The Factor: Inferring Protocol Performance Using Inter-link Reception Correlation
|
|
- Justin Day
- 5 years ago
- Views:
Transcription
1 The Factor: Inferring Protocol Performance Using Inter-link Reception Correlation Kannan Srinivasan, Mayank Jain, Jung Il Choi, Tahir Azim, Edward S Kim, Philip Levis and Bhaskar Krishnamachari MobiCom rd Sep 2010
2 Spatial Independence Assumption Losses on different links are independent after a link failure, routing protocols choose the next shortest path forwarder simulators explicitly generate channel states independently 2
3 Spatial Independence Assumption Losses on different links are independent after a link failure, routing protocols choose the next shortest path forwarder simulators explicitly generate channel states independently When is this assumption safe? Why does it matter? 3
4 Inter-link (Spatial) Correlation (a) Real Trace, Mirage 4
5 Inter-link (Spatial) Correlation (a) Real Trace, Mirage (b) Synthetic (Independent) Trace (Every link has the same packet reception ratio (PRR) as in real trace) 5
6 Inter-link (Spatial) Correlation (a) Real Trace, Mirage (b) Synthetic (Independent) Trace Losses are well aligned (correlated) 6
7 Traditional Routing n1 So what? S n2 n D Edge weights are PRRs S selects n5 as next-hop ETX: expected number of transmissions 0.2 n ETX = = n5 7
8 Opportunistic Routing n1 So what? S n2 n D S lists n1-n5 as next-hops S stops as soon as at least one of the next 0.2 n4 1.0 hop nodes receives n5 8
9 Opportunistic Routing n1 So what? S n2 n D Independent: ETX = 1 1 (1 0.2) = n4 1.0 n5 9
10 Opportunistic Routing n1 So what? S n2 n D Independent: ETX = 1 1 (1 0.2) = n Perfectly Correlated: ETX = 1 1 (1 0.2) + 1 = 6.0 n5 Same cost as traditional routing (without coordination cost)! Correlation has implications to protocol performance 10
11 So far Spatial correlation assumption does not always hold true a measured network: 70% of link pairs are highly correlated The degree of correlation has implications to protocol performance 11
12 Problem Statement Need a good way to measure spatial correlation to understand its implications to protocol performance existing metrics conflate correlation with link pair PRRs 12
13 Research Contributions Present a new metric: Show how well network coding protocols perform, based on Show s ability to predict opportunistic routing protocol performance (in paper) perfect prediction when a node has 2 potential forwarders more than 2 forwarders: perfect prediction for most of the nodes 13
14 Outline Desired Metric Properties The Metric s Usefulness Open Questions 14
15 Outline Desired Metric Properties The Metric s Usefulness Open Questions 15
16 Desired Metric Properties a) A scalar with a finite range: [-1,1] >0: positive correlation <0: negative correlation P x x t P y y 16
17 Desired Metric Properties a) A scalar with a finite range: [-1,1] b) Symmetric P x x t P y y Metric(x,y) = Metric(y,x) 17
18 Desired Metric Properties a) A scalar with a finite range: [-1,1] b) Symmetric c) Irrespective of PRRs: P x x t P y y 1 for perfectly positively correlated link pair -1 for perfectly negatively correlated link pair 18
19 Desired Metric Properties a) A scalar with a finite range: [-1,1] b) Symmetric c) Irrespective of PRRs: P x x t P y y 1 for perfectly positively correlated link pair -1 for perfectly negatively correlated link pair Not a made-up property! 19
20 Perfect Positive Correlation (Metric = 1) Same PRR Link Pair x t y Opportunistic routing should choose x or y, but not both 20
21 Perfect Positive Correlation (Metric = 1) Same PRR Link Pair t x y Different PRR Link Pair t x y Opportunistic routing should only choose x 21
