The Importance of Being Opportunistic

Size: px
Start display at page:

Download "The Importance of Being Opportunistic"

Transcription

1 High Performance Switching and Routing Telecom Center Workshop: Sept 4, The Importance of Being Opportunistic Sachin Katti Dina Katabi, Wenjun Hu, Hariharan Rahul, and Muriel Medard

2 Bandwidth is scarce in wireless Can we send more while consuming less bandwidth?

3 Current Approach Relay Alice A lice s p acket B o b s p acket Requires 4 transmissions Can we do it in 3 transmissions? Bob B o b s p acket A lice s p acket

4 A Network Coding Approach Relay Alice A lice s p acket B o b s p acket Bob B o b s p acket A lice s p acket 3 transmissions instead of 4 Save bandwidth

5 Network Coding Routers mix bits in packets, potentially from different flows Theoretically shown to achieve capacity for multicast No concrete results for unicast case

6 How to apply network coding? State-of-the Art Multicast Given Sender & Receivers R S R Given Flow Rate & Capacities R Min-Cost Flow Optimization Find the routing, which dictates the encoding

7 How to apply network coding? State-of-the Art Multicast Given Sender & Receivers Given flow rate & capacities In Practice Unicast Many Unknown Changing Sender & Receivers Unknown and bursty flow rate Min-Cost Flow Optimization Find the routing, which dictates the encoding?

8 How to apply network coding? State-of-the Art Multicast Given Sender & Receivers Given flow rate & capacities In Practice Unicast Many Unknown Changing Sender & Receivers Unknown and bursty flow rate Min-Cost Flow Optimization Find the routing, which dictates the encoding Opportunism

9 Opportunism (1) Opportunistic Listening: o Every node listens to all packets o It stores all heard packets for a limited time

10 Opportunism (1) Opportunistic Listening: o Every node listens to all packets o It stores all heard packets for a limited time A D B

11 Opportunism (1) Opportunistic Listening: o Every node listens to all packets o It stores all heard packets for a limited time o Node sends Reception Reports to tell its neighbors what packets it heard Reports are annotations to packets If no packets to send, periodically send reports

12 Opportunism (2) Opportunistic Coding: o Each node uses only local information o Use your favorite routing protocol o To send packet p to neighbor A, XOR p with packets already known to A Thus, A can decode o But how to benefit multiple neighbors from a single transmission?

13 Efficient Coding A C D B Arrows show next-hop

14 Efficient Coding Bad Coding C will get RED pkt but A can t get B LU E pkt A C D B Arrows show next-hop

15 Efficient Coding Better Coding Both A & C get a packet A C D B Arrows show next-hop

16 Efficient Coding Best Coding A, B, and C, each gets a packet A C D B To Arrows XOR n packets, show next-hop each next-hop should have the n-1 packets encoded with the packet it wants

17 But how does a node know what packets a neighbor has? Reception Reports But reception reports may get lost or arrive too late Use Guessing o If I receive a packet I assume all nodes closer to sender have received it

18 Putting It Together A C D B

19 Putting It Together A C D B

20 Putting It Together A C D B D on t reorder packets in a flow Keeps TCP happy No scheduling No packet is delayed

21 Beyond Fixed Routes B heard S s transm ission S S transmits A B No need for A transmission Route Chosen by Routing Protocol D Opportunistic Routing [BM05] Piggyback on reception report to learn whether next-hop has the packet cancel unnecessary transmissions

22 Opportunism Unicast Flows arrive and leave at any time No knowledge of rate No assumption of smooth traffic O A B N C F K M D G E

23 Performance

24 Emulation Environment We use Emstar o R eal code sim ulator o radios o Power Level: 200mW o 11Mbps bit rate o Simulated radio channel

25 Recall Our Simple Experiment XOR Relay Alice A lice s p acket B o b s p acket Bob B o b s p acket A lice s p acket 3 transmissions instead of 4 25% throughput increase

