9
Virtual MISO Triggers in Wi-Fi-like Networks Oscar Bejarano and Edward W. Knightly ECE Department, Rice University, Houston, TX 77005 {obejarano, knightly}@rice.edu Abstract—Virtual Multiple-Input Single-Output (vMISO) sys- tems distribute multi-antenna diversity capabilities between a sending and a cooperating node. vMISO has the potential to vastly improve wireless link reliability and bit error rates by exploiting spatial diversity. In this paper, we present the first design and experimental evaluation of vMISO triggers (when to invoke vMISO rather than traditional transmission) in Wi- Fi networking environments. We consider the joint effect of gains obtained at the physical layer with MAC and network- scale factors and show that 802.11 MAC mechanisms represent a major bottleneck to realizing gains that can be attained by a vMISO PHY. In contrast, we show how vMISO alters node inter- connectivity and coordination and therefore can vastly transform the network throughput distribution in beneficial ways that are not described merely by vMISO link gains. Moreover, we show how to avoid triggering vMISO when the increased spatial footprint of the new cooperator would excessively hinder other flows’ performance. In this paper, we build the first multi-flow vMISO testbed and explore the trigger criteria that are essential to attain substantial gains in a fully integrated vMISO system. We find that the largest gains are achieved by a largely isolated flow (gains of 110%) whereas cooperator interference and contention effects are pronounced in larger topologies, limiting typical gains to 14%. I. I NTRODUCTION Virtual MISO (vMISO) systems in combination with space- time block coding (STBC) have the potential to mitigate link performance degradation due to signal fading and multipath effects by exploiting spatial diversity [14], [16]. In its simplest form, a vMISO link consists of a distributed system comprised of a sender node and a helper or cooperator node simultane- ously transmitting to a common receiver. STBC is a technique for orthogonalizing a stream across several transmit antennas. Thus, vMISO can employ STBCs to increase robustness by using simultaneous transmission of two copies of a data stream from two independent nodes, i.e., the originating sender, and the helper. However despite its potential in theory, we will show that in Wi-Fi-like systems, vMISO does not necessarily yield a performance gain and it can even yield a net loss. In this paper, we design, implement, and experimentally evaluate vMISO trigger policies for Wi-Fi-like networks that ensure vMISO is only enabled when it will yield a net network gain. In particular, we present the following con- tributions: First, we build the first multi-flow virtual MISO testbed, and present a comprehensive experimental evaluation of vMISO medium access control (MAC) protocols, in both small- and large-scale networks. These protocols employ dis- tinct mechanisms to invoke vMISO transmissions; i) Reactive vMISO schemes (also known as On-Demand) invoke vMISO transmissions only via explicit feedback from the receiver This research is sponsored by NSF Grants CNS-1126478 and CNS- 1012831. when the original transmission failed and a retransmission is required. ii) Proactive protocols invoke vMISO transmissions in an opportunistic manner via a two-phase process where initially the information is delivered to the helper and then a simultaneous sender-helper transmission is started without requiring any feedback. In addition, we define a suite of bench- marking protocols that while unimplementable in practice, characterize idealized vMISO schemes for simulation-based comparison (e.g., to compare an operational vMISO protocol with a backhaul-based protocol). Second, we propose vMISO trigger policies designed to ensure net throughput gains in Wi-Fi-like environments, and demonstrate the following: (i) In single-flow scenarios, a combination of reactive and proactive vMISO protocols yield significant gains for a wide range of Signal-to-Noise Ratio (SNR) regimes. For instance, proactive vMISO should be triggered at low SNR because it does not waste resources on a Single-Input Single-Output (SISO) transmission attempt. On the other hand, reactive vMISO should be triggered for medium to high SNR because vMISO transmissions are only enabled if an initial SISO attempt failed. Furthermore, we explore vMISO when coupled with MAC-layer mechanisms such as bit rate adaptation, and evaluate the protocols’ performance as a function of signal attenuation, helper node position, and transmission power. We show that the maximum bit rate (defined by 802.11’s maximum modulation and coding rate) limits vMISO. Namely, while in theory additional cooperation gains are available via use of a higher rate, in practice proactive vMISO (invoked at the highest rate) can yield a net throughput loss due to overhead and should not be triggered. In contrast, reactive vMISO yields minimal effect at high rate and SNR as the use of the cooperator is rarely invoked as loss is rare, hence the trigger decision has minimal consequence. Moreover, for a given channel condition, vMISO gains vary significantly with transmission rate, with the largest gains available at rates that would yield a poor channel with SISO, i.e., rates higher than a SISO channel would allow. Thus, a joint decision of which transmission rate to choose and whether or not to trigger vMISO is needed to maximize gains. (ii) With two contending flows we show that the addition of a vMISO helper fundamentally alters the network graph, medium contention, and inter-flow coordination. We show that in some cases, a bigger footprint due to the additional helper node substantially inhibits spatial reuse thereby reduc- ing throughput of the other flow. However, in other scenarios, the helping nodes add “links” (i.e., interactions between the helper and other nodes), thereby improving MAC coordi- nation, fairness, and throughput, an unintended side effect of vMISO. For example, in hidden terminal scenarios, the

Virtual MISO Triggers in Wi-Fi-like Networks - ece.rice.eduob4/files/Infocom2013.pdf · Virtual MISO Triggers in Wi-Fi-like Networks ... tinct mechanisms to invoke vMISO transmissions;

Embed Size (px)

Citation preview

Page 1: Virtual MISO Triggers in Wi-Fi-like Networks - ece.rice.eduob4/files/Infocom2013.pdf · Virtual MISO Triggers in Wi-Fi-like Networks ... tinct mechanisms to invoke vMISO transmissions;

Virtual MISO Triggers in Wi-Fi-like NetworksOscar Bejarano and Edward W. Knightly

ECE Department, Rice University, Houston, TX 77005{obejarano, knightly}@rice.edu

Abstract—Virtual Multiple-Input Single-Output (vMISO) sys-tems distribute multi-antenna diversity capabilities between asending and a cooperating node. vMISO has the potential tovastly improve wireless link reliability and bit error rates byexploiting spatial diversity. In this paper, we present the firstdesign and experimental evaluation of vMISO triggers (whento invoke vMISO rather than traditional transmission) in Wi-Fi networking environments. We consider the joint effect ofgains obtained at the physical layer with MAC and network-scale factors and show that 802.11 MAC mechanisms representa major bottleneck to realizing gains that can be attained by avMISO PHY. In contrast, we show how vMISO alters node inter-connectivity and coordination and therefore can vastly transformthe network throughput distribution in beneficial ways thatare not described merely by vMISO link gains. Moreover, weshow how to avoid triggering vMISO when the increased spatialfootprint of the new cooperator would excessively hinder otherflows’ performance. In this paper, we build the first multi-flowvMISO testbed and explore the trigger criteria that are essentialto attain substantial gains in a fully integrated vMISO system. Wefind that the largest gains are achieved by a largely isolated flow(gains of 110%) whereas cooperator interference and contentioneffects are pronounced in larger topologies, limiting typical gainsto 14%.

I. INTRODUCTION

Virtual MISO (vMISO) systems in combination with space-time block coding (STBC) have the potential to mitigate linkperformance degradation due to signal fading and multipatheffects by exploiting spatial diversity [14], [16]. In its simplestform, a vMISO link consists of a distributed system comprisedof a sender node and a helper or cooperator node simultane-ously transmitting to a common receiver. STBC is a techniquefor orthogonalizing a stream across several transmit antennas.Thus, vMISO can employ STBCs to increase robustness byusing simultaneous transmission of two copies of a data streamfrom two independent nodes, i.e., the originating sender, andthe helper. However despite its potential in theory, we willshow that in Wi-Fi-like systems, vMISO does not necessarilyyield a performance gain and it can even yield a net loss.

In this paper, we design, implement, and experimentallyevaluate vMISO trigger policies for Wi-Fi-like networks thatensure vMISO is only enabled when it will yield a netnetwork gain. In particular, we present the following con-tributions: First, we build the first multi-flow virtual MISOtestbed, and present a comprehensive experimental evaluationof vMISO medium access control (MAC) protocols, in bothsmall- and large-scale networks. These protocols employ dis-tinct mechanisms to invoke vMISO transmissions; i) ReactivevMISO schemes (also known as On-Demand) invoke vMISOtransmissions only via explicit feedback from the receiver

This research is sponsored by NSF Grants CNS-1126478 and CNS-1012831.

when the original transmission failed and a retransmission isrequired. ii) Proactive protocols invoke vMISO transmissionsin an opportunistic manner via a two-phase process whereinitially the information is delivered to the helper and thena simultaneous sender-helper transmission is started withoutrequiring any feedback. In addition, we define a suite of bench-marking protocols that while unimplementable in practice,characterize idealized vMISO schemes for simulation-basedcomparison (e.g., to compare an operational vMISO protocolwith a backhaul-based protocol).

Second, we propose vMISO trigger policies designed toensure net throughput gains in Wi-Fi-like environments, anddemonstrate the following:

(i) In single-flow scenarios, a combination of reactive andproactive vMISO protocols yield significant gains for a widerange of Signal-to-Noise Ratio (SNR) regimes. For instance,proactive vMISO should be triggered at low SNR becauseit does not waste resources on a Single-Input Single-Output(SISO) transmission attempt. On the other hand, reactivevMISO should be triggered for medium to high SNR becausevMISO transmissions are only enabled if an initial SISOattempt failed. Furthermore, we explore vMISO when coupledwith MAC-layer mechanisms such as bit rate adaptation, andevaluate the protocols’ performance as a function of signalattenuation, helper node position, and transmission power.We show that the maximum bit rate (defined by 802.11’smaximum modulation and coding rate) limits vMISO. Namely,while in theory additional cooperation gains are available viause of a higher rate, in practice proactive vMISO (invokedat the highest rate) can yield a net throughput loss due tooverhead and should not be triggered. In contrast, reactivevMISO yields minimal effect at high rate and SNR as theuse of the cooperator is rarely invoked as loss is rare, hencethe trigger decision has minimal consequence. Moreover, fora given channel condition, vMISO gains vary significantlywith transmission rate, with the largest gains available at ratesthat would yield a poor channel with SISO, i.e., rates higherthan a SISO channel would allow. Thus, a joint decision ofwhich transmission rate to choose and whether or not to triggervMISO is needed to maximize gains.

