Introduction Multirate Multicast Multirate multicast: non-uniform receiving rates. 100 M bps 10 M bps 100 M bps 500 K bps

Size: px
Start display at page:

Download "Introduction Multirate Multicast Multirate multicast: non-uniform receiving rates. 100 M bps 10 M bps 100 M bps 500 K bps"

Transcription

1 Stochastic Optimal Multirate Multicast in Socially Selfish Wireless Networks Hongxing Li 1, Chuan Wu 1, Zongpeng Li 2, Wei Huang 1, and Francis C.M. Lau 1 1 The University of Hong Kong, Hong Kong 2 University of Calgary, Canada Mar. 27, 2012

2 Introduction Multirate Multicast Multirate multicast: non-uniform receiving rates. 100 M bps 10 M bps 100 M bps 500 K bps

3 Introduction Multirate Multicast Multirate multicast: non-uniform receiving rates. Example: media streaming, High-bandwidth receiver high quality streaming; Low-bandwidth receiver low but acceptable quality streaming. 100 M bps 100 M bps 500 K bps 10 M bps

4 Introduction Multirate Multicast Multirate multicast: non-uniform receiving rates. Example: media streaming, High-bandwidth receiver high quality streaming; Low-bandwidth receiver low but acceptable quality streaming. Layer 2 Layer M bps Layer M bps Layer K bps Layer 2 Layer 1 10 M bps Typical implementation: Multi-Resolution Coding (MRC), e.g., H.264/SVC and MPEG-4 Divide the data flow into layers; Base layer: most important and basic information; received by each destination; Enhancement layers: incremental details for better quality; optionally obtained; Allocate different number of layers to different receivers.

5 Introduction Multirate Multicast Multirate multicast: non-uniform receiving rates. Example: media streaming, High-bandwidth receiver high quality streaming; Low-bandwidth receiver low but acceptable quality streaming. Layer 2 Layer M bps Layer M bps Layer K bps Layer 2 Layer 1 10 M bps Typical implementation: Multi-Resolution Coding (MRC), e.g., H.264/SVC and MPEG-4 Divide the data flow into layers; Base layer: most important and basic information; received by each destination; Enhancement layers: incremental details for better quality; optionally obtained; Useful only if all lower layers correctly received! Allocate different number of layers to different receivers.

6 Introduction Stochastic Wireless Networks Stochastic wireless network: user mobility and channel fading.

7 Introduction Stochastic Wireless Networks Stochastic wireless network: user mobility and channel fading. R1 S R1 S D1 D1 R2 D2 D2 R2 Figure: User mobility dynamic topology dynamic routing.

8 Introduction Stochastic Wireless Networks Stochastic wireless network: user mobility and channel fading. R1 S R1 S D1 D1 R2 D2 D2 R2 Figure: User mobility dynamic topology dynamic routing. Figure: Channel fading dynamic link capacity dynamic capacity allocation.

9 Introduction Stochastic Wireless Networks Stochastic wireless network: user mobility and channel fading. R1 S R1 S D1 D1 R2 D2 D2 R2 Figure: User mobility dynamic topology dynamic routing. Figure: Channel fading dynamic link capacity dynamic capacity allocation. Dynamic throughput dynamic rate control (number of layers and data rate on each layer).

10 Introduction Social Selfishness Network users in the real world:

11 Introduction Social Selfishness Network users in the real world: Social relationships: social tie between relay node i and destination d, ρ id [0, 1], ρ id =1 strongest tie; ρ id =0 no tie;

12 Introduction Social Selfishness Network users in the real world: Social relationships: social tie between relay node i and destination d, ρ id [0, 1], ρ id =1 strongest tie; ρ id =0 no tie; Socially selfish: A user prefers helping others (in data relay) with stronger social ties; Unit cost for relaying one packet towards d: ξ(ρ id ), Non-increasing cost function on ρ id ;

13 Introduction Social Selfishness Network users in the real world: Social relationships: social tie between relay node i and destination d, ρ id [0, 1], ρ id =1 strongest tie; ρ id =0 no tie; Socially selfish: A user prefers helping others (in data relay) with stronger social ties; Unit cost for relaying one packet towards d: ξ(ρ id ), Non-increasing cost function on ρ id ; New challenge to protocol design: R 1 R 1 S 5 5 D S 5 X D R 2 Figure: Routing without social selfishness: S to R 1 to D. Figure: Routing with social selfishness: S to R 2 to D. R 2

14 Introduction Utility maximization problem Network model Single multicast session; General mobility model: ergodic process; General channel fading model: ergodic process; General interference model: interference relation set.

