Analog Network Coding. Sachin Katti. Shyamnath Gollakota and Dina Katabi. Current Wireless. Router C
|
|
- Michael Brent Bailey
- 5 years ago
- Views:
Transcription
1 Analog Network oding Sachin Katti Shyamnath Gollakota and Dina Katabi urrent Wireless Router
2 urrent Wireless Router Traditional Routing requires 4 time slots urrent Wireless Router Traditional Routing requires 4 time slots
3 Last Year Network oding OPE Router XOR = Traditional Routing requires 4 time slots Last Year Network oding OPE Router Traditional Routing requires 4 time slots
4 Last Year Network oding OPE Router XOR = XOR = Traditional Routing requires 4 time slots OPE requires 3 time slots an we Higher do it in throughput 2 time slots? Instead of router mixing packets Exploit that the wireless channel naturally mixes signals Analog Network oding (AN)
5 Analog Network oding Router Analog Network oding Router Interference 1) Dina and Jon transmit simultaneously
6 Analog Network oding Router 1) Dina and Jon transmit simultaneously 2) Router amplifies and broadcasts interfered signal Analog Network oding Router 1) Dina and Jon transmit simultaneously 2) Router amplifies and broadcasts interfered signal 3) Dina subtracts known signal from interfered signal
7 Analog Network oding Router Analog 1) Dina Network and Robert oding transmit requires simultaneously 2 time slots 2) Router amplifies Higher and broadcasts throughput interfered signal 3) Dina subtracts known signal from interfered signal It Is More Than Going From 3 To 2! Philosophical shift in dealing with interference Strategically exploit interference instead of avoiding it Promises new ways of dealing with hidden terminals
8 Hidden Terminal Scenario Src R1 R2 Dst Hidden Terminal Scenario Src R1 R2 Dst P1
9 Hidden Terminal Scenario Src R1 R2 Dst P2 P1 1) Src and R2 transmit simultaneously Hidden Terminal Scenario Src R1 R2 Dst P1 P2 1) Src and R2 transmit simultaneously 2) R1 subtracts P1, which he relayed earlier to recover P2 that he wants
10 Hidden Terminal Scenario Src R1 R2 Dst P1 P2 R2 and Src are hidden terminals Today : Simultaneous transmission AN : Simultaneous transmission ollision Success! Hidden Terminal Scenario Src R1 R2 Dst Other Benefits of AN: First step toward addressing hidden terminals AN extends network coding to new scenarios
11 How do we make it work? Practical hallenges Interfered signal is not exactly the sum hannel distorts signals Two signals are never synchronized It is not s D (t) + s J (t) but f1(s D (t)) + f2(s J (t-t)) Prior work assumes full synchronization and ignores channel distortion Not Practical!
12 Key Idea: Exploit Asynchrony! Key Idea: Exploit Asynchrony! Signal No Interference No Interference Time Dina uses interference-free parts to estimate channel and timing Dina compensates for her interfering signal Jon runs the same algorithm backwards! Exploit asynchrony to make it practical
13 ross layer realization of our idea Protocol Router senses idle medium and broadcasts a trigger to Dina and Jon Dina and Jon jitter their start times randomly and transmit Router amplifies and forwards interfered signal Dina and Jon receive and decode How do they decode?
