Mathematical Analysis of Peer to Peer Communication in Networks B. Hajek (with thank you to collaborators L. Massoulie, S. Sanghavi, and Z.

Size: px
Start display at page:

Download "Mathematical Analysis of Peer to Peer Communication in Networks B. Hajek (with thank you to collaborators L. Massoulie, S. Sanghavi, and Z."

Transcription

1 Mathematical Analysis of Peer to Peer Communication in Networks B. Hajek (with thank you to collaborators L. Massoulie, S. Sanghavi, and Z. Zhu) 1

2 Outline of presentation I. Overview II. File exchange for fixed peer population III. File exchange with continuous arrival of peers A. Fluid analysis (after Massoulie and Vojnovic) B. Direct stochastic analysis (work with Ji Zhu) IV. Discussion 2

3 I. Overview 3

4 Traditional File Service 4

5 Peer-to-peer File Service Service capacity scales with demand! Scalable Robust 5

6 Rough composition of Internet traffic today* P2P file transfer of movies (50%), software distribution (20-30%), games, etc % Web pages (including social networking sites) 20-30% Web streaming (via flash, quicktime, etc.) 8% Voice over IP 1% s, gaming, newsgroups, other 5% *See Schulze and Mochalski, 09. 6

7 1 st Generation P2P Systems Entire file uploaded in one shot Users wait till entire file is received before relaying BUT if file size is large, 1. Long delay before users become useful. e.g. Gnutella, KaZaa 2. If users depart mid-way, a lot of upload time wasted. 7

8 2 nd Generation P2P Systems File split into pieces Peers can start serving pieces without waiting for entire file. More effective at serving large files. e.g. BitTorrent, edonkey 8

9 A Model for P2P Live Streaming [Zhao,Liu,Chiu 09] Play deadline

10 ISP Friendly P2P Protocols Trans-ISP traffic is costly to ISPs ISPs can throttle P2P based on deep packet inspection Would like small trans-isp traffic 10

11 Flash Crowds Number downloading 5K 4K 3K 2K 1K Rapid startup is common Much variation in size and duration Flash Crowd start 24 hours 48 hours 11

12 Broad questions To wrap up overview, here is an incomplete list of performance issues for P2P: Peer selection strategies Piece selection strategies Push vs. pull Effects of heterogeneous link speeds Effects of network topologies ISP friendly operation Applications: file transfer, live streaming, video on demand, online interactive gaming or instruction,... 12

13 II. File exchange for fixed peer population Pertains to early portion of flash crowd situation. 13

14 Speedup from File Splitting One file at one source to N peers, File consists of K pieces, Measure time in multiples of time to download one piece. If file is not split, best completion time is: If file is split, best completion time is: * *[Mundinger,Weber,Weiss 07] gives centralized algorithm. 14

15 Blind collection of pieces (no exchange of lists) If contacts result in random pieces, get coupon collection problem: C 1 C 4 C 5 C K-2 C K 15

16 Coding at source Source message: K pieces... C 1 C 2 C 3 C 4 C K Transformed to M coded pieces:... Ĉ 1 Ĉ 2 Ĉ 3 Ĉ 4 Ĉ M Peers only need to collect K out of M: Ĉ 1 Ĉ 4 Ĉ 5 Ĉ M-2 Ĉ M [Luby, Shakrollahi, Mitzenmacher, Urbanke,...] 16

17 Network coding [Ahlswede, Cai, Li, Yeung, ] Each peer collects and produces coded pieces: C 1 C 2 C 3 C 4 C K Ĉ 127 Ĉ 37 Ĉ Ĉ 28 Ĉ 187 Ĉ 187 Ĉ 157 Ĉ Ĉ 289 Ĉ 349 Ĉ 157 Ĉ 489 Ĉ 128 Ĉ 349 Can achieve one-to-all dissemination in C(K+logN) time without exchange of piece lists: [Deb,Medard,Choute 07]. Can achieve same result with same bounds by PUSH + PULL without network coding: [Sanghavi,H., Massoulie 07]. 17

18 Newton Institute, Cambridge N peers, N pieces Use exchange of piece lists Each peer is advocate for one piece Random contact Pull random useful piece, with priority for advocated piece Completion time N+ O(log(N)) with high prob. [Sanghavi,H.,Massoulie 07] (Believe completion time is at most N+2 with high probability.) Simple result for N peers, N pieces 22 Mar 10 18