15 Introduction Utility maximization problem Network model Single multicast session; General mobility model: ergodic process; General channel fading model: ergodic process; General interference model: interference relation set. E.g., (a, b) I a and b are mutual interfering.

16 Introduction Utility maximization problem Essential questions: At source: calibrate the number of layers and the data rate on each layer towards each receiver; At each relay: make packet forwarding decisions; in each time slot, such that the overall net utility of time-averaged throughput is maximized over time?

17 Introduction Utility maximization problem Essential questions: At source: calibrate the number of layers and the data rate on each layer towards each receiver; At each relay: make packet forwarding decisions; in each time slot, such that the overall net utility of time-averaged throughput is maximized over time? Current literature: Known receiving rates at the destinations; And/or, given routing table of the layers. Our solution: an online algorithm with none of above assumptions.

18 Techniques Lyapunov optimization framework Proposed by Dr. Neely from USC; Online algorithm for time-averaged utility optimization; Strategically make decision in each time slot based on network status.

19 Techniques Lyapunov optimization framework Proposed by Dr. Neely from USC; Online algorithm for time-averaged utility optimization; Strategically make decision in each time slot based on network status. This work: decide rate control, routing and capacity allocation in each time slot based on Network topology; Channel capacity; Lengthes of packet queues and virtual queues.

20 Techniques Random linear network coding How? Why? Divide long flow on each layer into consecutive generations; Encode packets in the same generation. Increase diversity of packets each packet equivalently useful; Reduce coding complexity. r 3 (t) dk r 2 (t) dk r 1 (t) dk Q dk 3 s (t) Q dk 2 s (t) Q dk 1 s (t) Figure: The progress of sending the layer flow at source: an example.

21 Techniques Random linear network coding How? Why? Divide long flow on each layer into consecutive generations; Encode packets in the same generation. Increase diversity of packets each packet equivalently useful; Reduce coding complexity. r 3 (t) dk r 2 (t) dk r 1 (t) dk Q dk 3 s (t) Q dk 2 s (t) Q dk 1 s (t) Figure: The progress of sending the layer flow at source: an example. Rate control r dkl (t): data admission of generation k on layer l towards destination d.

22 Techniques Wireless transmission: broadcast 1J 12J dkl 13J dkl 14J dkl Figure: Example: hyperarc. Figure: Example: virtual flows.

23 Techniques Wireless transmission: broadcast 1J 12J dkl 13J dkl 14J dkl Figure: Example: hyperarc. Capacity allocation { α ij (t): 1 h ij is scheduled α ij (t) = 0 Otherwise Figure: Example: virtual flows. Routing µ dkl ijj (t): packets of generation k on layer l to node j over hyperarc h ij towards destination d.

24 Algorithm design Queues Packet queue at each node Q dkl i (t): packets queue on node i of generation k on layer l towards destination d, Incoming rate at slot t: If i is source: data admission r dkl (t) and packets routed from other nodes, e.g., µ dkl uij (t); dkl uij dkl ijj dkl ijj dkl If i not source: packets routed from other nodes, e.g., µ dkl uij (t); uij dkl ijj dkl ijj dkl Outgoing rate at slot t: packets routed to other nodes, e.g., µ dkl ijj (t).

25 Algorithm design Queues Virtual queues at source Y dkl (t): if the utility functions U l ( ), l [1,L], are non-linear, Incoming rate in slot t: γ dkl (t) [0,R]; Outgoing rate in slot t: r dkl (t); dkl dkl dkl Remark: Y dkl (t) is stable γ dkl r dkl U l ( γ dkl ) U l ( r dkl )

26 Algorithm design Queues Virtual queues at source (Cont.) G dkl (t): Incoming rate in slot t: r dkl +(t) with l + = l +1; Outgoing rate in slot t: r dkl (t); dkl+ dkl dkl Remark: G dkl (t) is stable r dkl + r dkl average end-to-end rate of layer l no less than that of layer l +1

27 Algorithm design Queues Virtual queues at source (Cont.) G dkl (t): Incoming rate in slot t: r dkl +(t) with l + = l +1; Outgoing rate in slot t: r dkl (t); dkl+ dkl dkl Remark: G dkl (t) is stable r dkl + r dkl average end-to-end rate of layer l no less than that of layer l +1MRC constraint!

