Mathematical Analysis of Peer to Peer Communication in Networks B. Hajek (with thank you to collaborators L. Massoulie, S. Sanghavi, and Z.
|
|
- Marvin Hodge
- 5 years ago
- Views:
Transcription
1 Mathematical Analysis of Peer to Peer Communication in Networks B. Hajek (with thank you to collaborators L. Massoulie, S. Sanghavi, and Z. Zhu) 1
2 Outline of presentation I. Overview II. File exchange for fixed peer population III. File exchange with continuous arrival of peers A. Fluid analysis (after Massoulie and Vojnovic) B. Direct stochastic analysis (work with Ji Zhu) IV. Discussion 2
3 I. Overview 3
4 Traditional File Service 4
5 Peer-to-peer File Service Service capacity scales with demand! Scalable Robust 5
6 Rough composition of Internet traffic today* P2P file transfer of movies (50%), software distribution (20-30%), games, etc % Web pages (including social networking sites) 20-30% Web streaming (via flash, quicktime, etc.) 8% Voice over IP 1% s, gaming, newsgroups, other 5% *See Schulze and Mochalski, 09. 6
7 1 st Generation P2P Systems Entire file uploaded in one shot Users wait till entire file is received before relaying BUT if file size is large, 1. Long delay before users become useful. e.g. Gnutella, KaZaa 2. If users depart mid-way, a lot of upload time wasted. 7
8 2 nd Generation P2P Systems File split into pieces Peers can start serving pieces without waiting for entire file. More effective at serving large files. e.g. BitTorrent, edonkey 8
9 A Model for P2P Live Streaming [Zhao,Liu,Chiu 09] Play deadline
10 ISP Friendly P2P Protocols Trans-ISP traffic is costly to ISPs ISPs can throttle P2P based on deep packet inspection Would like small trans-isp traffic 10
11 Flash Crowds Number downloading 5K 4K 3K 2K 1K Rapid startup is common Much variation in size and duration Flash Crowd start 24 hours 48 hours 11
12 Broad questions To wrap up overview, here is an incomplete list of performance issues for P2P: Peer selection strategies Piece selection strategies Push vs. pull Effects of heterogeneous link speeds Effects of network topologies ISP friendly operation Applications: file transfer, live streaming, video on demand, online interactive gaming or instruction,... 12
13 II. File exchange for fixed peer population Pertains to early portion of flash crowd situation. 13
14 Speedup from File Splitting One file at one source to N peers, File consists of K pieces, Measure time in multiples of time to download one piece. If file is not split, best completion time is: If file is split, best completion time is: * *[Mundinger,Weber,Weiss 07] gives centralized algorithm. 14
15 Blind collection of pieces (no exchange of lists) If contacts result in random pieces, get coupon collection problem: C 1 C 4 C 5 C K-2 C K 15
16 Coding at source Source message: K pieces... C 1 C 2 C 3 C 4 C K Transformed to M coded pieces:... Ĉ 1 Ĉ 2 Ĉ 3 Ĉ 4 Ĉ M Peers only need to collect K out of M: Ĉ 1 Ĉ 4 Ĉ 5 Ĉ M-2 Ĉ M [Luby, Shakrollahi, Mitzenmacher, Urbanke,...] 16
17 Network coding [Ahlswede, Cai, Li, Yeung, ] Each peer collects and produces coded pieces: C 1 C 2 C 3 C 4 C K Ĉ 127 Ĉ 37 Ĉ Ĉ 28 Ĉ 187 Ĉ 187 Ĉ 157 Ĉ Ĉ 289 Ĉ 349 Ĉ 157 Ĉ 489 Ĉ 128 Ĉ 349 Can achieve one-to-all dissemination in C(K+logN) time without exchange of piece lists: [Deb,Medard,Choute 07]. Can achieve same result with same bounds by PUSH + PULL without network coding: [Sanghavi,H., Massoulie 07]. 17
18 Newton Institute, Cambridge N peers, N pieces Use exchange of piece lists Each peer is advocate for one piece Random contact Pull random useful piece, with priority for advocated piece Completion time N+ O(log(N)) with high prob. [Sanghavi,H.,Massoulie 07] (Believe completion time is at most N+2 with high probability.) Simple result for N peers, N pieces 22 Mar 10 18
19 III. File exchange with continuous arrival of peers A. Fluid analysis (after [Massoulié, Vojnovic 07]) 19
20 peers peers collecting pieces (coupons) pieces initial seeding seed 20
21 peers peers collecting pieces (coupons) pieces initial seeding seed 21
22 peers peers collecting pieces (coupons) pieces initial seeding seed 22
