The Factor: Inferring Protocol Performance Using Inter-link Reception Correlation

Size: px
Start display at page:

Download "The Factor: Inferring Protocol Performance Using Inter-link Reception Correlation"

Transcription

1 The Factor: Inferring Protocol Performance Using Inter-link Reception Correlation Kannan Srinivasan, Mayank Jain, Jung Il Choi, Tahir Azim, Edward S Kim, Philip Levis and Bhaskar Krishnamachari MobiCom rd Sep 2010

2 Spatial Independence Assumption Losses on different links are independent after a link failure, routing protocols choose the next shortest path forwarder simulators explicitly generate channel states independently 2

3 Spatial Independence Assumption Losses on different links are independent after a link failure, routing protocols choose the next shortest path forwarder simulators explicitly generate channel states independently When is this assumption safe? Why does it matter? 3

4 Inter-link (Spatial) Correlation (a) Real Trace, Mirage 4

5 Inter-link (Spatial) Correlation (a) Real Trace, Mirage (b) Synthetic (Independent) Trace (Every link has the same packet reception ratio (PRR) as in real trace) 5

6 Inter-link (Spatial) Correlation (a) Real Trace, Mirage (b) Synthetic (Independent) Trace Losses are well aligned (correlated) 6

7 Traditional Routing n1 So what? S n2 n D Edge weights are PRRs S selects n5 as next-hop ETX: expected number of transmissions 0.2 n ETX = = n5 7

8 Opportunistic Routing n1 So what? S n2 n D S lists n1-n5 as next-hops S stops as soon as at least one of the next 0.2 n4 1.0 hop nodes receives n5 8

9 Opportunistic Routing n1 So what? S n2 n D Independent: ETX = 1 1 (1 0.2) = n4 1.0 n5 9

10 Opportunistic Routing n1 So what? S n2 n D Independent: ETX = 1 1 (1 0.2) = n Perfectly Correlated: ETX = 1 1 (1 0.2) + 1 = 6.0 n5 Same cost as traditional routing (without coordination cost)! Correlation has implications to protocol performance 10

11 So far Spatial correlation assumption does not always hold true a measured network: 70% of link pairs are highly correlated The degree of correlation has implications to protocol performance 11

12 Problem Statement Need a good way to measure spatial correlation to understand its implications to protocol performance existing metrics conflate correlation with link pair PRRs 12

13 Research Contributions Present a new metric: Show how well network coding protocols perform, based on Show s ability to predict opportunistic routing protocol performance (in paper) perfect prediction when a node has 2 potential forwarders more than 2 forwarders: perfect prediction for most of the nodes 13

14 Outline Desired Metric Properties The Metric s Usefulness Open Questions 14

15 Outline Desired Metric Properties The Metric s Usefulness Open Questions 15

16 Desired Metric Properties a) A scalar with a finite range: [-1,1] >0: positive correlation <0: negative correlation P x x t P y y 16

17 Desired Metric Properties a) A scalar with a finite range: [-1,1] b) Symmetric P x x t P y y Metric(x,y) = Metric(y,x) 17

18 Desired Metric Properties a) A scalar with a finite range: [-1,1] b) Symmetric c) Irrespective of PRRs: P x x t P y y 1 for perfectly positively correlated link pair -1 for perfectly negatively correlated link pair 18

19 Desired Metric Properties a) A scalar with a finite range: [-1,1] b) Symmetric c) Irrespective of PRRs: P x x t P y y 1 for perfectly positively correlated link pair -1 for perfectly negatively correlated link pair Not a made-up property! 19

20 Perfect Positive Correlation (Metric = 1) Same PRR Link Pair x t y Opportunistic routing should choose x or y, but not both 20

21 Perfect Positive Correlation (Metric = 1) Same PRR Link Pair t x y Different PRR Link Pair t x y Opportunistic routing should only choose x 21

22 Perfect Negative Correlation (Metric = -1) Sum of Link Pair PRRs = 1 x t y Every packet succeeds on only one link 22

23 Perfect Negative Correlation (Metric = -1) Sum of Link Pair PRRs = 1 x t y Sum of Link Pair PRRs > 1 t x y Every packet succeeds at one or both the links 23

24 Perfect Negative Correlation (Metric = -1) Sum of Link Pair PRRs < 1 x t y Opportunistic routing benefits most, given the two PRRs 24

25 Desired Metric Properties a) A scalar with a finite range: [-1,1] b) Symmetric c) Irrespective of PRRs: P x x t P y y 1 for perfectly positively correlated link pair -1 for perfectly negatively correlated link pair 25

26 An existing metric: A recent inter-link correlation metric [1,2,3]: = P(x=0 y=0) - P(x=0) =0 losses are independent t P x x P y y [1] A. Miu, G. Tan, H. Balakrishnan and J. Apostolopoulos, Divert: fine-grained path selection for wireless LANs, MobiSys [2] C. Reis, R. Mahajan, M. Rodrig, D. Wetherall and J. Zahorjan, Measurement-based models for delivery and interference in static wireless networks, SIGCOMM CCR [3] R. Laufer, H. D.-Ferriere and L. Kleinrock, "Multirate Anypath Routing in Wireless Mesh Networks, INFOCOM