28 Algorithm design Dynamic Algorithm With Lyapunov optimization framework, we get three optimization problems: Optimization only with auxiliary variable; Optimization only with rate control variable; Optimization only with routing and capacity allocation variables.

29 Algorithm design Dynamic Algorithm Rate control: auxiliary variable Remarks: γ dkl (t) = max{min{u 1 l ( Y dkl(t) ),R}, 0}, V Y dkl (t): the amount of packets ready for admission; Large Y dkl (t) too many non-admitted packets small γ dkl (t);

30 Algorithm design Dynamic Algorithm Rate control: data rate variable min{p dkl (t),r} if Y dkl (t)+1 {l<l} G dkl (t) r dkl (t) = >Q dkl s (t)+1 {l>1} G dkl (t), 0 otherwise Remarks: Y dkl (t): the amount of packet ready for admission; G dkl (t): extra packets received on layer l than layer l +1; Q dkl s (t): packets for delivery to the network;

31 Algorithm design Dynamic Algorithm Rate control: data rate variable min{p dkl (t),r} if Y dkl (t)+1 {l<l} G dkl (t) r dkl (t) = >Q dkl s (t)+1 {l>1} G dkl (t), 0 otherwise Remarks: Y dkl (t): the amount of packet ready for admission; G dkl (t): extra packets received on layer l than layer l +1; Q dkl s (t): packets for delivery to the network; Enough packet for admission and satisfaction of MRC constraint while low congestion data admission at maximum rate;

32 Algorithm design Dynamic Algorithm Joint routing and capacity allocation Capacity allocation: max α ij (t) W ij (t), h ij H(t) s.t. Interference Constraints. Weight W ij (t): multiplication of Hyperarc capacity; Maximum differential packet queue length minus social cost, over all combinations of Generation k; Layer l; Destination set D ij.

33 Algorithm design Dynamic Algorithm Joint routing and capacity allocation Capacity allocation: max α ij (t) W ij (t), h ij H(t) s.t. Interference Constraints. Weight W ij (t): multiplication of Hyperarc capacity; Maximum differential packet queue length minus social cost, over all combinations of Generation k; Layer l; Destination set D ij. Routing: µ dkl ijj(t) = { α ij (t) c ij (t) if (d, k, l, j) =arg max{w ij (t)}. 0 otherwise.

34 Algorithm design Dynamic Algorithm Joint routing and capacity allocation Capacity allocation: max α ij (t) W ij (t), h ij H(t) s.t. Interference Constraints. Weight W ij (t): multiplication of Hyperarc capacity; Maximum differential packet queue length minus social cost, over all combinations of Generation k; Layer l; Destination set D ij. Routing: µ dkl ijj(t) = { α ij (t) c ij (t) if (d, k, l, j) =arg max{w ij (t)}. 0 otherwise. Remarks: preference to Hyperarc with larger capacity; Flow with larger differential packet queue length. Destination with smaller social cost or larger social tie.

35 Algorithm design Dynamic Algorithm Distributed implementation for capacity allocation Greedily schedule the hyperarc h ij with, Largest weight W ij (t) among all its interfering hyperarcs; Largest weight W ij (t) among all its local hyperarcs, e.g., h iz (t) with Z J.

36 Performance analysis Theoretical results Utility optimality and network stability Constant gap to the offline optimum: Net utility by our online algorithm Offline optimum B/V, B is a constant; V is a configurable parameter; All queues are stable, i.e., stable network.

37 Performance analysis Empirical results Three types of social tie distributions 1) Uniform Distribution of Social Ties (UST): uniformly randomly assigned between (0, 1]. 2) Clustered Distribution of Social Ties 1 (CST1): normalized distribution of contact frequencies between two nodes from a trace. Low social tie among most nodes; Only a few nodes have strong social ties with others. 3) Clustered Distribution of Social Ties 2 (CST2): complementary of CST1 High social tie among most nodes; Only a few nodes have low social ties with others.

