Index. peer-to-peer systems, PPFEED (see Peer-to-peer file sharing (PPFEED)) ARQ schemes, 30. B Butterfly networks, 30

Size: px
Start display at page:

Download "Index. peer-to-peer systems, PPFEED (see Peer-to-peer file sharing (PPFEED)) ARQ schemes, 30. B Butterfly networks, 30"

Transcription

1 Index A Adaptive network coding (ANC) bandwidth utilization, 164 cumulative encoding technique, 163 LC, 163, 164 MDC, 164 overlay topology construction, peer joining, average satisfaction, control overhead, GT-ITM software, 171 LION, 171 resilience, problem formalization, random network coding, 163, receivers, 163 theoretical analysis, 163 AF-SoftNC. See Amplify-and-forward SoftNC (AF-SoftNC) ALM. See Application layer multicast (ALM) Amplify and forward (AF) protocol, 8 Amplify-and-forward SoftNC (AF-SoftNC) MAIR performance analysis, virtual channel approximation, 14 ANC. See Adaptive network coding (ANC) Application layer multicast (ALM) heterogeneous peer-to-peer streaming system, network coding advantages, 119 deterministic vs. random, 124 linear, multicast networks, peer-to-peer systems, PPFEED (see Peer-to-peer file sharing (PPFEED)) ARQ schemes, 30 B Butterfly networks, 30 C CCACK. See Cumulative coded acknowledgment (CCACK) CDN. See Content distribution network (CDN) Channel assignment and network-coded opportunistic routing (CANCOR) CR transmission, 70 CTT, 70 electromagnetic spectrum, 69 half-duplex model, 71 heuristic algorithm, NLP problem, 72, 75 opportunistic routing, 70 SCAOR, 71 simulation and performance evaluation protocols, 78 throughput comparison vs. batch size, 81, 82 throughput comparison vs. buffer size, throughput comparison vs. number of channels, throughput comparison vs. number of radios, 79 Channel coding, 2 4, 6, 11, 12 Springer International Publishing Switzerland 2016 Y. Qin (ed.), Network Coding at Different Layers In Wireless Networks, DOI /

2 180 Index CNCOR. See Combined network coding and opportunistic routing (CNCOR) CoAOR, Coding-aware routing candidate selection algorithm, coding rules and modeling assumptions, forwarding timer, 88 performance evaluation bandwidth efficiency vs. difference in spectrum changing, 89, 90 NS2, 88 simulation parameters, 88, 89 throughput vs. packet loss rate, 89, 90 prioritization, SuDR, Coding in opportunistic routing (CodeOR), 64 Cognitive radio networks (CRNs), 60 Cognitive radio opportunistic routing (CROR) coding-aware routing, CRNs, intersession network coding, 81 nums SUs and nump PUs, 83 throughput vs. packet loss rate, WMNs, 81 Cognitive transport throughput (CTT), 70 Combined network coding and opportunistic routing (CNCOR), 62 Content distribution network (CDN), 146 COPE, 61, 62, CORE, CoRET, 66 CTT. See Cognitive transport throughput (CTT) Cumulative coded acknowledgment (CCACK), D Data-driven Overlay Network (DONet), 148 DCAR. See Distributed coding-aware routing (DCAR) Deterministic vs. random network coding, 124 Distributed coding-aware routing (DCAR) characteristics, 62 k-hop coding model, DONet. See Data-driven Overlay Network (DONet) E Error-control techniques, 30 ETX. See Expected transmission count (ETX) Expected transmission count (ETX), 71, 74, F FCS. See Forwarding candidate set (FCS) Feedback-based adaptive broadcast coding scheme, 30 File sharing services, 125 Finite-state machine (FSM), 31, 36 37, Forwarding candidate set (FCS), 84, Free-ride-oriented routing (FORM) availability, 62 compatibility, 62 G Go-Back-N automatic repeat request (GBN-ARQ) assumptions, analysis, HISO network coding system, 41, 52, 54 NACK, 31 steady-state throughput finite-state machine modeling, HISO network coding system, 41, 52 law of total probability, 40 Perron-Frobenius theorem, 40 state transitions, 37 39, 52 system model abstract source node, HISO coding node, 32 throughput performance, nth time-chip, 35 transmission operations, GRANT message, 158 GT-ITM software, 158, 171 H HELLO messages, 157 Heterogeneous peer-to-peer streaming ANC, CDN, 146 live media steaming systems, mesh-based, 147 network layer multicast, 145 optimal overlay topology construction (see Overlay topology construction, peer-to-peer streaming systems) requirements, server-client transmission model, 146 unicast connection, 145 Heuristic algorithm candidate selection algorithm, channel assignment, H-Inputs-Single-Output (HISO) network, 31, 32, 41, 52 56