(ii) With two contending flows we show that the additionof a vMISO helper fundamentally alters the network graph,medium contention, and inter-flow coordination. We showthat in some cases, a bigger footprint due to the additionalhelper node substantially inhibits spatial reuse thereby reduc-ing throughput of the other flow. However, in other scenarios,the helping nodes add “links” (i.e., interactions between thehelper and other nodes), thereby improving MAC coordi-nation, fairness, and throughput, an unintended side effectof vMISO. For example, in hidden terminal scenarios, the

Page 2: Virtual MISO Triggers in Wi-Fi-like Networks - ece.rice.eduob4/files/Infocom2013.pdf · Virtual MISO Triggers in Wi-Fi-like Networks ... tinct mechanisms to invoke vMISO transmissions;

2

vMISO cooperator can add coordination by forcing othersenders to defer, therefore avoiding hidden terminal collisions.Consequently, proactively triggering vMISO transmissions insuch cases leads to increased overall throughput performance.

(iii) Finally, we establish that vMISO cooperators lead tosignificant increase in deferrals of other transmitters in large-scale topologies comprised of multi-hop flows, and ad hocnetworks thus decreasing the gains attained by vMISO com-pared to small-scale scenarios. While in small-scale scenarioseach individual flow can greedily choose whether to enablevMISO, we show that in large-scale networks a coordinateddecision that only allows certain flows to trigger vMISO,strongly benefits the entire network (i.e., only flows that yieldmaximum gains while minimizing their interference footprintshould be triggered). We show that even a simple thresholdpolicy allowing only the flows achieving gains beyond athreshold to trigger vMISO can significantly increase overallgains in large-scale networks. Nonetheless, vMISO has thelargest gains in small-scale topologies: e.g., a poor quality linkin a home WLAN might be dramatically improved by usinga nearby device as a helper.

II. VMISO PROTOCOLS AND IMPLEMENTATION

In this section we present the first multi-flow vMISO indoortestbed, comprised of several nodes forming different topolo-gies. Moreover, we describe a family of vMISO protocols thatwe implemented on an FPGA platform.

A. vMISO and STBC ImplementationVirtual MISO, also known as cooperative diversity, takes

advantage of spatial diversity and the relatively independentchannel realizations seen by different antennas. This is donein a distributed manner by exploiting the presence of multiplesingle-antenna nodes, which by operating together can emulatean antenna array [9]. That is, both the sender and the helpingnode (i.e., the vMISO cooperator) act as if they were asingle multi-antenna device by transmitting cooperatively toa common receiver.

Our implementation consists of single-antenna distributednodes where the sender and cooperating node form a vMISOlink by simultaneously transmitting two copies of the samesignal to a common receiver. We consider OFDM systemsand vMISO protocols that rely on the use of space-time blockcodes (i.e., Alamouti codes [1]) to orthogonalize these twosignal copies. In contrast to receiver diversity schemes suchas maximal ratio combining, Alamouti STBC distributes infor-mation across two senders thus making it a transmit diversityscheme. Our implementation performs the encoding/decodingin the time domain and follows the implementation presentedin [13]. Moreover, the vMISO protocol we implement is basedon a decode-and-forward (DF) scheme (see [9] for example).

B. vMISO MACVirtual MISO requires at least two nodes to have a copy

of the information to be transmitted, and since these nodesare separated, at least two phases are needed in order to firstdeliver the data to the cooperator and finally start a vMISOtransmission. The vMISO MAC determines how and when avMISO transmission should happen. Thus, in order to identify

the criteria required to design trigger policies that provide withmost substantial gains, we implement two types of vMISOMAC protocols.

Reactive vMISO schemes invoke vMISO transmissions onlyvia explicit feedback from the receiver. Specifically, we im-plement a protocol that relies on Negative Acknowledgementsor NACKs and we refer to it as Nack-based vMISO orNvMISO. The NACK invokes the cooperative transmission ata time that the helper node has (ideally) already overheard therequired transmission symbol sequence. That is, if the originaltransmission failed, a vMISO retransmission is instantiated bythe NACK. The reception of the NACK also synchronizes boththe source and the helper. In our system, the time between thetransmission from the source and the one from the helper isat most 200 ns. Thus, for a few hundred meters of separationbetween the two transmitting nodes, the length of the OFDMcyclic prefix allows us to treat the two copies as multipathat the receiver. Since the NACK is transmitted at base rate,we expect it to be highly reliable. According to the 802.11standard, it can be received as low as -85 dBm (for 10MHz channels), which increases the likelihood of successfullystarting a vMISO transmission if needed.

Proactive protocols trigger vMISO transmissions in a two-phase process where initially the information is delivered tothe helper and then a simultaneous sender-helper transmissionis invoked without requiring any feedback. The proactiveprotocol we implement is called Two-Phase vMISO (see Figure1(a)). With good channel conditions, it will always requiretwo phases even if the first transmission would have beensuccessful, therefore unnecessarily wasting air time and thehelper’s resources, and increasing interference.

Additionally, we define two benchmarking protocols forevaluation of vMISO; For the most part, these are unrealizableand unimplementable in real systems but are valuable forsimulation-based comparison. These benchmarking protocolsare illustrated in Figure 1. (b) Backhaul vMISO: the vMISOcooperator acts as a genie that a priori possesses the informa-tion the sender will transmit. Therefore, a vMISO transmissionoccurs in one phase without requiring any feedback, i.e., theNACK is not required, and the cooperator has the sender’s datain advance. (c) Perfect NACK NvMISO: the cooperator receivesa NACK with 100% probability therefore always starting avMISO retransmission if needed, also the cooperator alwayshas the data it needs to transmit. This is done in order to studythe extreme case where a vMISO retransmission always occurswhen requested, regardless of the position of the cooperator.Using this protocol provides us with a potential “worst-casescenario” for neighboring flows (since the cooperator willalways hear and transmit even when far from the vMISO flow),while providing a “best-case scenario” for the assisted flow dueto the same reason, hence a vMISO transmission will alwaysbe started.

C. Network PlatformWe implement the protocols and perform over-the-air ex-

periments on the Wireless Open-Access Research Platform(WARP). The board is a fully programmable wireless platformconsisting of a Xilinx Virtex-II Pro FPGA, and four daughtercard slots for up to four 2.4/5 GHz radio boards able to

Page 3: Virtual MISO Triggers in Wi-Fi-like Networks - ece.rice.eduob4/files/Infocom2013.pdf · Virtual MISO Triggers in Wi-Fi-like Networks ... tinct mechanisms to invoke vMISO transmissions;

3

(b)

C

S R

Phase 1

Phase II

C

S R

(c)

C

S R

Phase 1

Phase III

C

S R

Phase II

C

S R

(a)

Phase I

C

S R

Sunday, December 30, 2012

Fig. 1. Operation of vMISO protocols. Sender transmits to a receiver withthe help of a vMISO cooperator node.

support wideband applications (e.g., OFDM). The current stateof the platform’s OFDM physical layer supports BPSK, QPSK,and 16-QAM modulations in 10 MHz. To control the boards,conduct experiments, and gather data in real-time, we useWARPnet,1 a framework that enables communication amongwireless nodes in a network setting. WARPnet provides asoftware interface connecting WARP and a host PC runningserver and client scripts, via an ethernet switch. Figure 2presents our experimental setup.

SCRIPT

VISUALIZER

CONTROLLER

WARPnetClient

WARPnetClient

WARPnetClient

WARPnetServer

Host PC

Monday, March 21, 2011

Fig. 2. WARPnet: Host PC runs both client and server scripts to communicatewith the WARP boards to retrieve statistics and conduct experiments.

Furthermore, we implement vMISO and all related MACvariations as an extension to ns-2 in order to consider topolo-gies beyond 5 nodes. We use Nakagami random fading [4]which in addition to average pathloss effects due to node lo-cation, also characterizes received power as a random variablethat changes its value at each transmission. In order to validateour simulator extensions and channel model used, we compareour testbed results to the simulation results in Section III.Unless otherwise stated, we use the parameters in Table I inboth the simulations and the physical testbed.

III. TRADITIONAL MAC MECHANISMS HINDER VMISOPERFORMANCE GAINS

At the physical layer, vMISO improves link reliabilityby reducing error rates and outage probabilities [9], [16].However, the magnitude of these gains on the overall systemcan be influenced by MAC and network-scale factors. In thissection we show that the policies used to trigger vMISOtransmissions should be aware of MAC mechanisms such asmodulation and coding rate, as well as the SNR regimes atwhich the system is operating in order to ensure throughputgains.

1http://warp.rice.edu/trac/wiki/WARPnet

Carrier Frequency 2.427 GHzTransmit Power 10dBm

Header Rate BPSK (1/2 rate code)† Payload Rate 64-QAM (3/4 rate code)‡ Payload Rate 16-QAM (24Mbps)

Packet Size 1412 BytesTraffic Pattern Fully Backlogged Flows, CBR† Fading Model Nakagami (moderate fading)‡ OFDM Symbol 64 Subcarriers

TABLE ISIMULATOR AND TESTBED PARAMETERS - † INDICATES PARAMETERS

UNIQUE TO THE SIMULATOR WHEREAS ‡ INDICATES PARAMETERS UNIQUETO THE TESTBED

A. Transmission Rate in vMISO

Like vMISO, coding and modulation rate adaptation tech-niques are used to combat unreliable channel conditionscaused by fading and multipath. Namely, a transmitter adjustsits coding and modulation rate according to channel fluctu-ations induced by either transmitter or receiver mobility, aswell as scatterers. Therefore, in a real system, vMISO wouldoperate in conjunction with a rate adaptation technique andhere we explore their coupling.

