Making Friends with Broadcast. Administrivia

Similar documents
CE693: Adv. Computer Networking

CS 268: Computer Networking. Taking Advantage of Broadcast

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems

Geographic and Diversity Routing in Mesh Networks

Routing in Wireless Mesh Networks. Feb. 22, 2006

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

Challenge: high throughput despite loss. Roofnet has >30% loss probability. 4 Computer Networks Course (15-744), CMU, 2012.

XORs in the Air: Practical Wireless Network Coding

Wireless (Internet) Routing. Opportunistic Routing, Network Coding, TCP over Wireless

Architecture and Evaluation of an Unplanned b Mesh Network

Wireless Mesh Networks

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Internet Architecture and Assumptions. David Andersen CMU Computer Science

CAR: Coding-Aware Opportunistic Routing in Wireless Mesh Networks

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

The Importance of Being Opportunistic

15-441: Computer Networking

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

PRESENTED BY SARAH KWAN NETWORK CODING

15-441: Computer Networking. Wireless Networking

XORs in The Air: Practical Wireless Network Coding

Comparative Study of Routing Protocols for WMN

A Measurement Study of a Commercial-grade Urban WiFi Mesh

On-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density

CS551 Ad-hoc Routing

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100

ExOR: Opportunistic Multi-Hop Routing for Wireless Networks

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks

Network Layer: Non-Traditional Wireless Routing Localization Intro

Christos Papadopoulos

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols

Lecture 16: Wireless Networking

Wireless Internet Routing. Learning from Deployments Link Metrics

Efficiency through Eavesdropping: Link-layer Packet Caching

MAC LAYER. Murat Demirbas SUNY Buffalo

XCOR: Synergistic Inter flow Network Coding and Opportunistic Routing

ECE : Fundamentals of Wireless Networking - Spring 2007

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

CS 3640: Introduction to Networks and Their Applications

Wireless Network Security Spring 2013

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

AN exam March

Basic Reliable Transport Protocols

Lecture 15 Networking Fundamentals. Today s Plan

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Interference avoidance in wireless multi-hop networks 1

WIRELESS networks suffer from low throughput and

Lecture 20: Link Layer

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Chapter 1 - Introduction

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

ECE 158A: Lecture 13. Fall 2015

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer

Transport layer issues

CS457 Transport Protocols. CS 457 Fall 2014

Link Estimation and Tree Routing

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

Strengthening Unlicensed Band Wireless Backhaul

ECE 435 Network Engineering Lecture 11

CS144 Final Review. Dec 4th, 2009 Tom Wiltzius

CS244a: An Introduction to Computer Networks

Wireless Network Security Spring 2012

The Internet vs. Sensor Nets

L12: end to end layer

NETWORK coding [1] [3] has attracted much interest in

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

Wireless Network Security Spring 2015

Computer Science 461 Final Exam May 22, :30-3:30pm

Opportunistic Overlay Multicast in Wireless Networks

CSE 461: Wireless Networks

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Network Security Spring 2014

BOND: Unifying Mobile Networks with Named Data. Michael Meisel

CDMR: Cooperative Diversity-based Multi-Copy Relaying in Mesh Networks

L3: SampleRate (Chapter 3)

MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours With Solutions

Major Design Challenges. Sensor Network Characteristics. Crosslayer Design in Sensor Networks. Energy-Constrained Nodes. Wireless Sensor Networks

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Granting Silence to Avoid Wireless Collisions

Wireless TCP Performance Issues

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

Multicast EECS 122: Lecture 16

Lecture 16: Network Layer Overview, Internet Protocol

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani

Wireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013

Typical rooftop view

Queue Management for Network Coding in Ad Hoc Networks

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

A B C D E Total / 24 / 23 / 12 / 18 / 3 / 80

Chapter 24 Congestion Control and Quality of Service 24.1

Transcription:

Making Friends with Broadcast CMU 15-744 David Andersen Administrivia Midterm Mean 66.5, Median 70, Stddev 13.7 Histo: 35-39 37 38 40-44 45-49 50-54 54 54 54 55-59 56 57 60-64 61 64 64 65-69 69 70-74 71 73 73 73 75-79 75 76 76 79 80-84 83 85-89 86 90-95 90 Correlation with PS1 scores: 0.7 This is a grad class. Expect As and Bs in the normal curve (stddev) If outlier, might want to talk with dga. 1

Feedback Feedback #1 complaint: Post lecture notes earlier Answer: Okay! Second popularity group: Req. security topics Yes! Already planned; if suggestions, drop me a note. Security overview (problems, causes, challenges, definitions, packet floods, SYN floods, botnets, some defenses) DDoS control and traceback Worms Slides are sometimes hard to understand Will work on that. Many of them are brand new this semester Less un-important topics Need to clarify my emphasis. Every topic so far is important either because of practical impact, or because it s intellectually important in terms of methods or the things that came from it, or because it illustrates open problems But very true that not everything is practical. Thank you for the feedback! Back to Ad Hoc Networks Recall that Transmissions interfere with many nodes, which constrains capacity of ad hoc nets Multiple receivers hear every transmission Delivery is probabilistic b/c of multipath interference [Roofnet sigcomm2005] Today s papers: Past the cutting edge of what s commonly used in wireless nets Will they be? We ll see. 2

