Research topic: Multimedia Communication over Wireless Mesh Networks
|
|
- Megan Edwards
- 5 years ago
- Views:
Transcription
1 Research topic: Multimedia Communication over Wireless Mesh Networks Marcel Castro
2 Education background Bachelor in Electrical Eng. - Federal University of Goias, Goiânia, Brazil 2000 Master or Science in Electrical Eng. State University of Campinas (UNICAMP), Campinas, Brazil PhD in Computer Science Karlstad University (KAU), Karlstad, Sweden - present
3 Introduction Wireless Mesh Networks Usage Scenarios Challenges Outline Current Work and Contributions VoIP over hybrid MANETs Routing Metrics Evaluation Multimedia Communication over P2P in WMNs Future Work
4 Introduction Wireless Mesh Networks Usage Scenarios Challenges Outline Current Work and Contributions VoIP over hybrid MANETs Routing Metrics Evaluation Multimedia Communication over P2P in WMNs Future Work
5 Wireless Mesh Networks Node Types Wireless routers Gateways Link Types Intra-mesh wireless links Stationary client access Printers, servers Mobile client access Mobile clients Stationary clients Internet access links
6 Residential/Home Networks Usage Scenarios Office Campus/Community/Public Access Router/GW
7 Mesh Networks: Challenges Transmission Range Directional Antenna or MIMO Multiple Frequencies Multi-radio interfaces Multihop Routing Route Selection with multiple radios Multiple paths Routing to/from gateway Security, Privacy Malicious Users Admission Control Self Management Minimal human intervention avoid network operator Smart Spectrum Utilization Capacity Mobility Use of non-interference channels Header Compression Aggregation of traffic Priorization Multihop Handover Mobile Gateways Service Scalability Quality of Service Real-time applications Gateway 1 Internet Internet Gateway 2
8 Introduction Wireless Mesh Networks Usage Scenarios Challenges Outline Current Work and Contributions VoIP over hybrid MANETs Routing Metrics Evaluation Multimedia Communication over P2P in WMNs Future Work
9 Voice over IP VoIP over Hybrid MANETs Very hot topic in 3G Uses packetized voice over RTP/UDP/IP High overhead for small voice packets when used over standard Signalling via SIP involves 2 centralized entities: Registrar and Proxy User A e.g. GPRS/UMTS/WLAN User B Mobile Communication Devices Telecom Network Public Internet Wireless Access Networks Mobile PDAs Wireless Sensors Laptops Internet Connectivity Internet Connectivity Mobile Ad Hoc Network
10 Motivation and Characteristics Key Issue: How to provide VoIP services? Potential performance degradation Self Interference due to forwarding Routing required Call Setup Delay: below 5 sec for user satisfaction and interworking with ISDN: Possible Solutions Analyzed* Standard Approach Proxy located at Gateway Distributed SIP SIP signaling delay, network dependent SIP processing delay, proxy dependent Amount of signaling traffic SIP and Service Discovery Peer-to-Peer SIP Media * * M.C. Castro, A.J. Kassler, SIP based Service Provisioning for hybrid MANETs. IWT2007, Brazil, Feb AR1 AR2 INVITE,.. Internet AR3 SIP Request/Response RTP Media Samples Link Connectivity Proxy/ Registrar
11 Standard Approach - Simulation A brief insight through ns-2 simulation: Hybrid MANETs, MNs in grid, Different voice background traffic: ITU G729: 8Kbps, 20ms Bidirectional Exponential traffic talk/silence: 350ms/650ms Distance btw source/destination: 2-7 hops Out-In: 25%-75% SIP INVITE TA SIP Request payload: 500 bytes SIP Response payload: 300bytes Performance in terms of: SIP Call setup delay: Time btw SIP INVITE and 200 OK SIP Call Blocking Probability SIP msg loss IEEE g Data Rate = 24Mbps Link speed of 5Mbps / 2ms AODV-UU Hello Interval: 1s Routing towards Gateway using tunneling Carrier Sence = 500m Received Threshold = 250m Node space in grid = 200m TwoRayGround: Frequency: 2.4GHz Transmission Power = 100mW Tx/Rx Antenna height = 1,5m Tx/Rx Antenna gain = 1dB Sesitivity = -85dBm