22 Perfect Negative Correlation (Metric = -1) Sum of Link Pair PRRs = 1 x t y Every packet succeeds on only one link 22
23 Perfect Negative Correlation (Metric = -1) Sum of Link Pair PRRs = 1 x t y Sum of Link Pair PRRs > 1 t x y Every packet succeeds at one or both the links 23
24 Perfect Negative Correlation (Metric = -1) Sum of Link Pair PRRs < 1 x t y Opportunistic routing benefits most, given the two PRRs 24
25 Desired Metric Properties a) A scalar with a finite range: [-1,1] b) Symmetric c) Irrespective of PRRs: P x x t P y y 1 for perfectly positively correlated link pair -1 for perfectly negatively correlated link pair 25
26 An existing metric: A recent inter-link correlation metric [1,2,3]: = P(x=0 y=0) - P(x=0) =0 losses are independent t P x x P y y [1] A. Miu, G. Tan, H. Balakrishnan and J. Apostolopoulos, Divert: fine-grained path selection for wireless LANs, MobiSys [2] C. Reis, R. Mahajan, M. Rodrig, D. Wetherall and J. Zahorjan, Measurement-based models for delivery and interference in static wireless networks, SIGCOMM CCR [3] R. Laufer, H. D.-Ferriere and L. Kleinrock, "Multirate Anypath Routing in Wireless Mesh Networks, INFOCOM
27 is not the desired metric = P(x=0 y=0) - P(x=0) a) A scalar with a finite range of [-1,1] b) Symmetric c) Irrespective of PRRs: 1 for perfectly positively correlated link pair -1 for perfectly negatively correlated link pair 27
28 is not symmetric x t y = P(x=0 y=0) - P(x=0) x,y = 4/7-4/10 =
29 is not symmetric x t y = P(x=0 y=0) - P(x=0) x,y = 4/7-4/10 = 0.17 = P(y=0 x=0) - P(y=0) y,x = 1-7/10 = 0.3 x,y y,x 29
30 does not satisfy property (c) c) 1 for perfectly positively correlated link pair For the same PRR case (P(x=1) = P(y=1)): = P(x=0 y=0) - P(x=0) t x y P(x=0 y=0) = 1 = P(x=1) 1 looks independent for low PRR link pairs 30
31 does not satisfy property (c) c) 1 for perfectly positively correlated link pair For the same PRR case (P(x=1) = P(y=1)): = P(x=0 y=0) - P(x=0) t x y P(x=0 y=0) = 1 = P(x=1) 1 is not the desired metric 31
32 Cross-correlation Index: ρ ρ = { 0, P(x=1,y=1) - P(x=1).P(y=1) P(x=1)P(x=0)P(y=1)P(y=0) otherwise, P(x=a)P(y=a) 0 a {0,1} 32
33 Cross-correlation Index: ρ ρ = { 0, P(x=1,y=1) - P(x=1).P(y=1) P(x=1)P(x=0)P(y=1)P(y=0) otherwise, P(x=a)P(y=a) 0 a {0,1} a) A scalar with a finite range of [-1,1] b) Symmetric c) Irrespective of PRRs: 1 for perfectly positively correlated link pair -1 for perfectly negatively correlated link pair 33
34 ρ does not satisfy property (c) c) 1 for perfectly positively correlated link pair For the same PRR case (Px(1) = Py(1)): ρ = 2 Px,y(1,1) - Px(1) Px(1).Px(0) t x y Px,y(1,1) = Px(1) ρ = 1 Works when PRRs are same 34
35 ρ does not satisfy property (c) c) 1 for perfectly positively correlated link pair For the different PRR case (Px(1) Py(1)): Px,y(1,1) = min(px(1), Py(1)) t x ρ = y Px(0).Py(1) Px(1).Py(0) 1 Does NOT work when PRRs are different 35
36 ρ does not satisfy property (c) Similarly, for perfectly negatively correlated link pairs: is -1: only when PRRs sum to 1 does not work for other cases ρ is not the desired metric 36
37 Outline Desired Metric Properties The Metric s Usefulness Open Questions 37
38 New Metric: ρ almost satisfied all the desired properties Normalizing ρ satisfies all the properties: { ρ ρmax -ρ ρmin, if ρ>0, if ρ<0 0, otherwise 38
39 New Metric: { ρ ρmax -ρ ρmin, if ρ>0, if ρ<0 0, otherwise [-1.0, 1.0], Px, Py (0, 1) 0: independent pairs >0: positively correlated pairs 1: perfectly positively correlated pairs <0: negatively correlated pairs -1: perfectly negatively correlated pairs 39
40 on Mirage Ch 16 Ch 26 More correlated (Mirage) 40
41 WiFi (802.11) and Spectrum 41
42 WiFi (802.11) and Spectrum WiFi No WiFi 42