1) Hop-over overhearing Observation 1: Best ETX/ETT path may have overhearing : 0 < p < 45% A B C 90% 90% What does p look like? If p > 0, can we take advantage of it when overhearing happens instead of having it interfere with C s ability to talk concurrently? 2) Bidirectional Reception Observation 2: When you Tx in a line, both sides can hear you: packet A B C If sending from A B C A hearing (B C) is unwanted interference But we can turn it to our advantage 3

ExOR Let s take advantage of the first observation, with an extra twist: Packets may hop over in a line Or may hop sideways as well Want to use the best route even if it goes off the expected best path Why ExOR might increase throughput (1) src N1 N2 N3 N4 N5 dst 75% 50% 25% Best traditional route over 50% hops: 3( 1 / 0.5 ) = 6 tx Throughput 1 / # transmissions ExOR exploits lucky long receptions: 4 transmissions Assumes probability falls off gradually with distance Slide Credit: Biswas & Morris 4

Why ExOR might increase throughput (2) src 25% 25% 25% 25% Traditional routing: 1 / 0.25 + 1 = 5 tx ExOR: 1 /(1 (1 0.25) 4 ) + 1 = 2.5 transmissions N1 N2 N3 N4 Assumes independent losses 100% 100% 100% 100% dst Slide Credit: Biswas & Morris Design Choice ExOR makes routing decision after packets have been received Lets you decide route based upon actual success instead of probability Requires a way of communicating to other nodes who actually received packet 5

Priority ordering src N2 N4 dst N1 N3 Goal: nodes closest to the destination send first Sort by ETX metric to dst Nodes periodically flood ETX link state measurements Path ETX is weighted shortest path (Dijkstra s algorithm) Source sorts, includes list in ExOR header Slide Credit: Biswas & Morris ExOR batching src tx: 100 9 N1 rx: 88 99 tx: 8 N2 rx: 57 85 tx: 57-23 24 N3 N4 rx: 23 53 tx: 23 rx: 040 tx: 0 dst rx: 022 Challenge: finding the closest node to have rx d Send batches of packets for efficiency Node closest to the dst sends first Other nodes listen, send remaining packets in turn Repeat schedule until dst has whole batch Slide Credit: Biswas & Morris 6

ExOR: 2x overall improvement Cumulative Fraction of Node Pairs 1.0 0.8 0.6 0.4 0.2 ExOR Traditional 0 0 200 400 600 800 Throughput (Kbits/sec) Median throughputs: 240 Kbits/sec for ExOR, 121 Kbits/sec for Traditional Slide Credit: Biswas & Morris Fraction of Transmissions ExOR moves packets farther 58% of Traditional Routing transmissions 0.6 0.2 0.1 0 ExOR average: 422 meters/transmission Traditional Routing average: 205 meters/tx ExOR Traditional Routing 0 100 200 300 400 500 600 700 800 900 1000 Distance (meters) 25% of ExOR transmissions Slide Credit: Biswas & Morris 7

ExOR discussion 2x improvement: Awesome! The cost? Look at Figure 6 in the paper. What s the range of RTTs from src->n24? Up to 3.5 seconds. Ouch! Batching: Requires many pkts from src dst Increases delay Interacts very poorly with TCP. (Translation: probably slower!) Solution: Proxy at edge, custom transport protocol across wireless network Awesome performance and nice design, but some serious deployment challenges Back to Bidirectional When you Tx in a line, both sides can hear you: packet A B C How do we make this work for us? 8

Coding with Bidirectional traffic 4 hops in 3 transmissions: A B C Time 1: Pkt A->B Time 2: Pkt C->B Time 3: (Pkt C->B XOR Pkt A->B) Building it: COPE Opportunistic listening (common to ExOR) Nodes listen all the time to all Tx (n.b. would consume more power; assumption here is that you really want throughput) Periodic reception reports Tells neighbors what it s heard Usually piggybacked on data Can also guess about reception using ETX 9

What packets to code?? Node has some packets in Tx queue Which of them should it XOR together? Goal: max # of real packets delivered S.t. each nexthop can decode the real packet Let s walk through an example COPE-ing 1x2: C gets 2 1x3: C=3, A=1 1x3x4: B C Wants to send: 1 4 1 -> A 2 -> C A 3 -> C 4 -> D 3 4 D 1 3 10

Gain: Theory and Practice Depends on topology. An X : middle node can xor 4 packets Each edge sends once Middle sends once = 8 pkts in 5 tx = 1.6 gain Max: ~2 But Overhead, loss, etc. Quirk: Coding+MAC gain Consider A-B-C topology w/out COPE: middle must send 2x as many packets If MAC is fair, middle only gets 1/3 of transmit time So packets build up and get lost BUT: TCP prevents too much packet buildup So this is achievable with UDP flows 11

Can We COPE With It? Overall: With symmetric, same-size UDP flows, COPE gain very nice With symmetric TCP, maybe 30%, but: COPE works best in a highly-loaded network (increases capacity) TCP performs very poorly with high loss rates! Requires lots of work to get TCP to work well over cope Fundamental and cool results, but may also need custom transport protocols to really use Could be great for software/multimedia/etc., dist over mesh network If time permits TCP performance and wireless discussion Interesting RTS/CTS positive notes in COPE paper Application of cope and ExOR RTS-id 12

Credits Several of the ExOR slides (the pretty ones) are from Opportunistic Routing in Multi-hop Wireless Networks, Sanjit Biswas and Robert Morris, talk at SIGCOMM 2005. Aside: The Roofnet guys have a startup, Meraki (http://meraki.net/), doing mesh networks. They make cool little low-power mesh radios that implement many of the things we ve read about in class. Fun stuff. 13