27 is not the desired metric = P(x=0 y=0) - P(x=0) a) A scalar with a finite range of [-1,1] b) Symmetric c) Irrespective of PRRs: 1 for perfectly positively correlated link pair -1 for perfectly negatively correlated link pair 27

28 is not symmetric x t y = P(x=0 y=0) - P(x=0) x,y = 4/7-4/10 =

29 is not symmetric x t y = P(x=0 y=0) - P(x=0) x,y = 4/7-4/10 = 0.17 = P(y=0 x=0) - P(y=0) y,x = 1-7/10 = 0.3 x,y y,x 29

30 does not satisfy property (c) c) 1 for perfectly positively correlated link pair For the same PRR case (P(x=1) = P(y=1)): = P(x=0 y=0) - P(x=0) t x y P(x=0 y=0) = 1 = P(x=1) 1 looks independent for low PRR link pairs 30

31 does not satisfy property (c) c) 1 for perfectly positively correlated link pair For the same PRR case (P(x=1) = P(y=1)): = P(x=0 y=0) - P(x=0) t x y P(x=0 y=0) = 1 = P(x=1) 1 is not the desired metric 31

32 Cross-correlation Index: ρ ρ = { 0, P(x=1,y=1) - P(x=1).P(y=1) P(x=1)P(x=0)P(y=1)P(y=0) otherwise, P(x=a)P(y=a) 0 a {0,1} 32

33 Cross-correlation Index: ρ ρ = { 0, P(x=1,y=1) - P(x=1).P(y=1) P(x=1)P(x=0)P(y=1)P(y=0) otherwise, P(x=a)P(y=a) 0 a {0,1} a) A scalar with a finite range of [-1,1] b) Symmetric c) Irrespective of PRRs: 1 for perfectly positively correlated link pair -1 for perfectly negatively correlated link pair 33

34 ρ does not satisfy property (c) c) 1 for perfectly positively correlated link pair For the same PRR case (Px(1) = Py(1)): ρ = 2 Px,y(1,1) - Px(1) Px(1).Px(0) t x y Px,y(1,1) = Px(1) ρ = 1 Works when PRRs are same 34

35 ρ does not satisfy property (c) c) 1 for perfectly positively correlated link pair For the different PRR case (Px(1) Py(1)): Px,y(1,1) = min(px(1), Py(1)) t x ρ = y Px(0).Py(1) Px(1).Py(0) 1 Does NOT work when PRRs are different 35

36 ρ does not satisfy property (c) Similarly, for perfectly negatively correlated link pairs: is -1: only when PRRs sum to 1 does not work for other cases ρ is not the desired metric 36

37 Outline Desired Metric Properties The Metric s Usefulness Open Questions 37

38 New Metric: ρ almost satisfied all the desired properties Normalizing ρ satisfies all the properties: { ρ ρmax -ρ ρmin, if ρ>0, if ρ<0 0, otherwise 38

39 New Metric: { ρ ρmax -ρ ρmin, if ρ>0, if ρ<0 0, otherwise [-1.0, 1.0], Px, Py (0, 1) 0: independent pairs >0: positively correlated pairs 1: perfectly positively correlated pairs <0: negatively correlated pairs -1: perfectly negatively correlated pairs 39

40 on Mirage Ch 16 Ch 26 More correlated (Mirage) 40

41 WiFi (802.11) and Spectrum 41

42 WiFi (802.11) and Spectrum WiFi No WiFi 42

43 Outline Desired Metric Properties The Metric s Usefulness Open Questions 43

44 How useful is? Dissemination: Deliver large data to all nodes Eg. SPIN, RBP Deluge (standard protocol) Rateless Deluge (network coding) Compare the total time for dissemination 44

45 Dissemination Deluge: R1 P1 R2 P2 S P3 P4 original pkts R3 R4 Number of transmissions from S: 4 45

46 Dissemination Deluge: R1 P2 P3 P4 R2 P1 P3 P4 P1 P2 S P3 R3 P1 P2 P4 P4 original pkts R4 P1 P2 P3 Number of transmissions from S: 4 46

47 Dissemination Deluge: R1 P2 P3 P4 need P1 P1 need P2 R2 P1 P3 P4 P2 P3 S need P3 R3 P1 P2 P4 P4 original need P4 pkts R4 P1 P2 P3 Number of transmissions from S: 4 47

48 Dissemination Deluge: R1 P1 P2 P3 P4 R2 P1 P2 P3 P4 P1 P2 S P3 R3 P1 P2 P3 P4 P4 original pkts R4 P1 P2 P3 P4 Number of transmissions from S: 4+4 = 8 48