23 peers peers collecting pieces (coupons) pieces initial seeding seed 23
24 peers peers collecting pieces (coupons) pieces initial seeding 24
25 peers peers collecting pieces (coupons) pieces initial seeding seed 25
26 III. File exchange with continuous arrivals of peers A. Fluid analysis (after Massoulie and Vojnovic) B. Direct stochastic analysis (work with Ji Zhu) 26
27 peers collecting pieces (coupons) seed 22 Mar 10 Newton Institute, Cambridge 27
28 peers collecting pieces (coupons) seed 22 Mar 10 Newton Institute, Cambridge 28
29 22 Mar 10 29
30 peers collecting pieces (coupons) seed 22 Mar 10 Newton Institute, Cambridge 30
31 31
32 peers pieces one club (members have all pieces except piece one) normal young peers seed infected young peers 22 Mar 10 32
33 one club normal young peers seed infected young peers 33
34 one club normal young peers seed infected young peers 22 Mar 10 Newton Institute, Cambridge 34
35 one club normal young peers seed infected young peers 35
36 0 1 2 i K i j K-1 36
37 0 1 2 i K i j K-1 37
38 Discussion 38
39 Discussion (continued) (See Ji Zhu s poster Thursday) normal young peer one club (members have all pieces except piece one) infected young peer 39
40 Discussion (continued) 40
41 Discussion (continued) 41
42 42
43 43
44 Thanks! 44
Sharing Multiple Messages over Mobile Networks! Yuxin Chen, Sanjay Shakkottai, Jeffrey G. Andrews
2011 Infocom, Shanghai!! April 12, 2011! Sharing Multiple Messages over Mobile Networks! Yuxin Chen, Sanjay Shakkottai, Jeffrey G. Andrews Information Spreading over MANET!!! users over a unit area Each
More informationUnderstanding the Performance Gap between Pull-based Mesh Streaming Protocols and Fundamental Limits
Understanding the Performance Gap between Pull-based Mesh Streaming Protocols and Fundamental Limits Chen Feng, Baochun Li Dept. of Electrical and Computer Engineering University of Toronto Abstract Pull-based
More informationGlobal State and Gossip
Global State and Gossip CS 240: Computing Systems and Concurrency Lecture 6 Marco Canini Credits: Indranil Gupta developed much of the original material. Today 1. Global snapshot of a distributed system
More informationCS 457 Lecture 16 Routing Continued. Spring 2010
CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing
More informationOverview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network
Ad Hoc and Wireless Mesh Networking Laura Marie Feeney lmfeeney@sics.se Datakommunikation III, HT 00 Overview Ad hoc and wireless mesh networks Ad hoc network (MANet) operates independently of network
More informationAchieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationBandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation
Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Xiliang Liu Joint work with Kaliappa Ravindran and Dmitri Loguinov Department of Computer Science City University of New
More informationNovel bandwidth strategy for wireless P2P file sharing
Title Novel bandwidth strategy for wireless P2P file sharing Author(s) Meng, X; Tsang, PS; Lui, KS Citation The 2011 IEEE Wireless Communications and Networking Conference (WCNC), Cancun, Mexico, 28-31
More informationInformation flow over wireless networks: a deterministic approach
Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory
More informationT. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University
Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer
More informationReliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points
Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Pouya Ostovari and Jie Wu Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu
More informationM U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic
M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic
More informationContracting Models for P2P Content Distribution
Contracting Models for P2P Content Distribution Yung-Ming Li Institute of Information Management National Chiao Tung University, Taiwan Nov. 27, 2009 1 Introduction A Peer-to-Peer (P2P) network is a social
More informationECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III
ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted
