Introduction Multirate Multicast Multirate multicast: non-uniform receiving rates. 100 M bps 10 M bps 100 M bps 500 K bps
|
|
- Janice Parks
- 5 years ago
- Views:
Transcription
1 Stochastic Optimal Multirate Multicast in Socially Selfish Wireless Networks Hongxing Li 1, Chuan Wu 1, Zongpeng Li 2, Wei Huang 1, and Francis C.M. Lau 1 1 The University of Hong Kong, Hong Kong 2 University of Calgary, Canada Mar. 27, 2012
2 Introduction Multirate Multicast Multirate multicast: non-uniform receiving rates. 100 M bps 10 M bps 100 M bps 500 K bps
3 Introduction Multirate Multicast Multirate multicast: non-uniform receiving rates. Example: media streaming, High-bandwidth receiver high quality streaming; Low-bandwidth receiver low but acceptable quality streaming. 100 M bps 100 M bps 500 K bps 10 M bps
4 Introduction Multirate Multicast Multirate multicast: non-uniform receiving rates. Example: media streaming, High-bandwidth receiver high quality streaming; Low-bandwidth receiver low but acceptable quality streaming. Layer 2 Layer M bps Layer M bps Layer K bps Layer 2 Layer 1 10 M bps Typical implementation: Multi-Resolution Coding (MRC), e.g., H.264/SVC and MPEG-4 Divide the data flow into layers; Base layer: most important and basic information; received by each destination; Enhancement layers: incremental details for better quality; optionally obtained; Allocate different number of layers to different receivers.
5 Introduction Multirate Multicast Multirate multicast: non-uniform receiving rates. Example: media streaming, High-bandwidth receiver high quality streaming; Low-bandwidth receiver low but acceptable quality streaming. Layer 2 Layer M bps Layer M bps Layer K bps Layer 2 Layer 1 10 M bps Typical implementation: Multi-Resolution Coding (MRC), e.g., H.264/SVC and MPEG-4 Divide the data flow into layers; Base layer: most important and basic information; received by each destination; Enhancement layers: incremental details for better quality; optionally obtained; Useful only if all lower layers correctly received! Allocate different number of layers to different receivers.
6 Introduction Stochastic Wireless Networks Stochastic wireless network: user mobility and channel fading.
7 Introduction Stochastic Wireless Networks Stochastic wireless network: user mobility and channel fading. R1 S R1 S D1 D1 R2 D2 D2 R2 Figure: User mobility dynamic topology dynamic routing.
8 Introduction Stochastic Wireless Networks Stochastic wireless network: user mobility and channel fading. R1 S R1 S D1 D1 R2 D2 D2 R2 Figure: User mobility dynamic topology dynamic routing. Figure: Channel fading dynamic link capacity dynamic capacity allocation.
9 Introduction Stochastic Wireless Networks Stochastic wireless network: user mobility and channel fading. R1 S R1 S D1 D1 R2 D2 D2 R2 Figure: User mobility dynamic topology dynamic routing. Figure: Channel fading dynamic link capacity dynamic capacity allocation. Dynamic throughput dynamic rate control (number of layers and data rate on each layer).
10 Introduction Social Selfishness Network users in the real world:
11 Introduction Social Selfishness Network users in the real world: Social relationships: social tie between relay node i and destination d, ρ id [0, 1], ρ id =1 strongest tie; ρ id =0 no tie;
12 Introduction Social Selfishness Network users in the real world: Social relationships: social tie between relay node i and destination d, ρ id [0, 1], ρ id =1 strongest tie; ρ id =0 no tie; Socially selfish: A user prefers helping others (in data relay) with stronger social ties; Unit cost for relaying one packet towards d: ξ(ρ id ), Non-increasing cost function on ρ id ;
13 Introduction Social Selfishness Network users in the real world: Social relationships: social tie between relay node i and destination d, ρ id [0, 1], ρ id =1 strongest tie; ρ id =0 no tie; Socially selfish: A user prefers helping others (in data relay) with stronger social ties; Unit cost for relaying one packet towards d: ξ(ρ id ), Non-increasing cost function on ρ id ; New challenge to protocol design: R 1 R 1 S 5 5 D S 5 X D R 2 Figure: Routing without social selfishness: S to R 1 to D. Figure: Routing with social selfishness: S to R 2 to D. R 2
14 Introduction Utility maximization problem Network model Single multicast session; General mobility model: ergodic process; General channel fading model: ergodic process; General interference model: interference relation set.