−86 −84 −82 −80 −78 −76 −74 −72 −70 −680

2

4

6

8

10

12

14

16

18

Attenuation (dB)

Thro

ughp

ut (M

bps)

BPSK No CoopBPSK CoopQPSK No CoopQPSK Coop16QAM No Coop16QAM Coop64QAM No Coop64QAM Coop

−86 −84 −82 −80 −78 −76 −74 −72 −70 −680

1

2

3

4

5

6

7

8

9

Attenuation (dB)

Num

ber o

f Coo

pera

tive

Pack

ets

(x10

00)

BPSKQPSK16QAM64QAM

Attenuation (dB)

−86 −84 −82 −80 −78 −76 −74 −72 −70 −680

1

2

3

4

5

6

7

8

9

Attenuation (dB)

Num

ber o

f Coo

pera

tive

Pack

ets

(x10

00)

BPSKQPSK16QAM64QAM

Attenuation (dB)

Thr

ough

put

(Mbp

s)

Num

ber

of C

oope

rativ

e Pk

ts. (

x100

0)

0

1

2

3

4

5

6

7

8

9

-86 -84 -82 -80 -78 -76 -74 -72 -70 -68 -86 -84 -82 -80 -78 -76 -74 -72 -70 -68

(a) (b)

−86 −84 −82 −80 −78 −76 −74 −72 −70 −680

2

4

6

8

10

12

14

16

18

Attenuation (dB)

Thro

ughp

ut (M

bps)

6Mbps Direct Tx.6Mbps vMISO12Mbps Direct Tx.12Mbps vMISO24Mbps Direct Tx.24Mbps vMISO48Mbps Direct Tx.48Mbps vMISO

−86 −84 −82 −80 −78 −76 −74 −72 −70 −680

1

2

3

4

5

6

7

8

9

Attenuation (dB)

Num

ber o

f Coo

pera

tive

Pack

ets

(x10

00)

6Mbps12Mbps24Mbps48Mbps

0

2

4

6

8

10

12

14

16

18

Monday, December 31, 2012

Fig. 3. Throughput of NvMISO for different transmission rates.

−86 −84 −82 −80 −78 −76 −74 −72 −70 −680

2

4

6

8

10

12

14

16

18

Attenuation (dB)

Thro

ughp

ut (M

bps)

BPSK No CoopBPSK CoopQPSK No CoopQPSK Coop16QAM No Coop16QAM Coop64QAM No Coop64QAM Coop

−86 −84 −82 −80 −78 −76 −74 −72 −70 −680

1

2

3

4

5

6

7

8

9

Attenuation (dB)

Num

ber o

f Coo

pera

tive

Pack

ets

(x10

00)

BPSKQPSK16QAM64QAM

Attenuation (dB)

−86 −84 −82 −80 −78 −76 −74 −72 −70 −680

1

2

3

4

5

6

7

8

9

Attenuation (dB)

Num

ber o

f Coo

pera

tive

Pack

ets

(x10

00)

BPSKQPSK16QAM64QAM

Attenuation (dB)

Thr

ough

put

(Mbp

s)

Num

ber

of C

oope

rativ

e Pk

ts. (

x100

0)

0

1

2

3

4

5

6

7

8

9

-86 -84 -82 -80 -78 -76 -74 -72 -70 -68 -86 -84 -82 -80 -78 -76 -74 -72 -70 -68

(a) (b)

−86 −84 −82 −80 −78 −76 −74 −72 −70 −680

2

4

6

8

10

12

14

16

18

Attenuation (dB)

Thro

ughp

ut (M

bps)

6Mbps Direct Tx.6Mbps vMISO12Mbps Direct Tx.12Mbps vMISO24Mbps Direct Tx.24Mbps vMISO48Mbps Direct Tx.48Mbps vMISO

−86 −84 −82 −80 −78 −76 −74 −72 −70 −680

1

2

3

4

5

6

7

8

9

Attenuation (dB)

Num

ber o

f Coo

pera

tive

Pack

ets

(x10

00)

6Mbps12Mbps24Mbps48Mbps

0

2

4

6

8

10

12

14

16

18

Monday, December 31, 2012

Fig. 4. Number of cooperative NvMISO packet transmissions for differentrates.

We create three node networks (sender, helper, and receiver)

Page 4: Virtual MISO Triggers in Wi-Fi-like Networks - ece.rice.eduob4/files/Infocom2013.pdf · Virtual MISO Triggers in Wi-Fi-like Networks ... tinct mechanisms to invoke vMISO transmissions;

4

such that the signal attenuation between all three nodes is iden-tical. We then consider different attenuation which requiresuse of a different transmission rate to maximize throughput(an excessively high rate choice leads to packet loss whereasan unnecessarily low rate choice underutilizes). Observe inFigure 3 that even though vMISO gains are attained at a widerange of received SNR regimes, the magnitude of the gainsachieved by each rate is highly dependent on where the systemoperates within that range. That is, vMISO transmissions ata lower rate can only yield gains at lower SNR, whereas forhigher rates, gains are observed at higher SNR. The reason forthis is that higher rates will require a vMISO retransmissionin order to successfully deliver a packet even at a much higherSNR compared to lower rates. Moreover, the absolute highestgains are achieved by higher modulation rates. Consequently,notice in Figure 4 that vMISO transmissions occur mostly atthe higher rates; while vMISO transmissions occur rarely, if atall for the lower rates. For all cases, as attenuation decreases,the number of vMISO transmissions decreases because a directtransmission suffices and no retransmissions are sent.

These results imply that a vMISO MAC can only maximizeits throughput performance at all times by jointly consideringtransmission rate and the vMISO trigger criteria. Namely,vMISO must opportunistically increase the transmission ratein order to be able to trigger cooperation and increase through-put. Although the shown results are for reactive vMISO, noticethat a proactive vMISO scheme would be a better option inthe case of low SNR, whereas it would yield net losses forhigher SNR due to unnecessary vMISO triggers (as we willdescribe in the next section).

B. MAC Limitations at High RateNext, since we observed that the highest vMISO gains occur

when the transmission rate is highest (i.e., 64-QAM at 48Mbps for this case), we focus on this rate and investigate howMAC protocol overhead affects these maximum gains.

We consider a three node network where the vMISO coop-erator is chosen among a pool of uniformly distributed nodeslocated near the sender-receiver pair. We choose the cooperatorvia exhaustive search for the node with the highest averagethroughput. For comparison we consider the case where thevMISO cooperator is a store and forward node such that inthe first phase, the sender transmits to the cooperator, and inthe second phase, only the cooperator transmits data to thereceiver. We refer to this case as “Forced Two-Hop.”

Figure 5 depicts the average results and 95% confidenceintervals of throughput performance for different protocolsas a function of the link distance between a sender andreceiver. Observe that at all times, both Backhaul vMISOand NvMISO schemes outperform direct transmission, exceptwhen the probability of error due to channel conditions is closeto zero (which occurs at distance zero in this scenario) whereall these protocols perform the same. More importantly, noticethat the Backhaul vMISO sets an upper bound in throughputperformance for any type of vMISO scheme due its idealizedone-phase operation.

Theoretical physical-layer SNR gains and correspondingerror rate reductions consider a continuum of available rates.However, because a real system can only support a discrete and

limited number of rates, such gains cannot always be realizableat the MAC layer.

0 100 200 300 400 500 6000

10

20

30

40

50

60

70

80

90

100

Source−Destination Separation (meters)

Perc

ent o

f Coo

pera

tive

Pack

ets

NvMISOGenie−Based vMISO

0 100 200 300 400 500 6000

5

10

15

20

25

30

Source−Destination Separation (meters)

Thro

ughp

ut (M

bps)

Direct TransmissionForced Two−HopNvMISOGenie−Based vMISONaive vMISOTwo-Phase vMISO

Thursday, March 8, 2012

50 100 150 200 250 300Source-Destination Separation (meters)

Perc

ent

Coo

pera

tive

Pack

ets

100

0

90

80

70

60

50

40

30

20

10

0 100 200 300 400 500 6000

10

20

30

40

50

60

70

80

90

100

Source−Destination Separation (meters)

Perc

ent o

f Coo

pera

tive

Pack

ets

NvMISOGenie−Based vMISO

0 100 200 300 400 500 6000

5

10

15

20

25

30

Source−Destination Separation (meters)

Thro

ughp

ut (M

bps)

Direct TransmissionForced Two−HopNvMISOGenie−Based vMISONaive vMISOTwo-Phase vMISO

Thursday, March 8, 2012

15

30

25

20

10

5

0

Thr

ough

put

(Mbp

s)

50 100 150 200 250 300Source-Destination Separation (meters)

Two-Phase vMISOBackhaul vMISO

Direct TransmissionForced Two-HopNvMISO

Two-Phase vMISO

Backhaul vMISONvMISO

Monday, December 31, 2012

Fig. 5. Comparison of vMISO schemes with direct transmission and multi-hopping.

0 100 200 300 400 500 6000

10

20

30

40

50

60

70

80

90

100

Source−Destination Separation (meters)

Perc

ent o

f Coo

pera

tive

Pack

ets

NvMISOGenie−Based vMISO

0 100 200 300 400 500 6000

5

10

15

20

25

30

Source−Destination Separation (meters)

Thro

ughp

ut (M

bps)

Direct TransmissionForced Two−HopNvMISOGenie−Based vMISONaive vMISOTwo-Phase vMISO

Thursday, March 8, 2012

50 100 150 200 250 300Source-Destination Separation (meters)

Perc

ent

Coo

pera

tive

Pack

ets

100

0

90

80

70

60

50

40

30

20

10

0 100 200 300 400 500 6000

10

20

30

40

50

60

70

80

90

100

Source−Destination Separation (meters)

Perc

ent o

f Coo

pera

tive

Pack

ets

NvMISOGenie−Based vMISO

0 100 200 300 400 500 6000

5

10

15

20

25

30

Source−Destination Separation (meters)

Thro

ughp

ut (M

bps)

Direct TransmissionForced Two−HopNvMISOGenie−Based vMISONaive vMISOTwo-Phase vMISO

Thursday, March 8, 2012

15

30

25

20

10

5

0

Thr

ough

put

(Mbp

s)

50 100 150 200 250 300

Source-Destination Separation (meters)

Two-Phase vMISOBackhaul vMISO

Direct TransmissionForced Two-HopNvMISO

Two-Phase vMISO

Backhaul vMISONvMISO

Monday, December 31, 2012

Fig. 6. Percentage of vMISO transmissions out of the total number of MACtransmissions.