More informationCritical Communications State of the Play
Critical Communications State of the Play Mladen Vratonjić, Chairman mladen.vratonjic@tcca.info Control Rooms Use Critical Communications CRITICAL COMMUNICATIONS are the ones that are vital for performing
More informationCS 599: Distributed Intelligence in Robotics
CS 599: Distributed Intelligence in Robotics Winter 2016 www.cpp.edu/~ftang/courses/cs599-di/ Dr. Daisy Tang All lecture notes are adapted from Dr. Lynne Parker s lecture notes on Distributed Intelligence
More information2.6.1: Program Outcomes
2.6.1: Program Outcomes Program: M.Sc. Informatics Program Specific Outcomes (PSO) PSO1 This program provides studies in the field of informatics, which is essentially a blend of three domains: networking,
More informationHow to write a great research paper
How to write a great research paper Deep Learning Indaba, Stellenbosch Nando de Freitas, Ulrich Paquet and Stephan Gouws, DeepMind; Martin Arjovsky and Kyunghyun Cho, New York University y n a How to write
More informationUNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education. Paper 1 May/June hours 30 minutes
www.xtremepapers.com UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education *4670938493* COMPUTER STUDIES 0420/11 Paper 1 May/June 2012 2 hours 30 minutes
More informationVariations on the Index Coding Problem: Pliable Index Coding and Caching
Variations on the Index Coding Problem: Pliable Index Coding and Caching T. Liu K. Wan D. Tuninetti University of Illinois at Chicago Shannon s Centennial, Chicago, September 23rd 2016 D. Tuninetti (UIC)
More informationHave you ever had one of the following situations happen in your photography endeavors?
Image Stacking by Joe Wenninger I decided to write this article myself after having issues trying to do a Median blending technique from a book about Photoshop. You needed to have the extended version
More informationEMWIN OVERVIEW. Outline
EMWIN OVERVIEW Thursday, July 10, 2008 Santos Rodriguez NWS EMWIN 1 Outline EMWIN System Description Users of EMWIN EMWIN and the GOES-N Satellite Generation EMWIN and the GOES-R Satellite Generation Project
More informationArea Traffic Control System (ATCS)
Area Traffic Control System (ATCS) 1. Introduction: Area Traffic Control System is an indigenous solution for Indian Road Traffic, which optimizes traffic signal, covering a set of roads for an area in
More informationPresentation Outline
Presentation Outline Who and what is RANET? What does RANET do? Core RANET principles and philosophies. Overview of Technologies Satellite Community FM Where does RANET work? Who are we? Just tell me where
More informationData Dissemination in Wireless Sensor Networks
Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks
More informationSimulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool
Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab
More informationQualcomm Research Dual-Cell HSDPA
Qualcomm Technologies, Inc. Qualcomm Research Dual-Cell HSDPA February 2015 Qualcomm Research is a division of Qualcomm Technologies, Inc. 1 Qualcomm Technologies, Inc. Qualcomm Technologies, Inc. 5775
More informationIntroduction to Local and Wide Area Networks
Introduction to Local and Wide Area Networks Lecturers Amnach Khawne Jirasak Sittigorn Chapter 1 1 Routing Protocols and Concepts Chapter 10 : Link-State Routing Protocols Chapter 11 : OSPF Chapter 1 2
More informationPerformance Evaluation of a Video Broadcasting System over Wireless Mesh Network
Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless
More informationTrade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks. Wei Wang, Vikram Srinivasan, Kee-Chaing Chua
Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua Coverage in sensor networks Sensors are often randomly scattered in the field
More informationNetwork Layer (Routing)
Network Layer (Routing) Where we are in the ourse Moving on up to the Network Layer! Application Transport Network Link Physical SE 61 University of Washington Topics Network service models Datagrams (packets),
More informationLTE Essentials. Thursday, January 17, 2013 at 1:00 PM (ET)