15 Introduction Utility maximization problem Network model Single multicast session; General mobility model: ergodic process; General channel fading model: ergodic process; General interference model: interference relation set. E.g., (a, b) I a and b are mutual interfering.
16 Introduction Utility maximization problem Essential questions: At source: calibrate the number of layers and the data rate on each layer towards each receiver; At each relay: make packet forwarding decisions; in each time slot, such that the overall net utility of time-averaged throughput is maximized over time?
17 Introduction Utility maximization problem Essential questions: At source: calibrate the number of layers and the data rate on each layer towards each receiver; At each relay: make packet forwarding decisions; in each time slot, such that the overall net utility of time-averaged throughput is maximized over time? Current literature: Known receiving rates at the destinations; And/or, given routing table of the layers. Our solution: an online algorithm with none of above assumptions.
18 Techniques Lyapunov optimization framework Proposed by Dr. Neely from USC; Online algorithm for time-averaged utility optimization; Strategically make decision in each time slot based on network status.
19 Techniques Lyapunov optimization framework Proposed by Dr. Neely from USC; Online algorithm for time-averaged utility optimization; Strategically make decision in each time slot based on network status. This work: decide rate control, routing and capacity allocation in each time slot based on Network topology; Channel capacity; Lengthes of packet queues and virtual queues.
20 Techniques Random linear network coding How? Why? Divide long flow on each layer into consecutive generations; Encode packets in the same generation. Increase diversity of packets each packet equivalently useful; Reduce coding complexity. r 3 (t) dk r 2 (t) dk r 1 (t) dk Q dk 3 s (t) Q dk 2 s (t) Q dk 1 s (t) Figure: The progress of sending the layer flow at source: an example.
21 Techniques Random linear network coding How? Why? Divide long flow on each layer into consecutive generations; Encode packets in the same generation. Increase diversity of packets each packet equivalently useful; Reduce coding complexity. r 3 (t) dk r 2 (t) dk r 1 (t) dk Q dk 3 s (t) Q dk 2 s (t) Q dk 1 s (t) Figure: The progress of sending the layer flow at source: an example. Rate control r dkl (t): data admission of generation k on layer l towards destination d.
22 Techniques Wireless transmission: broadcast 1J 12J dkl 13J dkl 14J dkl Figure: Example: hyperarc. Figure: Example: virtual flows.
23 Techniques Wireless transmission: broadcast 1J 12J dkl 13J dkl 14J dkl Figure: Example: hyperarc. Capacity allocation { α ij (t): 1 h ij is scheduled α ij (t) = 0 Otherwise Figure: Example: virtual flows. Routing µ dkl ijj (t): packets of generation k on layer l to node j over hyperarc h ij towards destination d.
24 Algorithm design Queues Packet queue at each node Q dkl i (t): packets queue on node i of generation k on layer l towards destination d, Incoming rate at slot t: If i is source: data admission r dkl (t) and packets routed from other nodes, e.g., µ dkl uij (t); dkl uij dkl ijj dkl ijj dkl If i not source: packets routed from other nodes, e.g., µ dkl uij (t); uij dkl ijj dkl ijj dkl Outgoing rate at slot t: packets routed to other nodes, e.g., µ dkl ijj (t).