38 Performance analysis Empirical results Total Net Utility Centralized UST Centralized CST1 1.5 Centralized CST2 1 Distributed UST 0.5 Distributed CST1 Distributed CST Max link capacity between two nodes (c max ) (a) a 50-node network Total Net Utility 8 6 Centralized UST 4 Centralized CST1 Centralized CST2 2 Distributed UST Distributed CST1 Distributed CST Max link capacity between two nodes (c max ) (b) a 100-node network Figure: Centralized vs. distributed algorithm on total net utility.

39 Performance analysis Empirical results Average utility per destination UST CST1 CST Average social tie strength Average utility per destination UST CST1 CST Average social tie strength (a) a 50-node network (b) a 100-node network Figure: Impact of different social tie strengths. Observation: Obvious social preference under UST and CST1 distributions; No differentiated utility gain under CST2 distribution;

40 Performance analysis Empirical results Average utility per destination UST CST1 CST Average social tie strength Average utility per destination UST CST1 CST Average social tie strength (a) a 50-node network (b) a 100-node network Figure: Impact of different social tie strengths. Observation: Obvious social preference under UST and CST1 distributions; No differentiated utility gain under CST2 distribution; Reason: Free-riding in CST2.

41 Conclusion Contribution: First effort on optimal multirate multicast in stochastic wireless networks with user mobility and channel fading; Investigation on the impact of social selfishness on multicast; Cross-layer design achieving overall utility arbitrarily close to the offline optimum. Future work: Multirate multicast with delay guarantees; Reduce the number of queues on each node.

42 Conclusion Thank You! Q&A

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and

More information

Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions

Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions Abhishek Sinha Laboratory for Information and Decision Systems MIT MobiHoc, 2017 April 18, 2017 1 / 63 Introduction

More information

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,

More information

CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J.

CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering,

More information

A closer look at network structure:

A closer look at network structure: T1: Introduction 1.1 What is computer network? Examples of computer network The Internet Network structure: edge and core 1.2 Why computer networks 1.3 The way networks work 1.4 Performance metrics: Delay,

More information

Degrees of Freedom in Cached Interference Networks with Limited Backhaul

Degrees of Freedom in Cached Interference Networks with Limited Backhaul Degrees of Freedom in Cached Interference Networks with Limited Backhaul Vincent LAU, Department of ECE, Hong Kong University of Science and Technology (A) Motivation Interference Channels 3 No side information

More information

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Convergecast Amitabha Ghosh Yi Wang Ozlem D. Incel V.S. Anil Kumar Bhaskar Krishnamachari Dept. of Electrical Engineering,

More information

Delivery Network on the Internet

Delivery Network on the Internet Optimal erver Placement for treaming Content Delivery Network on the Internet Xiaojun Hei and Danny H.K. Tsang Department of Electronic and Computer Engineering Hong Kong University of cience and Technology

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

DYNAMIC RESOURCE ALLOCATION FOR LAYER- ENCODED VIDEO MULTICASTING OVER WIMAX NETWORKS

DYNAMIC RESOURCE ALLOCATION FOR LAYER- ENCODED VIDEO MULTICASTING OVER WIMAX NETWORKS DYNAMIC RESOURCE ALLOCATION FOR LAYER- ENCODED VIDEO MULTICASTING OVER WIMAX NETWORKS 1 C. NISHANT PAUL, 2 V. SAKTHIVEL 1 P.G. Student, School Of Computing, SASTRA University, Thanjavur 613401, India.

More information

Opportunistic and Cooperative Spatial Multiplexing in MIMO Ad Hoc Networks

Opportunistic and Cooperative Spatial Multiplexing in MIMO Ad Hoc Networks 1610 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 5, OCTOBER 2010 Opportunistic and Cooperative Spatial Multiplexing in MIMO Ad Hoc Networks Shan Chu, Graduate Student Member, IEEE, andxinwang, Member,

More information

Optical Packet Switching

Optical Packet Switching Optical Packet Switching DEISNet Gruppo Reti di Telecomunicazioni http://deisnet.deis.unibo.it WDM Optical Network Legacy Networks Edge Systems WDM Links λ 1 λ 2 λ 3 λ 4 Core Nodes 2 1 Wavelength Routing

More information

Notes on Backpressure Routing

Notes on Backpressure Routing EE 649 STOCHASTIC NETWORK OPTIMIZATION, MICHAEL J. NEELY, SPRING 2011 1 Notes on Backpressure Routing I. BACKPRESSURE ROUTING FOR NETWORKS Backpressure routing refers to an algorithm for dynamically routing

More information

Layer 3: Network Layer. 9. Mar INF-3190: Switching and Routing

Layer 3: Network Layer. 9. Mar INF-3190: Switching and Routing Layer 3: Network Layer 9. Mar. 2005 1 INF-3190: Switching and Routing Network Layer Goal Enable data transfer from end system to end system End systems Several hops, (heterogeneous) subnetworks Compensate

More information

The 2010 IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, April In Proceedings of WCNC, 2010, p.