26 1 Throughput (KB/s) No Coding 330 KB/s XOR 270 KB/s 0 Practical artifacts make network coding perform poorly Network coding requires broadcast But broadcast has no backoff more collisions

27 Ideally, design a back-off scheme for broadcast channels In practice, we want a solution that works with off-the-shelf drivers/cards Our Solution: Pseudo Broadcast Piggyback on unicast which has synchronous Acks and backoff o Each XOR-ed packet is sent to the MAC address of one of the intended receivers

28 1 XOR with Pseudo-Broadcast Improves Throughput Throughput (KB/s) No Coding 330 KB/s XOR with Pseudo-Broadcast 495 KB/s XOR 270 KB/s Improvement is more than 25% because MAC gives nodes equal bandwidth shares Without coding, relay needs twice as much bandwidth With coding, all nodes need equal bandwidth

29 Larger experiment 100 nodes 800mx800m Senders and receivers are chosen randomly Metric: Total Throughput of the Network

30 Opportunistic Coding vs. Current Network Throughput (KB/s) Opp. Coding Our Scheme Opp. Coding (no guessing) No Coding No Coding A Unicast Network Coding scheme that works well in No. realistic of flows situations

31 Preliminary Implementation Results Linux Kernel MAC Click Elements (part of Roofnet) Only Opportunistic Coding & Pseudo Broadcast (No opportunistic Listening) Relay Alice Bob

32 Ratio of throughput with coding to without coding Implementation Results Network Coding Doubles the Throughput Bit Rates (Mb/s)

33 Conclusion First implementation of network coding in a wireless network Learned Lessons o Be opportunistic (greed is good!) o Can do a good job with multiple unicast o 5x higher throughput in congested networks o Preliminary implementation results show throughput doubles

34 The Wireless Environment Multi-hop wireless networks (e.g., Roofnet)

35 Opportunistic Coding vs. Current Network Throughput (KB/s) Our Scheme No Coding 0 A Unicast Network Coding scheme that works well in No. realistic of flows situations

XORs in the Air: Practical Wireless Network Coding

XORs in the Air: Practical Wireless Network Coding XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments

The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments Sachin Katti Dina Katabi Wenjun Hu Hariharan Rahul Muriel Médard {skatti@, dk@, wenjun@csail., rahul@csail., medard@}mit.edu

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are

More information

XORs in The Air: Practical Wireless Network Coding

XORs in The Air: Practical Wireless Network Coding XORs in The Air: Practical Wireless Network Coding Sachin Katti Hariharan Rahul Wenjun Hu Dina Katabi Muriel Médard Jon Crowcroft MIT CSAIL Univ. of Cambridge ABSTRACT This paper proposes COPE, a new architecture

More information

PRESENTED BY SARAH KWAN NETWORK CODING

PRESENTED BY SARAH KWAN NETWORK CODING PRESENTED BY SARAH KWAN NETWORK CODING NETWORK CODING PRESENTATION OUTLINE What is Network Coding? Motivation and Approach Network Coding with Lossless Networks Challenges in Developing Coding Algorithms

More information

WIRELESS networks suffer from low throughput and

WIRELESS networks suffer from low throughput and IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 3, JUNE 2008 497 XORs in the Air: Practical Wireless Network Coding Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Médard, Senior Member,

More information

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems ECE 598HH: Special Topics in Wireless Networks and Mobile Systems Lecture 21: Opportunistic Routing Haitham Hassanieh *These slides are courtesy of Dina Katabi 1 Lecture Outline Single Path Routing Opportunistic

More information

Performance Evaluation of Wireless Network Coding under Practical Settings

Performance Evaluation of Wireless Network Coding under Practical Settings Performance Evaluation of Wireless Network Coding under Practical Settings Ihsan A. Qazi Pratik Gandhi Department of Computer Science School of Information Sciences University of Pittsburgh, Pittsburgh,