25 Algorithm design Queues Virtual queues at source Y dkl (t): if the utility functions U l ( ), l [1,L], are non-linear, Incoming rate in slot t: γ dkl (t) [0,R]; Outgoing rate in slot t: r dkl (t); dkl dkl dkl Remark: Y dkl (t) is stable γ dkl r dkl U l ( γ dkl ) U l ( r dkl )
26 Algorithm design Queues Virtual queues at source (Cont.) G dkl (t): Incoming rate in slot t: r dkl +(t) with l + = l +1; Outgoing rate in slot t: r dkl (t); dkl+ dkl dkl Remark: G dkl (t) is stable r dkl + r dkl average end-to-end rate of layer l no less than that of layer l +1
27 Algorithm design Queues Virtual queues at source (Cont.) G dkl (t): Incoming rate in slot t: r dkl +(t) with l + = l +1; Outgoing rate in slot t: r dkl (t); dkl+ dkl dkl Remark: G dkl (t) is stable r dkl + r dkl average end-to-end rate of layer l no less than that of layer l +1MRC constraint!
28 Algorithm design Dynamic Algorithm With Lyapunov optimization framework, we get three optimization problems: Optimization only with auxiliary variable; Optimization only with rate control variable; Optimization only with routing and capacity allocation variables.
29 Algorithm design Dynamic Algorithm Rate control: auxiliary variable Remarks: γ dkl (t) = max{min{u 1 l ( Y dkl(t) ),R}, 0}, V Y dkl (t): the amount of packets ready for admission; Large Y dkl (t) too many non-admitted packets small γ dkl (t);
30 Algorithm design Dynamic Algorithm Rate control: data rate variable min{p dkl (t),r} if Y dkl (t)+1 {l<l} G dkl (t) r dkl (t) = >Q dkl s (t)+1 {l>1} G dkl (t), 0 otherwise Remarks: Y dkl (t): the amount of packet ready for admission; G dkl (t): extra packets received on layer l than layer l +1; Q dkl s (t): packets for delivery to the network;
31 Algorithm design Dynamic Algorithm Rate control: data rate variable min{p dkl (t),r} if Y dkl (t)+1 {l<l} G dkl (t) r dkl (t) = >Q dkl s (t)+1 {l>1} G dkl (t), 0 otherwise Remarks: Y dkl (t): the amount of packet ready for admission; G dkl (t): extra packets received on layer l than layer l +1; Q dkl s (t): packets for delivery to the network; Enough packet for admission and satisfaction of MRC constraint while low congestion data admission at maximum rate;
32 Algorithm design Dynamic Algorithm Joint routing and capacity allocation Capacity allocation: max α ij (t) W ij (t), h ij H(t) s.t. Interference Constraints. Weight W ij (t): multiplication of Hyperarc capacity; Maximum differential packet queue length minus social cost, over all combinations of Generation k; Layer l; Destination set D ij.
33 Algorithm design Dynamic Algorithm Joint routing and capacity allocation Capacity allocation: max α ij (t) W ij (t), h ij H(t) s.t. Interference Constraints. Weight W ij (t): multiplication of Hyperarc capacity; Maximum differential packet queue length minus social cost, over all combinations of Generation k; Layer l; Destination set D ij. Routing: µ dkl ijj(t) = { α ij (t) c ij (t) if (d, k, l, j) =arg max{w ij (t)}. 0 otherwise.
34 Algorithm design Dynamic Algorithm Joint routing and capacity allocation Capacity allocation: max α ij (t) W ij (t), h ij H(t) s.t. Interference Constraints. Weight W ij (t): multiplication of Hyperarc capacity; Maximum differential packet queue length minus social cost, over all combinations of Generation k; Layer l; Destination set D ij. Routing: µ dkl ijj(t) = { α ij (t) c ij (t) if (d, k, l, j) =arg max{w ij (t)}. 0 otherwise. Remarks: preference to Hyperarc with larger capacity; Flow with larger differential packet queue length. Destination with smaller social cost or larger social tie.
35 Algorithm design Dynamic Algorithm Distributed implementation for capacity allocation Greedily schedule the hyperarc h ij with, Largest weight W ij (t) among all its interfering hyperarcs; Largest weight W ij (t) among all its local hyperarcs, e.g., h iz (t) with Z J.