12 Standard Approach - Simulation *ITU-T E.721, Network grade of service parameters and target values for circuit-switched services in the evolving isdn, May hops 1 gatew ay 0,9 5 hops 1 gatew ay 2 hops 1 gatew ay 0,8 Call blocking probability (<5sec) 0,7 0,6 0,5 0,4 0,3 0,2 Call Setup Delay (s) Blocking Probability SIP msg. drops Number of SIP INVITE messages Re-invitations due to SIP timeout - 2 hops Re-invitations due to SIP msg dropped - 2 hops 0,1 0 Alternative Approaches Desired Re-invitations due to SIP timeout - 5 hops Re-invitations due to SIP msg dropped - 5 hops Number of background flows Number of background flows
13 Proxy located at Gateway Gateway acts as SIP proxy/registrar on behalf of MANET nodes MANET nodes need to have information about the proxy Static configuration, or Autoconfiguration: Extension of GW discovery mechanism to inform MN about Gateway SIP Capability. Media AR1 AR2 INVITE,.. Proxy/ Registrar Internet Proxy/ Registrar SIP Request/Response RTP Media Samples Link Connectivity AR3 * M.C. Castro, A.J. Kassler A.J., Challenges of SIP in Internet Connected MANETs, Proc. of Int. Symposium of Wireless Pervasive Computing, Puerto Rico, February 2007.
14 Proxy located at Gateway Call Setup Delay where Proxy at AN/GW Call Setup Delay versus number of hops PLR versus number of hops
15 Introduction Wireless Mesh Networks Usage Scenarios Challenges Outline Current Work and Contributions VoIP over hybrid MANETs Routing Metrics Evaluation Multimedia Communication over P2P in WMNs Future Work
16 Routing Metrics in WMNs Related Work: QoS related approach: Calculate spare bandwidth Perform admission control on new flow [Chen & Heinzelman, JSAC05] Best-effort approach: Various routing metrics
17 Routing Metrics in WMNs Routing Metric should count: Path Length Link Capacity Packet Loss Ratio Interference: Inter-flow interference: Intra-flow interference:
18 Routing Metrics in WMNs ETX Expected Transmission Count [De Couto et al., MobiCom03] WCETT Weight Cumulative ETT [Draves et al., MobiCom04] MIC Metric of Interference and Channel Switching [Yang et al., WiMesh05]
19 Why new metrics? Metric needs to incorporate existing traffic and selftraffic: Self-traffic
20 How to do it? Use MAC timers [Saha, PhD thesis, Rice Univ., 07] Carrier sense and hidden terminal information [Yin et al., JWCMC06]
21 Where to use it? Packet Aggregation M A C IP U D P R T P AUDIO M A C IP U D P R T P AUDIO M A C DATA D T IP U P R P AUDIO DIFS Backoff SIFS ACK DIFS Backoff SIFS ACK DIFS Backoff SIFS ACK t M A C IP AH IP U D P R T P AUDIO IP U DATA D P R T P AUDIO IP U D P R T P AUDIO DIFS Backoff SIFS ACK t Traffic aware routing saved transmission time
22 Introduction Wireless Mesh Networks Usage Scenarios Challenges Outline Current Work and Contributions VoIP over hybrid MANETs Routing Metrics Evaluation Multimedia Communication over P2P in WMNs Future Work
23 P2P in WMNs Advantages of P2P over centralized infrastructure: Significant autonomy from central servers Exploits resources at the edges of the Internet storage and content CPU cycles Resources at edge have intermittent connectivity, being added & removed Classification: Unstructured P2P file sharing: Napster, Gnutella, KaZaA, search theory, flashfloods Structured DHT systems: Chord, CAN, Pastry, Tapestry, Bamboo, etc
24 Broad definition P2P file sharing Napster, Gnutella, KaZaA, etc P2P communication Instant messaging P2P computation DHTs & their apps Chord, CAN, Pastry, Tapestry P2P apps built over emerging overlays PlanetLab
25 Peer-to-Peer SIP INVITE REGISTER => Contact: columbia.edu Client-server maintenance, configuration, controlled infrastructure Alice s host INVITE alice P2P overlay REGISTER Alice No central server, but potentially higher search latency Cross-layer Cross-layer design: design: -Interaction -Interaction between between P2P P2P Protocols Protocols (DHT (DHT maintenance) maintenance) and and SIP SIP -All -All SIP SIP users users participate participate in in the the P2P P2P overlay overlay
