Network Layer: Non-Traditional Wireless Routing Localization Intro
|
|
- Tyrone Knight
- 5 years ago
- Views:
Transcription
1 Network Layer: Non-Traditional Wireless Routing Localization Intro Y. Richard Yang 12/4/2012
2 Outline Admin. and recap Network layer Intro Location/service discovery Routing Traditional routing Non-traditional routing Localization Intro 2
3 Admin. Projects please use Sign Up on classesv2 for project meetings project code/<6-page report due Dec. 12 final presentation date? First finish a basic version, and then stress/ extend your design 3
4 Recap: Routing So far, all routing protocols are in the framework of traditional wireline routing a graph representation of underlying network point-to-point graph, edges with costs select a best (lowest-cost) route for a src-dst pair 4
5 Traditional Routing Q: which route? 5
6 Inefficiency of Traditional Routing In traditional routing, packets received off the chosen path are useless Q: what is the probability that at least one of the intermediate nodes will receive from src? 6
7 Inefficiency of Traditional Routing In traditional routing, packets received off the chosen path are useless 7
8 Motivating Scenario Src A sends packet 1 to dst B; src B sends packet 3 to dst A A R B Traditional routing needs to transmit 4 packets Motivating question: can we do better, i.e., serve multiple src-dst pairs? 8
9 Outline Admin. and recap Network layer Intro Location/service discovery Routing Traditional routing Non-traditional routing Motivation Opportunistic routing: parallel computing for one srcdst pair 9
10 Key Issue in Opportunistic Routing Key Issue: opportunistic forwarding may lead to duplicates. 10
11 Extreme Opportunistic Routing (ExOR) [2005] Basic idea: avoid duplicates by scheduling Instead of choosing a fix sequential path (e.g., src->b->d->dst), the source chooses a list of forwarders (a forwarder list in the packets) using ETX-like metric a background process collects ETX information via periodic link-state flooding Forwarders are prioritized by ETX-like metric to the destination 11
12 ExOR: Forwarding Group packets into batches The highest priority forwarder transmits when the batch ends The remaining forwarders transmit in prioritized order each forwarder forwards packets it receives yet not received by higher priority forwarders status collected by batch map 12
13 Batch Map Batch map indicates, for each packet in a batch, the highest-priority node known to have received a copy of that packet 13
14 ExOR: Example N2 N0 N3 N1 14
15 ExOR: Stopping Rule A nodes stops sending the remaining packets in the batch if its batch map indicates over 90% of this batch has been received by higher priority nodes the remaining packets transferred with traditional routing 15
16 Evaluations 65 Node pairs 1.0MByte file transfer 1 Mbit/s bit rate 1 KByte packets EXOR bacth size kilometer 16
17 Evaluation: 2x Overall Improvement Cumulative Fraction of Node Pairs ExOR Traditional Throughput (Kbits/sec) Median throughputs: 240 Kbits/sec for ExOR, 121 Kbits/sec for Traditional 17
18 OR uses links in parallel Traditional Routing 3 forwarders 4 links ExOR 7 forwarders 18 links 18
19 OR moves packets farther 58% of Traditional Routing transmissions Fraction of Transmissions ExOR Traditional Routing Distance (meters) 25% of ExOR transmissions ExOR average: 422 meters/transmission Traditional Routing average: 205 meters/tx 19
20 Comments: ExOR Pros takes advantage of link diversity (the probabilistic reception) to increase the throughput does not require changes in the MAC layer can cope well with unreliable wireless medium Cons scheduling is hard to scale in large networks overhead in packet header (batch info) batches increase delay 20
21 Outline Admin. and recap Network layer Intro Location/service discovery Routing Traditional routing Non-traditional routing Motivation Opportunistic routing: parallel computing for one srcdst pair» ExOR» MORE 21
22 MORE: MAC-independent Opportunistic Routing & Encoding [2007] Basic idea: Replace node coordination with network coding Trading structured scheduler for random packets combination 22
