麻豆淫院


Researchers show how to use portable devices' built-in motion sensors to improve data rates on wireless networks

Constant connection
By using motion data from cell phones' built-in sensors, new communications protocols improve wireless connections for people on the go. Photo: Patrick Gillooly

For most of the 20th century, the paradigm of wireless communication was a radio station with a single high-power transmitter. As long as you were within 20 miles or so of the transmitter, you could pick up the station.

With the advent of cell phones, however, and even more so with Wi-Fi, the paradigm became a large number of scattered with limited range. When a user moves out of one transmitter鈥檚 range and into another鈥檚, the network has to perform a 鈥渉andoff.鈥 And as anyone who鈥檚 lost a call in a moving car or lost a Wi-Fi connection while walking to the bus stop can attest, handoffs don鈥檛 always happen as they should.

Most new phones, however, have built-in motion sensors 鈥 GPS receivers, accelerometers and, increasingly, gyros. At the Eighth Usenix Symposium on Networked Systems Design and Implementation, which took place in Boston in March, MIT researchers of new communications protocols that use information about a portable device鈥檚 movement to improve handoffs. In experiments on MIT鈥檚 campus-wide Wi-Fi network, the researchers discovered that their protocols could often, for users moving around, improve network throughput (the amount of information that devices could send and receive in a given period) by about 50 percent.

The MIT researchers 鈥 graduate student Lenin Ravindranath, Professor Hari Balakrishnan, Associate Professor Sam Madden, and postdoctoral associate Calvin Newport, all of the Computer Science and Artificial Intelligence Laboratory 鈥 used motion detection to improve four distinct communications protocols. One governs the smart phone鈥檚 selection of the nearest transmitter. 鈥淟et鈥檚 say you get off at the train station and start walking toward your office,鈥 Balakrishnan says. 鈥淲hat happens today is that your phone immediately connects to the access point with the strongest signal. But by the time it鈥檚 finished doing that, you鈥檝e walked on, so the best access point has changed. And that keeps happening.鈥

By contrast, Balakrishnan explains, the new protocol selects an access point on the basis of the user鈥檚 inferred trajectory. 鈥淲e connect you off the bat to an access point that has this trade-off between how long you鈥檙e likely to be connected to it and the throughput you鈥檙e going to get,鈥 he says. In their experiments, the MIT researchers found that, with one version of their protocol, a moving cell phone would have to switch transmitters 40 percent less frequently than it would with existing protocols. A variation of the protocol improved throughput by about 30 percent.

Perfect fit

Another of the protocols governs a phone鈥檚 selection of , or the rate at which it sends and receives information. Bit rate needs to be tailored to the bandwidth available: try to send too much data over a weak connection and much of it will be lost; but solving that problem by keeping the bit rate low can end up squandering data capacity.

When a device is in motion, the available bandwidth is constantly fluctuating, so selecting a bit rate becomes more difficult. Because a device using the MIT protocol knows when it鈥檚 in motion, it also knows when to be more careful in choosing a bit rate. In the researchers鈥 experiments, the gains in throughput from bit rate selection varied between 20 percent and 70 percent but consistently hovered around 50 percent.

A third protocol governs the behavior of the wireless base stations rather than the devices that connect to them. Ordinarily, a base station knows that a device has broken contact only after a long enough silence. In the meantime, the base station might try to send the same data to the device over and over, waiting forlornly for acknowledgment and wasting time and power. But with information about the device鈥檚 trajectory, the base station can make an educated guess about when it will lose contact.

Since Balakrishnan and Madden are two of the three primary investigators on MIT鈥檚 CarTel project, which seeks to use information technology to make driving safer and more efficient, the fourth protocol uses motion data to determine routing procedures for networks of wirelessly connected cars, whose relative positions are constantly changing.

鈥淚f you asked me which problems in the paper were the ones where I saw the shortest-term benefit to lots of users,鈥 says Brad Karp, head of the Networks Research Group at University College London鈥檚 Computer Science Department, 鈥渋t鈥檚 the automatic bit rate adaptation and, as a second choice, selection.鈥 Karp emphasizes that the great advantage of the researchers鈥 approach is that it relies on hardware that comes standard in most smart phones. He says that other experimental protocols 鈥 including one developed by Balakrishnan鈥檚 group 鈥 offer similar improvements in throughput, but that they generally require more intrusive modification of existing network infrastructure.

Balakrishnan adds that he and his colleagues have identified at least another half-dozen communications protocols that could benefit from information about device movement. 鈥淲hat we are really hoping is that this opens up a really exciting direction for work in the community,鈥 he says. 鈥淥ther people will come up with more creative ideas, now that you know that you can get these sensor hints in a fairly robust way.鈥


This story is republished courtesy of MIT News (), a popular site that covers news about MIT research, innovation and teaching.
Citation: Researchers show how to use portable devices' built-in motion sensors to improve data rates on wireless networks (2011, April 12) retrieved 6 June 2025 from /news/2011-04-portable-devices-built-in-motion-sensors.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Explore further

Explained: Ad hoc networks

0 shares

Feedback to editors