1. Exploiting Interference Fingerprints for Predictable Wireless Concurrency
- Author
-
Tianzhang Xing, Xiaojiang Chen, Dingyi Fang, Meng Jin, Xiaolong Zheng, Yuan He, and Xu Dan
- Subjects
Exploit ,Computer Networks and Communications ,business.industry ,Computer science ,Concurrency ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,Throughput ,02 engineering and technology ,Interference (wave propagation) ,Link-state routing protocol ,0202 electrical engineering, electronic engineering, information engineering ,Concurrent computing ,Wireless ,Electrical and Electronic Engineering ,business ,Protocol (object-oriented programming) ,Software ,Computer network - Abstract
Operating in unlicensed ISM bands, ZigBee devices often yield poor performance due to the interference from ever increasing wireless devices in the 2.4 GHz band. Our empirical results show that, a specific interference is likely to have different influence on different outbound links of a ZigBee sender, which indicates the chance of concurrent transmissions . Based on this insight, we propose Smoggy-Link, a practical protocol to exploit the potential concurrency for adaptive ZigBee transmissions under harsh interference. Smoggy-Link maintains an accurate link model to quantify and trace the relationship between interference and link qualities of the sender’s outbound links. With such a link model, Smoggy-Link can translate low-cost interference information to the fine-grained spatiotemporal link state. The link information is further utilized for adaptive link selection and intelligent transmission schedule. We implement and evaluate a prototype of our approach with TinyOS and TelosB motes. The evaluation results show that Smoggy-Link has consistent improvements in both throughput and packet reception ratio under interference from various interferers.
- Published
- 2021
- Full Text
- View/download PDF