36 Performance analysis Theoretical results Utility optimality and network stability Constant gap to the offline optimum: Net utility by our online algorithm Offline optimum B/V, B is a constant; V is a configurable parameter; All queues are stable, i.e., stable network.
37 Performance analysis Empirical results Three types of social tie distributions 1) Uniform Distribution of Social Ties (UST): uniformly randomly assigned between (0, 1]. 2) Clustered Distribution of Social Ties 1 (CST1): normalized distribution of contact frequencies between two nodes from a trace. Low social tie among most nodes; Only a few nodes have strong social ties with others. 3) Clustered Distribution of Social Ties 2 (CST2): complementary of CST1 High social tie among most nodes; Only a few nodes have low social ties with others.
38 Performance analysis Empirical results Total Net Utility Centralized UST Centralized CST1 1.5 Centralized CST2 1 Distributed UST 0.5 Distributed CST1 Distributed CST Max link capacity between two nodes (c max ) (a) a 50-node network Total Net Utility 8 6 Centralized UST 4 Centralized CST1 Centralized CST2 2 Distributed UST Distributed CST1 Distributed CST Max link capacity between two nodes (c max ) (b) a 100-node network Figure: Centralized vs. distributed algorithm on total net utility.
39 Performance analysis Empirical results Average utility per destination UST CST1 CST Average social tie strength Average utility per destination UST CST1 CST Average social tie strength (a) a 50-node network (b) a 100-node network Figure: Impact of different social tie strengths. Observation: Obvious social preference under UST and CST1 distributions; No differentiated utility gain under CST2 distribution;
40 Performance analysis Empirical results Average utility per destination UST CST1 CST Average social tie strength Average utility per destination UST CST1 CST Average social tie strength (a) a 50-node network (b) a 100-node network Figure: Impact of different social tie strengths. Observation: Obvious social preference under UST and CST1 distributions; No differentiated utility gain under CST2 distribution; Reason: Free-riding in CST2.
41 Conclusion Contribution: First effort on optimal multirate multicast in stochastic wireless networks with user mobility and channel fading; Investigation on the impact of social selfishness on multicast; Cross-layer design achieving overall utility arbitrarily close to the offline optimum. Future work: Multirate multicast with delay guarantees; Reduce the number of queues on each node.
42 Conclusion Thank You! Q&A
Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions
Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and
More informationThroughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions
Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions Abhishek Sinha Laboratory for Information and Decision Systems MIT MobiHoc, 2017 April 18, 2017 1 / 63 Introduction
More informationOptimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks
Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,
More informationCENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J.
CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering,
More informationA closer look at network structure:
T1: Introduction 1.1 What is computer network? Examples of computer network The Internet Network structure: edge and core 1.2 Why computer networks 1.3 The way networks work 1.4 Performance metrics: Delay,
More informationDegrees of Freedom in Cached Interference Networks with Limited Backhaul
Degrees of Freedom in Cached Interference Networks with Limited Backhaul Vincent LAU, Department of ECE, Hong Kong University of Science and Technology (A) Motivation Interference Channels 3 No side information
More informationLast time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access
Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading
More information2. Modelling of telecommunication systems (part 1)
2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks
More informationTopology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co
Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Convergecast Amitabha Ghosh Yi Wang Ozlem D. Incel V.S. Anil Kumar Bhaskar Krishnamachari Dept. of Electrical Engineering,
More informationDelivery Network on the Internet
Optimal erver Placement for treaming Content Delivery Network on the Internet Xiaojun Hei and Danny H.K. Tsang Department of Electronic and Computer Engineering Hong Kong University of cience and Technology
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationDYNAMIC RESOURCE ALLOCATION FOR LAYER- ENCODED VIDEO MULTICASTING OVER WIMAX NETWORKS
DYNAMIC RESOURCE ALLOCATION FOR LAYER- ENCODED VIDEO MULTICASTING OVER WIMAX NETWORKS 1 C. NISHANT PAUL, 2 V. SAKTHIVEL 1 P.G. Student, School Of Computing, SASTRA University, Thanjavur 613401, India.