The 2010 IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, April In Proceedings of WCNC, 2010, p. Title A joint routing and scheduling algorithm for efficient broadcast in wireless mesh networks Author(s) Chiu, HS; Yeung, KL Citation The 2 IEEE Wireless Communications and Networking Conference (WCNC),

More information

Mitigation of Capacity Region of Network and Energy Function for a Delay Tolerant Mobile Ad Hoc Network

Mitigation of Capacity Region of Network and Energy Function for a Delay Tolerant Mobile Ad Hoc Network International Journal of Scientific & Engineering Research, Volume 3, Issue 10, October-01 1 ISSN 9-5518 Mitigation of Capacity Region of Network and Energy Function for a Delay Tolerant Mobile Ad Hoc

More information

Adaptive Video Multicasting

Adaptive Video Multicasting Adaptive Video Multicasting Presenters: Roman Glistvain, Bahman Eksiri, and Lan Nguyen 1 Outline Approaches to Adaptive Video Multicasting Single rate multicast Simulcast Active Agents Layered multicasting

More information

Communication Fundamentals in Computer Networks

Communication Fundamentals in Computer Networks Lecture 5 Communication Fundamentals in Computer Networks M. Adnan Quaium Assistant Professor Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Room 4A07

More information

Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks under Physical Interference Model

Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks under Physical Interference Model Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks under Physical Interference Model Hongxing Li Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong hxli@cs.hku.hk

More information

Index. peer-to-peer systems, PPFEED (see Peer-to-peer file sharing (PPFEED)) ARQ schemes, 30. B Butterfly networks, 30

Index. peer-to-peer systems, PPFEED (see Peer-to-peer file sharing (PPFEED)) ARQ schemes, 30. B Butterfly networks, 30 Index A Adaptive network coding (ANC) bandwidth utilization, 164 cumulative encoding technique, 163 LC, 163, 164 MDC, 164 overlay topology construction, 166 167 peer joining, 168 170 average satisfaction,

More information

REDUCING DEFICIT QUEUE DELAY USING VIRTUAL MEMORY

REDUCING DEFICIT QUEUE DELAY USING VIRTUAL MEMORY REDUCING DEFICIT QUEUE DELAY USING VIRTUAL MEMORY N.Deepa 1, V.R.Arulmozhi 2, B.Vijaya Nirmala 3 1,2,3 Assistant Professor/Department of CSE, RVS Educational Trust s Group of Institution Dindigul, Tamilnadu,

More information

The Capacity of Wireless Networks

The Capacity of Wireless Networks The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of

More information

Heterogeneity Increases Multicast Capacity in Clustered Network

Heterogeneity Increases Multicast Capacity in Clustered Network Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline

More information

Active Adaptation in QoS Architecture Model

Active Adaptation in QoS Architecture Model Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex

More information

A Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows

A Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows 1 A Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows Phuong Luu Vo, Nguyen H. Tran, Choong Seon Hong, *KiJoon Chae Kyung H University,

More information

Measurement Based Routing Strategies on Overlay Architectures

Measurement Based Routing Strategies on Overlay Architectures Measurement Based Routing Strategies on Overlay Architectures Student: Tuna Güven Faculty: Bobby Bhattacharjee, Richard J. La, and Mark A. Shayman LTS Review February 15 th, 2005 Outline Measurement-Based

More information

arxiv: v2 [cs.ni] 23 May 2016

arxiv: v2 [cs.ni] 23 May 2016 Simulation Results of User Behavior-Aware Scheduling Based on Time-Frequency Resource Conversion Hangguan Shan, Yani Zhang, Weihua Zhuang 2, Aiping Huang, and Zhaoyang Zhang College of Information Science