3 Index 181 I Intersession network coding, 60, 63, 82, 83 Intra-session network coding CANCOR (see Channel assignment and (CANCOR)) coding-aware scheme, 69 K k-hop coding model, 62 L Lagrange dual problems, 65 Law of total probability, 40 Layered coding (LC), 163, 164 LC. See Layered coding (LC) LEAVE messages, 157 Linear network coding, multicast assignment, capacity, 123 flow, 120 link capacity function, 119 max-flow min-cut, theories, 119 Lyapunov optimization, 65 M MAIR. See Maximum achievable information rate (MAIR) Maximum achievable information rate (MAIR) AF-SoftNC and SBF-SoftNC, performance, analysis steps, 12 performance comparison AF-NNC, SBF-NNC, 21 SNC protocol, 21, 22 SNR, 22 Maximum ratio combination (MRC), 6 MCMR. See Multichannel multi-radio (MCMR) Minimum delay mesh (MDM) problem, 150 MRORNC. See Multi-rate opportunistic routing-aware network coding (MRORNC) Multicast coding subgraphs, 65 CoRET, 66 Hamming distance, 66 optimal encoding number, rate control, Multichannel multi-radio (MCMR), 70, 71 Multi-hop CRNs CANCOR (see Channel assignment and (CANCOR)) CROR (see Cognitive radio opportunistic routing (CROR)) Multiple description coding (MDC), 164 Multi-rate opportunistic routing-aware network coding (MRORNC), 63 Mutual information for demodulate and forward, N Network coding (NC) algebraic approach, 59 applications (see Wireless networks) CRNs, 60 I2NC, 60 intersession network coding, 60 intra-session network coding, 60 satellite networks, 59 scheme, 5, 30, 163, 164, 175 Network coding nodes communication systems, 30 feedback, 30 GBN-ARQ, 32, 56 HISO, 31 SR-ARQ, 32, 43, 56 state transitions, throughput and delay performance, 30 Network layer multicast, 118 Network simulator (NS2), 78, 88, 158 Network switching, NLP problem. See Nonlinear programming (NLP) problem Nonlinear programming (NLP) problem, 72, 75 O OCR. See Opportunistic cognitive routing (OCR) One-way channel (OWRC), 1 2, 8, 9, 17 Opportunistic cognitive routing (OCR), 70 Overlay topology construction, peer-to-peer streaming systems distributed algorithm, DONet, 148 greedy heuristic algorithm, MDM problem, 150 NICE protocol, peer joining, 156

4 182 Index Overlay topology construction, peer-to-peer streaming systems (cont.) peer leaving, end-to-end delay, 161, 162 GT-ITM software, 158 link stress, satisfaction, different system sizes, problem formalization conditions, 152 downloading rate, 151 link heterogeneity, 150, 151 Steiner tree packing, 153 uplink and downlik bandwidth, SplitStream, topology adjustment procedure, tree-based and mesh-based, 148 ZIGZAG, 149 P Packet transmission modeling, Peer-to-peer file sharing (PPFEED) advantages, random network coding, 125 combination networks linear network coding assignment, network coding gain, node types, 126 properties, 127 random network coding, 127 data dissemination, 134 decoding, 130 development, reliability and resilience, friendly/abruptly leaving, group ID, 129 joining process, 131 link heterogeneity, 136 local topology adjustment, multicast graph construction, 125 overlay network construction, 129 parameters, 129 baseline configuration, dynamic peer join/leave configuration, heterogeneity configuration, link stress, 138 reliability, 138 throughput, 137 topology awareness configuration, retransmission, 130 scalability and resilience, mesh network, services, topology awareness, Tornado code, 130 web-based applications, 124 Performance analysis, SoftNC with direct link AF-SoftNC, bounds and approximations, MAIR analysis, 12 MAIR performance comparison, SBF-SoftNC, without direct link, Perron-Frobenius theorem, 40 Physical layer network coding (PNC), 1 PPFEED. See Peer-to-peer file sharing (PPFEED) R Random loss, 103, 107, 110 Request indicator bits (RIBs), 66 REQUEST message, 157 RIBs. See Request indicator bits (RIBs) Round trip time (RTT) GBN-ARQ, 34 SR-ARQ, 35 TCP-Vegas, 98 Routing. See also Channel assignment and (CANCOR) CCACK, CNCOR, 62 CoAOR, CodeOR, 64 COPE, 61 CORE, DCAR, FORM, 62 multicast network, RTT. See Round trip time (RTT) S SBF. See Soft bit forward (SBF) SBF-SoftNC. See Soft-bit-forward SoftNC (SBF-SoftNC) SCAOR. See Simple channel assignment for opportunistic routing (SCAOR)

