Lecture 10: Link layer multicast. Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday

Similar documents
Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

XORs in the Air: Practical Wireless Network Coding

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

The Addressing of Data Link Layer

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

CS 268: Computer Networking. Taking Advantage of Broadcast

CE693: Adv. Computer Networking

Fast, Efficient, and Robust Multicast in Wireless Mesh Networks

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

LECTURE 9. Ad hoc Networks and Routing

Outline: Connecting Many Computers

RECENTLY, the information exchange using wired and

Lecture 7: Ethernet Hardware Addressing and Frame Format. Dr. Mohammed Hawa. Electrical Engineering Department, University of Jordan.

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

ECE 4450:427/527 - Computer Networks Spring 2017

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Computer and Network Security

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

CS 3640: Introduction to Networks and Their Applications

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Lecture 15: TCP over wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 13, Thursday

Links. CS125 - mylinks 1 1/22/14

Collisions & Virtual collisions in IEEE networks

Data Link Layer: Overview, operations

CMPE 257: Wireless and Mobile Networking

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

MAC. Fall Data Communications II 1

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

CMPE 257: Wireless and Mobile Networking

AN ABSTRACT OF THE THESIS OF

Communication Networks

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

CS 3640: Introduction to Networks and Their Applications

ECE 4450:427/527 - Computer Networks Spring 2017

Multiple-access protocols

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Data Link Control Protocols

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Wireless Sensor Networks

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Wireless Sensor Networks

Announcements. More Announcements. Brief History of Networking. How does a computer send messages over the Internet? 12/7/11

The flow of data must not be allowed to overwhelm the receiver

The Transport Layer Reliability

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Mobile Communications. Ad-hoc and Mesh Networks

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

Principles behind data link layer services:

Networking Link Layer

Principles of Reliable Data Transfer

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

Reliable Transmission

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CMPE150 Midterm Solutions

Harnessing Exposed Terminals in Wireless Networks

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Wireless Networking & Mobile Computing

Administrivia. FEC vs. ARQ. Reliable Transmission FEC. Last time: Framing Error detection. FEC provides constant throughput and predictable delay

Connecting to the Network

Networked Systems and Services, Fall 2018 Chapter 2. Jussi Kangasharju Markku Kojo Lea Kutvonen

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

IEEE Technical Tutorial. Introduction. IEEE Architecture

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 2.

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

UNIT IV -- TRANSPORT LAYER

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

MULTIPLE ACCESS PROTOCOLS 2. 1

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Wireless Medium Access Control Protocols

CC451 Computer Networks

Wireless Networking & Mobile Computing

CS 4453 Computer Networks Winter

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Wireless Communication

Lecture 8: February 19

Configuring EIGRP. 2001, Cisco Systems, Inc.

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Location Awareness in Ad Hoc Wireless Mobile Neworks

BROADCAST WITH NETWORK CODING: DRAGONCAST (DRAFT-ADJIH-DRAGONCAST-00)

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW!

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Mohamed Khedr.

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CMPE 257: Wireless and Mobile Networking

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding

Communications Software. CSE 123b. CSE 123b. Spring Lecture 3: Reliable Communications. Stefan Savage. Some slides couresty David Wetherall

Flow control: Ensuring the source sending frames does not overflow the receiver

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CS 455/555 Intro to Networks and Communications. Link Layer

The MAC Address Format

Transcription:

Lecture 10: Link layer multicast Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday

Unicast and broadcast Usually, link layer is used to send data over a single hop between source and destination. This is called unicast. Broadcast mode is used when data has to be sent to all receivers in a local area network. For example, in WiFi, beacons of access points and other such management information is sent in a broadcast mode. For all other transmissions, unicast mode is used. When a link layer receives a packet, it checks the destination address in the link layer header, and processes the frame only if the destination address matches its own address or the broadcast address. Otherwise, it discards the frame. Wireless link layer operates over the inherently broadcast wireless medium. So nodes overhear a lot of packets for other nodes, decode them at the physical layer, and throw them out eventually.

Link layer multicast Consider applications where an AP wants to send the same file to multiple clients. Unicast flows to each client is wasteful because each client receives multiple copies of essentially the same data. Broadcast is not reliable since broadcast frames do not have link layer ACK. This lecture will discuss mechanisms for reliable link layer multicast. Sample applications are an AP wanting to send a video / large file to multiple clients simultaneously and in an efficient manner. There is no one accepted best way to do link layer multicast. So this lecture will discuss various ideas from many different research proposals.

Pseudo-broadcast One way to solve the problem is by a technique called pseudo broadcast. Link layers of multicast clients are configured to be in promiscuous mode (that is, they will process all packets, including unicast packets destined to other nodes). AP sends the multicast data as unicast packets to one of the clients (called the leader of the multicast group), and all the other clients reveive the data in promiscuous mode.

Mechanisms to ACK To be reliable, AP needs a mechanism to get ACK from multiple clients. We cannot use the link layer ACK, as multiple ACKs will collide. AP can periodically poll the clients to ask for ACKs. Leader of the group can be picked such that it has the worst link to AP. So leader can send the link-layer ACK (meaning most clients would have received the frame too), and the few other clients that did not get the frame can send a NACK (negative ACK) ACKing can be done once per batch of frames to amortize this overhead. Clients can use other techniques like CDMA to send ACKs in the same time slot.

What to retransmit? When the AP learns that some clients did not receive some subset of packets, it can choose to retransmit the union of all lost packets. However, this leads to lot of retransmissions. Another technique is that the AP can send some parity packets (generated using a block code over the original packets). This way, different clients can recover different lost packets from the same set of parity packets. For example, consider an AP that has sent two packets p1 and p2 to clients C1 and C2. If C1 got p1, and C2 got p2, the AP can simply retransmit p1+p2, and each client can recover the packet it is missing. This process of generating extra error correcting packets to recover from errors can happen at the source of the multicast flow (e.g., video server), or at the intermediate nodes (e.g., AP). This technique is called network coding in the latter case.

The idea of unequal error protection When multicast is used to send videos, we can further optimize the process by using knowledge of the application layer content. Some video frames (called I-frames) encode complete images of a frame. Subsequent frames (called P-frames and B-frames) encode only the difference from the previous (or next) frame. Receiving I-frames reliably is much more important than receiving P- or B-frames. Some link layer multicast techniques employ reliable mechanisms like ACKs only for I-frames, and deliver P- and B-frames unreliably using broadcast. This technique is called unequal error protection.

Cooperative relaying Sometimes, it may be beneficial for one of the clients to perform retransmissions of lost data to far away clients. This may lead to using higher data rate than when AP sends. Such a mechanism is called cooperative relaying. The relaying node can further retransmit just the original packets, or it can also send parity packets to benefit more clients with fewer retransmissions. This technique is more useful in multihop wireless networks (that we will study later in the course).

Other link layer mechanisms Adjusting contention window must be done carefully for multicast flows. If the multicast mechanism is using broadcast packets (which have no ACK), then the contention window will always be at its lowest value, and the multicast flow will lead to unfairness to other unicast flows. Rate adaptation is also a tricky problem for multicast. There is a tradeoff between sending at lower rates and reaching many clients vs. sending at higher rates and taking care of the far away clients using retransmissions. In general, multicast flows are limited by the rate of the farthest node in the network, and smarter mechanisms are needed to ensure that clients with good signal do not starve because of the slower clients.