26 Peer-to-Peer SIP cont. P2P SIP Functions Lookup: Find a node that is responsible for given ID through INVITE Node answers 200OK if responsible, otherwise 302 moved temporarily Join the P2P overlay Send REGISTER to Bootstrap node with nodeid, build up finger table Leave the P2P Leaving node stores ressources at predecessor Distributed hash table (DHT) Manage SIP user location Node-ID 683 = hash(bob@kau.se) Overlay maintanance P2P protocol, e.g: OpenDHT, or SIP REGISTER may transport DHT Internet connected MANET Hierarchy of P2P SIP network GW must act as P2P SIP proxy/registrar Bob s Node Node-ID 683 Node C Node-ID INVITE INVITE Alice s Node Node-ID 503 Node A Node-ID Bob s Node Node B Node-ID 24 Alice trying to contact Bob
27 P2P SIP with DHT in hybrid MANET Problems Which protocol is used to maintain P2P SIP Overlay? Reuse SIP REGISTER for maintaining overlay structure Use OpenDHT for register and SIP for INVITE TA Performance of DHT in MANET under mobility and high churn rate? Interworking with external networks: Need P2PSIP node to act as gateway to external networks How P2PSIP finds those gateways? How to contact external nodes? Cross register OR Locate user during call setup DNS GW or Bootstrap nodes represent the domain P2P SIP Hierarchy GW reachable from global and local P2P SIP Network
28 Current Status VoIP over Hybrid MANETs Four proposals described Scalability versus number of hops, gateways, and different number of traffics. Simulation in NS-2: SIP + AODV-UU
29 Introduction Wireless Mesh Networks Usage Scenarios Challenges Outline Current Work and Contributions VoIP over hybrid MANETs Routing Metrics Evaluation Multimedia Communication over P2P in WMNs Future Work
30 Future Plans VoIP over Hybrid MANETs Evaluate SIP over P2P in simulation and testbed (using Linksys WRT54GL) Packet Aggregation Design of optimal Aggregation Technique using Traffic-aware Routing Metric Evaluation of packet aggregation over testbed P2P Systems in WMNs Cross-layer adaptation (physical location, link condition, ) Support of Quality of Service (Admission control, class of service, )
31 Thank you! Marcel C. Castro
32 Backup Slides
33 Node Joining Extended SIP Msg Joining Node Node-ID REGISTER 302 Node B Bootstrap Node Node-ID REGISTER 3. REGISTER 302 Node C Node B Node-ID 245 Key = Hash( ) = Node-ID OK Node C Node-ID 520 Iterative search increases reliability 4. Joining node after join Node-ID 503 REGISTER sip: SIP/2.0 To: <sip:503@ ;user=node> From: <sip:503@ ;user=node> Contact: <sip:503@ ;user=node> Expires: 600 DHT-NodeID: <sip:503@ ;user=node>;algorithm= sha1;overlay=chat; expires=600 Require: dht Supported: dht
34 User Registration Extended SIP Msg Alice s Node Node-ID 503 Node A Node-ID 023 Key = Hash(alice@example.com)= Alice -> REGISTER 302 Node B 2. REGISTER 200 OK Node B Node-ID 245 Alice-> Alice s Node Node C Node-ID 520 User s node must register in DHT SIP REGISTER used for nodes and users Alice s Node Node-ID 503 REGISTER sip: SIP/2.0 To: <sip:alice@example.com; resourceid=234> From: <sip:alice@example.com; resourceid=234> Contact: <sip:alice@ > Expires: 600 DHT-NodeID: <sip:503@ ;user=node>;algorithm=sha1;o verlay=chat; expires=1200 Require: dht Supported: dht
35 Contacting a User Extended SIP Msg Bob s Node Node-ID INVITE Node A Node-ID 023 Bob-> Bob s Node 302 Bob s Node Alice -> 234 Bob -> 723 Node C Node-ID 520 DHT used for initial location 2. INVITE Alice s Node Node-ID 503 Node B Node-ID 245 Alice-> Alice s Node REGISTER sip: SIP/2.0 To: <sip:bob@example.com;resourceid=723> From: <sip:alice@example.com; resourceid=234> DHT-NodeID: <sip:503@ ;user=node>;algorithm=sha1;o verlay=chat; expires=800 Require: dht Supported: dht
36 Session Establishment Bob s Node Node-ID 683 Node A Node-ID 023 Bob-> Bob s Node Alice -> 234 Bob -> 723 Node C Node-ID 520 Node B Node-ID 245 Alice-> Alice s Node Standard SIP used for connection No reliance on DHT Alice s Node Node-ID 503
RELOAD P2P Overlay Access Protocol. Younghan Kim Soongsil University