43 Outline Desired Metric Properties The Metric s Usefulness Open Questions 43
44 How useful is? Dissemination: Deliver large data to all nodes Eg. SPIN, RBP Deluge (standard protocol) Rateless Deluge (network coding) Compare the total time for dissemination 44
45 Dissemination Deluge: R1 P1 R2 P2 S P3 P4 original pkts R3 R4 Number of transmissions from S: 4 45
46 Dissemination Deluge: R1 P2 P3 P4 R2 P1 P3 P4 P1 P2 S P3 R3 P1 P2 P4 P4 original pkts R4 P1 P2 P3 Number of transmissions from S: 4 46
47 Dissemination Deluge: R1 P2 P3 P4 need P1 P1 need P2 R2 P1 P3 P4 P2 P3 S need P3 R3 P1 P2 P4 P4 original need P4 pkts R4 P1 P2 P3 Number of transmissions from S: 4 47
48 Dissemination Deluge: R1 P1 P2 P3 P4 R2 P1 P2 P3 P4 P1 P2 S P3 R3 P1 P2 P3 P4 P4 original pkts R4 P1 P2 P3 P4 Number of transmissions from S: 4+4 = 8 48
49 Dissemination with Network Coding Rateless Deluge: R1 P1 c1 R2 P2 c2 S P3 P4 original pkts c3 c4 coded pkts R3 R4 49
50 Dissemination with Network Coding Rateless Deluge: R1 c2 c3 c4 R2 c1 c3 c4 P1 c1 P2 c2 S P3 c3 R3 c1 c2 c4 P4 c4 original coded pkts pkts R4 c1 c2 c3 Number of transmissions from S: 4 50
51 Dissemination with Network Coding Rateless Deluge: need 1 R1 c2 c3 c4 P1 need 1 R2 c1 c3 c4 P2 P3 S need 1 R3 c1 c2 c4 P4 original need 1 pkts R4 c1 c2 c3 Number of transmissions from S: 4 51
52 Dissemination with Network Coding Rateless Deluge: R1 c5 c2 c3 c4 R2 c1 c5 c3 c4 P1 P2 c5 S P3 R3 c1 c2 c5 c4 P4 original coded pkts pkts R4 c1 c2 c3 c5 Number of transmissions from S:4+1=5 52
53 Deluge vs Rateless Deluge Correlation Type Rateless Deluge Deluge (# of pkts) (# of pkts) Perfect Negative 8 5 Rateless Deluge is great! 53
54 Deluge vs Rateless Deluge Correlation Type Rateless Deluge Deluge (# of pkts) (# of pkts) Perfect Negative 8 5 Perfect Positive
55 Total Dissemination Time Correlation Type Rateless Deluge Deluge (# of pkts) (# of pkts) Perfect Negative 8 5 Perfect Positive 5 5 Total dissemination time: Deluge = 5p Rateless = 5p + 5c p = time to send packets, c = time to code In this case, Deluge is better! 55
56 A Controlled Study 1 transmitter at highest tx power 7 single-hop receivers with perfect reception Independent Losses: Receivers randomly (with prob. Pr) drop packets Correlated Losses: Transmitter randomly (with prob. Pt) drops packets from tx queue Vary Pt and Pr to vary spatial correlation and PRR of links 56
57 A Controlled Study PRR = 0.8 Better When PRR is high, Deluge is better! 57
58 A Controlled Study PRR = 0.8 PRR = 0.4 When PRR is low, Rateless Deluge is almost always better! 58
59 Dissemination Time Performance Deluge is better Rateless Deluge is better Shows how much faster Rateless Deluge is over Deluge 59
60 Uncontrolled Experiment Measureκand then run the experiment 1 transmitter (injection point) and 8 receivers 3 setups Ch 16: high correlation Ch 26: medium correlation Movement: low correlation 60
61 Deluge vs Rateless Deluge Scenario Avg κ Avg PRR Ch16 (High) Ch % Time (sec) Ch16 Deluge Rateless Deluge (Network Coding) 61
62 Deluge vs Rateless Deluge Scenario Avg κ Avg PRR Ch16 (High) Ch26 (Medium) Ch26 Ch16 Time (sec) % -33% 0 Ch16 Ch26 Deluge Rateless Deluge (Network Coding) 62
63 Deluge vs Rateless Deluge Scenario Avg κ Avg PRR Ch16 (High) Ch26 (Medium) Movement (Low) % Ch26 Ch16 Time (sec) % -33% Movement 0 Ch16 Ch26 Movement Deluge Rateless Deluge (Network Coding) 63
64 Outline Desired Metric Properties The Metric s Usefulness Open Questions 64
65 Open Questions can change over time how to measure it online? useful for adaptive protocol design Is useful with adaptive protocols? adaptive rate adaptive packet size adaptive channel and bandwidth 65