LTE Essentials Thursday, January 17, 2013 at 1:00 PM (ET) Instructor: Annabel Z. Dodd Author of "The Essential Guide to Telecommunications, Fifth Edition Questions for the Instructor or for a Logistics
More informationSo Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks Tyler W Moore (joint work with Jolyon Clulow, Gerhard Hancke and Markus Kuhn) Computer Laboratory University of Cambridge Third European
More informationFrom network-level measurements to Quality of Experience: Estimating the quality of Internet access with ACQUA
From network-level measurements to Quality of Experience: Estimating the quality of Internet access with ACQUA Chadi.Barakat@inria.fr www-sop.inria.fr/members/chadi.barakat/ Joint work with D. Saucez,
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationIntroduction to OSPF. ISP Workshops. Last updated 11 November 2013
Introduction to OSPF ISP Workshops Last updated 11 November 2013 1 OSPF p Open Shortest Path First p Open: n Meaning an Open Standard n Developed by IETF (OSPF Working Group) for IP RFC1247 n Current standard
More informationBASIC CONCEPTS OF HSPA
284 23-3087 Uen Rev A BASIC CONCEPTS OF HSPA February 2007 White Paper HSPA is a vital part of WCDMA evolution and provides improved end-user experience as well as cost-efficient mobile/wireless broadband.
More informationHistorical Allegory. Paperback Movies, Put a movie on a CD (a trivial problem) Asymmetrical coding (versus H.261)
Historical Allegory Paperback Movies, 1984 Task: Approach: Result: By-product: Put a movie on a CD (a trivial problem) Asymmetrical coding (versus H.261) Scalable Video Decouple the Transmitter, channel,
More informationLec 19 Error and Loss Control I: FEC
Multimedia Communication Lec 19 Error and Loss Control I: FEC Zhu Li Course Web: http://l.web.umkc.edu/lizhu/teaching/ Z. Li, Multimedia Communciation, Spring 2017 p.1 Outline ReCap Lecture 18 TCP Congestion
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #16 Cross-Layer Attack & Defense 2016 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #16 Cross-Layer Attack & Defense 2015 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games
More informationUsing Cooperation for Low Power Low Latency Cellular Connectivity
Using Cooperation for Low Power Low Latency Cellular Connectivity Cătălin Nicuțar, Dragoș Niculescu, Costin Raiciu University Politehnica of Bucharest, ROMANIA UE FP7 Project UEFISCDI Romania mobile kibbutz
More informationVulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR
5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden
More informationWireless Network Security Spring 2011
Wireless Network Security 14-814 Spring 2011 Patrick Tague Mar 22, 2011 Class #19 Cross-layer attacks and defenses Announcements Homework #3 is due March 24 Exam in class March 31 Agenda Cross-layer attacks
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted
More informationUsing Online Communities as a Research Platform
CS 498 KA Experimental Methods for HCI Using Online Communities as a Research Platform Loren Terveen, John Riedl, Joseph A. Konstan, Cliff Lampe Presented by: Aabhas Chauhan Objective What are Online Communities?
More informationOSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP
OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area
More informationOSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database
OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation
More informationResource Allocation Challenges in Future Wireless Networks
Resource Allocation Challenges in Future Wireless Networks Mohamad Assaad Dept of Telecommunications, Supelec - France Mar. 2014 Outline 1 General Introduction 2 Fully Decentralized Allocation 3 Future
More informationMulti-Hop Probing Asymptotics In Available Bandwidth Estimation: Stochastic Analysis
Multi-Hop Probing Asymptotics In Available Bandwidth Estimation: Stochastic Analysis Xiliang Liu, Kaliappa Ravindran City University of New York Dmitri Loguinov Texas A&M University 1 Problem Statement
More informationA Super trainer with advanced hardware and software features only found in very expensive equipment.
