Title: RID: Radio Interference Detection in Wireless Sensor Network
1RID Radio Interference Detection in Wireless
Sensor Network
- Gang Zhou, Tian He, John A. Stankovic, Tarek
Abdelzaher - Department of Computer Science University of
Virginia - IEEE INFOCOM, 2005
- Presented by Jung, Jin-Kyu
2Contents
- Motivation
- Radio Interference Detection Protocol
- RID protocol
- RID-B protocol
- Evaluation
- Summary
3Motivation
- Interference-Connectivity Assumption
- Connectivity-Interference Assumption
? NOT true
R
T
J
4RID Protocol
Range 1 As High Sending Power Communication
Range Range 2 As Normal Sending Power
Interference Range
5RID Protocol (Cont)
- System wide solution
- Random back off
6RID Protocol (Cont)
- System wide solution
- Random back off
- Add-on rule
Condition A Stable power level during
T1 Condition B Stable low power level
(background noise power) during T2
7RID Protocol (Cont)
- System wide solution
- Random back off
- Add-on rule
Condition A Stable power level during
T1 Condition B Stable low power level
(background noise power) during T2
8RID Protocol (Cont)
- System wide solution
- Random back off
- Add-on rule
Condition A Stable power level during
T1 Condition B Stable low power level
(background noise power) during T2
9RID Protocol (Cont)
- System wide solution
- Random back off
- Add-on rule
- Multi-round Detections
10Information Sharing
Interference_In Table
Interference_Out Table
Interference_HTP Table
This Phase generates two more tables
Record Who can interfere with one of my
neighbors and how much it is
Record Who can interfere with me and how much it
is
Record Who I can interfere with and how much it
is
11Interference Calculation
- Goal Figure out All Collision Cases by Local
Calculation - Basic Step
- Calculate possible interference cases at receiver
D, when there are only two simultaneous
transmitters
- (1) Node i1s signal can be disturbed by node
i2s signal - (2) Without interference, node i1s signal is
able to be received by node D
12Interference Calculation-Extension
- Extension How about k simultaneous transmitters?
- (1) Node i1 signal can be disturbed by the sum
of node set i2, , ik - (2) Without interference, node i1s signal is
able to be received by node D - (3) Any proper subset of node set i2, , ik
can not generate enough interference
13RID-B Protocol
- Motivation of RID-B
- Future traffic information is needed to take full
use of Nk(D) in RID. - Very expensive, especially in WSN
- RID-Bs concern Detect nodes that can interrupt
the receivers reception of the weakest packet
from nodes within its communication neighborhood.
14RID-B Calculation
- How to achieve that?
- The same way to build Interference_In table
- Reorganize the Interference_In table
- Replace entry (transmitter ID, power level) with
entry (transmitter ID) if the following condition
is met - Entry is removed, if the condition is not met
Weakest signal power level from Rs communication
neighbors (C here)
15Evaluation
16Evaluation Result
- Performance with Different System Load
17Summary
- Conclusion
- Study the relationship between communication
range and interference - range in MICA2 devices, in both strong link
case and weak link case. - RID and RID-B, are the first to detect radio
interference topology in - runtime systems
- Apply radio interference detection in TDMA
design. It improves NAMAs - packet delivery ratio from 40 to 100, in
heavy load.