66 Summary Presented a spatial correlation metric, does not conflate correlation with PRRs has great predictive qualities predicts network coding protocol performance shows how well opportunistic routing protocols perform 66
67 A Shameless Advertisement I m looking for a faculty/research position contact: srikank@stanford.edu Mayank and Jung Il are looking for industrial research positions contact for Mayank: mayjain@stanford.edu contact for Jung Il: jungilchoi@stanford.edu 67
68 Backup Slides 68
69 on networks Roofnet (Outdoor) SWAN (Indoor) 69
70 Anypath ETX Ratio Py A B C Px s: Anypath ETX Ratio = E[A] E[A]inde E[A] max E[A] inde, E[A] E[A] inde E[A] inde E[A] min, PBC E[A] E[A] inde otherwise. where, the max, independent and min anypath ETX s 70
71 Opportunistic Routing: and Roofnet 11Mbps 71
72 Causes WiFi No WiFi Movement 72
EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing
EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a
More informationA Study of Spatial Packet Loss Correlation in Wireless Networks
A Study of Spatial Packet Loss Correlation in 82. Wireless Networks Zhe Wang, Mahbub Hassan School of Computer Science and Engineering University of New South Wales, Sydney 252, Australia Email: {zhewang,
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationFirst-Principles Modeling of Wireless Networks for Rate Control
First-Principles Modeling of Wireless Networks for Rate Control David Ripplinger Sean Warnick Daniel Zappala Abstract Achieving fair and optimal data rates in wireless networks is an area of continued
More informationCrossing Over the Bounded Domain: From Exponential To Power-law Intermeeting
Crossing Over the Bounded Domain: From Exponential To Power-law Intermeeting time in MANET Han Cai, Do Young Eun Department of Electrical and Computer Engineering North Carolina State University Motivation
More informationEffective Carrier Sensing in CSMA Networks under Cumulative Interference
INFOCOM 2010 Effective Carrier Sensing in MA Networks under Cumulative Interference Liqun Fu Soung Chang Liew Jianwei Huang Department of Information Engineering, The Chinese University of Hong Kong Introduction
More informationStability Analysis in a Cognitive Radio System with Cooperative Beamforming
Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Mohammed Karmoose 1 Ahmed Sultan 1 Moustafa Youseff 2 1 Electrical Engineering Dept, Alexandria University 2 E-JUST Agenda 1
More informationCommon Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel
Wang, ISIT 2011 p. 1/15 Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Chih-Chun Wang, Jaemin Han Center of Wireless Systems and Applications (CWSA) School
More informationOutline Network structure and objectives Routing Routing protocol protocol System analysis Results Conclusion Slide 2
2007 Radio and Wireless Symposium 9 11 January 2007, Long Beach, CA. Lifetime-Aware Hierarchical Wireless Sensor Network Architecture with Mobile Overlays Maryam Soltan, Morteza Maleki, and Massoud Pedram
More informationFairness and Optimal Stochastic Control for Heterogeneous Networks
λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping
More informationOptimal Rate Sampling in Systems
1 Optimal Rate Sampling in 82.11 Systems Richard Combes, Alexandre Proutiere, Donggyu Yun, Jungseul Ok, Yung Yi Abstract In 82.11 systems, Rate Adaptation (RA) is a fundamental mechanism allowing transmitters
More informationELEC546 Review of Information Theory
ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random
More informationCooperative HARQ with Poisson Interference and Opportunistic Routing
Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline
More informationFast Evaluation of Ensemble Transients of Large IP Networks. University of Maryland, College Park CS-TR May 11, 1998.