More informationOpportunistic and Cooperative Spatial Multiplexing in MIMO Ad Hoc Networks
1610 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 5, OCTOBER 2010 Opportunistic and Cooperative Spatial Multiplexing in MIMO Ad Hoc Networks Shan Chu, Graduate Student Member, IEEE, andxinwang, Member,
More informationOptical Packet Switching
Optical Packet Switching DEISNet Gruppo Reti di Telecomunicazioni http://deisnet.deis.unibo.it WDM Optical Network Legacy Networks Edge Systems WDM Links λ 1 λ 2 λ 3 λ 4 Core Nodes 2 1 Wavelength Routing
More informationNotes on Backpressure Routing
EE 649 STOCHASTIC NETWORK OPTIMIZATION, MICHAEL J. NEELY, SPRING 2011 1 Notes on Backpressure Routing I. BACKPRESSURE ROUTING FOR NETWORKS Backpressure routing refers to an algorithm for dynamically routing
More informationLayer 3: Network Layer. 9. Mar INF-3190: Switching and Routing
Layer 3: Network Layer 9. Mar. 2005 1 INF-3190: Switching and Routing Network Layer Goal Enable data transfer from end system to end system End systems Several hops, (heterogeneous) subnetworks Compensate
More informationThe 2010 IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, April In Proceedings of WCNC, 2010, p.
Title A joint routing and scheduling algorithm for efficient broadcast in wireless mesh networks Author(s) Chiu, HS; Yeung, KL Citation The 2 IEEE Wireless Communications and Networking Conference (WCNC),
More informationMitigation of Capacity Region of Network and Energy Function for a Delay Tolerant Mobile Ad Hoc Network
International Journal of Scientific & Engineering Research, Volume 3, Issue 10, October-01 1 ISSN 9-5518 Mitigation of Capacity Region of Network and Energy Function for a Delay Tolerant Mobile Ad Hoc
More informationAdaptive Video Multicasting
Adaptive Video Multicasting Presenters: Roman Glistvain, Bahman Eksiri, and Lan Nguyen 1 Outline Approaches to Adaptive Video Multicasting Single rate multicast Simulcast Active Agents Layered multicasting
More informationCommunication Fundamentals in Computer Networks
Lecture 5 Communication Fundamentals in Computer Networks M. Adnan Quaium Assistant Professor Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Room 4A07
More informationMinimum-Latency Aggregation Scheduling in Wireless Sensor Networks under Physical Interference Model
Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks under Physical Interference Model Hongxing Li Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong hxli@cs.hku.hk
More informationIndex. peer-to-peer systems, PPFEED (see Peer-to-peer file sharing (PPFEED)) ARQ schemes, 30. B Butterfly networks, 30
Index A Adaptive network coding (ANC) bandwidth utilization, 164 cumulative encoding technique, 163 LC, 163, 164 MDC, 164 overlay topology construction, 166 167 peer joining, 168 170 average satisfaction,
More informationREDUCING DEFICIT QUEUE DELAY USING VIRTUAL MEMORY
REDUCING DEFICIT QUEUE DELAY USING VIRTUAL MEMORY N.Deepa 1, V.R.Arulmozhi 2, B.Vijaya Nirmala 3 1,2,3 Assistant Professor/Department of CSE, RVS Educational Trust s Group of Institution Dindigul, Tamilnadu,
More informationThe Capacity of Wireless Networks
The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of
More informationHeterogeneity Increases Multicast Capacity in Clustered Network
Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline
More informationActive Adaptation in QoS Architecture Model
Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex
More informationA Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows
1 A Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows Phuong Luu Vo, Nguyen H. Tran, Choong Seon Hong, *KiJoon Chae Kyung H University,
More informationMeasurement Based Routing Strategies on Overlay Architectures
Measurement Based Routing Strategies on Overlay Architectures Student: Tuna Güven Faculty: Bobby Bhattacharjee, Richard J. La, and Mark A. Shayman LTS Review February 15 th, 2005 Outline Measurement-Based
More informationarxiv: v2 [cs.ni] 23 May 2016
Simulation Results of User Behavior-Aware Scheduling Based on Time-Frequency Resource Conversion Hangguan Shan, Yani Zhang, Weihua Zhuang 2, Aiping Huang, and Zhaoyang Zhang College of Information Science
More informationIMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS
IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST
More informationADAPTIVE ROUTING IN COMMUNICATION NETWORKS USING CELL BREATHING BASED BACKPRESSURE ALGORITHM
Indian Journal of Communications Technology and Electronics (IJCTE) Vol.2.No.1 2014pp 13-17. available at: www.goniv.com Paper Received :05-03-2014 Paper Published:28-03-2014 Paper Reviewed by: 1. John