5 Index 183 Selective-repeat ARQ (SR-ARQ) HISO network coding node, 31 NACK, 31, 36 system model, 33 throughput performance, time-chip, 35, 36 Server-client model, 117, 118 Simple channel assignment for opportunistic routing (SCAOR), 71 Soft bit forward (SBF), 8 10, 20 Soft-bit-forward SoftNC (SBF-SoftNC) analysis procedure, MAIR performance, 12, TWRC, 9 Soft network coding (SoftNC) AF-SoftNC, 2 design in fading channels, 8 10 SNC scheme, 6 system diagram, 7 MAIR, 2 numerical simulation bounds and approximations, MAIR performance comparison, SBF-SoftNC, 2 SplitStream, SR-ARQ. See Selective-repeat ARQ (SR-ARQ) State transitions GBN-ARQ, 37 39, 52 SR-ARQ calculation of P C, calculation of P 0, conditions for state, 45 Steady-state throughput, SR-ARQ network coding system, packet transmission modeling, state transitions calculation of P C, calculation of P 0, conditions for state, 45 Stop-and-Wait (SW-ARQ), 30, 31 Straightforward network coding (SNC) MAIR, 22 SoftNC, 7 system diagram, 5 Successful delivery ratio (SuDR) ETX, 85 FCS, 87 MORE and CORE, 84 T TCP. See Transmission control protocol (TCP) TCP-Vega congestion detection, 96 RTT-aware characteristic, 98 TCP-DNC, 108 TCP-Veno, 96 Topology awareness finish time and retransmissions, 144, 145 link stress, 144, 146 PPFEED, , 144 Transmission control protocol (TCP) adaptive method, digital fountain codes, 97 dynamic method, 102 effectiveness, linear network coding, 98 MRTT and RTT, 96 multi-flows hybrid network, 110, wired network, network switching, packet format, soundness, static method, transport layer, 95 Transmission operations, GBN-ARQ/ SR-ARQ, Two-way relay channel (TWRC) BPSK modulation, 4 half-duplex mode, 3 network coding, 3, 5 SNC scheme, 2 wireless TWRC, 4 W WACA. See Workload-Aware Channel Assignment algorithm (WACA) Wireless channel codes, 7 Wireless channel fading effect, 6 Wireless mesh networks (WMNs), 82 Wireless networks multicast flows (see Multicast) routing scheme-based NC (see Routing) scheme-based network coding, 60 WMNs. See Wireless mesh networks (WMNs) Workload-Aware Channel Assignment algorithm (WACA), 70 X XCOR, 63

PRESENTED BY SARAH KWAN NETWORK CODING

PRESENTED BY SARAH KWAN NETWORK CODING PRESENTED BY SARAH KWAN NETWORK CODING NETWORK CODING PRESENTATION OUTLINE What is Network Coding? Motivation and Approach Network Coding with Lossless Networks Challenges in Developing Coding Algorithms

More information

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc. Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Principles of Reliable Data Transfer

Principles of Reliable Data Transfer Principles of Reliable Data Transfer 1 Reliable Delivery Making sure that the packets sent by the sender are correctly and reliably received by the receiver amid network errors, i.e., corrupted/lost packets