For each packet, the transmission time consists of thetime it takes to send the actual data packet plus channelaccess, data preamble and acknowledgement overhead. Forexample, transmitting at 48 Mbps physical layer rate evenwhen channel conditions are “best” (no pathloss effects) onlyyields up to 26.6 Mbps MAC-layer throughput due to thisoverhead. Therefore, assuming the overhead is kept constant,the only way to increase the performance of this particularsystem would be by increasing the data rates. This wouldincrease the range of gains that a vMISO MAC can attain. Theimplications of this limit imposed by the MAC are reflected onwasted resources at the helper as well as unnecessary increasedinterference. Both Figures 5 and 6 demonstrate that for shortdistances in a moderate fading environment, any help providedby the vMISO cooperator is not required and should preferablybe avoided to reduce overhead and potential interference.Regardless of the number of vMISO transmissions, gains forthe ideal backhaul-based scheme and NvMISO are negligible.However, for moderate to large distances, a smart decisionwhether the helper should be used or not has to be made.

Observe in Figure 5 that except for small distances (below20 meters), vMISO schemes are always the best option. Nev-

Page 5: Virtual MISO Triggers in Wi-Fi-like Networks - ece.rice.eduob4/files/Infocom2013.pdf · Virtual MISO Triggers in Wi-Fi-like Networks ... tinct mechanisms to invoke vMISO transmissions;

5

ertheless, to outperform all other techniques at any regime, thevMISO MAC must switch between being reactive (NvMISO)or proactive (two-phase vMISO). For moderate distances (be-tween 20 and 80 meters), NvMISO can still benefit fromsuccessful one-phase transmissions if the channel is good,and use three-phase transmissions only if required. However,when initial transmissions from the sender begin to fail (whenhighest percentage of vMISO transmissions are triggered asshown in Figure 6), the proactive two-phase vMISO becomesthe better option because it requires fewer phases to achievethe same diversity and reliability. In contrast to two-hop trans-missions, vMISO schemes rely on both an increase in diversity,as well as increased power due to a simultaneous transmissionfrom two nodes. Alternately, vMISO nodes could transmit with1/N of the power required in a SISO transmission (where Nis the number of simultaneous transmitters) [7], thus keepingonly the gains achieved from diversity. Notice in Figure6 after reaching the highest point, the number of vMISOtransmissions decreases due to increased distance betweendestination and helper, therefore reducing the likelihood ofa successful NACK reception.

Findings: vMISO gains and trigger criteria must incor-porate the protocol (reactive or proactive), transmission rateand SNR. Namely, vMISO gains are best achieved whenthe transmission rate is high for a given SNR such thattransmissions at that higher rate will be successful onlywith vMISO. Additionally, while in theory vMISO gains areavailable even at very high SNR (only bounded by capacity),in practice the maximum transmission rate is limited, andtherefore once this rate is achieved with low error, no furthergains are possible. Thus, regardless of the magnitude of thegains at the PHY, the MAC represents a performance-limitingfactor. Nevertheless, except for very large sender-receiverlink distance, the adequate choice between a proactive orreactive vMISO guarantees better performance compared toother transmission schemes such as multi-hopping.

IV. VMISO TRANSFORMS THE NETWORK GRAPH ANDCONTENTION BEHAVIOR

Transmissions of vMISO cooperators in multi-flow topolo-gies introduce additional interference that can cause otherflows to defer, potentially leading to net performance losses.However, depending on the topology, such interference couldinstead be beneficial since it can add coordination by implicitlyinforming other senders via carrier sense that a transmission isoccurring (e.g., the case of hidden terminals that can mutuallysense the active cooperator). In this section we explore fourdifferent scenarios via experiments and simulations to studythe coupling of vMISO triggers and network topology.

A. Topology Generation and ValidationIn order to isolate effects of vMISO inter-flow interaction,

we consider the four atomic topologies shown in Figure 7 [5].To create the required topologies, we performed our ex-

periments in a static environment where no moving scattererswere present. Before each 60-second experiment, we used twotransceivers to test bidirectional connectivity between them.

(a) (b)

(d)

(c)

F1

F2

F1

F1F1

F2

F2

F2

F3

RR

(a) (b)

S1

S2

R1

R2

(c)

F1

F2

F1

F2

C

S1

S2

R1

R2 C

R

F1

C

S R

S1 S2

RC

Tuesday, February 28, 2012

Fig. 7. Small-scale topologies. Circles: senders and receivers. Squares:vMISO cooperators. Arrows indicate traffic flows, and dotted lines indicateconnectivity. Topologies: (a) Single Flow, (b) Fully Connected, (c) HiddenTerminal, and (d) Information Asymmetry.

We established that two nodes could not sense each otherwhen neither would defer to the other. In each case, positionsbetween senders and receivers were chosen such that the linkwould guarantee >90% packet reception at BPSK. Thus, inthis section we focus on the SNR regimes where vMISO yieldsthe most substantial gains i.e., medium to high SNR, andshow results only for reactive protocols which are expected toperform best in these situations. Nonetheless, we also provideinsights on the performance of proactive schemes for thesescenarios. We conducted all experiments at night and ensuredthat no other transmitters were active for the entire durationof each experiment by using a spectrum analyzer.

Figure 8(a) depicts the over-the-air deployment used forboth the single flow (nodes A, B and E are sender, receiverand cooperator, respectively) and the five node, 2-flow fullyconnected network (nodes C and D form the competing flow).Likewise, Figure 8(b) depicts the deployment used for thehidden terminal (nodes F and H are the senders, G is thereceiver, and J is the cooperator) and for the informationasymmetry scenarios (node H represents the sender and nodeI the receiver of the competing flow). For validation, in thissection both experiments and simulations are performed at16-QAM. Unless otherwise stated, throughout this sectionwe present average throughput results with 95% confidenceintervals.

control station issues an Ethernet broadcast to the boardsat the beginning of each experiment, which is used to resettheir clock. We verified that our technique achieves clocko!sets below a few micro-seconds.

Testbed Setup. We conduct our experiments on a five-node indoor testbed. In order to verify the robustness of MI-DAS to di!erent node densities, we alternately deployed ournodes in di!erent topological configurations. As a referencefor the reader, we list the locations used in our topologies indecreasing order of density, with reference to Figure 2: in thesingle-hop topology S1 all nodes are next to each other closeto position b; in the multi-hop topology M1 the nodes arelocated in the positions {a, b, c, d, e}; in the multi-hop M2the nodes are in positions {a, b, c, d, f}. Each board trans-mits 1000-byte data packets, with constant inter-packet timewhose value depends on the experiment. Each experimentrun lasts 10 seconds and, where not di!erently specified, thereported results are cumulative over 10 runs.

Figure 2: Layout of our testbed deployment.

5.2 Testbed ResultsExperimental Methodology. We evaluate the accu-

racy of the inference tool, by assessing its predictions in dif-ferent testbed and simulation settings. At the end of eachexperiment performed, we collect a single report from eachnode including its transmission time and busy time, whichrepresent the parameters T and B in Problem (5). We com-pute the optimal solution of Problem (5) corresponding tothe collected values using the Matlab solver fmincon. Weestablish the accuracy of the Activity Share inference bycomparing our estimations with the ground truth providedby an omniscent centralized approach based on the collectionof detailed traces (see the Validation Tool above).

Sensitivity to Network Density. The network densityinfluences the information in the node reports as follows.In low density conditions, the busy time reports constrainthe overlapping transmissions of a limited set of neighboringnodes (see Equation (3)), thus providing redundant infor-mation. For instance, in networks where each node has oneneighbor, the busy time of a node corresponds to the trans-mission time of the sole neighbor, which is also reported bythe neighbor itself. However, in high density conditions,more combinations of neighbor overlapping transmissionscan produce the same busy time value, thus increasing thecomplexity of the decomposition of the busy time in its Ac-tivity Share components. We investigate the e!ect of net-work density on the Activity Share accuracy by running ourexperiments on the three di!erent topologies of our testbed.

Figure 3 shows the CDF of the normalized relative errorof the Activity Share estimation, where the relative errorcommitted in a state is weighted by the Activity Share ofthat state, i.e., proportionally to the duration. The X-axis

indicates the normalized relative error committed, while theY-axis is in (non-dimensional) time ratio units. For instance,a point in (0.1, 0.7) indicates that the network spends 70% ofthe time in states where our inference tool commits an errorof 10% or less. All plots show that our inference techniqueis extremely accurate under all density conditions; further,S1 is the most accurate solution, while the M1 plot mostlydominates M2. The respective average normalized relativeerrors, i.e., the relative error committed in a randomly sam-pled instant, are 4.6% for S1, 9.9% for M1, and 11.5% forM2. These results are obtained for broadcast packets; how-ever, similar values have been obtained using one-hop uni-cast flows, i.e., 4.8% for S1, 6.1% for M1, and 7.7% forM2. Figure 4 shows the scatterplot of the predicted andactual Activity Share collected for one run of scenario M2.Each value k on the X-axis denotes a network state !D cor-responding to the binary representation of k (once mappedthe bit indices 0 through 4 to the nodes positioned in a, b,c, d, and f , respectively, e.g., k = 20 maps to the networkstate {10100}, i.e., where only nodes f and c transmit). Thegraph shows an excellent agreement between the inferred Ac-tivity Share and the actual Activity Share obtained from thetraces. Further, we can observe that a number of states havevery short durations: these typically include simultaneoustransmissions of nodes in carrier sensing range, which occurless frequently than the others. We conclude that networkdensity increases the accuracy of the Activity Share inferencetool by reducing the amount of redundant information.

Sensitivity to Network Density is revisited in the simula-tions in Section 5.3 for larger topologies.