More informationRobust Wireless Delivery of Scalable Videos using Inter-layer Network Coding
Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 19122 Abstract
More informationInspirations from Multiple Race Track Athletics for Multimedia Communications Traffic Engineering: Opportunities and Challenges
Inspirations from Multiple Race Track Athletics for Multimedia Communications Traffic Engineering: Opportunities and Challenges Sudip Misra Yale University Model M racers running towards a goal. Non-interfering
More informationMin-Cost Multicast Networks in Euclidean Space
Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue 1 Zongpeng Li 23 1 Fudan University Shanghai, China 2 University of Calgary Alberta, Canada 3 Institute of Network Coding, Chinese University of Hong Kong,
More informationPerformance Analysis of Cell Switching Management Scheme in Wireless Packet Communications
Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical
More informationTeletraffic theory (for beginners)
Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles
More information1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based
1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationCross-Monotonic Multicast
Cross-Monotonic Multicast Zongpeng Li Department of Computer Science University of Calgary April 17, 2008 1 Multicast Multicast models one-to-many data dissemination in a computer network Example: live
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationSome Optimization Trade-offs in Wireless Network Coding
Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,
More informationMesh Networks
Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE
More informationBasic Switch Organization
NOC Routing 1 Basic Switch Organization 2 Basic Switch Organization Link Controller Used for coordinating the flow of messages across the physical link of two adjacent switches 3 Basic Switch Organization
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationThe Maximum Throughput of A Wireless Multi-Hop Path
The Maximum Throughput of A Wireless Multi-Hop Path Guoqiang Mao School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia Email: guoqiang@ee.usyd.edu.au Abstract In
More informationA Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks
A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Turgut, and Ladislau Bölöni Networking and Mobile Computing Research Laboratory (NetMoC) Department of Electrical
More informationRED behavior with different packet sizes
RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,
More informationA Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network
Clemson University TigerPrints All Theses Theses 8-2017 A Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network William Derek Johnson Clemson University Follow this and
More informationConnecting to the Network
Connecting to the Network Networking for Home and Small Businesses Chapter 3 1 Objectives Explain the concept of networking and the benefits of networks. Explain the concept of communication protocols.
More informationImproving Internet Performance through Traffic Managers
Improving Internet Performance through Traffic Managers Ibrahim Matta Computer Science Department Boston University Computer Science A Glimpse of Current Internet b b b b Alice c TCP b (Transmission Control
More informationDesign and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan
Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan
More informationOn the Maximum Throughput of A Single Chain Wireless Multi-Hop Path
On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia
More informationA Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks
A Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks Yi Shi Y. Thomas Hou The Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA Abstract Cognitive
More informationRandomization. Randomization used in many protocols We ll study examples:
Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous
More informationRandomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling
Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous
More informationChapter 4 Network Layer
Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Network Layer 4-1 Chapter 4: Network Layer Chapter
More informationSuccessive Interference Cancellation: A Back of the Envelope Perspective. Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi
Successive Interference Cancellation: A Back of the Envelope Perspective Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi Simple Case of Wireless Transmission T1 AP Decoding successful
More information! Network bandwidth shared by all users! Given routing, how to allocate bandwidth. " efficiency " fairness " stability. !