More information

DTN Interworking for Future Internet Presented by Chang, Dukhyun

DTN Interworking for Future Internet Presented by Chang, Dukhyun DTN Interworking for Future Internet 2008.02.20 Presented by Chang, Dukhyun Contents 1 2 3 4 Introduction Project Progress Future DTN Architecture Summary 2/29 DTN Introduction Delay and Disruption Tolerant

More information

PRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS

PRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS PRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS Pouya Ostovari, Jie Wu, and Ying Dai Center for Networked Computing http://www.cnc.temple.edu Agenda 2 Introduction Motivation

More information

Fall 2012: FCM 708 Bridge Foundation I

Fall 2012: FCM 708 Bridge Foundation I Fall 2012: FCM 708 Bridge Foundation I Prof. Shamik Sengupta Instructor s Website: http://jjcweb.jjay.cuny.edu/ssengupta/ Blackboard Website: https://bbhosted.cuny.edu/ Intro to Computer Networking Transport

More information

Computer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure

Computer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure Computer Networking Reliable Transport Prof. Andrzej Duda duda@imag.fr Reliable Transport Reliable data transfer Data are received ordered and error-free Elements of procedure usually means the set of

More information

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

XORs in the Air: Practical Wireless Network Coding

XORs in the Air: Practical Wireless Network Coding XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we

More information

Peer-to-Peer Streaming Systems. Behzad Akbari

Peer-to-Peer Streaming Systems. Behzad Akbari Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues

More information

UNIVERSITY OF CALIFORNIA, IRVINE. Cross-Layer Optimization of Coded Wireless Networks DISSERTATION

UNIVERSITY OF CALIFORNIA, IRVINE. Cross-Layer Optimization of Coded Wireless Networks DISSERTATION UNIVERSITY OF CALIFORNIA, IRVINE Cross-Layer Optimization of Coded Wireless Networks DISSERTATION submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in Electrical

More information

Lecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture)

Lecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture) Lecture 7: Sliding Windows CSE 123: Computer Networks Geoff Voelker (guest lecture) Please turn in HW #1 Thank you From last class: Sequence Numbers Sender Receiver Sender Receiver Timeout Timeout Timeout

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control

More information

Scalable Video Transport over Wireless IP Networks. Dr. Dapeng Wu University of Florida Department of Electrical and Computer Engineering

Scalable Video Transport over Wireless IP Networks. Dr. Dapeng Wu University of Florida Department of Electrical and Computer Engineering Scalable Video Transport over Wireless IP Networks Dr. Dapeng Wu University of Florida Department of Electrical and Computer Engineering Bandwidth Fluctuations Access SW Domain B Domain A Source Access

More information

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc. Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested

More information

1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12.

1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12. Lecture Slides 1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12. Additional Topics 1.1. Basic Operations

More information

Streaming Video over the Internet. Dr. Dapeng Wu University of Florida Department of Electrical and Computer Engineering

Streaming Video over the Internet. Dr. Dapeng Wu University of Florida Department of Electrical and Computer Engineering Streaming Video over the Internet Dr. Dapeng Wu University of Florida Department of Electrical and Computer Engineering What is Streaming Video? Download mode: no delay bound Streaming mode: delay bound

More information

Error Control System for Parallel Multichannel Using Selective Repeat ARQ

Error Control System for Parallel Multichannel Using Selective Repeat ARQ Error Control System for Parallel Multichannel Using Selective Repeat ARQ M.Amal Rajan 1, M.Maria Alex 2 1 Assistant Prof in CSE-Dept, Jayamatha Engineering College, Aralvaimozhi, India, 2 Assistant Prof

More information

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 0000; 00: 6 Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding Pouya Ostovari, Abdallah Khreishah,

More information

Chapter 3: Transport Layer Part A

Chapter 3: Transport Layer Part A Chapter 3: Transport Layer Part A Course on Computer Communication and Networks, CTH/GU The slides are adaptation of the slides made available by the authors of the course s main textbook 3: Transport

More information

Computer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand

Computer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand Jan May 2018 Computer Networks รศ.ดร.อน นต ผลเพ ม Assoc. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand

More information

Preface List of Acronyms

Preface List of Acronyms Contents Preface List of Acronyms xxi Chapter 1 Next Generation Wireless Technologies 1 1.1 Introduction 1 1.2 Wireless Networking Standardization Process 5 1.2.1 Wireless Personal Area Networks 5 1.2.2

More information

Applying Network Coding to Peer-to-Peer File Sharing

Applying Network Coding to Peer-to-Peer File Sharing 1938 IEEE TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 8, AUGUST 2014 Applying Network Coding to Peer-to-Peer File Sharing Min Yang and Yuanyuan Yang, Fellow, IEEE Abstract Network coding is a promising enhancement

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

Lecture 7: Flow Control"

Lecture 7: Flow Control Lecture 7: Flow Control" CSE 123: Computer Networks Alex C. Snoeren No class Monday! Lecture 7 Overview" Flow control Go-back-N Sliding window 2 Stop-and-Wait Performance" Lousy performance if xmit 1 pkt

More information

Introduction Multirate Multicast Multirate multicast: non-uniform receiving rates. 100 M bps 10 M bps 100 M bps 500 K bps

Introduction Multirate Multicast Multirate multicast: non-uniform receiving rates. 100 M bps 10 M bps 100 M bps 500 K bps Stochastic Optimal Multirate Multicast in Socially Selfish Wireless Networks Hongxing Li 1, Chuan Wu 1, Zongpeng Li 2, Wei Huang 1, and Francis C.M. Lau 1 1 The University of Hong Kong, Hong Kong 2 University

More information

MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach

MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach Nhat Pham, Kiwoong Kwon, Daeyoung Kim School of Computing, Korea Advanced Institute

More information

Lecture 7: Flow & Media Access Control"

Lecture 7: Flow & Media Access Control Lecture 7: Flow & Media Access Control" CSE 123: Computer Networks Alex C. Snoeren HW 2 due next Wednesday! Lecture 7 Overview" Flow control Go-back-N Sliding window Methods to share physical media: multiple

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW!

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW! CSE 123: Computer Networks Alex C. Snoeren HW 1 due NOW! Automatic Repeat Request (ARQ) Acknowledgements (ACKs) and timeouts Stop-and-Wait Sliding Window Forward Error Correction 2 Link layer is lossy

More information

NETWORK coding [1] [3] has attracted much interest in

NETWORK coding [1] [3] has attracted much interest in 1714 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 4, MAY 2011 Analysis of General Network Coding Conditions and Design of a Free-Ride-Oriented Routing Metric Bin Guo, Student Member, IEEE, Hongkun

More information

Fast, Efficient, and Robust Multicast in Wireless Mesh Networks

Fast, Efficient, and Robust Multicast in Wireless Mesh Networks fast efficient and robust networking FERN Fast, Efficient, and Robust Multicast in Wireless Mesh Networks Ian Chakeres Chivukula Koundinya Pankaj Aggarwal Outline IEEE 802.11s mesh multicast FERM algorithms

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Chapter 24. Transport-Layer Protocols

Chapter 24. Transport-Layer Protocols Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable

More information

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems ECE 598HH: Special Topics in Wireless Networks and Mobile Systems Lecture 21: Opportunistic Routing Haitham Hassanieh *These slides are courtesy of Dina Katabi 1 Lecture Outline Single Path Routing Opportunistic

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ]

presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ] presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ] Category Application Invention Title Principle Investigator CUHK Tech ID HTTP-based Video Streaming Devices and Methods for Scheduling Transmission

More information

Recommended Readings

Recommended Readings Lecture 11: Media Adaptation Scalable Coding, Dealing with Errors Some slides, images were from http://ip.hhi.de/imagecom_g1/savce/index.htm and John G. Apostolopoulos http://www.mit.edu/~6.344/spring2004

More information

MULTI-LAYER VIDEO STREAMING WITH HELPER NODES USING NETWORK CODING

MULTI-LAYER VIDEO STREAMING WITH HELPER NODES USING NETWORK CODING MULTI-LAYER VIDEO STREAMING WITH HELPER NODES USING NETWORK CODING Pouya Ostovari, Abdallah Khreishah, and Jie Wu Computer and Information Sciences Temple University IEEE MASS 2013 Center for Networked