Throughput Prediction Accuracy. We evaluate theaccuracy of the model in Section 4, by comparing its pre-dictions with testbed experiments in the topology M1 withsingle-hop flows {a ! c; b ! a; c ! a; d ! b; e ! c}. Foreach set of experiments, we consider a target under-servedlink whose tra"c is fully backlogged, and we perform a refer-ence run, measuring the throughput of the target link whenall others transmit at 900 kbps rate. At the end of thereference run, we collect the node reports, infer the Activ-ity Share, and predict the throughput increase of the tar-get link obtained by rate-limiting any of the four conflictingnodes of a fixed quantity (400 kbps). Then, we perform fouradditional runs on the testbed, alternately rate-limiting adi!erent conflicting node for the same 400 kbps quantity,and we record the actual throughput gain of the target link.Finally, we contrast the throughput gain predicted by ourmodel with the actual gain obtained in the testbed.

Figure 5 shows the CDF of the relative error for all pos-sible target link/conflicting node pairs for 10 repetitions ofour scenario (200 predictions in total). The long tail of thedistribution is due to few combinations for which the actualgain is very small (on the order of a few kbps); in those cases,even an error of few packets is decisive in relative terms. Interms of the absolute error, the predicted throughput gainis on average less than 80 kbps di!erent from the actualthroughput gain (i.e., 20% of the rate-limiting value of 400kbps, or around 30% of the average actual throughput gainof approximately 240 kbps).

Additional Results. In [13] we present several addi-tional findings, including: 1) The accuracy of the inferencetool does not decrease for unsaturated and low tra"c loads.We ran a set of experiments with topology M1, where weincreased the tra"c load of the nodes from 400 kbps to fully

control station issues an Ethernet broadcast to the boardsat the beginning of each experiment, which is used to resettheir clock. We verified that our technique achieves clocko!sets below a few micro-seconds.

Testbed Setup. We conduct our experiments on a five-node indoor testbed. In order to verify the robustness of MI-DAS to di!erent node densities, we alternately deployed ournodes in di!erent topological configurations. As a referencefor the reader, we list the locations used in our topologies indecreasing order of density, with reference to Figure 2: in thesingle-hop topology S1 all nodes are next to each other closeto position b; in the multi-hop topology M1 the nodes arelocated in the positions {a, b, c, d, e}; in the multi-hop M2the nodes are in positions {a, b, c, d, f}. Each board trans-mits 1000-byte data packets, with constant inter-packet timewhose value depends on the experiment. Each experimentrun lasts 10 seconds and, where not di!erently specified, thereported results are cumulative over 10 runs.

Figure 2: Layout of our testbed deployment.

5.2 Testbed ResultsExperimental Methodology. We evaluate the accu-

racy of the inference tool, by assessing its predictions in dif-ferent testbed and simulation settings. At the end of eachexperiment performed, we collect a single report from eachnode including its transmission time and busy time, whichrepresent the parameters T and B in Problem (5). We com-pute the optimal solution of Problem (5) corresponding tothe collected values using the Matlab solver fmincon. Weestablish the accuracy of the Activity Share inference bycomparing our estimations with the ground truth providedby an omniscent centralized approach based on the collectionof detailed traces (see the Validation Tool above).

Sensitivity to Network Density. The network densityinfluences the information in the node reports as follows.In low density conditions, the busy time reports constrainthe overlapping transmissions of a limited set of neighboringnodes (see Equation (3)), thus providing redundant infor-mation. For instance, in networks where each node has oneneighbor, the busy time of a node corresponds to the trans-mission time of the sole neighbor, which is also reported bythe neighbor itself. However, in high density conditions,more combinations of neighbor overlapping transmissionscan produce the same busy time value, thus increasing thecomplexity of the decomposition of the busy time in its Ac-tivity Share components. We investigate the e!ect of net-work density on the Activity Share accuracy by running ourexperiments on the three di!erent topologies of our testbed.

Figure 3 shows the CDF of the normalized relative errorof the Activity Share estimation, where the relative errorcommitted in a state is weighted by the Activity Share ofthat state, i.e., proportionally to the duration. The X-axis

indicates the normalized relative error committed, while theY-axis is in (non-dimensional) time ratio units. For instance,a point in (0.1, 0.7) indicates that the network spends 70% ofthe time in states where our inference tool commits an errorof 10% or less. All plots show that our inference techniqueis extremely accurate under all density conditions; further,S1 is the most accurate solution, while the M1 plot mostlydominates M2. The respective average normalized relativeerrors, i.e., the relative error committed in a randomly sam-pled instant, are 4.6% for S1, 9.9% for M1, and 11.5% forM2. These results are obtained for broadcast packets; how-ever, similar values have been obtained using one-hop uni-cast flows, i.e., 4.8% for S1, 6.1% for M1, and 7.7% forM2. Figure 4 shows the scatterplot of the predicted andactual Activity Share collected for one run of scenario M2.Each value k on the X-axis denotes a network state !D cor-responding to the binary representation of k (once mappedthe bit indices 0 through 4 to the nodes positioned in a, b,c, d, and f , respectively, e.g., k = 20 maps to the networkstate {10100}, i.e., where only nodes f and c transmit). Thegraph shows an excellent agreement between the inferred Ac-tivity Share and the actual Activity Share obtained from thetraces. Further, we can observe that a number of states havevery short durations: these typically include simultaneoustransmissions of nodes in carrier sensing range, which occurless frequently than the others. We conclude that networkdensity increases the accuracy of the Activity Share inferencetool by reducing the amount of redundant information.

Sensitivity to Network Density is revisited in the simula-tions in Section 5.3 for larger topologies.

Throughput Prediction Accuracy. We evaluate theaccuracy of the model in Section 4, by comparing its pre-dictions with testbed experiments in the topology M1 withsingle-hop flows {a ! c; b ! a; c ! a; d ! b; e ! c}. Foreach set of experiments, we consider a target under-servedlink whose tra"c is fully backlogged, and we perform a refer-ence run, measuring the throughput of the target link whenall others transmit at 900 kbps rate. At the end of thereference run, we collect the node reports, infer the Activ-ity Share, and predict the throughput increase of the tar-get link obtained by rate-limiting any of the four conflictingnodes of a fixed quantity (400 kbps). Then, we perform fouradditional runs on the testbed, alternately rate-limiting adi!erent conflicting node for the same 400 kbps quantity,and we record the actual throughput gain of the target link.Finally, we contrast the throughput gain predicted by ourmodel with the actual gain obtained in the testbed.

Figure 5 shows the CDF of the relative error for all pos-sible target link/conflicting node pairs for 10 repetitions ofour scenario (200 predictions in total). The long tail of thedistribution is due to few combinations for which the actualgain is very small (on the order of a few kbps); in those cases,even an error of few packets is decisive in relative terms. Interms of the absolute error, the predicted throughput gainis on average less than 80 kbps di!erent from the actualthroughput gain (i.e., 20% of the rate-limiting value of 400kbps, or around 30% of the average actual throughput gainof approximately 240 kbps).

Additional Results. In [13] we present several addi-tional findings, including: 1) The accuracy of the inferencetool does not decrease for unsaturated and low tra"c loads.We ran a set of experiments with topology M1, where weincreased the tra"c load of the nodes from 400 kbps to fully

control station issues an Ethernet broadcast to the boardsat the beginning of each experiment, which is used to resettheir clock. We verified that our technique achieves clocko!sets below a few micro-seconds.

Testbed Setup. We conduct our experiments on a five-node indoor testbed. In order to verify the robustness of MI-DAS to di!erent node densities, we alternately deployed ournodes in di!erent topological configurations. As a referencefor the reader, we list the locations used in our topologies indecreasing order of density, with reference to Figure 2: in thesingle-hop topology S1 all nodes are next to each other closeto position b; in the multi-hop topology M1 the nodes arelocated in the positions {a, b, c, d, e}; in the multi-hop M2the nodes are in positions {a, b, c, d, f}. Each board trans-mits 1000-byte data packets, with constant inter-packet timewhose value depends on the experiment. Each experimentrun lasts 10 seconds and, where not di!erently specified, thereported results are cumulative over 10 runs.

Figure 2: Layout of our testbed deployment.

5.2 Testbed ResultsExperimental Methodology. We evaluate the accu-

racy of the inference tool, by assessing its predictions in dif-ferent testbed and simulation settings. At the end of eachexperiment performed, we collect a single report from eachnode including its transmission time and busy time, whichrepresent the parameters T and B in Problem (5). We com-pute the optimal solution of Problem (5) corresponding tothe collected values using the Matlab solver fmincon. Weestablish the accuracy of the Activity Share inference bycomparing our estimations with the ground truth providedby an omniscent centralized approach based on the collectionof detailed traces (see the Validation Tool above).

Sensitivity to Network Density. The network densityinfluences the information in the node reports as follows.In low density conditions, the busy time reports constrainthe overlapping transmissions of a limited set of neighboringnodes (see Equation (3)), thus providing redundant infor-mation. For instance, in networks where each node has oneneighbor, the busy time of a node corresponds to the trans-mission time of the sole neighbor, which is also reported bythe neighbor itself. However, in high density conditions,more combinations of neighbor overlapping transmissionscan produce the same busy time value, thus increasing thecomplexity of the decomposition of the busy time in its Ac-tivity Share components. We investigate the e!ect of net-work density on the Activity Share accuracy by running ourexperiments on the three di!erent topologies of our testbed.

Figure 3 shows the CDF of the normalized relative errorof the Activity Share estimation, where the relative errorcommitted in a state is weighted by the Activity Share ofthat state, i.e., proportionally to the duration. The X-axis

indicates the normalized relative error committed, while theY-axis is in (non-dimensional) time ratio units. For instance,a point in (0.1, 0.7) indicates that the network spends 70% ofthe time in states where our inference tool commits an errorof 10% or less. All plots show that our inference techniqueis extremely accurate under all density conditions; further,S1 is the most accurate solution, while the M1 plot mostlydominates M2. The respective average normalized relativeerrors, i.e., the relative error committed in a randomly sam-pled instant, are 4.6% for S1, 9.9% for M1, and 11.5% forM2. These results are obtained for broadcast packets; how-ever, similar values have been obtained using one-hop uni-cast flows, i.e., 4.8% for S1, 6.1% for M1, and 7.7% forM2. Figure 4 shows the scatterplot of the predicted andactual Activity Share collected for one run of scenario M2.Each value k on the X-axis denotes a network state !D cor-responding to the binary representation of k (once mappedthe bit indices 0 through 4 to the nodes positioned in a, b,c, d, and f , respectively, e.g., k = 20 maps to the networkstate {10100}, i.e., where only nodes f and c transmit). Thegraph shows an excellent agreement between the inferred Ac-tivity Share and the actual Activity Share obtained from thetraces. Further, we can observe that a number of states havevery short durations: these typically include simultaneoustransmissions of nodes in carrier sensing range, which occurless frequently than the others. We conclude that networkdensity increases the accuracy of the Activity Share inferencetool by reducing the amount of redundant information.