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

ADAPTIVE ROUTING IN COMMUNICATION NETWORKS USING CELL BREATHING BASED BACKPRESSURE ALGORITHM

ADAPTIVE ROUTING IN COMMUNICATION NETWORKS USING CELL BREATHING BASED BACKPRESSURE ALGORITHM Indian Journal of Communications Technology and Electronics (IJCTE) Vol.2.No.1 2014pp 13-17. available at: www.goniv.com Paper Received :05-03-2014 Paper Published:28-03-2014 Paper Reviewed by: 1. John

More information

Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding

Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 19122 Abstract

More information

Inspirations from Multiple Race Track Athletics for Multimedia Communications Traffic Engineering: Opportunities and Challenges

Inspirations from Multiple Race Track Athletics for Multimedia Communications Traffic Engineering: Opportunities and Challenges Inspirations from Multiple Race Track Athletics for Multimedia Communications Traffic Engineering: Opportunities and Challenges Sudip Misra Yale University Model M racers running towards a goal. Non-interfering

More information

Min-Cost Multicast Networks in Euclidean Space

Min-Cost Multicast Networks in Euclidean Space Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue 1 Zongpeng Li 23 1 Fudan University Shanghai, China 2 University of Calgary Alberta, Canada 3 Institute of Network Coding, Chinese University of Hong Kong,

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

Teletraffic theory (for beginners)

Teletraffic theory (for beginners) Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Cross-Monotonic Multicast

Cross-Monotonic Multicast Cross-Monotonic Multicast Zongpeng Li Department of Computer Science University of Calgary April 17, 2008 1 Multicast Multicast models one-to-many data dissemination in a computer network Example: live

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

Mesh Networks

Mesh Networks Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE

More information

Basic Switch Organization

Basic Switch Organization NOC Routing 1 Basic Switch Organization 2 Basic Switch Organization Link Controller Used for coordinating the flow of messages across the physical link of two adjacent switches 3 Basic Switch Organization

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

The Maximum Throughput of A Wireless Multi-Hop Path

The Maximum Throughput of A Wireless Multi-Hop Path The Maximum Throughput of A Wireless Multi-Hop Path Guoqiang Mao School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia Email: guoqiang@ee.usyd.edu.au Abstract In

More information

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Turgut, and Ladislau Bölöni Networking and Mobile Computing Research Laboratory (NetMoC) Department of Electrical

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

A Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network

A Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network Clemson University TigerPrints All Theses Theses 8-2017 A Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network William Derek Johnson Clemson University Follow this and

More information

Connecting to the Network

Connecting to the Network Connecting to the Network Networking for Home and Small Businesses Chapter 3 1 Objectives Explain the concept of networking and the benefits of networks. Explain the concept of communication protocols.

More information

Improving Internet Performance through Traffic Managers

Improving Internet Performance through Traffic Managers Improving Internet Performance through Traffic Managers Ibrahim Matta Computer Science Department Boston University Computer Science A Glimpse of Current Internet b b b b Alice c TCP b (Transmission Control

More information

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan

More information

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia

More information

A Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks

A Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks A Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks Yi Shi Y. Thomas Hou The Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA Abstract Cognitive

More information

Randomization. Randomization used in many protocols We ll study examples:

Randomization. Randomization used in many protocols We ll study examples: Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous

More information

Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling

Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Network Layer 4-1 Chapter 4: Network Layer Chapter

More information

Successive Interference Cancellation: A Back of the Envelope Perspective. Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi

Successive Interference Cancellation: A Back of the Envelope Perspective. Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi Successive Interference Cancellation: A Back of the Envelope Perspective Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi Simple Case of Wireless Transmission T1 AP Decoding successful

More information

! Network bandwidth shared by all users! Given routing, how to allocate bandwidth. " efficiency " fairness " stability. !