23 Basic Idea: Source Chooses a list of forwarders (e.g., using ETX) Breaks up file into K packets (p1, p2,, pk) Generate random packets p ' j = c p ji i MORE header includes the code vector [c j1, c j2, c jk ] for coded packet p j 23
24 Basic Idea: Source 24
25 Basic Idea: Forwarder Check if in the list of forwarders Check if linearly independent of new packet with existing packet Re-coding and forward 25
26 Basic Idea: Destination Decode Send ACK back to src if success 26
27 Key Practical Question: How many packets does a forwarder send? Compute zi: the expected number of times that forwarder i should forward each packet 27
28 Єij: loss probability of the link between i and j Computes z s Compute z s so that at least one forwarder that is closer to destination is expected to have received the packet : zs = 1 (1 ε j sj ) 28
29 Compute z j for forwarder j Only need to forward packets that are received by j sent by forwarders who are further from destination not received by any forwarder who is closer to destination #such pkts: Lj = i isfurther [z i (1 ε ij ) k closer tod ε ik ] 29
30 Compute z j for forwarder j Lj = i isfurther [z i (1 ε ij ) k closer tod ε ik ] To guarantee at least one forwarder closer to d receives the packet z j = (1 k L j closer to d ε jk ) 30
31 Evaluations 20 nodes distributed in a indoor building Path between nodes are 1 ~ 5 hops in length Loss rate is 0% ~ 60%; average 27% 31
32 Throughput 32
33 Improve on MORE? 33
34 Mesh Networks API So Far Network Forward correct packets to destination PHY/LL Deliver correct packets
35 Motivation 10-3 BER R1 S D 10-3 BER R2 570 bytes; 1 bit in 1000 incorrect à Packet loss of 99%
36 Opportunis?c Rou?ng à 50 transmissions Implication S 99% (10-3 BER) 99% (10-3 BER) ExOR MORE R1 Loss Loss R2 D
37 Outline Admin. and recap Network layer Intro Location/service discovery Routing Traditional routing Non-traditional routing Motivation Opportunistic routing: parallel computing for one srcdst pair» ExOR [2005]» MORE [2007]» MIXIT [2008] 37
38 New API PHY + LL Deliver correct symbols to higher layer Network Forward correct symbols to destination
39 What Should Each Router Forward? S P1 P2 R1 P1 P2 R2 P1 P2 D
40 What Should Each Router Forward? S P1 P2 R1 P1 P2 R2 P1 P2 D 1) Forward everything à Inefficient 2) Coordinate à Unscalable
41 Symbol Level Network Coding S P1 P2 R1 P1 P2 R2 P1 P2 D Forward random combinations of correct symbols
42 Symbol Level Network Coding R1 2s 1 + 7s s 1 s 2 R2 D 5s 1 + 9s s 1 s 2 Routers create random combinations of correct symbols
43 Symbol Level Network Coding R1 2s 1 + 7s 2 D 5s 1 + 9s 2 R2 Solve 2 equa?ons s1, s 2 Destination decodes by solving linear equations
44 Symbol Level Network Coding R1 2s 1 + 7s s 1 s 2 R2 D 5s 1 5 s 1 0 s 2 Routers create random combinations of correct symbols
45 Symbol Level Network Coding R1 2s 1 + 7s 2 D 5s 1 R2 Solve 2 equa?ons s1, s 2 Destination decodes by solving linear equations
46 Destination needs to know which combinations it received 5 Use run length encoding Original Packets Coded Packet
47 Destination needs to know which combinations it received Use run length encoding 0 9 Original Packets Coded Packet
48 Destination needs to know which combinations it received Use run length encoding 5 9 Original Packets Coded Packet
49 Destination needs to know which combinations it received Use run length encoding 5 0 Original Packets Coded Packet
50 Destination needs to know which combinations it received Use run length encoding
51 Symbol-level Network Coding Forward random combinations of correct symbols R1 5 9 Original Packets Coded Packet
52 Symbol-level Network Coding Forward random combinations of correct symbols R1 0 9 Original Packets Coded Packet
53 Symbol-level Network Coding Forward random combinations of correct symbols R1 5 9 Original Packets Coded Packet
54 Symbol-level Network Coding Forward random combinations of correct symbols R1 5 0 Original Packets Coded Packet
55 Evaluation Implementa9on on GNURadio SDR and USRP Zigbee (IEEE ) link layer 25 node indoor testbed, random flows Compared to: 1. Shortest path rou9ng based on ETX 2. MORE: Packet- level opportunis9c rou9ng