Sensitivity to Network Density is revisited in the simula-tions in Section 5.3 for larger topologies.

Throughput Prediction Accuracy. We evaluate theaccuracy of the model in Section 4, by comparing its pre-dictions with testbed experiments in the topology M1 withsingle-hop flows {a ! c; b ! a; c ! a; d ! b; e ! c}. Foreach set of experiments, we consider a target under-servedlink whose tra"c is fully backlogged, and we perform a refer-ence run, measuring the throughput of the target link whenall others transmit at 900 kbps rate. At the end of thereference run, we collect the node reports, infer the Activ-ity Share, and predict the throughput increase of the tar-get link obtained by rate-limiting any of the four conflictingnodes of a fixed quantity (400 kbps). Then, we perform fouradditional runs on the testbed, alternately rate-limiting adi!erent conflicting node for the same 400 kbps quantity,and we record the actual throughput gain of the target link.Finally, we contrast the throughput gain predicted by ourmodel with the actual gain obtained in the testbed.

Figure 5 shows the CDF of the relative error for all pos-sible target link/conflicting node pairs for 10 repetitions ofour scenario (200 predictions in total). The long tail of thedistribution is due to few combinations for which the actualgain is very small (on the order of a few kbps); in those cases,even an error of few packets is decisive in relative terms. Interms of the absolute error, the predicted throughput gainis on average less than 80 kbps di!erent from the actualthroughput gain (i.e., 20% of the rate-limiting value of 400kbps, or around 30% of the average actual throughput gainof approximately 240 kbps).

Additional Results. In [13] we present several addi-tional findings, including: 1) The accuracy of the inferencetool does not decrease for unsaturated and low tra"c loads.We ran a set of experiments with topology M1, where weincreased the tra"c load of the nodes from 400 kbps to fully

10m

10m

A

B

C

D

BE

Thursday, March 1, 2012

(a) (b)

A

B

C

D

F

G H

I

E

J

Monday, March 5, 2012

Fig. 8. Layout of our indoor testbed. (a) Used for single flow andfully connected topologies, (b) Used for hidden and information asymmetryscenarios

As a baseline, we first evaluate the performance of a singlevMISO flow (Figure 7(a)). The results are depicted in Figure9(a) and show vMISO gains as high as 110% with the largestgains occurring when the cooperator is approximately halfwaybetween the sender and the receiver (see also Section 3). Moreapropos, these results validate the vMISO simulator which weuse extensively in our evaluation.

Page 6: Virtual MISO Triggers in Wi-Fi-like Networks - ece.rice.eduob4/files/Infocom2013.pdf · Virtual MISO Triggers in Wi-Fi-like Networks ... tinct mechanisms to invoke vMISO transmissions;

6

Flow 1 Experiment Flow 2 Experiment Flow 1 Simulation Flow 2 Simulation0

0.5

1

1.5

2

2.5

3

3.5

4

Thro

ughp

ut (M

bps)

No CooperationCooperationNo CooperationCooperation

Experiment Simulation

Flow 2Flow 1Flow 2Flow 1

4

3.5

3

2.5

2

1.5

1

0.5

0

Th

rou

ghp

ut

(Mb

ps)

Saturday, July 16, 2011

Experiment Simulation0

1

2

3

4

5

6

7

8

9Th

roug

hput

(Mbp

s)

No CooperationCooperation9

8

7

6

5

4

3

2

1

0Experiment Simulation

Thr

ough

put

(Mbp

s)

Flow 1 Experiment Flow 2 Experiment Flow 1 Simulation Flow 2 Simulation0

0.5

1

1.5

2

2.5

3

3.5

4

Thro

ughp

ut (M

bps)

No CooperationCooperationNo CooperationCooperation

Experiment Simulation

Flow 2Flow 1Flow 2Flow 1

4

3.5

3

2.5

2

1.5

1

0.5

0

Th

rou

ghp

ut

(Mb

ps)

Saturday, July 16, 2011

4

3.5

3

2.5

2

1.5

1

0.5

0T

hrou

ghpu

t (M

bps)

Flow 1 Flow 2 Flow 1 Flow 2

Direct Tx.NvMISO

Direct Tx.NvMISO

Flow 2 Flow 1 Flow 2Experiment Simulation

(a) Single Flow (b) Fully Connected

Tuesday, February 28, 2012

Fig. 9. vMISO in Fully Connected Topologies

B. Fully Connected Topology

In a two-flow network, the increased transmission footprintof the vMISO flow can negatively impact competing flows.Therefore, we evaluate vMISO in a two-flow network whereall nodes can carrier sense each other (see Figure 7(b)), andthe cooperator assists only one flow at all times (i.e., flow 1).

Observe in Figure 9(b) that as expected, the throughputachieved by flow 1 is much higher when vMISO transmissionsare enabled. However, more importantly, there is no negativeeffect on the performance of the competing flow. Since bothsources mutually carrier sense, the competing flow is alreadydeferring to the cooperative one. This means that the vMISOcooperator transmits only when the competing flow is de-ferring. Furthermore, since the vMISO flow becomes moreefficient with fewer dropped packets, the increased amount ofair time leads to a slight increase in the performance of theother flow.

C. Hidden Terminals

Hidden terminals cannot coordinate via carrier sensing,thus leading to a high number of collisions compared tofully connected networks. Here, we explore whether vMISO’scooperator could potentially reduce collisions if its locationwould allow the different sources to sense it. For example,in Figure 7(c) if the source of flow 2 is able to sense thecooperator in a vMISO transmission, then it would defer to it,therefore decreasing the number of collisions.

Figure 10(a) presents the throughput achieved by both flowswith and without vMISO transmissions (RTS/CTS is disabled- a common practice in current deployments). Observe that justby enabling vMISO links in flow 1, its throughput increasesby approximately 64% in average. More importantly, vMISOnot only increases link reliability but can further coordinatesender nodes that are not able to sense each other. If thecooperator can be sensed by the different senders, a vMISOtransmission will cause other nodes to defer. The transmissionof a NACK from the common receiver (due to either a collisionor channel fade), starts a vMISO retransmission which in thiscase is more likely to be overheard by the competing sender.Such coordination and collision reduction also allows thecompeting flow to experience a slight performance increase.Thus, vMISO cooperators can passively provide the networkwith more information regarding the overall state of different

transmitters. For instance, our simulations showed a decreasein the average number of collisions of approximately 15%.Such improvement corresponds to the increase in throughputat flow 2. For this particular case, notice that sending a NACKeven due to a collision, at worst will lead to one node backingoff and one sending an immediate retransmission. This doesnot represent a major issue in such as small topology, however,it could have a significant effect on congestion experienced inlarger networks.

Flow 1 Experiment Flow 2 Experiment Flow 1 Simulation Flow 2 Simulation0

100

200

300

400

500

600

700

800

900

1000

Thro

ughp

ut (k

bps)

No CooperationCooperation

Flow 1 Experiment Flow 2 Experiment Flow 1 Simulation Flow 2 Simulation0

200

400

600

800

1000

1200

1400

1600

Thro

ughp

ut (k

bps)

No CooperationCooperationDirect Tx.NvMISO

Direct Tx.NvMISO1000

900

800

700

600

500

400

300

200

100

0

Thr

ough

put

(kbp

s)

Flow 1 Flow 2Flow 2Experiment Simulation

(a) Hidden Terminal

Flow 1 Flow 2 Flow 1 Flow 2Flow 2Experiment Simulation

(b) Information Asymmetry

Flow 1 Flow 2

1600

1400

1200

1000

800

600

400

200

0

Thr

ough

put

(kbp

s)

Tuesday, February 28, 2012

Fig. 10. Cooperation in Hidden Terminal (a), and Information Asymmetry(b) Topologies

D. Information Asymmetry

In a scenario with two active flows in which only oneof them interferes with the other, the disadvantaged flowcould eventually reach starvation. We denote this scenario asinformation asymmetry (see Figure 7(d)) [5].

The starvation problem can be diminished by the presenceof a cooperator which is within range of both senders. If thisis the case, a vMISO transmission would cause the sender ofthe dominating flow to defer, hence decreasing the numberof collisions at the receiver of the disadvantaged flow. Everysingle failed packet in flow 1 starts a vMISO transmission thatcan potentially cause the competing sender to defer.

Observe in Figure 10(b) that as expected, the differencein throughput between the advantaged and the disadvantagedflows is significant. Even though gains from vMISO forflow 1 are high (approximately 55%), its performance is stillunsatisfactory compared to that of flow 2. That is, using Jainfairness index we observe only a very small increase from0.51 to 0.56. In our case, since vMISO transmissions arestarted only through feedback from the receiver, if collisionsare not resolved for the entire length of both packets, novMISO retransmission will occur. Likewise, if the cooperatoris not sensed by the competing sender, it will not defer.Such behaviors limits the extent to which the presence ofthe cooperator can positively affect the disadvantaged flow.Nevertheless, if the collision is resolved and a NACK is sent,it will make the disadvantaged flow more aggressive. Thus,vMISO can help alleviate the starvation problem by addingcoordination, but MAC behavior dominates flow performance.

Page 7: Virtual MISO Triggers in Wi-Fi-like Networks - ece.rice.eduob4/files/Infocom2013.pdf · Virtual MISO Triggers in Wi-Fi-like Networks ... tinct mechanisms to invoke vMISO transmissions;

7

E. Helper Footprint and Spatial Reuse

To better understand the interference effect caused by theposition of the cooperator with respect to other flows, weinvestigate each flow’s performance for the two scenariosdepicted in Figure 11, compared to the fully connected case.In the fully connected scenario, the position of the cooperatorinfluences the magnitude of the gains that can be obtainedthrough vMISO without significantly affecting the perfor-mance of the other flow. However, if both flows are decou-pled, the position of the cooperator could potentially causethe competing flow to defer (as seen in Figure 11(a)), thusbecoming an important influencing factor on the performanceof such flow.