Fast Evaluation of Ensemble Transients of Large IP Networks Catalin T. Popescu cpopescu@cs.umd.edu A. Udaya Shankar shankar@cs.umd.edu Department of Computer Science University of Maryland, College Park
More informationHow do Wireless Chains Behave? The Impact of MAC Interactions
The Impact of MAC Interactions S. Razak 1 Vinay Kolar 2 N. Abu-Ghazaleh 1 K. Harras 1 1 Department of Computer Science Carnegie Mellon University, Qatar 2 Department of Wireless Networks RWTH Aachen University,
More informationTOUR: Time-sensitive Opportunistic Utility- based Routing in Delay Tolerant Networks
TEMPLE UNIVERSITY TOUR: Time-sensitive Opportunistic Utility- based Routing in Delay Tolerant Networks Mingjun Xiao a,b, Jie Wu b, Cong Liu c, and Liusheng Huang a a University of Science and Technology
More informationOn Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks
This paper was presented as part of the Mini-Conference at IEEE INFOCOM 11 On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks Lei Sun Wenye Wang
More informationOn queueing in coded networks queue size follows degrees of freedom
On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,
More informationNICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1
NICTA Short Course Network Analysis Vijay Sivaraman Day 1 Queueing Systems and Markov Chains Network Analysis, 2008s2 1-1 Outline Why a short course on mathematical analysis? Limited current course offering
More informationOnline Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel
Online Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel Yanting Wu Dept. of Electrical Engineering University of Southern California Email: yantingw@usc.edu Bhaskar Krishnamachari
More informationTemporal Reachability Graphs
Temporal Reachability Graphs John Whitbeck, Marcelo Dias de Amorim, Vania Conan and Jean-Loup Guillaume August 25th, 212 Intro : Contact Traces 2/16 Intro : Contact Traces 2/16 Intro : Contact Traces Time
More informationIntegrating an physical layer simulator in NS-3
Integrating an 802.11 physical layer simulator in NS-3 Stylianos Papanastasiou Signals and Systems stypap@chalmers.se Outline Motivation Planned activity The implementation Validation, tradeoffs Future
More informationImpacts of Channel Variability on Link-Level Throughput in Wireless Networks
Impacts of Channel Variability on Link-Level Throughput in Wireless Networks Can Emre Koksal, Kyle Jamieson, Emre Telatar, and Patrick Thiran Department of Communication and Computer Sciences, EPFL 5 Lausanne,
More informationMaxime GUILLAUD. Huawei Technologies Mathematical and Algorithmic Sciences Laboratory, Paris
1/21 Maxime GUILLAUD Alignment Huawei Technologies Mathematical and Algorithmic Sciences Laboratory, Paris maxime.guillaud@huawei.com http://research.mguillaud.net/ Optimisation Géométrique sur les Variétés
More informationSTABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS
The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung
More informationModule 1. Introduction to Digital Communications and Information Theory. Version 2 ECE IIT, Kharagpur
Module ntroduction to Digital Communications and nformation Theory Lesson 3 nformation Theoretic Approach to Digital Communications After reading this lesson, you will learn about Scope of nformation Theory
More informationIntegrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks
VANET Analysis Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks Tom Hao Luan, Xuemin (Sherman) Shen, and Fan Bai BBCR, ECE, University of Waterloo, Waterloo, Ontario, N2L 3G1,
More informationModeling and Simulation NETW 707
Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides
More informationMessage Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs
01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,
More information10601 Machine Learning
10601 Machine Learning September 2, 2009 Recitation 2 Öznur Taştan 1 Logistics Homework 2 is going to be out tomorrow. It is due on Sep 16, Wed. There is no class on Monday Sep 7 th (Labor day) Those who
More informationProblem Set: TT Quantum Information
Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C
More informationBased on Partial CSI in MIMO Ad-Hoc Networks
s Based on Partial CSI in MIMO Ad-Hoc Networks Y. Richter & I. Bergel Faculty of Engineering, Bar-Ilan University Austin, May 2015 1 Outline s &. Optimal routing in random ad-hoc networks. antenna routing.
More informationQuantized Conflict Graphs for Wireless Network Optimization
Quantized Conflict Graphs for Wireless Network Optimization Yanchao Zhao, Wenzhong Li, Jie Wu, Sanglu Lu State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology,
More informationOptimal Association of Stations and APs in an IEEE WLAN
Optimal Association of Stations and APs in an IEEE 802. WLAN Anurag Kumar and Vinod Kumar Abstract We propose a maximum utility based formulation for the problem of optimal association of wireless stations
More informationTCP over Cognitive Radio Channels
1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done
More informationHalf-Duplex Gaussian Relay Networks with Interference Processing Relays
Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras
More informationSynchronization in Physical- Layer Network Coding
Synchronization in Physical- Layer Network Coding Soung Liew Institute of Network Coding The Chinese University of Hong Kong Slides in this talk based on partial content in Physical-layer Network Coding:
More informationGiuseppe Bianchi, Ilenia Tinnirello
Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop
More informationWiFi MAC Models David Malone
WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,
More informationOptimal Utility-Lifetime Trade-off in Self-regulating Wireless Sensor Networks: A Distributed Approach
Optimal Utility-Lifetime Trade-off in Self-regulating Wireless Sensor Networks: A Distributed Approach Hithesh Nama, WINLAB, Rutgers University Dr. Narayan Mandayam, WINLAB, Rutgers University Joint work
More informationP e = 0.1. P e = 0.01
23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function
More informationAdaptive Contact Probing Mechanisms for Delay Tolerant Applications. Wang Wei, Vikram Srinivasan, Mehul Motani
Adaptive Contact Probing Mechanisms for Delay Tolerant Applications Wang Wei, Vikram Srinivasan, Mehul Motani Outline Introduction Modeling contact processes Real world contact traces Designing energy
More informationCoding for loss tolerant systems
Coding for loss tolerant systems Workshop APRETAF, 22 janvier 2009 Mathieu Cunche, Vincent Roca INRIA, équipe Planète INRIA Rhône-Alpes Mathieu Cunche, Vincent Roca The erasure channel Erasure codes Reed-Solomon
More informationFast and Accurate Transaction-Level Model of a Wormhole Network-on-Chip with Priority Preemptive Virtual Channel Arbitration
Fast and Accurate Transaction-Level Model of a Wormhole Network-on-Chip with Priority Preemptive Virtual Channel Arbitration Leandro Soares Indrusiak, Osmar Marchi dos Santos eal Time Systems Group (TS)
More informationReliable Data Transport: Sliding Windows
Reliable Data Transport: Sliding Windows 6.02 Fall 2013 Lecture 23 Exclusive! A Brief History of the Internet guest lecture by Prof. Hari Balakrishnan Wenesday December 4, 2013, usual 6.02 lecture time
More informationInterplay of security and clock synchronization"
July 13, 2010, P. R. Kumar " This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License." See http://creativecommons.org/licenses/by-nc-nd/3.0/" Interplay
More informationDynamic Power Allocation and Routing for Time Varying Wireless Networks
Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,
More informationPower Allocation and Coverage for a Relay-Assisted Downlink with Voice Users
Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,
More informationFraud within Asymmetric Multi-Hop Cellular Networks
Financial Cryptography 2005 EPFL, Lausanne, Switzerland ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Wireless networks Single-hop cellular network Multi-hop network Multi-hop cellular network Asymmetric multi-hop
More informationPerformance Evaluation of Deadline Monotonic Policy over protocol
Performance Evaluation of Deadline Monotonic Policy over 80. protocol Ines El Korbi and Leila Azouz Saidane National School of Computer Science University of Manouba, 00 Tunisia Emails: ines.korbi@gmail.com
More informationDominating Connectivity and Reliability of Heterogeneous Sensor Networks
Dominating Connectivity and Reliability of Heterogeneous Sensor Networks Kenneth A. Berman Email: ken.berman@uc.edu Fred S. Annexstein Email: fred.annexstein@uc.edu Aravind Ranganathan Email: rangana@email.uc.edu
More informationForward Correction and Fountain Codes in Delay Tolerant Networks
Forward Correction and Fountain Codes in Delay Tolerant Networks Eitan Altman INRIA, 24 Route des Lucioles, 692 Sophia-Antipolis Cedex, France eitan.altman@sophia.inria.fr Francesco De Pellegrini CREATE-NET,
More informationMulticast With Prioritized Delivery: How Fresh is Your Data?
Multicast With Prioritized Delivery: How Fresh is Your Data? Jing Zhong, Roy D Yates and Emina Solanin Department of ECE, Rutgers University, {ingzhong, ryates, eminasolanin}@rutgersedu arxiv:885738v [csit
More informationDEDI: A Framework for Analyzing Rank Evolution of Random Network Coding in a Wireless Network
DEDI: A Framework for Analyzing Rank Evolution of Random Network Coding in a Wireless Network Dan Zhang Narayan Mandayam and Shyam Parekh WINLAB, Rutgers University 671 Route 1 South, North Brunswick,
More informationThroughput-Optimal Robotic Message Ferrying for Wireless Networks using Backpressure Control
Throughput-Optimal obotic Message Ferrying for Wireless Networks using Backpressure Control Andrea Gasparri Department of Engineering oma Tre University ome, Italy gasparri@dia.uniroma3.it Bhaskar Krishnamachari
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer
More informationOn the Capacity of the Interference Channel with a Relay
On the Capacity of the Interference Channel with a Relay Ivana Marić, Ron Dabora and Andrea Goldsmith Stanford University, Stanford, CA {ivanam,ron,andrea}@wsl.stanford.edu Abstract Capacity gains due
More informationMarkov Chain Model for ALOHA protocol