56 Throughput Comparison CDF x 2.1x MIXIT MORE Shortest Path Throughput (Kbps)
57 Outline Admin. and recap Network layer Intro Location/service discovery Routing Traditional routing Non-traditional routing Motivation Opportunistic routing: parallel computing for one srcdst pair Opportunistic routing: parallel computing for multiple src-dst pairs 57
58 Motivating Scenario A sends pkt 1 to dst B B sends pkt 3 to dst A A R B 58
59 Opportunistic Coding: Basic Idea Each node looks at the packets available in its buffer, and those its neighbors buffers It selects a set of packets, computes the XOR of the selected packets, and broadcasts the XOR 59
60 Opportunistic Coding: Example 60
61 Wireless Networking: Summary send receive info info/control status - The ability to communicate is a foundational support of wireless mobile networks - The capacity of such networks is continuously being challenged as demand increases (e.g., Verizon LTE-based home broadband) - Much progress has been made, but still more are coming. 61
62 Outline Admin. Network layer Localization overview 62
63 Motivations The ancient question: Where am I? Localization is the process of determining the positions of the network nodes This is as fundamental a primitive as the ability to communicate 63
64 Localization: Many Applications Location aware information services e.g., E911, location-based search, advertisement, inventory management, traffic monitoring, emergency crew coordination, intrusion detection, air/water quality monitoring, environmental studies, biodiversity, military applications, resource selection (server, printer, etc.) Sensing data without knowing the location is meaningless. [IEEE Computer, Vol. 33, 2000] 64
65 The Localization Process Location Based Applications Location Computation Localizability (opt) Measurements 65
66 Classification of Localization based on Measurement Modality Coarse-grained measurements, e.g., signal signature a database of signal signature (e.g. pattern of received signal, visible set of APs ( at different locations match to the signature Connectivity Advantages low cost; measurements do not need line-of-sight Disadvantages low precision 66 For a detailed study, see Accuracy Characterization for Metropolitan-scale Wi-Fi Localization, in Mobisys 2005.
67 Classification of Localization based on Measurement Modality (cont ) Fine-grained localization distance angle (esp. with MIMO) Advantages high precision Disadvantages measurements need line-of-sight for good performance Cricket 67 iphone 4 GPS (ifixit)
68 Outline Admin. Localization Overview GPS 68
69 Global Position Systems US Department of Defense: need for very precise navigation In 1973, the US Air Force proposed a new system for navigation using satellites The system is known as: Navigation System with Timing and Ranging: Global Positioning System or NAVSTAR GPS 69
70 GPS Operational Capabilities Initial Operational Capability - December 8, 1993 Full Operational Capability declared by the Secretary of Defense at 00:01 hours on July 17,
71 NAVSTAR GPS Goals What time is it? What is my position (including attitude)? What is my velocity? Other Goals: - What is the local time? - When is sunrise and sunset? - What is the distance between two points? - What is my estimated time arrival (ETA)? 71
72 GSP Basics Simply stated: The GPS satellites are nothing more than a set of wireless base stations in the sky The satellites simultaneously broadcast beacon messages (called navigation messages) A GPS receiver measures time of arrival to the satellites, and then uses trilateration to determine its position 72
73 GPS Basics: Triangulation Measurement: Computes distance t 1 S p = t + c p R 1 p p 1 = c( t R1 t S ) 73
74 GPS Basics: Triangulation In reality, receiver clock is not sync d with satellites Thus need to estimate clock t R1 d c S 1 = t + + δ clock drift p p = c( t t δ R1 S 1 clock drift R1 S = c( t t ) cδ clock drift ) called pseudo range 74
75 75 GPS with Clock Synchronization?