More information

Improving the Robustness of TCP to Non-Congestion Events

Improving the Robustness of TCP to Non-Congestion Events Improving the Robustness of TCP to Non-Congestion Events Presented by : Sally Floyd floyd@acm.org For the Authors: Sumitha Bhandarkar A. L. Narasimha Reddy {sumitha,reddy}@ee.tamu.edu Problem Statement

More information

The Importance of Being Opportunistic

The Importance of Being Opportunistic High Performance Switching and Routing Telecom Center Workshop: Sept 4, 1997. The Importance of Being Opportunistic Sachin Katti Dina Katabi, Wenjun Hu, Hariharan Rahul, and Muriel Medard Bandwidth is

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 3: Reliable Communications. Stefan Savage. Some slides couresty David Wetherall

Communications Software. CSE 123b. CSE 123b. Spring Lecture 3: Reliable Communications. Stefan Savage. Some slides couresty David Wetherall CSE 123b CSE 123b Communications Software Spring 2002 Lecture 3: Reliable Communications Stefan Savage Some slides couresty David Wetherall Administrativa Home page is up and working http://www-cse.ucsd.edu/classes/sp02/cse123b/

More information

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression, Design of an Application Layer Congestion Control for Reducing network load and Receiver based Buffering Technique for packet synchronization in Video Streaming over the Internet Protocol Mushfeq-Us-Saleheen

More information

Lec 19 - Error and Loss Control

Lec 19 - Error and Loss Control ECE 5578 Multimedia Communication Lec 19 - Error and Loss Control Zhu Li Dept of CSEE, UMKC Office: FH560E, Email: lizhu@umkc.edu, Ph: x 2346. http://l.web.umkc.edu/lizhu slides created with WPS Office

More information

Multi-Hop ARQ 林咨銘 2006/8/24.

Multi-Hop ARQ 林咨銘 2006/8/24. Multi-Hop ARQ 林咨銘 2006/8/24 tmlin@itri.org.tw Outline Introduction Multi-Hop Scenario Multi-Hop Issues Multi-Hop ARQ Schemes Multi-hop ARQ [1] VTC 2005 Spring Relay ARQ[2] VTC 2005 Fall Summary Multi-Hop

More information

One More Bit Is Enough

One More Bit Is Enough One More Bit Is Enough Yong Xia, RPI Lakshmi Subramanian, UCB Ion Stoica, UCB Shiv Kalyanaraman, RPI SIGCOMM 05, Philadelphia, PA 08 / 23 / 2005 Motivation #1: TCP doesn t work well in high b/w or delay

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure

More information

Video-Aware Opportunistic Network Coding over Wireless Networks

Video-Aware Opportunistic Network Coding over Wireless Networks 1 Video-Aware Opportunistic Network Coding over Wireless Networks Hulya Seferoglu, IEEE Student Member, Athina Markopoulou, IEEE Member Abstract In this paper, we study video streaming over wireless networks

More information

The Open System Interconnect model

The Open System Interconnect model The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually

More information

Multimedia Networking

Multimedia Networking Multimedia Networking Victor Gau Information Processing Lab. 2008/03/07 Outline Introduction Network Basics Quality of Service Applications VoIP IPTV Telematics Multimedia Multimedia (Lat. Multum + Medium)

More information

CS Transport. Outline. Window Flow Control. Window Flow Control

CS Transport. Outline. Window Flow Control. Window Flow Control CS 54 Outline indow Flow Control (Very brief) Review of TCP TCP throughput modeling TCP variants/enhancements Transport Dr. Chan Mun Choon School of Computing, National University of Singapore Oct 6, 005

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

TCP over Wireless. Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land 1

TCP over Wireless. Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land 1 TCP over Wireless Protocols and Networks Hadassah College Spring 218 Wireless Dr. Martin Land 1 Classic TCP-Reno Ideal operation in-flight segments = cwnd (send cwnd without stopping) Cumulative ACK for

More information

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth EECS Contents Motivation Overview Implementation Issues Ethernet Multicast IGMP Routing Approaches Reliability Application Layer Multicast Summary Motivation: ISPs charge by bandwidth Broadcast Center