Motivation Network Congestion Control EL 933, Class10 Yong Liu 11/22/2005! Network bandwidth shared by all users! Given routing, how to allocate bandwidth efficiency fairness stability! Challenges distributed/selfish/uncooperative
More informationDynamic Index Coding for Wireless Broadcast Networks
PROC. IEEE INFOCOM 202 Dynamic Index Coding for Wireless Broadcast Networks Michael J. Neely, Arash Saber Tehrani, Zhen Zhang Abstract We consider a wireless broadcast station that transmits packets to
More informationCross-Layer Optimization for Wireless Networks with Multi-Receiver Diversity
Cross-Layer Optimization for Wireless Networks with Multi-Receiver Diversity 1 2 3 error broadcasting Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely/ Comm Theory Workshop,
More informationAn Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing
An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing Sudipta Sengupta Shravan Rayanchu,2 Suman Banerjee 2 Bell Laboratories, Lucent Technologies, Murray Hill,
More informationVaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India
Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR
More information554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE
554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY 2008 Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks Yalin Evren Sagduyu, Member, IEEE, and
More informationEffects of Optical Network Unit Placement Schemes for Multi-Channel Hybrid Wireless-Optical Broadband-Access Networks
Effects of Optical Network Unit Placement Schemes for Multi-Channel Hybrid Wireless-Optical Broadband-Access Networks Amitangshu Pal and Asis Nasipuri Electrical & Computer Engineering, The University
More informationFault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks
Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado
More informationCross-Layer Optimization for Efficient Delivery of Scalable Video over WiMAX Lung-Jen Wang 1, a *, Chiung-Yun Chang 2,b and Jen-Yi Huang 3,c
Applied Mechanics and Materials Submitted: 2016-06-28 ISSN: 1662-7482, Vol. 855, pp 171-177 Revised: 2016-08-13 doi:10.4028/www.scientific.net/amm.855.171 Accepted: 2016-08-23 2017 Trans Tech Publications,
More informationOn Benefits of Network Coding in Bidirected Networks and Hyper-networks
On Benefits of Network Coding in Bidirected Networks and Hyper-networks Zongpeng Li University of Calgary / INC, CUHK December 1 2011, at UNSW Joint work with: Xunrui Yin, Xin Wang, Jin Zhao, Xiangyang
More informationCHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)
92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)
More informationCooperative-Diversity Slotted ALOHA
Wireless Networks manuscript No. (will be inserted by the editor) Cooperative-Diversity Slotted ALOHA John M. Shea, Tan F. Wong, and Wing-Hin Wong Wireless Information Networking Group, University of Florida,
More informationUnderstanding the Impact of Interference on Collaborative Relays
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. XX, NO. X, MONTH 200X 1 Understanding the Impact of Interference on Collaborative Relays Yan Zhu, Student Member, IEEE and Haitao Zheng, Member, IEEE Abstract
More informationImproving VoD System Efficiency with Multicast and Caching
Improving VoD System Efficiency with Multicast and Caching Jack Yiu-bun Lee Department of Information Engineering The Chinese University of Hong Kong Contents 1. Introduction 2. Previous Works 3. UVoD
More informationCS 268: Computer Networking. Taking Advantage of Broadcast
CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic
More informationCongestion Avoidance
Congestion Avoidance Richard T. B. Ma School of Computing National University of Singapore CS 5229: Advanced Compute Networks References K. K. Ramakrishnan, Raj Jain, A Binary Feedback Scheme for Congestion
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationQos support and adaptive video
Qos support and adaptive video QoS support in ad hoc networks MAC layer techniques: 802.11 e - alternation of contention based and contention free periods; differentiated (per class) Interframe Spacing
More informationEfficient Universal Recovery in Broadcast Networks
Efficient Universal Recovery in Broadcast Networks Thomas Courtade and Rick Wesel UCLA September 30, 2010 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 1 / 19 System Model and Problem
More informationCS519: Computer Networks
Lets start at the beginning : Computer Networks Lecture 1: Jan 26, 2004 Intro to Computer Networking What is a for? To allow two or more endpoints to communicate What is a? Nodes connected by links Lets
More informationLecture (08, 09) Routing in Switched Networks
Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.