76 GPS Design/Operation Segments (components) user segment: users with receivers control segment: control the satellites space segment: the constellation of satellites transmission scheme 76
77 Control Segment Master Control Station is located at the Consolidated Space Operations Center (CSOC) at Flacon Air Force Station near Colorado Springs 77
78 CSOC Track the satellites for orbit and clock determination Time synchronization Upload the Navigation Message Manage Denial Of Availability (DOA) 78
79 Space Segment: Constellation 79
80 Space Segment: Constellation System consists of 24 satellites in the operational mode: 21 in use and 3 spares 3 other satellites are used for testing Altitude: 20,200 Km with periods of 12 hr. Current Satellites: Block IIR- $25,000, KG Hydrogen maser atomic clocks these clocks lose one second every 2,739,000 million years 80
81 GPS Orbits 81
82 GPS Satellite Transmission Scheme: Navigation Message To compute position one must know the positions of the satellites Navigation message consists of: - satellite status to allow calculating pos - clock info Navigation Message at 50 bps each frame is 1500 bits Q: how long for each message? More detail: see 82
83 GPS Satellite Transmission Scheme: Requirements All 24 GPS satellites transmit Navigation Messages on the same frequencies Resistant to jamming Resistant to spoofing Allows military control of access (selected availability) 83
84 GPS As a Communication Infrastructure All 24 GPS satellites transmit on the same frequencies BUT use different codes i.e., Direct Sequence Spread Spectrum (DSSS), and Code Division Multiple Access (CDMA) Using BPSK to encode bits 84
85 Basic Scheme 85
86 GPS Control Controlling precision Lower chipping rate, lower precision Control access/anti-spoofing Control chipping sequence 86
87 GPS Chipping Seq. and Codes Two types of codes C/A Code - Coarse/Acquisition Code available for civilian use on L1 Chipping rate: M 1023 bits pseudorandom numbers (PRN) P Code - Precise Code on L1 and L2 used by the military Chipping rate: M PRN code is (repeat about one week) P code is encrypted called P(Y) code
88 GPS PHY and MAC Layers 88
89 Typical GPS Receiver: C/A code on L1 During the acquisition time you are receiving the navigation message also on L1 The receiver then reads the timing information and computes pseudo-ranges 89
90 Military Receiver Decodes both L1 and L2 L2 is more precise L1 and L2 difference allows computing ionospheric delay 90
91 Denial of Accuracy (DOA) The US military uses two approaches to prohibit use of the full resolution of the system Selective availability (SA) noise is added to the clock signal and the navigation message has lies in it SA is turned off permanently in 2000 Anti-Spoofing (AS) - P-code is encrypted 91
92 Extensions to GPS Differential GPS ground stations with known positions calculate positions using GPS the difference (fix) transmitted using FM radio used to improve accuracy Assisted GPS put a server on the ground to help a GPS receiver reduces GPS search time from minutes to seconds E.g., iphone GPS: BCM
93 GPS: Summary GPS is among the simplest localization technique (in terms topology): one-step trilateration 93
94 GPS Limitations Hardware requirements vs. small devices GPS can be jammed by sophisticated adversaries Obstructions to GPS satellites common each node needs LOS to 4 satellites GPS satellites not necessarily overhead, e.g., urban canyon, indoors, and underground 94
95 Limitation of Trilateration Percentage of localizable nodes localized by Trilateration. Ratio Uniformly random 250 node network. Average Degree 95
ECE 598HH: Special Topics in Wireless Networks and Mobile Systems
ECE 598HH: Special Topics in Wireless Networks and Mobile Systems Lecture 21: Opportunistic Routing Haitham Hassanieh *These slides are courtesy of Dina Katabi 1 Lecture Outline Single Path Routing Opportunistic
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are
More informationCS 268: Computer Networking. Taking Advantage of Broadcast
CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic
More informationMaking Friends with Broadcast. Administrivia
Making Friends with Broadcast CMU 15-744 David Andersen Administrivia Midterm Mean 66.5, Median 70, Stddev 13.7 Histo: 35-39 37 38 40-44 45-49 50-54 54 54 54 55-59 56 57 60-64 61 64 64 65-69 69 70-74 71
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationGeographic and Diversity Routing in Mesh Networks
Geographic and Diversity Routing in Mesh Networks COS 463: Wireless Networks Lecture 7 Kyle Jamieson [Parts adapted from B. Karp, S. Biswas, S. Katti] Course Contents 1. Wireless From the Transport Layer
More informationRouting in Wireless Mesh Networks. Feb. 22, 2006
Routing in Wireless Mesh Networks Feb. 22, 2006 Wireless Mesh Networks Multi-hop Wireless Networks Stationary Nodes Mobile Nodes Motivating scenario Community wireless networks (Mesh Networks) Battlefield
More informationWireless Mesh Networks
Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationWireless (Internet) Routing. Opportunistic Routing, Network Coding, TCP over Wireless
Wireless (Internet) Routing Opportunistic Routing, Network Coding, TCP over Wireless Outline Review of last time Opportunistic Routing o What is opportunistic routing? o ExOr o SOAR o Can we use opportunistic
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationLink Estimation and Tree Routing
Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless
More informationXORs in the Air: Practical Wireless Network Coding
XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationWPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/
WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More informationA Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:239-7242 Volume 4 Issue 7 July 205, Page No. 3422-3425 A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationRouting in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationCDMA-Based MAC Protocol for Wireless Ad Hoc Networks
CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for 600.647-Advanced Topics in Wireless Networks. JHU. Spring 04 Today s Presentation
More informationLong Distance Wireless Communication. Principally satellite communication:
Long Distance Wireless Communication Principally satellite communication: Uplink/Downlink Footprint LOS (line of sight) communication satellite base station is relay Effective for broadcast Limited bandwidth
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose
More informationFairness Example: high priority for nearby stations Optimality Efficiency overhead
Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationDesign and Evaluation of a new MAC Protocol for Long- Distance Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005
Design and Evaluation of a new MAC Protocol for Long- Distance 802.11 Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005 Reviewed by Anupama Guha Thakurta CS525M - Mobile and Ubiquitous
More informationinfrared Disadvantage: 1. cannot use for long-range communication or outside a building due to sun s rays.