More information

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

QUESTION BANK EVEN SEMESTER

QUESTION BANK EVEN SEMESTER Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff

More information

Yarmouk University Hijjawi Faculty for Engineering Technology Telecommunication Engineering Department

Yarmouk University Hijjawi Faculty for Engineering Technology Telecommunication Engineering Department Yarmouk University Hijjawi Faculty for Engineering Technology Telecommunication Engineering Department A DYNAMIC MULTI-CAST ROUTING ALGORITHM FOR OPPORTUNISTIC NETWORKS: IMPLEMENTING THE EXPECTED TRANSMISSION

More information

Multicasting in ad hoc networks: Energy efficient

Multicasting in ad hoc networks: Energy efficient Multicasting in ad hoc networks: Energy efficient Blerta Bishaj Helsinki University of Technology 1. Introduction...2 2. Sources of power consumption... 3 3. Directional antennas... 3 4. TCP... 3 5. Energy-efficient

More information

On Network Dimensioning Approach for the Internet

On Network Dimensioning Approach for the Internet On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!! Garcia UCB!

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!!  Garcia UCB! cs10.berkeley.edu CS10 : Beauty and Joy of Computing Internet II!!Senior Lecturer SOE Dan Garcia!!!www.cs.berkeley.edu/~ddgarcia CS10 L17 Internet II (1)! Why Networks?! Originally sharing I/O devices

More information

Scalable Application Layer Multicast

Scalable Application Layer Multicast Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy http://www.cs.umd.edu/projects/nice Group Communication A C A C 1 2 1 2 B D B D Network-layer Multicast Replication

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Chapter 1 - Introduction

Chapter 1 - Introduction Chapter 1-lntroduction Chapter 1 - Introduction The aim of this chapter is to provide a background to topics which are relevant to the subject of this thesis. The motivation for writing a thesis regarding

More information

SONY S QOS TECHNOLOGY

SONY S QOS TECHNOLOGY SONY S QOS TECHNOLOGY ACHIEVE LOW-DELAY, HIGH-QUALITY STREAMING OVER MOBILE NETWORKS SONY CORPORATION PROFESSIONAL SOLUTION GROUP The use of high-speed mobile networks including LTE (Long Term Evolution)

More information

University of Warwick institutional repository: A Thesis Submitted for the Degree of PhD at the University of Warwick

University of Warwick institutional repository:  A Thesis Submitted for the Degree of PhD at the University of Warwick University of Warwick institutional repository: http://go.warwick.ac.uk/wrap A Thesis Submitted for the Degree of PhD at the University of Warwick http://go.warwick.ac.uk/wrap/72647 This thesis is made

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Cooperative Communications

Cooperative Communications Cooperative Wideband Radio Fabio Belloni fbelloni@wooster.hut.fi Outline Introduction. Historical Background. Cooperative : cellular and ad-hoc networks. relay channel. performance evaluation. Functions

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 2 TCP Congestion Control (TCP Tahoe) Only ACK correctly received packets Congestion Window Size: Maximum number of bytes that can be sent without receiving

More information

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address

More information

Layered Multicast with Forward Error Correction (FEC) for Internet Video

Layered Multicast with Forward Error Correction (FEC) for Internet Video Layered Multicast with Forward Error Correction (FEC) for Internet Video ZaiChen Zhang and Victor O. K. Li The University of Hong Kong Hong Kong, China Abstract In this paper, we propose RALF, a new FEC-based

More information

Predicting connection quality in peer-to-peer real-time video streaming systems

Predicting connection quality in peer-to-peer real-time video streaming systems Predicting connection quality in peer-to-peer real-time video streaming systems Alex Giladi Jeonghun Noh Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,

More information

Cache and Forward Architecture

Cache and Forward Architecture Cache and Forward Architecture Shweta Jain Research Associate Motivation Conversation between computers connected by wires Wired Network Large content retrieval using wireless and mobile devices Wireless

More information

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window. Part 1 Question 1 [0.5 Marks] Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated by a TCP segment and then an IP datagram. What percentage of each

More information

UNIVERSITY OF OSLO Department of informatics. Investigating the limitations of video stream scheduling in the Internet. Master thesis.