More information

Embracing Wireless Interference: Analog Network Coding

Embracing Wireless Interference: Analog Network Coding Embracing Wireless Interference: Analog Network Coding By Sachin Katti, Shyamnath Gollakota, and Dina Katabi Shyamala Villupuram Sundararaman University of Freiburg shyamala.villupuram.sundararaman@venus.uni-freiburg.de

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Queue Management for Network Coding in Ad Hoc Networks

Queue Management for Network Coding in Ad Hoc Networks 2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) Question 1 (X marks) (a) The one-way propagation delay between A and B is 100/1 = 100 seconds. The RTT will be

More information

Routing in Wireless Mesh Networks. Feb. 22, 2006

Routing in Wireless Mesh Networks. Feb. 22, 2006 Routing in Wireless Mesh Networks Feb. 22, 2006 Wireless Mesh Networks Multi-hop Wireless Networks Stationary Nodes Mobile Nodes Motivating scenario Community wireless networks (Mesh Networks) Battlefield

More information

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100 CSCI 1680 Computer Networks Fonseca Exam - Midterm Due: 11:50am, 15 Mar 2011 Closed Book. Maximum points: 100 NAME: 1. Sending Data - [12 pts] a. If TCP provides reliable, in-order delivery of bytes end-to-end,

More information

Wireless (Internet) Routing. Opportunistic Routing, Network Coding, TCP over Wireless

Wireless (Internet) Routing. Opportunistic Routing, Network Coding, TCP over Wireless Wireless (Internet) Routing Opportunistic Routing, Network Coding, TCP over Wireless Outline Review of last time Opportunistic Routing o What is opportunistic routing? o ExOr o SOAR o Can we use opportunistic

More information

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren Practical Lazy Scheduling in Wireless Sensor Networks Ramana Rao Kompella and Alex C. Snoeren Distributed Rate Adaptation Problem: In wireless networks (e.g., sensor nets, 802.11) radios consume significant

More information

Making Friends with Broadcast. Administrivia

Making Friends with Broadcast. Administrivia Making Friends with Broadcast CMU 15-744 David Andersen Administrivia Midterm Mean 66.5, Median 70, Stddev 13.7 Histo: 35-39 37 38 40-44 45-49 50-54 54 54 54 55-59 56 57 60-64 61 64 64 65-69 69 70-74 71

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

Recommended Readings

Recommended Readings Lecture 11: Media Adaptation Scalable Coding, Dealing with Errors Some slides, images were from http://ip.hhi.de/imagecom_g1/savce/index.htm and John G. Apostolopoulos http://www.mit.edu/~6.344/spring2004

More information

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control : Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And

More information

Christos Papadopoulos

Christos Papadopoulos CS557: Measurements Christos Papadopoulos Adapted by Lorenzo De Carli Outline End-to-End Packet Dynamics - Paxon99b Wireless measurements - Aguayo04a Note: both these studies are old, so the results have

More information

Randomization. Randomization used in many protocols We ll study examples:

Randomization. Randomization used in many protocols We ll study examples: Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous

More information

Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling

Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous

More information

Link Estimation and Tree Routing

Link Estimation and Tree Routing Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless

More information

Question Points Score total 100

Question Points Score total 100 CS457: Computer Networking Date: 5/8/2007 Name: Instructions: 1. Be sure that you have 8 questions 2. Write your Student ID (email) at the top of every page 3. Be sure to complete the honor statement after

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

Reliable video-streaming delivery in wireless access networks using Network Coding

Reliable video-streaming delivery in wireless access networks using Network Coding Reliable video-streaming delivery in wireless access networks using Network Coding MELISA JUNUZOVIĆ, KEMAL ALIČ, ALEŠ ŠVIGELJ Department of Communication Systems, Jozef Stefan Institute Jozef Stefan International

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Typical rooftop view

Typical rooftop view Roofnet map Typical rooftop view Roofnet Goals and Design Ideas Goals Operate without extensive planning or central management Provide wide coverage and acceptable performance Design decisions Unconstrained