49 Dissemination with Network Coding Rateless Deluge: R1 P1 c1 R2 P2 c2 S P3 P4 original pkts c3 c4 coded pkts R3 R4 49

50 Dissemination with Network Coding Rateless Deluge: R1 c2 c3 c4 R2 c1 c3 c4 P1 c1 P2 c2 S P3 c3 R3 c1 c2 c4 P4 c4 original coded pkts pkts R4 c1 c2 c3 Number of transmissions from S: 4 50

51 Dissemination with Network Coding Rateless Deluge: need 1 R1 c2 c3 c4 P1 need 1 R2 c1 c3 c4 P2 P3 S need 1 R3 c1 c2 c4 P4 original need 1 pkts R4 c1 c2 c3 Number of transmissions from S: 4 51

52 Dissemination with Network Coding Rateless Deluge: R1 c5 c2 c3 c4 R2 c1 c5 c3 c4 P1 P2 c5 S P3 R3 c1 c2 c5 c4 P4 original coded pkts pkts R4 c1 c2 c3 c5 Number of transmissions from S:4+1=5 52

53 Deluge vs Rateless Deluge Correlation Type Rateless Deluge Deluge (# of pkts) (# of pkts) Perfect Negative 8 5 Rateless Deluge is great! 53

54 Deluge vs Rateless Deluge Correlation Type Rateless Deluge Deluge (# of pkts) (# of pkts) Perfect Negative 8 5 Perfect Positive

55 Total Dissemination Time Correlation Type Rateless Deluge Deluge (# of pkts) (# of pkts) Perfect Negative 8 5 Perfect Positive 5 5 Total dissemination time: Deluge = 5p Rateless = 5p + 5c p = time to send packets, c = time to code In this case, Deluge is better! 55

56 A Controlled Study 1 transmitter at highest tx power 7 single-hop receivers with perfect reception Independent Losses: Receivers randomly (with prob. Pr) drop packets Correlated Losses: Transmitter randomly (with prob. Pt) drops packets from tx queue Vary Pt and Pr to vary spatial correlation and PRR of links 56

57 A Controlled Study PRR = 0.8 Better When PRR is high, Deluge is better! 57

58 A Controlled Study PRR = 0.8 PRR = 0.4 When PRR is low, Rateless Deluge is almost always better! 58

59 Dissemination Time Performance Deluge is better Rateless Deluge is better Shows how much faster Rateless Deluge is over Deluge 59

60 Uncontrolled Experiment Measureκand then run the experiment 1 transmitter (injection point) and 8 receivers 3 setups Ch 16: high correlation Ch 26: medium correlation Movement: low correlation 60

61 Deluge vs Rateless Deluge Scenario Avg κ Avg PRR Ch16 (High) Ch % Time (sec) Ch16 Deluge Rateless Deluge (Network Coding) 61

62 Deluge vs Rateless Deluge Scenario Avg κ Avg PRR Ch16 (High) Ch26 (Medium) Ch26 Ch16 Time (sec) % -33% 0 Ch16 Ch26 Deluge Rateless Deluge (Network Coding) 62

63 Deluge vs Rateless Deluge Scenario Avg κ Avg PRR Ch16 (High) Ch26 (Medium) Movement (Low) % Ch26 Ch16 Time (sec) % -33% Movement 0 Ch16 Ch26 Movement Deluge Rateless Deluge (Network Coding) 63

64 Outline Desired Metric Properties The Metric s Usefulness Open Questions 64

65 Open Questions can change over time how to measure it online? useful for adaptive protocol design Is useful with adaptive protocols? adaptive rate adaptive packet size adaptive channel and bandwidth 65

66 Summary Presented a spatial correlation metric, does not conflate correlation with PRRs has great predictive qualities predicts network coding protocol performance shows how well opportunistic routing protocols perform 66

67 A Shameless Advertisement I m looking for a faculty/research position contact: srikank@stanford.edu Mayank and Jung Il are looking for industrial research positions contact for Mayank: mayjain@stanford.edu contact for Jung Il: jungilchoi@stanford.edu 67

68 Backup Slides 68

69 on networks Roofnet (Outdoor) SWAN (Indoor) 69

70 Anypath ETX Ratio Py A B C Px s: Anypath ETX Ratio = E[A] E[A]inde E[A] max E[A] inde, E[A] E[A] inde E[A] inde E[A] min, PBC E[A] E[A] inde otherwise. where, the max, independent and min anypath ETX s 70

71 Opportunistic Routing: and Roofnet 11Mbps 71

72 Causes WiFi No WiFi Movement 72

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

A Study of Spatial Packet Loss Correlation in Wireless Networks

A Study of Spatial Packet Loss Correlation in Wireless Networks A Study of Spatial Packet Loss Correlation in 82. Wireless Networks Zhe Wang, Mahbub Hassan School of Computer Science and Engineering University of New South Wales, Sydney 252, Australia Email: {zhewang,

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

First-Principles Modeling of Wireless Networks for Rate Control

First-Principles Modeling of Wireless Networks for Rate Control First-Principles Modeling of Wireless Networks for Rate Control David Ripplinger Sean Warnick Daniel Zappala Abstract Achieving fair and optimal data rates in wireless networks is an area of continued