More informationDistributed Throughput Maximization in Wireless Mesh Networks via Pre-Partitioning
TO APPEAR IN IEEE/ACM TRANSACTIONS ON NETWORKING, 2008 1 Distributed Throughput Maximization in Wireless Mesh Networks via Pre-Partitioning Andrew Brzezinski, Gil Zussman Senior Member, IEEE, and Eytan
More informationOn the Role of Network Coding in Uncoordinated Multihop Content Distribution over Ad Hoc Networks
On the Role of Network Coding in Uncoordinated Multihop Content istribution over Ad Hoc Networks Mark Johnson 1, Minghua Chen 2, and Kannan Ramchandran 1 1 epartment of Electrical Engineering and Computer
More informationMaximizing the Number of Users in an Interactive Video-on-Demand System
IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 4, DECEMBER 2002 281 Maximizing the Number of Users in an Interactive Video-on-Demand System Spiridon Bakiras, Member, IEEE and Victor O. K. Li, Fellow,
More informationWireless Internet Routing. Learning from Deployments Link Metrics
Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data
More informationBalancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control
Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control Mung Chiang Electrical Engineering Department, Princeton University NRL/NATO Workshop
More informationCSE 3214: Computer Network Protocols and Applications Network Layer
CSE 314: Computer Network Protocols and Applications Network Layer Dr. Peter Lian, Professor Department of Computer Science and Engineering York University Email: peterlian@cse.yorku.ca Office: 101C Lassonde
More informationExploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
1 Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks Shan Chu, Student Member, IEEE, Xin Wang Member, IEEE, and Yuanyuan Yang Fellow, IEEE. Abstract With the popularity
More informationMaximization of Time-to-first-failure for Multicasting in Wireless Networks: Optimal Solution
Arindam K. Das, Mohamed El-Sharkawi, Robert J. Marks, Payman Arabshahi and Andrew Gray, "Maximization of Time-to-First-Failure for Multicasting in Wireless Networks : Optimal Solution", Military Communications
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationCSE3213 Computer Network I
CSE3213 Computer Network I Introduction Course page: http://www.cse.yorku.ca/course/3213 1 Course Contents 3 general areas: data communications, networking, and protocols 1. Data communications: basic
More informationUnit 2 Packet Switching Networks - II
Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source
More informationEE 122: Network Applications
Network EE 122: Network Applications Kevin Lai Aug 28, 2002 Network functionality is only useful if it benefits users - also applies to any computer system, but easier to forget in networking - e.g., Is
More informationOne More Bit Is Enough
One More Bit Is Enough Yong Xia, RPI Lakshmi Subramanian, UCB Ion Stoica, UCB Shiv Kalyanaraman, RPI SIGCOMM 05, Philadelphia, PA 08 / 23 / 2005 Motivation #1: TCP doesn t work well in high b/w or delay
More informationCoding vs. ARQ in Fading Channels: How reliable should the PHY be?
Coding vs. ARQ in Fading Channels: How reliable should the PHY be? Peng Wu and Nihar Jindal University of Minnesota Department of Electrical & Computer Engineering Introduction RC ayer ACK/NACK RC ayer
More informationA Dynamic TDMA Protocol Utilizing Channel Sense
International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2
More informationQueuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks
Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu
More informationMulticasting in ad hoc networks: Energy efficient
Multicasting in ad hoc networks: Energy efficient Blerta Bishaj Helsinki University of Technology 1. Introduction...2 2. Sources of power consumption... 3 3. Directional antennas... 3 4. TCP... 3 5. Energy-efficient
More informationCERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research
CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West
More informationA CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3
A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3 1,2,3 Department of Computer Science Engineering Jaypee Institute
More informationInternetworking Part 1
CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More informationTMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks
: A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer
More information