! Network bandwidth shared by all users! Given routing, how to allocate bandwidth.  efficiency  fairness  stability. ! Motivation Network Congestion Control EL 933, Class10 Yong Liu 11/22/2005! Network bandwidth shared by all users! Given routing, how to allocate bandwidth efficiency fairness stability! Challenges distributed/selfish/uncooperative

More information

Dynamic Index Coding for Wireless Broadcast Networks

Dynamic Index Coding for Wireless Broadcast Networks PROC. IEEE INFOCOM 202 Dynamic Index Coding for Wireless Broadcast Networks Michael J. Neely, Arash Saber Tehrani, Zhen Zhang Abstract We consider a wireless broadcast station that transmits packets to

More information

Cross-Layer Optimization for Wireless Networks with Multi-Receiver Diversity

Cross-Layer Optimization for Wireless Networks with Multi-Receiver Diversity Cross-Layer Optimization for Wireless Networks with Multi-Receiver Diversity 1 2 3 error broadcasting Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely/ Comm Theory Workshop,

More information

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing Sudipta Sengupta Shravan Rayanchu,2 Suman Banerjee 2 Bell Laboratories, Lucent Technologies, Murray Hill,

More information

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR

More information

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE 554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY 2008 Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks Yalin Evren Sagduyu, Member, IEEE, and

More information

Effects of Optical Network Unit Placement Schemes for Multi-Channel Hybrid Wireless-Optical Broadband-Access Networks

Effects of Optical Network Unit Placement Schemes for Multi-Channel Hybrid Wireless-Optical Broadband-Access Networks Effects of Optical Network Unit Placement Schemes for Multi-Channel Hybrid Wireless-Optical Broadband-Access Networks Amitangshu Pal and Asis Nasipuri Electrical & Computer Engineering, The University

More information

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado

More information

Cross-Layer Optimization for Efficient Delivery of Scalable Video over WiMAX Lung-Jen Wang 1, a *, Chiung-Yun Chang 2,b and Jen-Yi Huang 3,c

Cross-Layer Optimization for Efficient Delivery of Scalable Video over WiMAX Lung-Jen Wang 1, a *, Chiung-Yun Chang 2,b and Jen-Yi Huang 3,c Applied Mechanics and Materials Submitted: 2016-06-28 ISSN: 1662-7482, Vol. 855, pp 171-177 Revised: 2016-08-13 doi:10.4028/www.scientific.net/amm.855.171 Accepted: 2016-08-23 2017 Trans Tech Publications,

More information

On Benefits of Network Coding in Bidirected Networks and Hyper-networks

On Benefits of Network Coding in Bidirected Networks and Hyper-networks On Benefits of Network Coding in Bidirected Networks and Hyper-networks Zongpeng Li University of Calgary / INC, CUHK December 1 2011, at UNSW Joint work with: Xunrui Yin, Xin Wang, Jin Zhao, Xiangyang

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Cooperative-Diversity Slotted ALOHA

Cooperative-Diversity Slotted ALOHA Wireless Networks manuscript No. (will be inserted by the editor) Cooperative-Diversity Slotted ALOHA John M. Shea, Tan F. Wong, and Wing-Hin Wong Wireless Information Networking Group, University of Florida,

More information

Understanding the Impact of Interference on Collaborative Relays

Understanding the Impact of Interference on Collaborative Relays IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. XX, NO. X, MONTH 200X 1 Understanding the Impact of Interference on Collaborative Relays Yan Zhu, Student Member, IEEE and Haitao Zheng, Member, IEEE Abstract

More information

Improving VoD System Efficiency with Multicast and Caching

Improving VoD System Efficiency with Multicast and Caching Improving VoD System Efficiency with Multicast and Caching Jack Yiu-bun Lee Department of Information Engineering The Chinese University of Hong Kong Contents 1. Introduction 2. Previous Works 3. UVoD

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

Congestion Avoidance

Congestion Avoidance Congestion Avoidance Richard T. B. Ma School of Computing National University of Singapore CS 5229: Advanced Compute Networks References K. K. Ramakrishnan, Raj Jain, A Binary Feedback Scheme for Congestion

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Qos support and adaptive video

Qos support and adaptive video Qos support and adaptive video QoS support in ad hoc networks MAC layer techniques: 802.11 e - alternation of contention based and contention free periods; differentiated (per class) Interframe Spacing

More information

Efficient Universal Recovery in Broadcast Networks

Efficient Universal Recovery in Broadcast Networks Efficient Universal Recovery in Broadcast Networks Thomas Courtade and Rick Wesel UCLA September 30, 2010 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 1 / 19 System Model and Problem

More information

CS519: Computer Networks

CS519: Computer Networks Lets start at the beginning : Computer Networks Lecture 1: Jan 26, 2004 Intro to Computer Networking What is a for? To allow two or more endpoints to communicate What is a? Nodes connected by links Lets

More information

Lecture (08, 09) Routing in Switched Networks

Lecture (08, 09) Routing in Switched Networks Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.