More information

Crossing Over the Bounded Domain: From Exponential To Power-law Intermeeting

Crossing Over the Bounded Domain: From Exponential To Power-law Intermeeting Crossing Over the Bounded Domain: From Exponential To Power-law Intermeeting time in MANET Han Cai, Do Young Eun Department of Electrical and Computer Engineering North Carolina State University Motivation

More information

Effective Carrier Sensing in CSMA Networks under Cumulative Interference

Effective Carrier Sensing in CSMA Networks under Cumulative Interference INFOCOM 2010 Effective Carrier Sensing in MA Networks under Cumulative Interference Liqun Fu Soung Chang Liew Jianwei Huang Department of Information Engineering, The Chinese University of Hong Kong Introduction

More information

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Mohammed Karmoose 1 Ahmed Sultan 1 Moustafa Youseff 2 1 Electrical Engineering Dept, Alexandria University 2 E-JUST Agenda 1

More information

Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel

Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Wang, ISIT 2011 p. 1/15 Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Chih-Chun Wang, Jaemin Han Center of Wireless Systems and Applications (CWSA) School

More information

Outline Network structure and objectives Routing Routing protocol protocol System analysis Results Conclusion Slide 2

Outline Network structure and objectives Routing Routing protocol protocol System analysis Results Conclusion Slide 2 2007 Radio and Wireless Symposium 9 11 January 2007, Long Beach, CA. Lifetime-Aware Hierarchical Wireless Sensor Network Architecture with Mobile Overlays Maryam Soltan, Morteza Maleki, and Massoud Pedram

More information

Fairness and Optimal Stochastic Control for Heterogeneous Networks

Fairness and Optimal Stochastic Control for Heterogeneous Networks λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping

More information

Optimal Rate Sampling in Systems

Optimal Rate Sampling in Systems 1 Optimal Rate Sampling in 82.11 Systems Richard Combes, Alexandre Proutiere, Donggyu Yun, Jungseul Ok, Yung Yi Abstract In 82.11 systems, Rate Adaptation (RA) is a fundamental mechanism allowing transmitters

More information

ELEC546 Review of Information Theory

ELEC546 Review of Information Theory ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

Fast Evaluation of Ensemble Transients of Large IP Networks. University of Maryland, College Park CS-TR May 11, 1998.

Fast Evaluation of Ensemble Transients of Large IP Networks. University of Maryland, College Park CS-TR May 11, 1998. Fast Evaluation of Ensemble Transients of Large IP Networks Catalin T. Popescu cpopescu@cs.umd.edu A. Udaya Shankar shankar@cs.umd.edu Department of Computer Science University of Maryland, College Park

More information

How do Wireless Chains Behave? The Impact of MAC Interactions

How do Wireless Chains Behave? The Impact of MAC Interactions The Impact of MAC Interactions S. Razak 1 Vinay Kolar 2 N. Abu-Ghazaleh 1 K. Harras 1 1 Department of Computer Science Carnegie Mellon University, Qatar 2 Department of Wireless Networks RWTH Aachen University,

More information

TOUR: Time-sensitive Opportunistic Utility- based Routing in Delay Tolerant Networks

TOUR: Time-sensitive Opportunistic Utility- based Routing in Delay Tolerant Networks TEMPLE UNIVERSITY TOUR: Time-sensitive Opportunistic Utility- based Routing in Delay Tolerant Networks Mingjun Xiao a,b, Jie Wu b, Cong Liu c, and Liusheng Huang a a University of Science and Technology

More information

On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks

On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks This paper was presented as part of the Mini-Conference at IEEE INFOCOM 11 On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks Lei Sun Wenye Wang

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1 NICTA Short Course Network Analysis Vijay Sivaraman Day 1 Queueing Systems and Markov Chains Network Analysis, 2008s2 1-1 Outline Why a short course on mathematical analysis? Limited current course offering

More information

Online Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel

Online Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel Online Learning to Optimize Transmission over an Unknown Gilbert-Elliott Channel Yanting Wu Dept. of Electrical Engineering University of Southern California Email: yantingw@usc.edu Bhaskar Krishnamachari

More information

Temporal Reachability Graphs

Temporal Reachability Graphs Temporal Reachability Graphs John Whitbeck, Marcelo Dias de Amorim, Vania Conan and Jean-Loup Guillaume August 25th, 212 Intro : Contact Traces 2/16 Intro : Contact Traces 2/16 Intro : Contact Traces Time

More information

Integrating an physical layer simulator in NS-3

Integrating an physical layer simulator in NS-3 Integrating an 802.11 physical layer simulator in NS-3 Stylianos Papanastasiou Signals and Systems stypap@chalmers.se Outline Motivation Planned activity The implementation Validation, tradeoffs Future