UNIVERSITY OF OSLO Department of informatics. Investigating the limitations of video stream scheduling in the Internet. Master thesis. UNIVERSITY OF OSLO Department of informatics Investigating the limitations of video stream scheduling in the Internet Master thesis Espen Jacobsen May, 2009 Investigating the limitations of video stream

More information

Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014

Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014 Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014 1/26 ! Real-time Video Transmission! Challenges and Opportunities! Lessons Learned for Real-time Video! Mitigating Losses in Scalable

More information

RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks

RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks JEONGYEUP PAEK, RAMESH GOVINDAN University of Southern California 1 Applications that require the transport of high-rate data

More information

Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport

Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport Holger Karl Computer Networks Group Universität Paderborn Overview Dependability requirements Delivering single packets Delivering

More information

Making Friends with Broadcast. Administrivia

Making Friends with Broadcast. Administrivia Making Friends with Broadcast CMU 15-744 David Andersen Administrivia Midterm Mean 66.5, Median 70, Stddev 13.7 Histo: 35-39 37 38 40-44 45-49 50-54 54 54 54 55-59 56 57 60-64 61 64 64 65-69 69 70-74 71

More information

Mesh-Based Content Routing Using XML

Mesh-Based Content Routing Using XML Outline Mesh-Based Content Routing Using XML Alex C. Snoeren, Kenneth Conley, and David K. Gifford MIT Laboratory for Computer Science Presented by: Jie Mao CS295-1 Fall 2005 2 Outline Motivation Motivation

More information

Proxy-based TCP-friendly streaming over mobile networks

Proxy-based TCP-friendly streaming over mobile networks Proxy-based TCP-friendly streaming over mobile networks Frank Hartung Uwe Horn Markus Kampmann Presented by Rob Elkind Proxy-based TCP over mobile nets 1 Outline Introduction TCP Friendly Rate Control

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

Prof. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service

Prof. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service Multimedia Communications Multimedia Technologies & Applications Prof. Dr. Abdulmotaleb El Saddik Multimedia Communications Research Laboratory School of Information Technology and Engineering University

More information

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2 5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang

More information

Equation-based Congestion Control

Equation-based Congestion Control Equation-based Congestion Control for Unicast and Multicast Applications Jörg Widmer Praktische Informatik IV, University of Mannheim / AT&T Center for Internet Research at ICSI (ACIRI) Feb 05, 2001 Why

More information

Housekeeping. Fall /5 CptS/EE 555 1

Housekeeping. Fall /5 CptS/EE 555 1 Housekeeping Lab access HW turn-in Jin? Class preparation for next time: look at the section on CRCs 2.4.3. Be prepared to explain how/why the shift register implements the CRC Skip Token Rings section

More information

The Effects of Asymmetry on TCP Performance

The Effects of Asymmetry on TCP Performance The Effects of Asymmetry on TCP Performance Hari Balakrishnan Venkata N. Padmanabhan Randy H. Katz University of California at Berkeley Daedalus/BARWAN Retreat June 1997 Outline Overview Bandwidth asymmetry

More information

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 6, NO. 1, FEBRUARY

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 6, NO. 1, FEBRUARY IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 6, NO. 1, FEBRUARY 24 87 An End-to-End Adaptation Protocol for Layered Video Multicast Using Optimal Rate Allocation Jiangchuan Liu, Member, IEEE, BoLi, Senior Member,

More information

Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis

Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis Prof. SmitaShukla Patel 1, Dr. M.Mohanpriya 2 1 Computer Science Department,Karpagam University,India 2 Computer Science

More information

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate

More information

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 1.

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 1. Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 1 Foundation Eng. Haneen El-Masry February, 2014 A Computer Network A computer

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Graph Theoretic Models for Ad hoc Wireless Networks

Graph Theoretic Models for Ad hoc Wireless Networks Graph Theoretic Models for Ad hoc Wireless Networks Prof. Srikrishnan Divakaran DA-IICT 10/4/2009 DA-IICT 1 Talk Outline Overview of Ad hoc Networks Design Issues in Modeling Ad hoc Networks Graph Theoretic

More information