More information

Distributed Throughput Maximization in Wireless Mesh Networks via Pre-Partitioning

Distributed Throughput Maximization in Wireless Mesh Networks via Pre-Partitioning TO APPEAR IN IEEE/ACM TRANSACTIONS ON NETWORKING, 2008 1 Distributed Throughput Maximization in Wireless Mesh Networks via Pre-Partitioning Andrew Brzezinski, Gil Zussman Senior Member, IEEE, and Eytan

More information

On the Role of Network Coding in Uncoordinated Multihop Content Distribution over Ad Hoc Networks

On the Role of Network Coding in Uncoordinated Multihop Content Distribution over Ad Hoc Networks On the Role of Network Coding in Uncoordinated Multihop Content istribution over Ad Hoc Networks Mark Johnson 1, Minghua Chen 2, and Kannan Ramchandran 1 1 epartment of Electrical Engineering and Computer

More information

Maximizing the Number of Users in an Interactive Video-on-Demand System

Maximizing the Number of Users in an Interactive Video-on-Demand System IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 4, DECEMBER 2002 281 Maximizing the Number of Users in an Interactive Video-on-Demand System Spiridon Bakiras, Member, IEEE and Victor O. K. Li, Fellow,

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control

Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control Mung Chiang Electrical Engineering Department, Princeton University NRL/NATO Workshop

More information

CSE 3214: Computer Network Protocols and Applications Network Layer

CSE 3214: Computer Network Protocols and Applications Network Layer CSE 314: Computer Network Protocols and Applications Network Layer Dr. Peter Lian, Professor Department of Computer Science and Engineering York University Email: peterlian@cse.yorku.ca Office: 101C Lassonde

More information

Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks

Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks 1 Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks Shan Chu, Student Member, IEEE, Xin Wang Member, IEEE, and Yuanyuan Yang Fellow, IEEE. Abstract With the popularity

More information

Maximization of Time-to-first-failure for Multicasting in Wireless Networks: Optimal Solution

Maximization of Time-to-first-failure for Multicasting in Wireless Networks: Optimal Solution Arindam K. Das, Mohamed El-Sharkawi, Robert J. Marks, Payman Arabshahi and Andrew Gray, "Maximization of Time-to-First-Failure for Multicasting in Wireless Networks : Optimal Solution", Military Communications

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

CSE3213 Computer Network I

CSE3213 Computer Network I CSE3213 Computer Network I Introduction Course page: http://www.cse.yorku.ca/course/3213 1 Course Contents 3 general areas: data communications, networking, and protocols 1. Data communications: basic

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

EE 122: Network Applications

EE 122: Network Applications Network EE 122: Network Applications Kevin Lai Aug 28, 2002 Network functionality is only useful if it benefits users - also applies to any computer system, but easier to forget in networking - e.g., Is

More information

One More Bit Is Enough

One More Bit Is Enough One More Bit Is Enough Yong Xia, RPI Lakshmi Subramanian, UCB Ion Stoica, UCB Shiv Kalyanaraman, RPI SIGCOMM 05, Philadelphia, PA 08 / 23 / 2005 Motivation #1: TCP doesn t work well in high b/w or delay

More information

Coding vs. ARQ in Fading Channels: How reliable should the PHY be?

Coding vs. ARQ in Fading Channels: How reliable should the PHY be? Coding vs. ARQ in Fading Channels: How reliable should the PHY be? Peng Wu and Nihar Jindal University of Minnesota Department of Electrical & Computer Engineering Introduction RC ayer ACK/NACK RC ayer

More information

A Dynamic TDMA Protocol Utilizing Channel Sense

A Dynamic TDMA Protocol Utilizing Channel Sense International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2

More information

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

Multicasting in ad hoc networks: Energy efficient

Multicasting in ad hoc networks: Energy efficient Multicasting in ad hoc networks: Energy efficient Blerta Bishaj Helsinki University of Technology 1. Introduction...2 2. Sources of power consumption... 3 3. Directional antennas... 3 4. TCP... 3 5. Energy-efficient

More information

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West

More information

A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3

A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3 A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3 1,2,3 Department of Computer Science Engineering Jaypee Institute

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information