More information

Impacts of Channel Variability on Link-Level Throughput in Wireless Networks

Impacts of Channel Variability on Link-Level Throughput in Wireless Networks Impacts of Channel Variability on Link-Level Throughput in Wireless Networks Can Emre Koksal, Kyle Jamieson, Emre Telatar, and Patrick Thiran Department of Communication and Computer Sciences, EPFL 5 Lausanne,

More information

Maxime GUILLAUD. Huawei Technologies Mathematical and Algorithmic Sciences Laboratory, Paris

Maxime GUILLAUD. Huawei Technologies Mathematical and Algorithmic Sciences Laboratory, Paris 1/21 Maxime GUILLAUD Alignment Huawei Technologies Mathematical and Algorithmic Sciences Laboratory, Paris maxime.guillaud@huawei.com http://research.mguillaud.net/ Optimisation Géométrique sur les Variétés

More information

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung

More information

Module 1. Introduction to Digital Communications and Information Theory. Version 2 ECE IIT, Kharagpur

Module 1. Introduction to Digital Communications and Information Theory. Version 2 ECE IIT, Kharagpur Module ntroduction to Digital Communications and nformation Theory Lesson 3 nformation Theoretic Approach to Digital Communications After reading this lesson, you will learn about Scope of nformation Theory

More information

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks VANET Analysis Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks Tom Hao Luan, Xuemin (Sherman) Shen, and Fan Bai BBCR, ECE, University of Waterloo, Waterloo, Ontario, N2L 3G1,

More information

Modeling and Simulation NETW 707

Modeling and Simulation NETW 707 Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides

More information

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs 01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,

More information

10601 Machine Learning

10601 Machine Learning 10601 Machine Learning September 2, 2009 Recitation 2 Öznur Taştan 1 Logistics Homework 2 is going to be out tomorrow. It is due on Sep 16, Wed. There is no class on Monday Sep 7 th (Labor day) Those who

More information

Problem Set: TT Quantum Information

Problem Set: TT Quantum Information Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C

More information

Based on Partial CSI in MIMO Ad-Hoc Networks

Based on Partial CSI in MIMO Ad-Hoc Networks s Based on Partial CSI in MIMO Ad-Hoc Networks Y. Richter & I. Bergel Faculty of Engineering, Bar-Ilan University Austin, May 2015 1 Outline s &. Optimal routing in random ad-hoc networks. antenna routing.

More information

Quantized Conflict Graphs for Wireless Network Optimization

Quantized Conflict Graphs for Wireless Network Optimization Quantized Conflict Graphs for Wireless Network Optimization Yanchao Zhao, Wenzhong Li, Jie Wu, Sanglu Lu State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology,

More information

Optimal Association of Stations and APs in an IEEE WLAN

Optimal Association of Stations and APs in an IEEE WLAN Optimal Association of Stations and APs in an IEEE 802. WLAN Anurag Kumar and Vinod Kumar Abstract We propose a maximum utility based formulation for the problem of optimal association of wireless stations

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Half-Duplex Gaussian Relay Networks with Interference Processing Relays Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras

More information

Synchronization in Physical- Layer Network Coding

Synchronization in Physical- Layer Network Coding Synchronization in Physical- Layer Network Coding Soung Liew Institute of Network Coding The Chinese University of Hong Kong Slides in this talk based on partial content in Physical-layer Network Coding:

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop

More information

WiFi MAC Models David Malone

WiFi MAC Models David Malone WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,

More information

Optimal Utility-Lifetime Trade-off in Self-regulating Wireless Sensor Networks: A Distributed Approach

Optimal Utility-Lifetime Trade-off in Self-regulating Wireless Sensor Networks: A Distributed Approach Optimal Utility-Lifetime Trade-off in Self-regulating Wireless Sensor Networks: A Distributed Approach Hithesh Nama, WINLAB, Rutgers University Dr. Narayan Mandayam, WINLAB, Rutgers University Joint work

More information

P e = 0.1. P e = 0.01

P e = 0.1. P e = 0.01 23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function

More information

Adaptive Contact Probing Mechanisms for Delay Tolerant Applications. Wang Wei, Vikram Srinivasan, Mehul Motani

Adaptive Contact Probing Mechanisms for Delay Tolerant Applications. Wang Wei, Vikram Srinivasan, Mehul Motani Adaptive Contact Probing Mechanisms for Delay Tolerant Applications Wang Wei, Vikram Srinivasan, Mehul Motani Outline Introduction Modeling contact processes Real world contact traces Designing energy

More information

Coding for loss tolerant systems

Coding for loss tolerant systems Coding for loss tolerant systems Workshop APRETAF, 22 janvier 2009 Mathieu Cunche, Vincent Roca INRIA, équipe Planète INRIA Rhône-Alpes Mathieu Cunche, Vincent Roca The erasure channel Erasure codes Reed-Solomon

More information

Fast and Accurate Transaction-Level Model of a Wormhole Network-on-Chip with Priority Preemptive Virtual Channel Arbitration