Markov Chain Model for ALOHA protocol Laila Daniel and Krishnan Narayanan April 22, 2012 Outline of the talk A Markov chain (MC) model for Slotted ALOHA Basic properties of Discrete-time Markov Chain Stability
More informationMegaMIMO: Scaling Wireless Throughput with the Number of Users. Hariharan Rahul, Swarun Kumar and Dina Katabi
MegaMIMO: Scaling Wireless Throughput with the Number of Users Hariharan Rahul, Swarun Kumar and Dina Katabi There is a Looming Wireless Capacity Crunch Given the trends in the growth of wireless demand,
More informationGeneralized Two-Hop Relay for Flexible Delay Control in MANETs
Generalized Two-Hop Relay for Flexible Delay Control in MANETs 12 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
More informationCDA6530: Performance Models of Computers and Networks. Chapter 2: Review of Practical Random Variables
CDA6530: Performance Models of Computers and Networks Chapter 2: Review of Practical Random Variables Two Classes of R.V. Discrete R.V. Bernoulli Binomial Geometric Poisson Continuous R.V. Uniform Exponential,
More informationDiscrete Random Variables
CPSC 53 Systems Modeling and Simulation Discrete Random Variables Dr. Anirban Mahanti Department of Computer Science University of Calgary mahanti@cpsc.ucalgary.ca Random Variables A random variable is
More informationPower Controlled FCFS Splitting Algorithm for Wireless Networks
Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July
More informationWideband Fading Channel Capacity with Training and Partial Feedback
Wideband Fading Channel Capacity with Training and Partial Feedback Manish Agarwal, Michael L. Honig ECE Department, Northwestern University 145 Sheridan Road, Evanston, IL 6008 USA {m-agarwal,mh}@northwestern.edu
More informationCollaborative Localization Using Weighted Centroid Localization (WCL) Algorithm in CR Networks
Collaborative Localization Using Weighted Centroid Localization (WCL) Algorithm in CR Networks Simulation and Theoretical Results Jun Wang Paulo Urriza Prof. Danijela Čabrić UCLA CORES Lab March 12, 2010
More informationOptimal Channel Probing and Transmission Scheduling in a Multichannel System
Optimal Channel Probing and Transmission Scheduling in a Multichannel System Nicholas B. Chang and Mingyan Liu Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor,
More informationrequests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1
Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet
More informationDesign and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks
Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks Joon Ahn a, Affan Syed b, Bhaskar Krishnamachari a, John Heidemann b a Ming Hsieh Department of Electrical Engineering,
More informationFlow-level performance of wireless data networks
Flow-level performance of wireless data networks Aleksi Penttinen Department of Communications and Networking, TKK Helsinki University of Technology CLOWN seminar 28.8.08 1/31 Outline 1. Flow-level model
More informationInteractive Interference Alignment
Interactive Interference Alignment Quan Geng, Sreeram annan, and Pramod Viswanath Coordinated Science Laboratory and Dept. of ECE University of Illinois, Urbana-Champaign, IL 61801 Email: {geng5, kannan1,
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also
More informationA Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying
A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,
More informationThroughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting
Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210
More informationON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS. Michael G. Rabbat
ON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS Michael G. Rabbat Dept. of Electrical and Computer Engineering McGill University, Montréal, Québec Email: michael.rabbat@mcgill.ca ABSTRACT This paper
More informationProcessor Sharing Flows in the Internet
STANFORD HPNG TECHNICAL REPORT TR4-HPNG4 Processor Sharing Flows in the Internet Nandita Dukkipati, Nick McKeown Computer Systems Laboratory Stanford University Stanford, CA 9434-93, USA nanditad, nickm
More informationSignalling Analysis for Adaptive TCD Routing in ISL Networks *
COST 272 Packet-Oriented Service delivery via Satellite Signalling Analysis for Adaptive TCD Routing in ISL Networks * Ales Svigelj, Mihael Mohorcic, Gorazd Kandus Jozef Stefan Institute, Ljubljana, Slovenia
More informationNetwork coding for online and dynamic networking problems. Tracey Ho Center for the Mathematics of Information California Institute of Technology
Network coding for online and dynamic networking problems Tracey Ho Center for the Mathematics of Information California Institute of Technology 1 Work done in collaboration with: Harish Viswanathan: Bell
More informationQueuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe
Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem Wade Trappe Lecture Overview Network of Queues Introduction Queues in Tandem roduct Form Solutions Burke s Theorem What
More informationInterference and SINR in Dense Terahertz Networks
Interference and SINR in Dense Terahertz Networks V. Petrov, D. Moltchanov, Y. Koucheryavy Nano Communications Center Tampere University of Technology Outline 1. Introduction to THz communications 2. Problem