RELOAD P2P Overlay Access Protocol Younghan Kim Soongsil University Contents Introduction What is P2P? Why P2P-SIP? P2PSIP overlay network Architecture Operations RELOAD protocol Introduction Protocol
More informationOptimizing SIP Service Provisioning in Internet Connected MANETs
Optimizing SIP Service Provisioning in Internet Connected MANETs Marcel C. Castro and Andreas J. Kassler Computer Science Department Karlstad University Universitetgatan 2, Karlstad, Sweden Email: (Marcel.Cavalcanti
More informationCS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications
Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges
More informationPreface Preliminaries. Introduction to VoIP Networks. Public Switched Telephone Network (PSTN) Switching Routing Connection hierarchy Telephone
VoIP quality and performance issues Delay Jitter Packet loss Echo and talk overlap Approaches to maintaining VoIP quality Network-level QoS VoIP codecs VoIP applications and services Fax Emergency numbers
More informationPeer-to-Peer Internet Applications: A Review
Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation
More informationMaking Gnutella-like P2P Systems Scalable
Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems
More informationP2PSIP, ICE, and RTCWeb
P2PSIP, ICE, and RTCWeb T-110.5150 Applications and Services in Internet October 11 th, 2011 Jouni Mäenpää NomadicLab, Ericsson Research AGENDA Peer-to-Peer SIP (P2PSIP) Interactive Connectivity Establishment
More informationOutline Overview Multimedia Applications Signaling Protocols (SIP/SDP, SAP, H.323, MGCP) Streaming Protocols (RTP, RTSP, HTTP, etc.) QoS (RSVP, Diff-S
Internet Multimedia Architecture Outline Overview Multimedia Applications Signaling Protocols (SIP/SDP, SAP, H.323, MGCP) Streaming Protocols (RTP, RTSP, HTTP, etc.) QoS (RSVP, Diff-Serv, IntServ) Conclusions
More informationOverview of the Session Initiation Protocol
CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction
More informationOverlay Networks in ScaleNet
Overlay Networks in ScaleNet Dipl-Inform. Ingmar Baumgart Prof. Dr. Martina Zitterbart VDE ITG 5.2.1 Fachgruppentreffen, Ericsson, Aachen, 5.5.06, The ScaleNet Project : Scalable, efficient and flexible
More informationArchitecture and Evaluation of an Unplanned b Mesh Network
Architecture and Evaluation of an Unplanned 802.11b Mesh Network John Bicket, Daniel Aguayo, Sanjit Biswas, and Robert Morris MIT CSAIL (MobiCom 05) slides by Jong-Kwon Lee, presented by Fallon Chen May
More informationOverlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network
More informationTSIN02 - Internetworking
Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node
More informationAd Hoc Networks: Introduction
Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2
More informationMedia Communications Internet Telephony and Teleconference
Lesson 13 Media Communications Internet Telephony and Teleconference Scenario and Issue of IP Telephony Scenario and Issue of IP Teleconference ITU and IETF Standards for IP Telephony/conf. H.323 Standard
More informationImplementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network
ENSC 85: High-Performance Networks Spring 2008 Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network Chih-Hao Howard Chang howardc@sfu.ca Final Project Presentation School of Engineering
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationVoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP System Gatekeeper: A gatekeeper is useful for handling VoIP call connections includes managing terminals, gateways and MCU's (multipoint
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationA Measurement Study of Multiplicative Overhead Effects in Wireless Networks
A Measurement Study of Multiplicative Overhead Effects in Wireless Joseph Camp, Vincenzo Mancuso, Omer Gurewitz, and Edward W. Knightly INFOCOM 2008 http://networks.rice.edu System: Large-scale, Multi-tier
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationVoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.
VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationOn the Scalability of Hierarchical Ad Hoc Wireless Networks
On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical
More informationLatest Peer-to-Peer Technologies II Artjom Lind 1
Latest Peer-to-Peer Technologies II 25.11.2009 Artjom Lind 1 Outline Last presentation Intro Peer-to-Peer SIP TCP Traversal Conclusions 25.11.2009 Artjom Lind 2 Last Presentation P2P Systems Structured
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general principles and architectures how to put
More informationDelivering Voice over IEEE WLAN Networks
Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationExpected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network
Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area
More informationTelematics Chapter 9: Peer-to-Peer Networks
Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session
More informationMobile Communications. Ad-hoc and Mesh Networks
Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between
More informationHandling Churn in a DHT
Handling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz UC Berkeley and Intel Research Berkeley What s a DHT? Distributed Hash Table Peer-to-peer algorithm to offering put/get
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationOutline. QoS routing in ad-hoc networks. Real-time traffic support. Classification of QoS approaches. QoS design choices
Outline QoS routing in ad-hoc networks QoS in ad-hoc networks Classifiction of QoS approaches Instantiation in IEEE 802.11 The MAC protocol (recap) DCF, PCF and QoS support IEEE 802.11e: EDCF, HCF Streaming
More informationVoice over IP (VoIP)
Voice over IP (VoIP) David Wang, Ph.D. UT Arlington 1 Purposes of this Lecture To present an overview of Voice over IP To use VoIP as an example To review what we have learned so far To use what we have
More informationWireless Mesh Networks
Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationLecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011
Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared
More informationOverview. Slide. Special Module on Media Processing and Communication
Overview Review of last class Protocol stack for multimedia services Real-time transport protocol (RTP) RTP control protocol (RTCP) Real-time streaming protocol (RTSP) SIP Special Module on Media Processing
More informationP2PNS: A Secure Distributed Name Service for P2PSIP
P2PNS: A Secure Distributed Name Service for P2PSIP Mobile P2P 2008, Hong Kong, China Outline Decentralized VoIP (P2PSIP) Peer-to-Peer name service (P2PNS) Architecture Two-stage name resolution P2PNS
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Having looked at the individual nodes in the previous chapter,
More informationCSC8223 Wireless Sensor Networks. Chapter 3 Network Architecture
CSC8223 Wireless Sensor Networks Chapter 3 Network Architecture Goals of this chapter General principles and architectures: how to put the nodes together to form a meaningful network Design approaches:
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl, Andreas Willig, "Protocols and Architectures for Wireless Sensor Networks," Wiley 2005 Goals of this chapter Having looked at the
More informationA Novel Software-Based H.323 Gateway with
A Novel Software-Based H.323 Gateway with Proxy-TC for VoIP Systems Presenter : Wei-Sheng Yin Advisor : Dr. Po-Ning Chen Institute of Communications Engineering National Chiao Tung University Agenda Introduction
More informationExtensions to Session Initiation Protocol (SIP) and Peer-to-Peer SIP
Extensions to Session Initiation Protocol (SIP) and Peer-to-Peer SIP T-110.7100 Applications and Services in Internet 1.10.2008 Jouni Mäenpää NomadicLab, Ericsson Contents Extending SIP SIP extension negotiation
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationThe Effects of Asymmetry on TCP Performance
The Effects of Asymmetry on TCP Performance Hari Balakrishnan Venkata N. Padmanabhan Randy H. Katz University of California at Berkeley Daedalus/BARWAN Retreat June 1997 Outline Overview Bandwidth asymmetry
More informationA Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets
A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore
More informationUnit 8 Peer-to-Peer Networking
Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System
More informationAdvanced Network Design
Advanced Network Design Organization Whoami, Book, Wikipedia www.cs.uchicago.edu/~nugent/cspp54015 Grading Homework/project: 60% Midterm: 15% Final: 20% Class participation: 5% Interdisciplinary Course
More informationOverview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).