Fast and Accurate Transaction-Level Model of a Wormhole Network-on-Chip with Priority Preemptive Virtual Channel Arbitration Fast and Accurate Transaction-Level Model of a Wormhole Network-on-Chip with Priority Preemptive Virtual Channel Arbitration Leandro Soares Indrusiak, Osmar Marchi dos Santos eal Time Systems Group (TS)

More information

Reliable Data Transport: Sliding Windows

Reliable Data Transport: Sliding Windows Reliable Data Transport: Sliding Windows 6.02 Fall 2013 Lecture 23 Exclusive! A Brief History of the Internet guest lecture by Prof. Hari Balakrishnan Wenesday December 4, 2013, usual 6.02 lecture time

More information

Interplay of security and clock synchronization"

Interplay of security and clock synchronization July 13, 2010, P. R. Kumar " This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License." See http://creativecommons.org/licenses/by-nc-nd/3.0/" Interplay

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

Fraud within Asymmetric Multi-Hop Cellular Networks

Fraud within Asymmetric Multi-Hop Cellular Networks Financial Cryptography 2005 EPFL, Lausanne, Switzerland ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Wireless networks Single-hop cellular network Multi-hop network Multi-hop cellular network Asymmetric multi-hop

More information

Performance Evaluation of Deadline Monotonic Policy over protocol

Performance Evaluation of Deadline Monotonic Policy over protocol Performance Evaluation of Deadline Monotonic Policy over 80. protocol Ines El Korbi and Leila Azouz Saidane National School of Computer Science University of Manouba, 00 Tunisia Emails: ines.korbi@gmail.com

More information

Dominating Connectivity and Reliability of Heterogeneous Sensor Networks

Dominating Connectivity and Reliability of Heterogeneous Sensor Networks Dominating Connectivity and Reliability of Heterogeneous Sensor Networks Kenneth A. Berman Email: ken.berman@uc.edu Fred S. Annexstein Email: fred.annexstein@uc.edu Aravind Ranganathan Email: rangana@email.uc.edu

More information

Forward Correction and Fountain Codes in Delay Tolerant Networks

Forward Correction and Fountain Codes in Delay Tolerant Networks Forward Correction and Fountain Codes in Delay Tolerant Networks Eitan Altman INRIA, 24 Route des Lucioles, 692 Sophia-Antipolis Cedex, France eitan.altman@sophia.inria.fr Francesco De Pellegrini CREATE-NET,

More information

Multicast With Prioritized Delivery: How Fresh is Your Data?

Multicast With Prioritized Delivery: How Fresh is Your Data? Multicast With Prioritized Delivery: How Fresh is Your Data? Jing Zhong, Roy D Yates and Emina Solanin Department of ECE, Rutgers University, {ingzhong, ryates, eminasolanin}@rutgersedu arxiv:885738v [csit

More information

DEDI: A Framework for Analyzing Rank Evolution of Random Network Coding in a Wireless Network

DEDI: A Framework for Analyzing Rank Evolution of Random Network Coding in a Wireless Network DEDI: A Framework for Analyzing Rank Evolution of Random Network Coding in a Wireless Network Dan Zhang Narayan Mandayam and Shyam Parekh WINLAB, Rutgers University 671 Route 1 South, North Brunswick,

More information

Throughput-Optimal Robotic Message Ferrying for Wireless Networks using Backpressure Control

Throughput-Optimal Robotic Message Ferrying for Wireless Networks using Backpressure Control Throughput-Optimal obotic Message Ferrying for Wireless Networks using Backpressure Control Andrea Gasparri Department of Engineering oma Tre University ome, Italy gasparri@dia.uniroma3.it Bhaskar Krishnamachari

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer

More information

On the Capacity of the Interference Channel with a Relay

On the Capacity of the Interference Channel with a Relay On the Capacity of the Interference Channel with a Relay Ivana Marić, Ron Dabora and Andrea Goldsmith Stanford University, Stanford, CA {ivanam,ron,andrea}@wsl.stanford.edu Abstract Capacity gains due

More information

Markov Chain Model for ALOHA protocol

Markov Chain Model for ALOHA protocol Markov Chain Model for ALOHA protocol Laila Daniel and Krishnan Narayanan April 22, 2012 Outline of the talk A Markov chain (MC) model for Slotted ALOHA Basic properties of Discrete-time Markov Chain Stability

More information

MegaMIMO: Scaling Wireless Throughput with the Number of Users. Hariharan Rahul, Swarun Kumar and Dina Katabi

MegaMIMO: Scaling Wireless Throughput with the Number of Users. Hariharan Rahul, Swarun Kumar and Dina Katabi MegaMIMO: Scaling Wireless Throughput with the Number of Users Hariharan Rahul, Swarun Kumar and Dina Katabi There is a Looming Wireless Capacity Crunch Given the trends in the growth of wireless demand,

More information

Generalized Two-Hop Relay for Flexible Delay Control in MANETs

Generalized Two-Hop Relay for Flexible Delay Control in MANETs Generalized Two-Hop Relay for Flexible Delay Control in MANETs 12 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