PLC Trainer PTS T100 LAB EXPERIMENTS A Super trainer with advanced hardware and software features only found in very expensive equipment. You won t find any similar equipment among our competitors at such
More informationDiffusion of Networking Technologies
Diffusion of Networking Technologies ISP Bellairs Workshop on Algorithmic Game Theory Barbados April 2012 Sharon Goldberg Boston University Princeton University Zhenming Liu Harvard University Diffusion
More informationMultiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks
Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)
More informationOptimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function
Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function John MacLaren Walsh & Steven Weber Department of Electrical and Computer Engineering
More informationLeica Spider Infrastructure HW Solutions Introducing: Leica GR30 & GR50
Leica Spider Infrastructure HW Solutions Introducing: Leica GR30 & GR50 Reliable solutions for today and tomorrow Leica Spider Integrated Solutions Introducing: Leica GR30 & GR50 Outline Introducing Leica
More informationCS649 Sensor Networks IP Lecture 9: Synchronization
CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization
More informationCoding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.
Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18
More information2016 AMSAT Field Day
2016 AMSAT Field Day It's that time of year again; summer and Field Day! Each year the American Radio Relay League (ARRL) sponsors Field Day as a picnic, a campout, practice for emergencies, an informal
More informationControl issues in cognitive networks. Marko Höyhtyä and Tao Chen CWC-VTT-Gigaseminar 4th December 2008
Control issues in cognitive networks Marko Höyhtyä and Tao Chen CWC-VTT-Gigaseminar 4th December 2008 Outline Cognitive wireless networks Cognitive mesh Topology control Frequency selection Power control
More informationDatasheet. Tag Piccolino for RTLS-TDoA. A tiny Tag powered by coin battery V1.1
Tag Piccolino for RTLS-TDoA A tiny Tag powered by coin battery Features Real-Time Location with UWB and TDoA Technique Movement Detection / Sensor Data Identification, unique MAC address Decawave UWB Radio,
More informationMobility Online Graduation Student
Mobility Online Graduation Student This manual is to guide you through the Mobility Online tool used for graduation: standard and extended. It depends on your faculty if you should apply in the standard
More informationWhy (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System
Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System Sandy Clark Travis Goodspeed Perry Metzger Zachary Wasserman Kevin Xu Matt Blaze Usenix
More informationLong Term Evolution (LTE) and 5th Generation Mobile Networks (5G) CS-539 Mobile Networks and Computing
Long Term Evolution (LTE) and 5th Generation Mobile Networks (5G) Long Term Evolution (LTE) What is LTE? LTE is the next generation of Mobile broadband technology Data Rates up to 100Mbps Next level of
More informationChapter 2 Channel Equalization
Chapter 2 Channel Equalization 2.1 Introduction In wireless communication systems signal experiences distortion due to fading [17]. As signal propagates, it follows multiple paths between transmitter and
More informationBackground: Cellular network technology
Background: Cellular network technology Overview 1G: Analog voice (no global standard ) 2G: Digital voice (again GSM vs. CDMA) 3G: Digital voice and data Again... UMTS (WCDMA) vs. CDMA2000 (both CDMA-based)
More informationGregory Bock, Brittany Dhall, Ryan Hendrickson, & Jared Lamkin Project Advisors: Dr. Jing Wang & Dr. In Soo Ahn Department of Electrical and Computer
Gregory Bock, Brittany Dhall, Ryan Hendrickson, & Jared Lamkin Project Advisors: Dr. Jing Wang & Dr. In Soo Ahn Department of Electrical and Computer Engineering March 1 st, 2016 Outline 2 I. Introduction
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More informationVersion 9.2. SmartPTT PLUS. Capacity Max Configuration Guide
Version 9.2 Configuration Guide Januar 2018 Contents Contents 1 3 1.1 Configuring 5 1.2 Configuring Trunk Controller 9 1.3 Configuring MNIS Data Gateway 15 1.4 Configuring MNIS VRC Gateway 22 1.5 Configuring
More informationDistributed Virtual Environments!