More informationAn algebraic framework for a unified view of route-vector protocols
An algebraic framework for a unified view of route-vector protocols João Luís Sobrinho Instituto Superior Técnico, Universidade de Lisboa Instituto de Telecomunicações Portugal 1 Outline 1. ontext for
More informationPerformance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks
Communications and Networ, 2010, 2, 87-92 doi:10.4236/cn.2010.22014 Published Online May 2010 (http://www.scirp.org/journal/cn Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless
More informationCapacity and Delay Tradeoffs for Ad-Hoc Mobile Networks
IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano
More informationPerformance analysis of IEEE WLANs with saturated and unsaturated sources
Performance analysis of IEEE 82.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Hai L. Vu, Lachlan L. H. Andrew Centre for Advanced Internet Architectures, Technical Report 11811A Swinburne
More informationNetwork Performance Tomography
Network Performance Tomography Hung X. Nguyen TeleTraffic Research Center University of Adelaide Network Performance Tomography Inferring link performance using end-to-end probes 2 Network Performance
More informationCapacity Limit, Link Scheduling and Power Control in Wireless Networks. Shan Zhou
Capacity Limit, Link Scheduling and Power Control in Wireless Networks by Shan Zhou A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Approved April
More informationReal-Time Course. Clock synchronization. June Peter van der TU/e Computer Science, System Architecture and Networking
Real-Time Course Clock synchronization 1 Clocks Processor p has monotonically increasing clock function C p (t) Clock has drift rate For t1 and t2, with t2 > t1 (1-ρ)(t2-t1)
More informationKeyless authentication in the presence of a simultaneously transmitting adversary
Keyless authentication in the presence of a simultaneously transmitting adversary Eric Graves Army Research Lab Adelphi MD 20783 U.S.A. ericsgra@ufl.edu Paul Yu Army Research Lab Adelphi MD 20783 U.S.A.
More informationA Quantitative View: Delay, Throughput, Loss
A Quantitative View: Delay, Throughput, Loss Antonio Carzaniga Faculty of Informatics University of Lugano September 27, 2017 Outline Quantitative analysis of data transfer concepts for network applications
More informationAn Algebraic Approach to Network Coding
An Algebraic Approach to July 30 31, 2009 Outline 1 2 a 3 Linear 4 Digital Communication Digital communication networks are integral parts of our lives these days; so, we want to know how to most effectively
More informationDirichlet s Principle on Multiclass Multihop Wireless Networks: Minimum Cost Routing Subject to Stability
Dirichlet s Principle on Multiclass Multihop Wireless Networks: Minimum Cost Routing Subject to Stability Reza Banirazi, Edmond Jonckheere, Bhaskar Krishnamachari Department of Electrical Engineering,
More informationOn the Use of Division Algebras for Wireless Communication
On the Use of Division Algebras for Wireless Communication frederique@systems.caltech.edu California Institute of Technology AMS meeting, Davidson, March 3rd 2007 Outline A few wireless coding problems
More informationSIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.
SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of
More informationFailure-Resilient Ad Hoc and Sensor Networks in a Shadow Fading Environment
Failure-Resilient Ad Hoc and Sensor Networks in a Shadow Fading Environment Christian Bettstetter DoCoMo Euro-Labs, Future Networking Lab, Munich, Germany lastname at docomolab-euro.com Abstract This paper
More informationMulti-User Communication: Capacity, Duality, and Cooperation. Nihar Jindal Stanford University Dept. of Electrical Engineering
Multi-User Communication: Capacity, Duality, and Cooperation Niar Jindal Stanford University Dept. of Electrical Engineering February 3, 004 Wireless Communication Vision Cellular Networks Wireless LAN
More informationAnalysis of Scalable TCP in the presence of Markovian Losses
Analysis of Scalable TCP in the presence of Markovian Losses E Altman K E Avrachenkov A A Kherani BJ Prabhu INRIA Sophia Antipolis 06902 Sophia Antipolis, France Email:altman,kavratchenkov,alam,bprabhu}@sophiainriafr
More informationarxiv: v1 [cs.dc] 30 Mar 2015
Uniform Information Exchange in Multi-channel Wireless Ad Hoc Networks arxiv:1503.08570v1 [cs.dc] 30 Mar 2015 Li Ning Center for High Performance Computing Shenzhen Institutes of Advanced Technology, CAS
More informationQuantum Wireless Sensor Networks
Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.
More informationNash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels
Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Jung Hoon Lee and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University,
More informationDistributed Optimization over Networks Gossip-Based Algorithms
Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random
More informationQueue length analysis for multicast: Limits of performance and achievable queue length with random linear coding
Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits
More information