pilot bits whose values have high predictability. We then augment three decoders, including the BCJR decoder of convolutional code, the belief propagation decoder of LDPC code, and the bubble decoder of rateless Spinal code, to effectively exploit extracted pilots. We implement LEAD on the USRP platform and evaluate its performance by replaying real-life 802.11 packet traces on a testbed of 12 USRP links. Our results show that LEAD reduces BER by more than 90% for half of the error packets, while incurring very low overhead.
منابع مشابه
HMTP: Multipath transport protocol for multihoming wireless erasure networks
This paper proposes a fountain-code-based multi-path transport protocol, called heterogeneous multi-path transport protocol (HMTP), and evaluates its performance. HMTP improves the throughput performance and path utilization of multi-homing wireless erasure networks. It solves the receive buffer blocking problem and eliminates the need for retransmissions and in-order packet delivery, both of w...
متن کاملA Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks
Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...
متن کاملImproving WLAN Performance by Modifying an IEEE 802.11 Protocol
One of the limitations of the IEEE 802.11 distributed coordination function (DCF) protocol is its low bandwidth utilization under medium-to-high traffic loads resulting in low throughput and high packet delay. To overcome performance problems, traditional IEEE 802.11 DCF (“DCF”) protocol is modified to the buffer unit multiple access (BUMA) protocol. The BUMA protocol achieves a better system p...
متن کاملEfficient Throughput MAC Protocol in Ad-hoc Network’s
This research aims at improving the throughput in distributed cooperative wireless ad-hoc networks by use of stations equipped with a new MAC. The main focus of this research is to show that several existing schemes can degrade network throughput and can result in higher energy consumption than when using IEEE 802.11 without power control. This work proposes a new power controlled MAC protocol ...
متن کاملOn Improving Performance for IEEE 802.11 Wireless LANs under Congested and Error-Prone Environments
IEEE 802.11 is worldwide implemented and the most widely deployed protocol for Wireless Local Area Networks (WLANs). This paper proposes a simple and effective contention window-resetting scheme, named Double Increment Double Decrement (DIDD), to improve the performance of IEEE 802.11 Binary Exponential Backoff (BEB) under an error-prone environment. Our work becomes important and meaningful in...
متن کامل