This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,
More informationIEEE s ESS Mesh Networking
IEEE 802.11s ESS Mesh Networking Prof. Young-Bae Ko (youngko@ajou.ac.kr) Ubiquitous Networked Systems (UbiNeS) Lab (http://uns.ajou.ac.kr) KRnet 2006 Contents Introduction - Wireless Mesh Networks IEEE
More informationJunseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea
Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea http://usn.konkuk.ac.kr/~jskim 1 IEEE 802.x Standards 802.11 for Wireless Local Area Network 802.11 legacy clarified 802.11 legacy
More informationInternet Technology 3/2/2016
Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationOpportunistic Application Flows in Sensor-based Pervasive Environments
Opportunistic Application Flows in Sensor-based Pervasive Environments Nanyan Jiang, Cristina Schmidt, Vincent Matossian, and Manish Parashar ICPS 2004 1 Outline Introduction to pervasive sensor-based
More informationGENI Experimental Infrastructure Wireless & Sensor Networks Aug 8, 2005
GENI Experimental Infrastructure Wireless & Sensor Networks Aug 8, 2005 Rutgers, The State University of New Jersey D. Raychaudhuri ray@winlab.rutgers.edu www.winlab.rutgers.edu 1 GENI Wireless Network
More informationAn Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols in MP2P Networks
2015 Fifth International Conference on Advanced Computing & Communication Technologies An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols
More informationMultimedia Networking
Multimedia Networking Victor Gau Information Processing Lab. 2008/03/07 Outline Introduction Network Basics Quality of Service Applications VoIP IPTV Telematics Multimedia Multimedia (Lat. Multum + Medium)
More informationAd-hoc and Infrastructured Networks Interconnection
tel. 22 209 4000 fax 22 209 4050 e-mail www@inescporto.pt internet Ad-hoc and Infrastructured Networks Interconnection Tânia Pinto Calçada and Manuel Ricardo RTCM Aveiro 18th February 2005 INESC Porto
More informationReal-Time Control Protocol (RTCP)
Real-Time Control Protocol (RTCP) works in conjunction with RTP each participant in RTP session periodically sends RTCP control packets to all other participants each RTCP packet contains sender and/or
More informationWireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO
Wireless Sensor Architecture 1 GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO FORM A MEANINGFUL NETWORK Mobile ad hoc networks Nodes talking to each other Nodes talking to some
More informationSynthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE)
Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Problem Definition Solution Approach Benefits to End User Talk Overview Metrics Summary of Results to Date Lessons Learned & Future Work
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More information1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12.
Lecture Slides 1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12. Additional Topics 1.1. Basic Operations
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationPeer-to-Peer Systems. Chapter General Characteristics
Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include
More informationT Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.
T-0.50 Computer Networks II Mobility Issues 6.0.008 Overview Mobile IP NEMO Transport layer solutions i SIP mobility Contents Prof. Sasu Tarkoma Mobility What happens when network endpoints start to move?