More information

XCOR: Synergistic Inter flow Network Coding and Opportunistic Routing

XCOR: Synergistic Inter flow Network Coding and Opportunistic Routing Dimitrios Koutsonikolas (dkoutson@purdue.edu) Advisor: Y. Charlie Hu School of ECE, Purdue University XCOR: Synergistic Inter flow Network Coding and Opportunistic Routing 1. Abstract Opportunistic routing

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet

More information

Comparison of Analytical and Measured Performance Results on Network Coding in IEEE Ad-Hoc Networks

Comparison of Analytical and Measured Performance Results on Network Coding in IEEE Ad-Hoc Networks Comparison of Analytical and Measured Performance Results on Network Coding in IEEE 802.11 Ad-Hoc Networks Fang Zhao Singapore-MIT Alliance for Research and Technology, Singapore Email:fang.zhao@smart.mit.edu

More information

TCP Congestion Control

TCP Congestion Control 6.033, Spring 2014 TCP Congestion Control Dina Katabi & Sam Madden nms.csail.mit.edu/~dina Sharing the Internet How do you manage resources in a huge system like the Internet, where users with different

More information

Design of Link and Routing Protocols for Cache-and- Forward Networks. Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri

Design of Link and Routing Protocols for Cache-and- Forward Networks. Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri Design of Link and Routing Protocols for Cache-and- Forward Networks Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri Introduction Future Internet usage is expected to involve

More information

Agenda. What are we looking at? Introduction. Aim of the project. IP Routing

Agenda. What are we looking at? Introduction. Aim of the project. IP Routing Agenda Handoffs in Cellular Wireless Networks: The Daedalus Implementation & Experience by Shrinivasan Seshan, Hari Balakrishnan Randy H. Katz A short presentation by Aishvarya Sharma Dept of Computer

More information

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang School of Electrical and Computer Engineering, Purdue University,

More information

CAR: Coding-Aware Opportunistic Routing in Wireless Mesh Networks

CAR: Coding-Aware Opportunistic Routing in Wireless Mesh Networks : Coding-Aware Opportunistic Routing in Wireless Mesh Networks Hongquan Liu and Yuantao Gu Received Jan., 3 Abstract An intermediate node in inter-flow network coding scheme, such as, needs to know exactly

More information

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1 Ethernet Network Fundamentals Chapter 9 1 Objectives Identify the basic characteristics of network media used in Ethernet. Describe the physical and data link features of Ethernet. Describe the function

More information

The Effects of Asymmetry on TCP Performance

The Effects of Asymmetry on TCP Performance The Effects of Asymmetry on TCP Performance Hari Balakrishnan Venkata N. Padmanabhan Randy H. Katz University of California at Berkeley Daedalus/BARWAN Retreat June 1997 Outline Overview Bandwidth asymmetry

More information

Advanced Computer Networks. Medium Access, WLAN & Bluetooth

Advanced Computer Networks. Medium Access, WLAN & Bluetooth Advanced Computer Networks 263 3501 00 Medium Access, WLAN & Bluetooth Patrick Stuedi Spring Semester 2014 1 Tuesday 11 March 2014 Last Week Signal Propagation Path loss model Log normal shadowing model

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

Design and Evaluation of a new MAC Protocol for Long- Distance Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005

Design and Evaluation of a new MAC Protocol for Long- Distance Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005 Design and Evaluation of a new MAC Protocol for Long- Distance 802.11 Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005 Reviewed by Anupama Guha Thakurta CS525M - Mobile and Ubiquitous

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CS 375: Computer Networks Thomas C. Bressoud 1 Goals for Todayʼs Lecture Principles underlying transport-layer services (De)multiplexing Detecting

More information

Multipath TCP with Network Coding for Wireless Mesh Networks

Multipath TCP with Network Coding for Wireless Mesh Networks This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2 proceedings Multipath TCP with Network Coding for Wireless