More information

CDA6530: Performance Models of Computers and Networks. Chapter 2: Review of Practical Random Variables

CDA6530: Performance Models of Computers and Networks. Chapter 2: Review of Practical Random Variables CDA6530: Performance Models of Computers and Networks Chapter 2: Review of Practical Random Variables Two Classes of R.V. Discrete R.V. Bernoulli Binomial Geometric Poisson Continuous R.V. Uniform Exponential,

More information

Discrete Random Variables

Discrete Random Variables CPSC 53 Systems Modeling and Simulation Discrete Random Variables Dr. Anirban Mahanti Department of Computer Science University of Calgary mahanti@cpsc.ucalgary.ca Random Variables A random variable is

More information

Power Controlled FCFS Splitting Algorithm for Wireless Networks

Power Controlled FCFS Splitting Algorithm for Wireless Networks Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July

More information

Wideband Fading Channel Capacity with Training and Partial Feedback

Wideband Fading Channel Capacity with Training and Partial Feedback Wideband Fading Channel Capacity with Training and Partial Feedback Manish Agarwal, Michael L. Honig ECE Department, Northwestern University 145 Sheridan Road, Evanston, IL 6008 USA {m-agarwal,mh}@northwestern.edu

More information

Collaborative Localization Using Weighted Centroid Localization (WCL) Algorithm in CR Networks

Collaborative Localization Using Weighted Centroid Localization (WCL) Algorithm in CR Networks Collaborative Localization Using Weighted Centroid Localization (WCL) Algorithm in CR Networks Simulation and Theoretical Results Jun Wang Paulo Urriza Prof. Danijela Čabrić UCLA CORES Lab March 12, 2010

More information

Optimal Channel Probing and Transmission Scheduling in a Multichannel System

Optimal Channel Probing and Transmission Scheduling in a Multichannel System Optimal Channel Probing and Transmission Scheduling in a Multichannel System Nicholas B. Chang and Mingyan Liu Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor,

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks Joon Ahn a, Affan Syed b, Bhaskar Krishnamachari a, John Heidemann b a Ming Hsieh Department of Electrical Engineering,

More information

Flow-level performance of wireless data networks

Flow-level performance of wireless data networks Flow-level performance of wireless data networks Aleksi Penttinen Department of Communications and Networking, TKK Helsinki University of Technology CLOWN seminar 28.8.08 1/31 Outline 1. Flow-level model

More information

Interactive Interference Alignment

Interactive Interference Alignment Interactive Interference Alignment Quan Geng, Sreeram annan, and Pramod Viswanath Coordinated Science Laboratory and Dept. of ECE University of Illinois, Urbana-Champaign, IL 61801 Email: {geng5, kannan1,

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also

More information

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

ON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS. Michael G. Rabbat

ON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS. Michael G. Rabbat ON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS Michael G. Rabbat Dept. of Electrical and Computer Engineering McGill University, Montréal, Québec Email: michael.rabbat@mcgill.ca ABSTRACT This paper

More information

Processor Sharing Flows in the Internet

Processor Sharing Flows in the Internet STANFORD HPNG TECHNICAL REPORT TR4-HPNG4 Processor Sharing Flows in the Internet Nandita Dukkipati, Nick McKeown Computer Systems Laboratory Stanford University Stanford, CA 9434-93, USA nanditad, nickm

More information

Signalling Analysis for Adaptive TCD Routing in ISL Networks *

Signalling Analysis for Adaptive TCD Routing in ISL Networks * COST 272 Packet-Oriented Service delivery via Satellite Signalling Analysis for Adaptive TCD Routing in ISL Networks * Ales Svigelj, Mihael Mohorcic, Gorazd Kandus Jozef Stefan Institute, Ljubljana, Slovenia

More information

Network coding for online and dynamic networking problems. Tracey Ho Center for the Mathematics of Information California Institute of Technology

Network coding for online and dynamic networking problems. Tracey Ho Center for the Mathematics of Information California Institute of Technology Network coding for online and dynamic networking problems Tracey Ho Center for the Mathematics of Information California Institute of Technology 1 Work done in collaboration with: Harish Viswanathan: Bell

More information

Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe

Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem Wade Trappe Lecture Overview Network of Queues Introduction Queues in Tandem roduct Form Solutions Burke s Theorem What

More information

Interference and SINR in Dense Terahertz Networks

Interference and SINR in Dense Terahertz Networks Interference and SINR in Dense Terahertz Networks V. Petrov, D. Moltchanov, Y. Koucheryavy Nano Communications Center Tampere University of Technology Outline 1. Introduction to THz communications 2. Problem

More information

An algebraic framework for a unified view of route-vector protocols

An algebraic framework for a unified view of route-vector protocols An algebraic framework for a unified view of route-vector protocols João Luís Sobrinho Instituto Superior Técnico, Universidade de Lisboa Instituto de Telecomunicações Portugal 1 Outline 1. ontext for