(a) (b)(c)

F1

F2

F1F1

F2

F2

F3

RR

(a) (b)

S1

S2

R1

R2

F1

F2

R

F1

C

S R C

S1

S2

R1

R2

F1

F2

C

Tuesday, February 28, 2012

Fig. 11. Topologies where the helper assists only one flow. In (a), F2 canonly sense the helper and vice versa; in (b), both flows are decoupled.

To explore these potential effects that originate from theposition of the cooperator with respect to other flows, wecreate two two-flow topologies where the first consists ofcoupled flows (fully connected), and the second one consistsof uncoupled flows (independent flows), and evaluate thePerfect NACK NvMISO scheme. For every scenario we varythe position of the cooperator inside a square grid and keepboth senders and receivers fixed in their respective positions.We allow one cooperator to assist only flow 1 in order toanalyze its influence on competing flow 2.

Figure 12 depicts the results with the x-y axis representingthe grid position of the cooperator. As a reference, locationsof the senders are represented by black circles and receiversby white. The dependent variable throughput gain or loss isrepresented by a colormap as illustrated on beside the figure.

For nearby flows in which spatial re-use was not possibleindependent of having a cooperator, the top two Figures12(a) and 12(b) indicate that if a vMISO protocol is able tocooperate every time it is needed, gains can be up to 200%.Equally important, as was the case with the results reportedin Figure 9(b), Figure 12(b) shows that cooperating with oneflow has minimal effect on the performance of the competingone. Hence, in a fully connected network, the cooperator(regardless of its position) is not consuming any extra channelresources than those that flow 1 would consume if its pathto the destination was relatively good and no cooperator waspresent. The best-case helper location significantly improvesthe performance of the vMISO flow whereas the worst-caselocation does not have considerable effects on the competingflow.

Next, we consider the case where farther away flows canemploy spatial re-use without vMISO. Figure 12(c) shows thatfor flow 1, the vMISO flow, gains can again reach up to 200%.However, Figure 12(d) indicates that if the cooperator is fartheraway from the assisted flow, it increasingly adversely impacts

c) Independent Flows - Flow 1Throughput Gain/Loss (%)

X−Position (meters)

Y−Po

sitio

n (m

eter

s)

Flow 1 Throughput Gain/Loss at d=700m (%)

0 100 200 3000

200

400

600

800

0

50

100

150

200

X−Position (meters)

Y−Po

sitio

n (m

eter

s)

Flow 2 Throughput Gain/Loss at d=700m (%)

0 100 200 3000

200

400

600

800

−40

−30

−20

−10

0

X−Position (meters)

Y−Po

sitio

n (m

eter

s)

Flow 1 Throughput Gain/Loss at d=100m (%)

0 100 200 300 4000

50

100

150

200

250

300

0

50

100

150

200

X−Position (meters)

Y−Po

sitio

n (m

eter

s)

Flow 2 Throughput Gain/Loss at d=100m (%)

0 100 200 300 4000

50

100

150

200

250

300

−40

−30

−20

−10

0

X−Position (meters)

Y−Po

sitio

n (m

eter

s)

Flow 1 Throughput Gain/Loss at d=700m (%)

0 100 200 3000

200

400

600

800

0

50

100

150

200

X−Position (meters)

Y−Po

sitio

n (m

eter

s)

Flow 2 Throughput Gain/Loss at d=700m (%)

0 100 200 3000

200

400

600

800

−40

−30

−20

−10

0

X−Position (meters)

Y−Po

sitio

n (m

eter

s)

Flow 1 Throughput Gain/Loss at d=100m (%)

0 100 200 300 4000

50

100

150

200

250

300

0

50

100

150

200

X−Position (meters)

Y−Po

sitio

n (m

eter

s)

Flow 2 Throughput Gain/Loss at d=100m (%)

0 100 200 300 4000

50

100

150

200

250

300

−40

−30

−20

−10

0

d) Independent Flows - Flow 2Throughput Gain/Loss (%)

a) Coupled Flows - Flow 1Throughput Gain/Loss (%)

b) Coupled Flows - Flow 2Throughput Gain/Loss (%)

F2

F1

F2

F1

F2

F1

F2

F1

Wednesday, March 7, 2012

Fig. 12. Influence of helper’s transmission footprint in coupled and uncoupledflows as a function of its position.

the competing flow. These results show that such degradationreaches approximately 40% throughput losses. Moreover forsome vMISO cooperator positions, while the gains that canbe achieved by the vMISO flow are practically null, attemptsto cooperate can lead to significant adverse effects on theperformance of the surrounding flow.

In a proactive scheme, the negative effects on the competingflow (for both topologies in Figure 11) are more significantsince it would be required to defer for two consecutive phasesfor every single original transmission instead of only whena retransmission is needed. This will happen regardless ofwhether or not it provides any gains to the vMISO flow itself.

Findings: For two contending flows, the addition of avMISO cooperator alters the node interconnectivity andthus MAC-layer coordination. Namely, the cooperator cancause a nearby sender that should defer but cannot sense theother transmitter to sense the cooperator and correctly defer.This yields new MAC-layer coordination that can lead todecreased collisions when senders are hidden or increasedfairness when the vMISO flow would have otherwise beentopologically disadvantaged. Therefore, both hidden terminalsand asymmetrically disadvantaged flows should proactivelytrigger vMISO if a suitably located cooperator is available inorder to increase the flow’s aggressiveness. Thus, comparedto reactive schemes, a proactive protocol can have a moresignificant impact on competing flows due to a more constantvMISO triggering.

V. NETWORK-SCALE EVALUATION

In networks consisting of multiple flows, vMISO links leadto complex flow interactions that amplify and combine severalof the issues we studied in isolation in atomic topologies.For instance, transmissions by numerous cooperators lead to

Page 8: Virtual MISO Triggers in Wi-Fi-like Networks - ece.rice.eduob4/files/Infocom2013.pdf · Virtual MISO Triggers in Wi-Fi-like Networks ... tinct mechanisms to invoke vMISO transmissions;

8

a more significant increase in interference compared to small-scale networks. Nevertheless, we demonstrate that simplevMISO trigger policies can help alleviate those aggregateeffects that would otherwise cause significant performancelosses.

To study the increase in interference due to vMISO in large-scale networks, we emulate static ad hoc single-hop topologiescomprised of different numbers of flows (2 to 20). For eachcase, we report averages over 30 different topologies whereflows have been randomly positioned based on a uniformdistribution. Distances between sender and receiver at eachflow are chosen such that NvMISO would yield a gain if theflow was completely isolated (according to the results fromFigure 5). Moreover, whenever vMISO is enabled we selectthe cooperator that is closest to the midpoint between sourceand destination (i.e., the one we expect to provide with thehighest gains). Such topologies provide network configurationsspanning from isolated flows to fully connected scenarios. Dueto the prohibitive cost and complexity of building a fully-scaled network, we employ our validated simulator modelto evaluate vMISO protocols. We present results for reactiveprotocols since these cause the least amount of interferencecompared to proactive schemes, thus providing with highergains and demonstrating vMISO’s potential.

We compute the time between successful packet trans-missions for each individual flow. Since sources are fullybacklogged, the rate at which packets leave each source nodewill depend on MAC and PHY behavior. Contention andinterference affect this rate via carrier sense. Therefore, weuse the inter-packet transmission time to analyze the amountof contention present in the network: the longer the time, thehigher the contention. Moreover, we compare against perfectNACK NvMISO to explore the “worst-case scenario” in termsof interference where vMISO transmissions are always startedif a NACK is sent.

0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.51

2

3

4

5

6

7

8

9

10

11

Inte

r−Pa

cket

Tra

nsm

issio

n Ti

me

(ms)

Time seconds

Direct Tx.NvMISOPerfect NACK NvMISO

0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.50

1

2

3

4

5

6

Thro

ughp

ut G

ain

(Mbp

s)

Perfect NACK NvMISONvMISO

6

5

4

3

2

1

0

Thr

ough

put

Gai

n (M

bps)

2 Flows 5 Flows 10 Flows 15 Flows 20 Flows 2 Flows 5 Flows 10 Flows 15 Flows 20 Flows

Inte

r-Pa

cket

Tra

nsm

issi

on T

ime

(ms)

11

10

9

8

7

6

5

4

3

2

1

(a) (b)

0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.50

1

2

3

4

5

6

Thro

ughp

ut G

ain

(Mbp

s)

Perfect NACK NvMISONvMISO

0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.51

2

3

4

5

6

7

8

9

10

11

Inte

r−Pa

cket

Tra

nsm

issio

n Ti

me

(ms)

Time seconds

Direct Tx.NvMISOPerfect NACK NvMISO

Thursday, March 8, 2012

0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.50

1

2

3

4

5

6

Thro

ughp

ut G

ain

(Mbp

s)

Perfect NACK NvMISONvMISOManaged Network

0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.50

1

2

3

4

5

6

Thro

ughp

ut G

ain

(Mbp

s)

Perfect NACK NvMISONvMISOManaged Network

0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.51

2

3

4

5

6

7

8

9

10

11

Inte

r−Pa

cket

Tra

nsm

issio

n Ti

me

(ms)

Time seconds

Direct Tx.NvMISOPerfect NACK NvMISO

0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.51

2

3

4

5

6

7

8

9

10

11

Inte

r−Pa

cket

Tra

nsm

issio

n Ti

me

(ms)

Time seconds

Direct Tx.NvMISOPerfect NACK NvMISO

0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.50

1

2

3

4

5

6

Thro

ughp

ut G

ain

(Mbp

s)

Perfect NACK NvMISONvMISOManaged Network

0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.50

1

2

3

4

5

6

Thro

ughp

ut G

ain

(Mbp

s)

Perfect NACK NvMISONvMISOTrigger Threshold Policy

Sunday, December 30, 2012

Fig. 13. (a) Mean packet inter-transmission time for different network sizes.(b) Per-flow throughput gains/losses for different network sizes

Figure 13(a) depicts the mean successful packet inter-transmission time per-flow. Error bars show the range of resultsfor the different flows in the network. Observe that for allcases, the mean inter-transmission time is much lower whenvMISO is disabled. Moreover, the gaps between the directtransmission scheme and both NvMISO and perfect NACKNvMISO widen with an increased number of flows (samebehavior observed in percent difference between the vMISOprotocols and the direct transmission scheme). Since each flow

uses one cooperator, this indicates that the larger the number ofcooperators used in the network, the bigger the spatial footprintof each flow. This increase causes most flows to experiencehigher contention, meaning that fewer packet transmissionsoccur.