More information

Housekeeping. Fall /5 CptS/EE 555 1

Housekeeping. Fall /5 CptS/EE 555 1 Housekeeping Lab access HW turn-in Jin? Class preparation for next time: look at the section on CRCs 2.4.3. Be prepared to explain how/why the shift register implements the CRC Skip Token Rings section

More information

CSCI 466 Midterm Networks Fall 2011

CSCI 466 Midterm Networks Fall 2011 CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No

More information

PiggyCode: a MAC layer network coding scheme to improve TCP performance over wireless networks

PiggyCode: a MAC layer network coding scheme to improve TCP performance over wireless networks PiggyCode: a MAC layer network coding scheme to improve TCP performance over wireless networks Luca Scalia, Fabio Soldo, Mario Gerla Dipartimento di Ingegneria Elettrica, Elettronica e delle Telecomunicazioni,

More information

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Dimitri Marandin 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" 27.-28. July 2004 www.ifn.et.tu-dresden.de/tk/

More information

Chapter 1 - Introduction

Chapter 1 - Introduction Chapter 1-lntroduction Chapter 1 - Introduction The aim of this chapter is to provide a background to topics which are relevant to the subject of this thesis. The motivation for writing a thesis regarding

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

Last Lecture. Network Architecture: Layers. This Lecture. In the sending host (2) In the sending host

Last Lecture. Network Architecture: Layers. This Lecture. In the sending host (2) In the sending host Chapter 7.B and 7.C Architecture: Layers Prof. Dina Katabi Last Lecture We learned how to share the network infrastructure between many connections/flows We also learned about the implications of the sharing

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

A Joint Network-Channel Coding Technique for Single-Hop Wireless Networks

A Joint Network-Channel Coding Technique for Single-Hop Wireless Networks A Joint Network-Channel Coding Technique for Single-Hop Wireless Networks Tuan Tran, Thinh Nguyen and Bella Bose School of EECS, Oregon State University Corvallis, OR 97, USA {trantu, thinhq}@eecs.oregonstate.edu;

More information

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network IEEE ICC 2016 - Wireless Communications Symposium Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network Stefan Achleitner, Thomas La Porta Computer Science and Engineering The Pennsylvania

More information

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CE443 - Fall 1390 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides

More information

Evaluating the Effect of Path Diversity over QoS and QoE in a High Speed Indoor Mesh Backbone

Evaluating the Effect of Path Diversity over QoS and QoE in a High Speed Indoor Mesh Backbone Evaluating the Effect of Path Diversity over QoS and QoE in a High Speed Indoor Mesh Backbone Sandip Chakraborty 12, Sukumar Nandi Department of Computer Science and Engineering Indian Institute of Technology

More information

Network Coding Via Opportunistic Forwarding in Wireless Mesh Networks

Network Coding Via Opportunistic Forwarding in Wireless Mesh Networks Network Coding Via Opportunistic Forwarding in Wireless Mesh Networks Jian Zhang ECE Department Rutgers University New Brunswick, U.S.A. jianz@caip.rutgers.edu Yuanzhu Peter Chen Department of Computer

More information

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon 15-441 Computer Networking Lecture 5 Data link Layer Access Control Based on slides by Peter Steenkiste Copyright, Carnegie Mellon 2007-12 1 Datalink Functions Framing: encapsulating a network layer datagram

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Internetwork Basic. Possible causes of LAN traffic congestion are

Internetwork Basic. Possible causes of LAN traffic congestion are Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible

More information

Initialization Protocols for IEEE Based Ad Hoc Networks Λ

Initialization Protocols for IEEE Based Ad Hoc Networks Λ Initialization Protocols for IEEE 802.11-Based Ad Hoc Networks Λ Chih-Shun Hsu and Jang-Ping Sheu Department of Computer Science and Information Engineering National Central University, Chung-Li, 32054,

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Management Science Letters

Management Science Letters Management Science Letters 4 (2014) 2509 2516 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl Delay-based network coding packet selection Rasoul

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 COS 461: Computer Networks Spring 2006 (MW 1:30-2:50 in Friend 109) Jennifer Rexford Teaching Assistant: Mike Wawrzoniak http://www.cs.princeton.edu/courses/archive/spring06/cos461/

More information

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup Chapter 4 Routers with Tiny Buffers: Experiments This chapter describes two sets of experiments with tiny buffers in networks: one in a testbed and the other in a real network over the Internet2 1 backbone.