More information

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks Communications and Networ, 2010, 2, 87-92 doi:10.4236/cn.2010.22014 Published Online May 2010 (http://www.scirp.org/journal/cn Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless

More information

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano

More information

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Performance analysis of IEEE WLANs with saturated and unsaturated sources Performance analysis of IEEE 82.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Hai L. Vu, Lachlan L. H. Andrew Centre for Advanced Internet Architectures, Technical Report 11811A Swinburne

More information

Network Performance Tomography

Network Performance Tomography Network Performance Tomography Hung X. Nguyen TeleTraffic Research Center University of Adelaide Network Performance Tomography Inferring link performance using end-to-end probes 2 Network Performance

More information

Capacity Limit, Link Scheduling and Power Control in Wireless Networks. Shan Zhou

Capacity Limit, Link Scheduling and Power Control in Wireless Networks. Shan Zhou Capacity Limit, Link Scheduling and Power Control in Wireless Networks by Shan Zhou A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Approved April

More information

Real-Time Course. Clock synchronization. June Peter van der TU/e Computer Science, System Architecture and Networking

Real-Time Course. Clock synchronization. June Peter van der TU/e Computer Science, System Architecture and Networking Real-Time Course Clock synchronization 1 Clocks Processor p has monotonically increasing clock function C p (t) Clock has drift rate For t1 and t2, with t2 > t1 (1-ρ)(t2-t1)

More information

Keyless authentication in the presence of a simultaneously transmitting adversary

Keyless authentication in the presence of a simultaneously transmitting adversary Keyless authentication in the presence of a simultaneously transmitting adversary Eric Graves Army Research Lab Adelphi MD 20783 U.S.A. ericsgra@ufl.edu Paul Yu Army Research Lab Adelphi MD 20783 U.S.A.

More information

A Quantitative View: Delay, Throughput, Loss

A Quantitative View: Delay, Throughput, Loss A Quantitative View: Delay, Throughput, Loss Antonio Carzaniga Faculty of Informatics University of Lugano September 27, 2017 Outline Quantitative analysis of data transfer concepts for network applications

More information

An Algebraic Approach to Network Coding

An Algebraic Approach to Network Coding An Algebraic Approach to July 30 31, 2009 Outline 1 2 a 3 Linear 4 Digital Communication Digital communication networks are integral parts of our lives these days; so, we want to know how to most effectively

More information

Dirichlet s Principle on Multiclass Multihop Wireless Networks: Minimum Cost Routing Subject to Stability

Dirichlet s Principle on Multiclass Multihop Wireless Networks: Minimum Cost Routing Subject to Stability Dirichlet s Principle on Multiclass Multihop Wireless Networks: Minimum Cost Routing Subject to Stability Reza Banirazi, Edmond Jonckheere, Bhaskar Krishnamachari Department of Electrical Engineering,

More information

On the Use of Division Algebras for Wireless Communication

On the Use of Division Algebras for Wireless Communication On the Use of Division Algebras for Wireless Communication frederique@systems.caltech.edu California Institute of Technology AMS meeting, Davidson, March 3rd 2007 Outline A few wireless coding problems

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

Failure-Resilient Ad Hoc and Sensor Networks in a Shadow Fading Environment

Failure-Resilient Ad Hoc and Sensor Networks in a Shadow Fading Environment Failure-Resilient Ad Hoc and Sensor Networks in a Shadow Fading Environment Christian Bettstetter DoCoMo Euro-Labs, Future Networking Lab, Munich, Germany lastname at docomolab-euro.com Abstract This paper

More information

Multi-User Communication: Capacity, Duality, and Cooperation. Nihar Jindal Stanford University Dept. of Electrical Engineering

Multi-User Communication: Capacity, Duality, and Cooperation. Nihar Jindal Stanford University Dept. of Electrical Engineering Multi-User Communication: Capacity, Duality, and Cooperation Niar Jindal Stanford University Dept. of Electrical Engineering February 3, 004 Wireless Communication Vision Cellular Networks Wireless LAN

More information

Analysis of Scalable TCP in the presence of Markovian Losses

Analysis of Scalable TCP in the presence of Markovian Losses Analysis of Scalable TCP in the presence of Markovian Losses E Altman K E Avrachenkov A A Kherani BJ Prabhu INRIA Sophia Antipolis 06902 Sophia Antipolis, France Email:altman,kavratchenkov,alam,bprabhu}@sophiainriafr

More information

arxiv: v1 [cs.dc] 30 Mar 2015

arxiv: v1 [cs.dc] 30 Mar 2015 Uniform Information Exchange in Multi-channel Wireless Ad Hoc Networks arxiv:1503.08570v1 [cs.dc] 30 Mar 2015 Li Ning Center for High Performance Computing Shenzhen Institutes of Advanced Technology, CAS

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Jung Hoon Lee and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University,

More information

Distributed Optimization over Networks Gossip-Based Algorithms

Distributed Optimization over Networks Gossip-Based Algorithms Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random

More information

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits

More information