14 Primer on Modulation Nodes transmit vectors on channel Focus on MSK (Minimum Shift Keying) modulation leads by 90 degrees Bit 1 lags by 90 degrees Bit 0 Primer on hannel Effects Attenuation hannel and are attenuated by the same amount
15 Primer on hannel Effects Attenuation Rotation hannel Primer on hannel Effects Attenuation Rotation hannel To decode, receiver computes angle between received vectors Angle (, Angle ) between = 90 degrees vectors is Bit preserved 1 was transmitted
16 So, How Does Dina Decode? Signal No Interference No Interference Time Dina s Signal Jon s Signal So, How Does Dina Decode? Signal No Interference No Interference Time Interference Small uninterfered part at the start Decodes uninterfered part via standard MSK demodulation Once interference starts, Dina changes decoding algorithm
17 What did Dina send? What did Dina send? What did Jon send? J1 J2
18 What is Interference Vector addition X1 J1 X2 J2 What does Dina know? X1 J1 X2 J2
19 What does Dina know? X1 No Interference Amplitude of her Vectors α X2 Amplitude of Jon s Vectors β What does Dina know? J1 X1 J1 X2 Dina finds solutions for X1 and X2
20 What does Dina know? J1 X1 J2 J1 X2 J2 Dina Two finds solutions for for each X1interfered and X2 vector! What does Dina know? J1 X1 J2 J1 X2 J2 Dina finds solutions Four possible for X1 and angles! X2
21 What does Dina know? J2 X1 J1 J2 X2 J1 Dina finds solutions Four possible for X1 and angles! X2 What does Dina know? X1 J1 J2 J1 X2 Dina finds solutions Four possible for X1 and angles! X2 J2
22 What does Dina know? J1 X1 J2 J1 X2 J2 Dina finds solutions Four possible for X1 and angles! X2 What does Dina know? J1 X1 J2 J1 X2 Dina finds solutions Four possible for X1 and angles! X2 J2
23 What does Dina know? J1 X1 J2 J1 X2 J2 Dina Pick finds the solutions correct for angle X1 and 90 X2degrees What does Dina know? X1 J1 J2 J1 X2 J2 Dina Pick finds the solutions correct for angle X1 and +90 X2 degrees
24 What does Dina know? J2 X2 X1 J1 J2 J1 Dina finds Dictates solutions solution for X1 for and Jon s X2 vectors! What does Dina know? X1 X2 J2 J1 Dina finds angle between J1 and J2 and decodes
25 Decoding Algorithm Decoding interference Signal Interference Time Decode rest of the interfered part using this algorithm Decode final uninterfered part from Jon via standard MSK demodulation Performance
26 AN Implementation Software GNURadio codebase Hardware USRP frontend GHz frequency range SNR of db anonical topologies in mesh networks Dina and Jon Router AN throughput gain over current 4/2 = 2 AN throughput gain over OPE 3/2 = 1.5
27 Throughput gain for Dina-Jon scenario DF Gain over Routing Throughput gain Median Gain over Routing 70% Throughput gain for Dina-Jon scenario DF Gain over OPE Gain over Routing Throughput gain Median Gain over Routing 70% Median Gain over Routing 70% Median Gain over OPE 30%
28 X topology Router Interference apture! apture! X topology Router Interference apture! apture!
29 X topology Router AN throughput gain over current 4/2 = 2 AN decodes interference using overheard signals AN throughput gain over OPE 3/2 = 1.5 Throughput gain X topology DF Gain over Routing Throughput gain Median Gain over Routing 65%
30 Throughput gain X topology DF Gain over OPE Gain over Routing Throughput gain Median Gain over Routing 65% Median Gain over OPE 28% hain topology Src R1 R2 Dst AN throughput gain over current 3/2 = 1.5
31 Throughput gain hain topology DF Throughput gain Median Gain over Routing 37% onclusion Shifts in the design of wireless networks to recognize wireless for what it is Embrace Broadcast Embrace Interference Implementation that yields large throughput gains
Embracing Wireless Interference: Analog Network Coding
Embracing Wireless Interference: Analog Network Coding Sachin Katti MIT CSAIL skatti@mit.edu Shyamnath Gollakota MIT CSAIL gshyam@mit.edu Dina Katabi MIT CSAIL dina@csail.mit.edu ABSTRACT Traditionally,
More informationEmbracing Wireless Interference: Analog Network Coding
Embracing Wireless Interference: Analog Network Coding By Sachin Katti, Shyamnath Gollakota, and Dina Katabi Shyamala Villupuram Sundararaman University of Freiburg shyamala.villupuram.sundararaman@venus.uni-freiburg.de
More informationZigZag Decoding: Combating Hidden Terminals In Wireless Networks Shyamnath Gollakota and Dina Katabi
Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-28-58 October, 28 Decoding: Combating Hidden Terminals In Wireless Networks Shyamnath Gollakota and Dina Katabi massachusetts
More informationZigZag Decoding: Combating Hidden Terminals in Wireless Networks
Decoding: Combating Hidden Terminals in Wireless Networks Shyamnath Gollakota and Dina Katabi MIT CSAI ABSTRACT This paper presents, an 8. receiver design that combats hidden terminals. s core contribution
More informationPRESENTED BY SARAH KWAN NETWORK CODING
PRESENTED BY SARAH KWAN NETWORK CODING NETWORK CODING PRESENTATION OUTLINE What is Network Coding? Motivation and Approach Network Coding with Lossless Networks Challenges in Developing Coding Algorithms
More informationZigZag Decoding: Combating Hidden Terminals in Wireless Networks. Shyamnath Gollakota
ZigZag Decoding: Combating Hidden Terminals in Wireless Networks by Shyamnath Gollakota Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements
More informationPNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS
PNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS Gowdara Rajasekhar Gowda 1, Dr. B R Sujatha 2 1MTech (DECS) student, E&C Dept, Malnad College of Engineering, Karnataka, India. 2Associate professor,
More informationThe Importance of Being Opportunistic
High Performance Switching and Routing Telecom Center Workshop: Sept 4, 1997. The Importance of Being Opportunistic Sachin Katti Dina Katabi, Wenjun Hu, Hariharan Rahul, and Muriel Medard Bandwidth is
More informationWireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationECE 598HH: Special Topics in Wireless Networks and Mobile Systems
ECE 598HH: Special Topics in Wireless Networks and Mobile Systems Lecture 21: Opportunistic Routing Haitham Hassanieh *These slides are courtesy of Dina Katabi 1 Lecture Outline Single Path Routing Opportunistic
More informationTOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS
IEEE 2012 Transactions on Wireless Communications, Volume: 9, Issue: 2 TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS Abstract Cooperative communication has received tremendous
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationWireless Networks (MAC)
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationOPTIMIZING THE DELAY IN MULTIHOP WIRELESS NETWORK USING NETWORK CODING AND SUCCESSIVE INTERFERENCE CANCELLATION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are
More informationOutline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space
Outline Lecture 16: Wireless Networking Wireless physical layer challenges - Signal, noise, modulation - A little bit of EE goes a long way Wireless link layers - Hidden terminals, exposed terminals -
More informationCombating Packet Loss in OPS networks: A Case for Network Coding. Gergely Biczók and Harald Øverby NTNU Dept. of Telematics.
Combating Packet Loss in OPS networks: A Case for Network Coding Gergely Biczók and Harald Øverby NTNU Dept. of Telematics Abstract Fighting packet loss in optical packet-switched networks has been a priority
More informationDetecting Sybil Nodes in Wireless Networks. *: SIS Dept., UNC Charlotte **: ECE Dept., WPI
Detecting Sybil Nodes in Wireless Networks with Physical Layer Network Coding Weichao Wang*, DiPu**, and Alex Wyglinski** *: SIS Dept., UNC Charlotte **: ECE Dept., WPI Motivation Network coding technique
More informationRate Adaptation for Multiuser MIMO Networks
Rate Adaptation for 82. Multiuser MIMO Networks Wei-Liang Shen, Yu-Chih Tung, Kuang-Che Lee, Kate Ching-Ju Lin, Shyamnath Gollakota, Dina Katabi and Ming-Syan Chen Research Center for IT Innovation, Academia
More information788 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 24, NO. 2, APRIL Xudong Wang, Senior Member, IEEE, and Wenguang Mao
788 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 24, NO. 2, APRIL 2016 Analog Network Coding Without Restrictions on Superimposed Frames Xudong Wang, Senior Member, IEEE, and Wenguang Mao Abstract The applicability
More informationXORs in the Air: Practical Wireless Network Coding
XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we
More informationCS 268: Computer Networking. Taking Advantage of Broadcast
CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic
More informationWireless (Internet) Routing. Opportunistic Routing, Network Coding, TCP over Wireless
Wireless (Internet) Routing Opportunistic Routing, Network Coding, TCP over Wireless Outline Review of last time Opportunistic Routing o What is opportunistic routing? o ExOr o SOAR o Can we use opportunistic
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationECE 158A: Lecture 13. Fall 2015
ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit
More informationPRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS
PRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS Pouya Ostovari, Jie Wu, and Ying Dai Center for Networked Computing http://www.cnc.temple.edu Agenda 2 Introduction Motivation
More informationSymbol-level Network Coding for Wireless Mesh Networks
Symbol-level Network Coding for Wireless Mesh Networks Sachin Katti, Dina Katabi, Hari Balakrishnan, and Muriel Medard Massachusetts Institute of Technology ABSTRACT This paper describes MIXIT, a system
More informationRouting in Wireless Mesh Networks. Feb. 22, 2006
Routing in Wireless Mesh Networks Feb. 22, 2006 Wireless Mesh Networks Multi-hop Wireless Networks Stationary Nodes Mobile Nodes Motivating scenario Community wireless networks (Mesh Networks) Battlefield
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose
More informationET4254 Communications and Networking 1
Topic 2 Aims:- Communications System Model and Concepts Protocols and Architecture Analog and Digital Signal Concepts Frequency Spectrum and Bandwidth 1 A Communications Model 2 Communications Tasks Transmission
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network
Chapter 6 Wireless and Mobile Networks Computer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 009. Chapter 6: Wireless and Mobile Networks ackground: # wireless
More informationCAR: Coding-Aware Opportunistic Routing in Wireless Mesh Networks
: Coding-Aware Opportunistic Routing in Wireless Mesh Networks Hongquan Liu and Yuantao Gu Received Jan., 3 Abstract An intermediate node in inter-flow network coding scheme, such as, needs to know exactly
More informationOutline. A Professional Company in Software-Defined Networking (SDN) Copyright , EstiNet Technologies Inc. All Rights Reserved..