More information

Analog Network Coding. Sachin Katti. Shyamnath Gollakota and Dina Katabi. Current Wireless. Router C

Analog Network Coding. Sachin Katti. Shyamnath Gollakota and Dina Katabi. Current Wireless. Router C Analog Network oding Sachin Katti Shyamnath Gollakota and Dina Katabi urrent Wireless Router urrent Wireless Router Traditional Routing requires 4 time slots urrent Wireless Router Traditional Routing

More information

Measurement Study of Lowbitrate Internet Video Streaming

Measurement Study of Lowbitrate Internet Video Streaming Measurement Study of Lowbitrate Internet Video Streaming Dmitri Loguinov and Hayder Radha CS Dept at CUNY NY and EE/ECE at MSU. In Proceedings of ACM SIGCOMM Workshop on Internet Measurement November 2002

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

ICS 451: Today's plan. Sliding Window Reliable Transmission Acknowledgements Windows and Bandwidth-Delay Product Retransmission Timers Connections

ICS 451: Today's plan. Sliding Window Reliable Transmission Acknowledgements Windows and Bandwidth-Delay Product Retransmission Timers Connections ICS 451: Today's plan Sliding Window Reliable Transmission Acknowledgements Windows and Bandwidth-Delay Product Retransmission Timers Connections Alternating Bit Protocol: throughput tied to latency with

More information

Embracing Wireless Interference: Analog Network Coding

Embracing Wireless Interference: Analog Network Coding Embracing Wireless Interference: Analog Network Coding Sachin Katti MIT CSAIL skatti@mit.edu Shyamnath Gollakota MIT CSAIL gshyam@mit.edu Dina Katabi MIT CSAIL dina@csail.mit.edu ABSTRACT Traditionally,

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Lecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture)

Lecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture) Lecture 7: Sliding Windows CSE 123: Computer Networks Geoff Voelker (guest lecture) Please turn in HW #1 Thank you From last class: Sequence Numbers Sender Receiver Sender Receiver Timeout Timeout Timeout

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Outline: Connecting Many Computers

Outline: Connecting Many Computers Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

More information

Implementing and Experimenting with XCP

Implementing and Experimenting with XCP Implementing and Experimenting with XCP Ted Faber, Aaron Falk, Yuri Pryadkin, Bob Braden, Eric Coe, Aman Kapoor, Amit Yajurvedi, Nirav Jasapara USC/ISI USC Viterbi School of Engineering 28 Sept 2005 Outline

More information

Bottleneck Zone Analysis in Wireless Sensor Network Using XOR Operation and Duty Cycle

Bottleneck Zone Analysis in Wireless Sensor Network Using XOR Operation and Duty Cycle Bottleneck Zone Analysis in Wireless Sensor Network Using XOR Operation and Duty Cycle P.Dhivakar 1, K. Sindhanaiselvan 2 PG Student, Dept of CSE, M. Kumarasamy College of Engineering, Karur, Tamilnadu,

More information

Lecture 22: Buffering & Scheduling. CSE 123: Computer Networks Alex C. Snoeren

Lecture 22: Buffering & Scheduling. CSE 123: Computer Networks Alex C. Snoeren Lecture 22: Buffering & Scheduling CSE 123: Computer Networks Alex C. Snoeren Lecture 23 Overview Buffer Management FIFO RED Traffic Policing/Scheduling 2 Key Router Challenges Buffer management: which