Distributed Virtual Environments! Introduction! Richard M. Fujimoto! Professor!! Computational Science and Engineering Division! College of Computing! Georgia Institute of Technology! Atlanta, GA 30332-0765,
More informationMILnews. IP-based split-site operation with the R&S M3SR Series4100 HF radios. Offprint from MILnews 12. Electronics for security and defense
MILnews Electronics for security and defense Offprint from MILnews 12 IP-based split-site operation with the R&S M3SR Series4100 HF radios IP-based split-site operation with the R&S M3SR Series4100 HF
More informationThe Wireless Data Crunch: Motivating Research in Wireless Communications
The Wireless Data Crunch: Motivating Research in Wireless Communications Stephen Hanly CSIRO-Macquarie University Chair in Wireless Communications stephen.hanly@mq.edu.au Wireless Growth Rate Cooper s
More informationNetworks: how Information theory met the space and time. Philippe Jacquet INRIA Ecole Polytechnique France
Networks: how Information theory met the space and time Philippe Jacquet INRIA Ecole Polytechnique France Plan of the talk History of networking and telecommunication Physics, mathematics, computer science
More informationSafeMobile Radio Configuration
SafeMobile Radio Configuration SafeMobile offers a world of wireless applications that help organizations better manage their mobile assets, fleet and personnel. For more information, see www.safemobile.com.
More informationEngineering Scope and Sequence Student Outcomes (Objectives Skills/Verbs)
The World of Modern Engineering What do Scientists and Engineers do? What is the difference between analog and digital devices? How do Engineers organize their designs? Introduction to LabView software
More informationScalable Routing Protocols for Mobile Ad Hoc Networks
Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview
More informationAmerica Invents Act. What does it mean for you?
America Invents Act What does it mean for you? + Outline When is something patentable? Under first-to-invent Under first-to-file What do the changes mean for you? What do you need to (if anything) before
More informationRaffles, silent auctions, golf outings, OH MY!
Raffles, silent auctions, golf outings, OH MY! Fundraiser/event best practices Ohio State Alumni Clubs and Societies Overview: Purpose and brainstorming Establishing planning timeline Create an outline
More informationConfiguring the maximum number of external LSAs in LSDB 27 Configuring OSPF exit overflow interval 28 Enabling compatibility with RFC Logging
Contents Configuring OSPF 1 Overview 1 OSPF packets 1 LSA types 1 OSPF areas 2 Router types 4 Route types 5 Route calculation 6 OSPF network types 6 DR and BDR 6 Protocols and standards 8 OSPF configuration
More informationVEX IQ Challenge Inspection
Overview VEX IQ Challenge Inspection Every robot will be required to pass an inspection before being cleared to participate in the VEX IQ Challenge. The deadline for teams to successfully complete the
More informationInterference Alignment. Extensions. Basic Premise. Capacity and Feedback. EE360: Lecture 11 Outline Cross-Layer Design and CR. Feedback in Networks
EE360: Lecture 11 Outline Cross- Design and Announcements HW 1 posted, due Feb. 24 at 5pm Progress reports due Feb. 29 at midnight (not Feb. 27) Interference alignment Beyond capacity: consummating unions
More informationPerformance Analysis of Power Control and Cell Association in Heterogeneous Cellular Networks
Performance Analysis of Power Control and Cell Association in Heterogeneous Cellular Networks Prasanna Herath Mudiyanselage PhD Final Examination Supervisors: Witold A. Krzymień and Chintha Tellambura
More informationPB Works e-portfolio Optimizing Photographs using Paintshop Pro 9
PB Works e-portfolio Optimizing Photographs using Paintshop Pro 9 Digital camera resolution is rated in megapixels. Consumer class digital cameras purchased in 2002-05 typically were rated at 3.1 megapixels
More informationCANADIAN SIP TRUNKING MARKET REPORT
i CANADIAN SIP TRUNKING MARKET REPORT ii TABLE OF CONTENTS Section Page SECTION 1: INTRODUCTION & INDUSTRY BACKGROUND... 1 1.1 Introduction... 2 1.2 How SIP Trunking Works... 4 1.3 Competitive Landscape...