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl Computer Networks Group Universität Paderborn Computer Networks Group Universität Paderborn Outline Design principles (skipped) Basic
More informationPeerfactSim.KOM: A Simulation Framework for Peer-to-Peer Systems
PeerfactSim.KOM: A Simulation Framework for Peer-to-Peer Systems The 2011 International Conference on High Performance Computing & Simulation July 4 8, 2011, Istanbul, Turkey Dominik Stingl Christian Gross
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationAnalysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group
More informationH.323. Definition. Overview. Topics
H.323 Definition H.323 is a standard that specifies the components, protocols and procedures that provide multimedia communication services real-time audio, video, and data communications over packet networks,
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationTech-invite. RFC 3261's SIP Examples. biloxi.com Registrar. Bob's SIP phone
Tech-invite http://www.tech-invite.com RFC 3261's SIP Examples V2.2 November 22, 2005 Registrar Bob's SIP INVITE 100 Trying Proxy INVITE 100 Trying Proxy 200 OK INVITE REGISTER This is a representation,
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationSupporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)
Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:
More informationMotivation for peer-to-peer
Peer-to-peer systems INF 5040 autumn 2015 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Ø Inherent restrictions of the standard client/ server model
More informationEECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations
EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley
More informationImprovement of AODV Routing Protocol with QoS Support in Wireless Mesh Networks
Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 1133 1140 2012 International Conference on Solid State Devices and Materials Science Improvement of AODV Routing Protocol with QoS
More informationEfficient Routing for Wireless Mesh Networks Using a Backup Path
University of New Haven Digital Commons @ New Haven Electrical & Computer Engineering and Computer Science Faculty Publications Electrical & Computer Engineering and Computer Science 12-2013 Efficient
More informationNew Signaling approach Improving the VoIP Quality of Service in Ad hoc Network
New Signaling approach Improving the VoIP Quality of Service in Ad hoc Network Salma Rattal EEA&TI Laboratory Faculty of sciences and techniques Hassan 2nd University Mohammedia-Casablanca Morocco Abdelmajid
More informationPeer-to-Peer Architectures and Signaling. Agenda
Peer-to-Peer Architectures and Signaling Juuso Lehtinen Juuso@netlab.hut.fi Slides based on presentation by Marcin Matuszewski in 2005 Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction
More informationENG Advanced Mobile Networks: QoS, QoE & Technical Aspects
ENG-514 - Advanced Mobile Networks: QoS, QoE & Technical Aspects Description The increasing uptake of Internet of Things (IoT), Big data and cloud-based services introduces a new set of requirements for
More information4G Wireless Systems. Outlines. Data Rates of Wireless Networks. Wireless Networks. Wireless Networks Throughput versus Range
Outlines 4G Wireless Systems Vijay K. Garg, Ph.D., P.E. Department of Electrical & Computer Engineering, College of Engineering, University of Illinois at Chicago e-mail: garg.v@comcast.net Types of wireless
More informationAdaptive Aggregation of Voice over IP in Wireless Mesh Networks
Computer Science Peter Dely Adaptive Aggregation of Voice over IP in Wireless Mesh Networks Master s Project D2007:08 Adaptive Aggregation of Voice over IP in Wireless Mesh Networks Peter Dely 2007 The
More informationPRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS
PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.
More informationWide Open Spaces or Mostly Wireless, Most of the Time
Wide Open Spaces or Mostly Wireless, Most of the Time Jerry D. Gibson University of California, Santa Barbara Supported by NSF under Grant Nos. CCF-0429884 and CNS-0435527, the California Micro Program,
More informationOverview of Mobile Networking Initiatives at WINLAB
Overview of Mobile Networking Initiatives at WINLAB Introduction: The Next Generation MSC Custom Mobile Infrastructure (e.g. GSM, 3G) BTS Public Switched Network (PSTN) BSC GGSN, etc. WLAN Access Point
More informationDepartment of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005
Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 There are 10 questions in total. Please write your SID
More informationOverlay networks. Today. l Overlays networks l P2P evolution l Pastry as a routing overlay example
Overlay networks Today l Overlays networks l P2P evolution l Pastry as a routing overlay eample Network virtualization and overlays " Different applications with a range of demands/needs network virtualization
More informationOverlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q
Overlay networks To do q q q Overlay networks P2P evolution DHTs in general, Chord and Kademlia Turtles all the way down Overlay networks virtual networks Different applications with a wide range of needs
More informationMBC. Auto. Address. Networks. Mesh. uto- configuration for Wireless. Keecheon Kim. Konkuk University Seoul, Korea
Address Auto uto- configuration for Wireless Mesh Networks Keecheon Kim Konkuk University Seoul, Korea kckim@konkuk.ac.kr Contents Wireless Mesh Networks Auto- configuration Topics In Autoconf WG Proposed
More informationFiber-Wireless (FiWi) Access Networks
Fiber-Wireless (FiWi) Access Networks Eiman Alotaibi Department of Computer Science University of California, Davis Reference: N. Ghazisaidi, M. Martin, and C. Assi, Fiber-Wireless (FiWi) Access Networks:
More information