In Figure 13(b) we present per-flow throughput gains fornetworks with different number of flows. Observe that inaverage, for 2 flows, NvMISO achieves up to 2.2 Mbpsgains, which corresponds to roughly 47% gains compared todirect transmission. On the other hand, perfect NACK NvMISOreaches gains of more than 5 Mbps or 104% throughput gains.However, as the number of flows increases to 20, the additionalinterference due to the cooperators leads to a significantdecrease in gains of approximately 98% and 96% for NvMISOand perfect NACK NvMISO, respectively. To overcome suchdegradation, we modify the latter protocol by reducing theextra interference generated throughout the entire network.That is, after observing all vMISO flows for some period oftime (10 seconds in our case) we only allow those that achievemore than 10% gains to enable vMISO transmissions. Thisapproach uses a network-wide trigger threshold. Nevertheless,we demonstrate in Figure 13(b) that this simple thresholdpolicy significantly improves overall performance.

0204060801001200

1

2

3

4

5

6

7

8

Node Index

Thro

ughp

ut (M

bps)

Perfect NACK NvMISONvMISODirect Tx.

Fig. 14. Network consisting of 120 flows.

Finally, we investigate how vMISO affects the individualperformance of each flow in a large-scale ad hoc network. Wesimulate a network of 120 vMISO flows and present per-flowaverage throughput. Figure 14 shows that both vMISO pro-tocols yield throughput gains compared to direct transmissionfor all flows except for the first three highest throughput flows(where both vMISO schemes reach only up to 4Mbps). Inparticular, these three flows have an overwhelming advantageover all other flows. With vMISO, the throughput of theseadvantaged flows drops significantly (i.e., between 10 and 20%drop), while the throughput of the rest increases. Jain’s fairnessindex grows from 0.186 using direct transmissions to 0.253with NvMISO and 0.387 with perfect NACK NvMISO. Thus,vMISO improves fairness by providing additional throughputto underserved flows at the expense of the highest-rate “priv-ileged” flows. In addition, in [2] we present results for anevaluation of vMISO in a multi-hop mesh network deployed

Page 9: Virtual MISO Triggers in Wi-Fi-like Networks - ece.rice.eduob4/files/Infocom2013.pdf · Virtual MISO Triggers in Wi-Fi-like Networks ... tinct mechanisms to invoke vMISO transmissions;

9

in Houston TX.

Findings: Although in large-scale networks the potentialfor each flow to find an ideally positioned cooperator isgreatly increased, when the number of active flows is large,network-wide vMISO gains are greatly reduced compared tosmall-scale networks due to substantially increased interfer-ence and contention caused by the cooperators. Therefore,while flows in small-scale networks can independently choosewhether to trigger vMISO, large-scale networks will benefitfrom a coordinated decision that determines which flowswill invoke vMISO transmissions (e.g., those with maxi-mum gains for themselves and minimum interference forothers). Even a simple threshold-based policy allowing onlyflows with gains above a certain threshold to enable vMISOcan substantially improve overall network performance.

VI. RELATED WORK

Prior work can be broadly categorized into two main areas.First, most prior work on vMISO and cooperative-diversityis information theoretic and focuses on performance at thephysical layer. The concept of user cooperation is introducedin [16] and was targeted to cellular networks where dis-tributed nodes establish vMISO links to increase capacity androbustness against channel variations. Their work employsinformation-theoretic concepts to analyze capacity and out-age probability. An analytical study of different cooperative-diversity protocols, e.g., amplify-and-forward and decode-and-forward, is presented in [9]. In contrast, we address MAC-layerand network-scale issues that arise from implementation ofvMISO and take a purely experimental approach to evaluatevMISO rather than theoretical.

Second, there have been recent efforts to develop MACprotocols exploiting spatial diversity and vMISO transmis-sions. MAC protocol designs for single- and multi-hop havebeen presented and evaluated in [6]–[8], [10], [11], [17],[18] for example. In contrast, our work does not focus onprotocol design, but instead comprises a study of generalizedvMISO MAC mechanisms with the purpose of identifyingthe triggering criteria that provides with largest gains whileminimizing interference. This is crucial for understanding howand for which scenarios a vMISO protocol should be designedand used. Unlike [12] where the authors present an analyticalstudy of reactive and proactive cooperation protocols in adhoc networks, we take an experimental approach and studya wide variety of topologies. Hardware implementations havebeen developed for both asynchronous [3] and synchronoussystems [13], [15], [19]. Although asynchronous coopera-tion circumvents the challenge of strict timing coordination,vMISO’s synchronous cooperation at symbol time scales hasbeen shown to yield larger benefits [13]. Unlike asynchronousimplementations, vMISO transmissions in our work occursimultaneously by means of STBCs so that symbol levelsynchronization is a key factor in our implementation. Incontrast to all previous implementations, our work focuseson diverse network topologies and evaluates performance ofvMISO protocols in multi-flow networks.

VII. CONCLUSION

In this work, we evaluate the performance of vMISOschemes in critical networking scenarios that span from fullyconnected topologies, to cases leading to information asym-metry in both isolated and network-wide designs. We evaluatereactive and proactive vMISO protocols to identify the regimesin which vMISO transmissions should be triggered basedon network and channel conditions. We perform a studyof network factors affecting the gains that can be achievedthrough vMISO under different small-scale networking sce-narios consisting of at most two flows. Further, we extend ourevaluation to multi-flow, multi-hopping network configurationsconsisting of more complex interactions among nodes. Wepresent results from both an experimental setup as well assimulations where we implement different vMISO protocolsand demonstrate that the high gains from vMISO achieved insmall topologies decrease in large-scale network scenarios.

REFERENCES

[1] S.M. Alamouti. A simple transmit diversity technique for wirelesscommunications. IEEE J. Sel. Areas Commun., Oct 1998.

[2] O. Bejarano and E. Knightly. Virtual MISO triggers in wifi-likenetworks. http://networks.rice.edu/papers/vMISOmain.pdf, 2012.

[3] G.J. Bradford and J.N. Laneman. An experimental framework for theevaluation of cooperative diversity. In Proc. of IEEE CISS, 2009.

[4] Q. Chen, F. Schmidt-Eisenlohr, D. Jiang, M. Torrent-Moreno, L. Del-grossi, and H. Hartenstein. Overhaul of IEEE 802.11 modeling andsimulation in ns-2. In Proc. of ACM MSWiM, 2007.

[5] M Garetto, J. Shi, and E. Knightly. Modeling media access in embeddedtwo-flow topologies of multi-hop wireless networks. In Proc. of ACMMobiCom, 2005.

[6] C. Hunter, P. Murphy, and A. Sabharwal. Real-time testbed implemen-tation of a distributed cooperative MAC and PHY. In Proc. of IEEECISS, 2010.

[7] G. Jakllari, S. V. Krishnamurthy, M. Faloutsos, P. V. Krishnamurthy, andO. Ercetin. A framework for distributed spatio-temporal communicationsin mobile ad hoc networks. In Proc. of IEEE INFOCOM, 2006.

[8] M. Kurth, A. Zubow, and J.-P. Redlich. Cooperative opportunisticrouting using transmit diversity in wireless mesh networks. In Proc.of IEEE INFOCOM, 2008.

[9] J.N. Laneman, D.N.C. Tse, and G.W. Wornell. Cooperative diversity inwireless networks: Efficient protocols and outage behavior. IEEE Trans.Inf. Theory, Dec. 2004.

[10] P. Liu, Z. Tao, S. Narayanan, T. Korakis, and S.S. Panwar. CoopMAC:A cooperative MAC for wireless LANs. IEEE J. Sel. Areas Commun.,Feb. 2007.

[11] M. Lu, P. Steenkiste, and T. Chen. Design, implementation andevaluation of an efficient opportunistic retransmission protocol. In Proc.of ACM MobiCom, 2009.

[12] A. Munari, M. Levorato, and M. Zorzi. Cooperation in carrier sensebased wireless ad hoc networks - Part II: Proactive schemes. CoRR,2012.

[13] P. Murphy, A. Sabharwal, and B. Aazhang. On building a coopera-tive communication system: testbed implementation and first results.EURASIP J. Wirel. Commun. Netw., Feb. 2009.

[14] C.T.K. Ng and A.J. Goldsmith. Capacity and cooperation in wirelessnetworks. In Proc. of IEEE ITA, 2006.

[15] H. Rahul, H. Hassanieh, and D. Katabi. SourceSync: A distributedwireless architecture for exploiting sender diversity. In Proc. of ACMSIGCOMM, 2010.

[16] A. Sendonaris, E. Erkip, and B. Aazhang. User cooperation diversity.Part I. system description. IEEE Trans. Commun., Nov. 2003.

[17] S. Sharma, Yi Shi, Y.T. Hou, H.D. Sherali, and S. Kompella. Cooperativecommunications in multi-hop wireless networks: Joint flow routing andrelay node assignment. In Proc. of IEEE INFOCOM, 2010.

[18] Z. Xinyu and K.G. Shin. DAC: Distributed asynchronous cooperationfor wireless relay networks. In Proc. of IEEE INFOCOM, 2010.

[19] J. Zhang, J. Jia, Q. Zhang, and E.M.K. Lo. Implementation andevaluation of cooperative communication schemes in software-definedradio testbed. In Proc. of IEEE INFOCOM, 2010.