Physical Layer Outline Signal Propagation Media The Calculation of Signal Delivery Time The Evaluation of End-to-end Delay Signal Encoding and Modulation Wired Signal s Encoding, Decoding and Decoding
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationLecture 16: Wireless Networking
Lecture 16: Wireless Networking Outline Wireless physical layer challenges - Signal, noise, modulation - A little bit of EE goes a long way Wireless link layers - Hidden terminals, exposed terminals -
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in
More informationGoal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste
Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind
More informationCSCI-1680 Wireless Chen Avin
CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks
More informationXCOR: Synergistic Inter flow Network Coding and Opportunistic Routing
Dimitrios Koutsonikolas (dkoutson@purdue.edu) Advisor: Y. Charlie Hu School of ECE, Purdue University XCOR: Synergistic Inter flow Network Coding and Opportunistic Routing 1. Abstract Opportunistic routing
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationQueue Management for Network Coding in Ad Hoc Networks
2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,
More informationComputer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:
More informationTHE demand for widespread Internet access over large
3596 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Cooperative Strategies and Achievable Rate for Tree Networks With Optimal Spatial Reuse Omer Gurewitz, Member, IEEE, Alexandre
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationChapter 6 The Link Layer and LANs
Chapter 6 The Link Layer and LANs A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationLecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationMaking Friends with Broadcast. Administrivia
Making Friends with Broadcast CMU 15-744 David Andersen Administrivia Midterm Mean 66.5, Median 70, Stddev 13.7 Histo: 35-39 37 38 40-44 45-49 50-54 54 54 54 55-59 56 57 60-64 61 64 64 65-69 69 70-74 71
More informationVolume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationThe Basics of Wireless Communication Octav Chipara
The asics of Wireless ommunication Octav hipara genda hannel model: the protocol model High-level media access TM, SM hidden/exposed terminal problems WLN Fundamentals of routing proactive on-demand 2
More informationPerformance Analysis of Digital Network Coding Based Two Way Amplify and Forward Relay Networks
International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 National Conference on Performance Analysis of Digital Network Coding Based Two Way Amplify and Forward Relay Networks
More information1999, Scott F. Midkiff
Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams
More informationMetronome: Spectrum Sharing in Heterogeneous Wireless Networks. Ramki Gummadi (MIT)
Metronome: Spectrum Sharing in Heterogeneous Wireless Networks Ramki Gummadi (MIT) Joint work with Hari Balakrishnan (MIT) Srinivasan Seshan (CMU) COMSNETS 2009 1 Motivation Heterogeneous wireless n/w
More informationCDMA-Based MAC Protocol for Wireless Ad Hoc Networks
CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for 600.647-Advanced Topics in Wireless Networks. JHU. Spring 04 Today s Presentation
More informationEnhanced Contention Resolution Aloha - ECRA
Enhanced Contention Resolution Aloha - ECRA Federico Clazzer and Christian Kissling German Aerospace Centre (DLR) Oberpfaffenhofen, D-82234, Wessling, Germany Email: {federico.clazzer, christian.kissling}@dlr.de
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationM06:Wireless and Mobile Networks. Corinna Schmitt
M06:Wireless and Mobile Networks Corinna Schmitt corinna.schmitt@unibas.ch Acknowledgement 2016 M06 2 Background q # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)!
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationComputer Networks (Fall 2011) Homework 2
5-744 Computer Networks (Fall 20) Homework 2 Name: Due: Oct. 2th, 20, 3:00PM (in class) Andrew ID: October 2, 20 A Short Questions. Which of the following is true about modern high-speed routers? A. A
More information298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016
298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO., JANUARY 206 Hybrid Network Coding for Unbalanced Slotted ALOHA Relay Networks Shijun Lin, Member, IEEE, Liqun Fu, Member, IEEE, Jianmin Xie,
More informationLinks. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel
Link Layer Error Detection Nodes Links Frame R yclic Redundancy hecksum Parity its More about this in exercise! Data Link Layer -1 Data Link Layer -2 Links Two types of links : point-to-point broadcast
More informationAdaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols
Link Layer: Introduction daptors ommunicating hosts and routers are nodes links connect nodes wired links wireless links layer-2 packet is a frame, encapsulates datagram datagram controller sending host
More informationAd-Hoc Networks Seminar
ellular Network Topology hu backbone network, e.g. leased line d-hoc Networks Seminar Introduction SoSe 2007 2 Terminals communicate only with base stations. ssociation between terminal and base station.
More informationEECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub
Ethernet -- Topology: Ethernet MAC: Hub Single collision domain Hub Hub Relay Collision! After a collision, stop for a random time wait for a random time, then try again. (Walrand/Varaiya slides) - computers
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the
More informationInternet Structure. network edge:
Midterm Review Internet Structure network edge: Hosts: clients and servers Server often in data centers access networks, physical media:wired, wireless communication links network core: interconnected
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.
Chapter 6 Wireless and obile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Chapter 6: Wireless and obile Networks
More informationLinks. CS125 - mylinks 1 1/22/14
Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationTopology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications
Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications 1 S.Shahinsha, 2 Mr.M.Sri Raghavendra 1 PG Scholar, St. Johns College of Engineering &Technology, Yerakota, AP, India 2 Assistant
More informationBridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang
Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang University of Wisconsin - Madison 1 Wireless Access in Vehicles Wireless network in public vehicles use existing infrastructure
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationThe Capacity of Wireless Networks
The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control
More informationDesign a Proposed Algorithm for Reliable Data Delivery for High Dynamic MANET
Design a Proposed Algorithm for Reliable Data Delivery for High Dynamic MANET Rashmi Saini 1 and Vinit Lohan 2 1 M.Tech. Student, Department of CSE, VCE, Rohtak, Haryana (India) 2 Assistant Professor,
More informationLecture 19. Principles behind data link layer services Framing Multiple access protocols
Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationLXRS and LXRS+ Wireless Sensor Protocol
LORD TECHNICAL NOTE LXRS and LXRS+ Wireless Sensor Protocol Using LXRS and LXRS+ For Long-Term Monitoring and High Bandwidth Test and Measurement Introduction LORD Sensing has developed and deployed two
More informationMedium Access Control
Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless
More informationQos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol
Original Article Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol P. Kalaivani* 1, G. Sathya 1 and N. Senthilnathan 2 1 Assistant Professor, SNS College of Engineering,
More informationAnnouncements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7
ECE/CS 372 introduction to computer networks Announcements: Assignment 4 due now Chapter 7 Acknowledgement: slides drawn heavily from Kurose & Ross and Prof. Bechir Hamdaoui Chapter 7, slide 1 Wireless
More informationGeographic and Diversity Routing in Mesh Networks
Geographic and Diversity Routing in Mesh Networks COS 463: Wireless Networks Lecture 7 Kyle Jamieson [Parts adapted from B. Karp, S. Biswas, S. Katti] Course Contents 1. Wireless From the Transport Layer
More informationHomework 1 50 points. Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below:
Homework 1 50 points Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below: A circuit-switching scenario in which Ncs users, each requiring a bandwidth
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +9 051 20 9147 Office Hours: Tuesday 5 pm @ Main Building, third fllor Credits: 6 Protocol Stack Time Synchronization Energy Efficiency Distributed Processing
More informationReview For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University
School of Business Review For Exam 2 Wednesday 10/6/2004) Abdou Illia, Fall 2004 School of Business Internetworking 3 1. Name the two most known Medium Access Control Protocols found in LANs. How they
More informationA Light-Weight Wireless Handshake
A Light-Weight Wireless Handshake Kate Ching-Ju Lin Research Center for IT Innovation Academia Sinica katelin@citi.sinica.edu.tw Yuan-Jen Chuang Research Center for IT Innovation Academia Sinica johnnyc2277@citi.sinica.edu.tw
More informationAn Adaptive TDD Network with Network Coding Embedded Two-way Relay
An Adaptive TDD Network with Network Coding Embedded Two-way Relay 1 Sanqing Hu and Yu-Dong Yao, Fellow, IEEE Abstract Using relays to receive and forward packets between a network base station and network
More informationEthernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet
Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +9 051 20 9147 Office Hours: Tuesday 5 pm @ Main Building, third fllor Credits: 6 Protocol Stack Time Synchronization Energy Efficiency Distributed Processing
More information