More information

Presented by: Murad Kaplan

Presented by: Murad Kaplan Presented by: Murad Kaplan Introduction. Design of SCP-MAC. Lower Bound of Energy Performance with Periodic Traffic. Protocol Implementation. Experimental Evaluation. Related Work. 2 Energy is a critical

More information

Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) Fair Queueing

Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay)  Fair Queueing Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark Fair Queueing 2 Today Wireline Queue Drop Wireless Queue Drop 3 Types of Congestion Control Strategies

More information

DCAR: Distributed Coding-Aware Routing in Wireless Networks

DCAR: Distributed Coding-Aware Routing in Wireless Networks : Distributed Coding-Aware Routing in Wireless Networks Jilin Le, John C.S. Lui Department of Computer Science and Engineering Chinese University of Hong Kong {jlle, cslui}@cse.cuhk.edu.hk Dah Ming Chiu

More information

CSE 473 Introduction to Computer Networks. Exam 2. Your name here: 11/7/2012

CSE 473 Introduction to Computer Networks. Exam 2. Your name here: 11/7/2012 CSE 473 Introduction to Computer Networks Jon Turner Exam 2 Your name here: 11/7/2012 1. (10 points). The diagram at right shows a DHT with 16 nodes. Each node is labeled with the first value in its range

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Simulation Analysis of the MH-TRACE Protocol. Bora KARAOGLU

Simulation Analysis of the MH-TRACE Protocol. Bora KARAOGLU Simulation Analysis of the MH-TRACE Protocol Bora KARAOGLU 1 Agenda TRACE Family Protocol Overview Parameter Optimization for MH-TRACE 2 Agenda TRACE Family Protocol Overview Parameter Optimization for

More information

A Practical and Efficient Overhearing Strategy for Reliable Content Distribution over a Single Hop Ad Hoc Network

A Practical and Efficient Overhearing Strategy for Reliable Content Distribution over a Single Hop Ad Hoc Network Regular Paper A Practical and Efficient Overhearing Strategy for Reliable Content Distribution over a Single Hop Ad Hoc Network Hiroaki Yokose 1 Koji Nitta 1 Satoshi Ohzahata 1,a) Toshihiko Kato 1 Received:

More information

ECE 544 Computer Networks II Mid-Term Exam March 29, 2002 Profs. D. Raychaudhuri & M. Ott

ECE 544 Computer Networks II Mid-Term Exam March 29, 2002 Profs. D. Raychaudhuri & M. Ott ECE544 Mid-Term Page ECE 544 Computer Networks II Mid-Term Exam March 29, 2002 Profs. & M. Ott Instructions: This is a 2 hr, OPEN BOOK exam. (Only the textbook, Peterson & Davie, Computer Networks, A Systems

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

Impact of TCP Window Size on a File Transfer

Impact of TCP Window Size on a File Transfer Impact of TCP Window Size on a File Transfer Introduction This example shows how ACE diagnoses and visualizes application and network problems; it is not a step-by-step tutorial. If you have experience

More information

Detecting Sybil Nodes in Wireless Networks. *: SIS Dept., UNC Charlotte **: ECE Dept., WPI

Detecting Sybil Nodes in Wireless Networks. *: SIS Dept., UNC Charlotte **: ECE Dept., WPI Detecting Sybil Nodes in Wireless Networks with Physical Layer Network Coding Weichao Wang*, DiPu**, and Alex Wyglinski** *: SIS Dept., UNC Charlotte **: ECE Dept., WPI Motivation Network coding technique

More information

CRC. Implementation. Error control. Software schemes. Packet errors. Types of packet errors

CRC. Implementation. Error control. Software schemes. Packet errors. Types of packet errors CRC Implementation Error control An Engineering Approach to Computer Networking Detects all single bit errors almost all 2-bit errors any odd number of errors all bursts up to M, where generator length

More information