Chapter2: analog and digital signals can take one of two forms: 1. periodic 2. nonperiodic Periodic analog signals can be classified as: 1. simple 2. composite A sine wave is represented by three parameters:
More informationMSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach
MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach Nhat Pham, Kiwoong Kwon, Daeyoung Kim School of Computing, Korea Advanced Institute
More informationLecture 2: Internet Structure
Lecture 2: Internet Structure COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross,
More informationPhysical Layer: Multiplexing, Spectrum Spreading and Switching. Covers Chapters# 06 & 08 from Text Book
Physical Layer: Multiplexing, Spectrum Spreading and Switching Covers Chapters# 06 & 08 from Text Book 2 Multiplexing From Chapter#06 3 Multiplexing If bandwidth of a medium linking two devices is greater
More informationChallenge: high throughput despite loss. Roofnet has >30% loss probability. 4 Computer Networks Course (15-744), CMU, 2012.
MOTIVATIONS MAC-INDEPENDENT OPPORTUNISTIC ROUTING & ENCODING S. Chachulski, M. Jennings, S. Katti, D. Katabi SIGCOMM 07 Low quality of wireless links Multipath fading, scattering, other signals, etc. Roofnet
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationWireless Internet Routing. Learning from Deployments Link Metrics
Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationGrandstream Networks, Inc. GWN76XX Series Mesh Network Guide
Grandstream Networks, Inc. GWN76XX Series Mesh Network Guide Table of Content SUPPORTED DEVICES... 4 INTRODUCTION... 5 MESH NETWORK ARCHITECTURE... 6 Terminology... 6 Mesh Network Architecture Models...
More informationModulation. Propagation. Typical frequency bands
References Wireless Technology 2 AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. The physical layer provides mechanical, electrical, l functional,
More informationAT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE
Wireless Technology AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. References 2 The physical layer provides mechanical, electrical, l functional,
More informationCSCI-1680 Wireless Chen Avin
CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationTinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture
More informationWireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013
Wireless Sensor Networks (WSN) Tanyar Pooyeh 2pooyeh@informatik.uni-hamburg.de Intelligent Robotics - winter semester 2013/14 Nov 11, 2013 Outline Multi-hop Wireless Networks MANETs, VANETs, WSNs Routing
More informationM06:Wireless and Mobile Networks. Corinna Schmitt
M06:Wireless and Mobile Networks Corinna Schmitt corinna.schmitt@unibas.ch Acknowledgement 2016 M06 2 Background q # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)!