More informationCross-Layer Design and CR
EE360: Lecture 11 Outline Cross-Layer Design and CR Announcements HW 1 posted, due Feb. 24 at 5pm Progress reports due Feb. 29 at midnight (not Feb. 27) Interference alignment Beyond capacity: consummating
More informationAutonomous Self-deployment of Wireless Access Networks in an Airport Environment *
Autonomous Self-deployment of Wireless Access Networks in an Airport Environment * Holger Claussen Bell Labs Research, Swindon, UK. * This work was part-supported by the EU Commission through the IST FP5
More informationSyed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University
Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous
More informationMore Efficient Routing Algorithm for Ad Hoc Network
More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks
More informationPerformance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System. Candidate: Paola Pulini Advisor: Marco Chiani
Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System (AeroMACS) Candidate: Paola Pulini Advisor: Marco Chiani Outline Introduction and Motivations Thesis
More informationP. 241 Figure 8.1 Multiplexing
CH 08 : MULTIPLEXING Multiplexing Multiplexing is multiple links on 1 physical line To make efficient use of high-speed telecommunications lines, some form of multiplexing is used It allows several transmission
More informationWireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale
Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks
More informationEENG 444 / ENAS 944 Digital Communication Systems
EENG 444 / ENAS 944 Digital Communication Systems Introduction!! Wenjun Hu Communication Systems What s the first thing that comes to your mind? Communication Systems What s the first thing that comes
More informationSwiftBroadband Technical workshop
SwiftBroadband Technical workshop Dale Irish Head of Aviation Product Management Gwenael Marchand Aviation Technical Specialist Agenda Current status Rapid growth amongst wide mix of users Network upgrades
More informationGrundlagen der Rechnernetze. Introduction
Grundlagen der Rechnernetze Introduction Overview Building blocks and terms Basics of communication Addressing Protocols and Layers Performance Historical development Grundlagen der Rechnernetze Introduction
More informationActive Road Management Assisted by Satellite. ARMAS Phase II
Active Road Management Assisted by Satellite ARMAS Phase II European Roundtable on Intelligent Roads Brussels, 26 January 2006 1 2 Table of Contents Overview of ARMAS System Architecture Field Trials Conclusions
More informationGames. Episode 6 Part III: Dynamics. Baochun Li Professor Department of Electrical and Computer Engineering University of Toronto
Games Episode 6 Part III: Dynamics Baochun Li Professor Department of Electrical and Computer Engineering University of Toronto Dynamics Motivation for a new chapter 2 Dynamics Motivation for a new chapter
More informationCROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS
CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS Jie Chen, Tiejun Lv and Haitao Zheng Prepared by Cenker Demir The purpose of the authors To propose a Joint cross-layer design between MAC layer and Physical
More informationBasics of Error Correcting Codes
Basics of Error Correcting Codes Drawing from the book Information Theory, Inference, and Learning Algorithms Downloadable or purchasable: http://www.inference.phy.cam.ac.uk/mackay/itila/book.html CSE
More informationMultiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, 6.4.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Medium Sharing Techniques Static Channelization FDMA TDMA Attempt to produce an orderly access
More informationChapter 6. Agile Transmission Techniques
Chapter 6 Agile Transmission Techniques 1 Outline Introduction Wireless Transmission for DSA Non Contiguous OFDM (NC-OFDM) NC-OFDM based CR: Challenges and Solutions Chapter 6 Summary 2 Outline Introduction
More informationThe Business of Internet Radio. George Capalbo VP Engineering, Backbone Networks Corporation 2004
The Business of Internet Radio George Capalbo VP Engineering, Backbone Networks Corporation 2004 Introduction This presentation is about the business and technology of Internet radio You are viewing because
More information