More informationExercises for the Lectures on Communication Networks
Exercises for the Lectures on Prof. Jochen Seitz & Dipl.-Ing. Karsten Renhak Department of University of Technology Ilmenau October 5, 010 [Jochen.Seitz Karsten.Renhak]@tu-ilmenau.de Contents 1 Communication
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationChapter 3.1 Acknowledgment:
Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts
More informationCS 332 Computer Networks Wireless Networks
CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:
More informationNetworking Sensors, I
Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement
More informationITTC A Geographical Routing Protocol for Highly-Dynamic Aeronautical Networks
A Geographical Routing Protocol for Highly-Dynamic Aeronautical Networks Kevin Peters, Abdul Jabbar, Egemen K. Çetinkaya, James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationArchitecture and Evaluation of an Unplanned b Mesh Network
Architecture and Evaluation of an Unplanned 802.11b Mesh Network John Bicket, Daniel Aguayo, Sanjit Biswas, and Robert Morris MIT CSAIL (MobiCom 05) slides by Jong-Kwon Lee, presented by Fallon Chen May
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +9 051 20 9147 Office Hours: Tuesday 5 pm @ Main Building, third fllor Credits: 6 Protocol Stack Time Synchronization Energy Efficiency Distributed Processing
More informationData Link Layer: Multi Access Protocols
Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +9 051 20 9147 Office Hours: Tuesday 5 pm @ Main Building, third fllor Credits: 6 Protocol Stack Time Synchronization Energy Efficiency Distributed Processing
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationMessage acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with
ZigBee IEEE 802.15.4 Emerging standard for low-power wireless monitoring and control Scale to many devices Long lifetime is important (contrast to Bluetooth) 10-75m range typical Designed for industrial
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationImplementation and use of Software Defined Radio (SDR) technology for Public Safety, Traffic applications, and Highway Engineering
Implementation and use of Software Defined Radio (SDR) technology for Public Safety, Traffic applications, and Highway Engineering Topics of discussion * Section 1. Wireless vs. Wired. Advantages and disadvantages
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationThe Impact of Current and Future Global Navigation Satellite Systems on Precise Carrier Phase Positioning
The Impact of Current and Future Global Navigation Satellite Systems on Precise Carrier Phase Positioning R.Murat Demirer R.Murat Demirer( CORS Project) 1 Potential Applications of the Global Positioning
More informationLecture 10: Link layer multicast. Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday
Lecture 10: Link layer multicast Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday Unicast and broadcast Usually, link layer is used to send data over a single hop between source and destination. This
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationVorlesung Kommunikationsnetze Research Topics: QoS in VANETs
Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationCSCI Spring Final Exam Solution
CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and
More informationBroadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 0000; 00: 6 Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding Pouya Ostovari, Abdallah Khreishah,
More informationGuide to Wireless Communications, 3 rd Edition. Objectives
Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications
More informationBasic Concepts. CS168, Fall 2014 Sylvia Ratnasamy h<p://inst.eecs.berkeley.edu/~cs168/fa14/
Basic Concepts CS168, Fall 2014 Sylvia Ratnasamy h
More informationStudy and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs
Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate
More informationAd Hoc Networks: Issues and Routing
Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path
More informationWireless Networking: An Introduction. Hongwei Zhang
Wireless Networking: An Introduction Hongwei Zhang http://www.cs.wayne.edu/~hzhang Outline Networking as resource allocation A taxonomy of current practice Technical elements Outline Networking as resource
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.
Chapter 6 Wireless and obile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Chapter 6: Wireless and obile Networks
More informationMobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo
Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad
More informationNarra, et al. Performance Analysis of AeroRP with Ground Station Advertisements. Hemanth Narra, Egemen K. Çetinkaya, and James P.G.
Performance Analysis of AeroRP with Ground Station Advertisements Hemanth Narra, Egemen K. Çetinkaya, and James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationEthernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet
Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks
More informationLocation Awareness in Ad Hoc Wireless Mobile Neworks
Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationImplementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)
CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal
More informationBy Ambuj Varshney & Akshat Logar
By Ambuj Varshney & Akshat Logar Wireless operations permits services, such as long range communications, that are impossible or impractical to implement with the use of wires. The term is commonly used
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationAnnouncements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1
Announcements 18-759: Wireless Networks Lecture 11: 802.11* Please mail survey team information» Can include topic preferences now if you have them Submit project designs through blackboard Homework 2
More informationComparative Analysis of ZigBee, WLAN and Bluetooth System and its Throughput Enhancement
Comparative Analysis of ZigBee, WLAN and Bluetooth System and its Throughput Enhancement Ms. Hina Dhiman Dept. of Electronics and Telecommunication Sinhgad College of Engineering Pune, India Prof. Mrs.
More informationIntroduction. The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs.
Introduction The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block Diagram Intro-1
More informationCHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL
63 CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL 4.1 INTRODUCTION This chapter explains the impact of the blackhole, rushing, sybil and wormhole active attacks, in the route discovery
More informationLecture 4. Data Transmission Modes and Switching. Data Transmission & Switching 1-1
Lecture 4 Data Transmission Modes and Switching Data Transmission & Switching 1-1 Agenda Introduction to Data Transmission Modes Parallel and Serial Transmission Transmission Media Guided and unguided
More informationSimulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
More information