19 III. File exchange with continuous arrival of peers A. Fluid analysis (after [Massoulié, Vojnovic 07]) 19

20 peers peers collecting pieces (coupons) pieces initial seeding seed 20

21 peers peers collecting pieces (coupons) pieces initial seeding seed 21

22 peers peers collecting pieces (coupons) pieces initial seeding seed 22

23 peers peers collecting pieces (coupons) pieces initial seeding seed 23

24 peers peers collecting pieces (coupons) pieces initial seeding 24

25 peers peers collecting pieces (coupons) pieces initial seeding seed 25

26 III. File exchange with continuous arrivals of peers A. Fluid analysis (after Massoulie and Vojnovic) B. Direct stochastic analysis (work with Ji Zhu) 26

27 peers collecting pieces (coupons) seed 22 Mar 10 Newton Institute, Cambridge 27

28 peers collecting pieces (coupons) seed 22 Mar 10 Newton Institute, Cambridge 28

29 22 Mar 10 29

30 peers collecting pieces (coupons) seed 22 Mar 10 Newton Institute, Cambridge 30

31 31

32 peers pieces one club (members have all pieces except piece one) normal young peers seed infected young peers 22 Mar 10 32

33 one club normal young peers seed infected young peers 33

34 one club normal young peers seed infected young peers 22 Mar 10 Newton Institute, Cambridge 34

35 one club normal young peers seed infected young peers 35

36 0 1 2 i K i j K-1 36

37 0 1 2 i K i j K-1 37

38 Discussion 38

39 Discussion (continued) (See Ji Zhu s poster Thursday) normal young peer one club (members have all pieces except piece one) infected young peer 39

40 Discussion (continued) 40

41 Discussion (continued) 41

42 42

43 43

44 Thanks! 44

Sharing Multiple Messages over Mobile Networks! Yuxin Chen, Sanjay Shakkottai, Jeffrey G. Andrews

Sharing Multiple Messages over Mobile Networks! Yuxin Chen, Sanjay Shakkottai, Jeffrey G. Andrews 2011 Infocom, Shanghai!! April 12, 2011! Sharing Multiple Messages over Mobile Networks! Yuxin Chen, Sanjay Shakkottai, Jeffrey G. Andrews Information Spreading over MANET!!! users over a unit area Each

More information

Understanding the Performance Gap between Pull-based Mesh Streaming Protocols and Fundamental Limits

Understanding the Performance Gap between Pull-based Mesh Streaming Protocols and Fundamental Limits Understanding the Performance Gap between Pull-based Mesh Streaming Protocols and Fundamental Limits Chen Feng, Baochun Li Dept. of Electrical and Computer Engineering University of Toronto Abstract Pull-based

More information

Global State and Gossip

Global State and Gossip Global State and Gossip CS 240: Computing Systems and Concurrency Lecture 6 Marco Canini Credits: Indranil Gupta developed much of the original material. Today 1. Global snapshot of a distributed system

More information

CS 457 Lecture 16 Routing Continued. Spring 2010

CS 457 Lecture 16 Routing Continued. Spring 2010 CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing

More information

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network Ad Hoc and Wireless Mesh Networking Laura Marie Feeney lmfeeney@sics.se Datakommunikation III, HT 00 Overview Ad hoc and wireless mesh networks Ad hoc network (MANet) operates independently of network

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation

Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Xiliang Liu Joint work with Kaliappa Ravindran and Dmitri Loguinov Department of Computer Science City University of New

More information

Novel bandwidth strategy for wireless P2P file sharing

Novel bandwidth strategy for wireless P2P file sharing Title Novel bandwidth strategy for wireless P2P file sharing Author(s) Meng, X; Tsang, PS; Lui, KS Citation The 2011 IEEE Wireless Communications and Networking Conference (WCNC), Cancun, Mexico, 28-31

More information

Information flow over wireless networks: a deterministic approach

Information flow over wireless networks: a deterministic approach Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory

More information

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer

More information

Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points

Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Pouya Ostovari and Jie Wu Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu

More information

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic

More information

Contracting Models for P2P Content Distribution

Contracting Models for P2P Content Distribution Contracting Models for P2P Content Distribution Yung-Ming Li Institute of Information Management National Chiao Tung University, Taiwan Nov. 27, 2009 1 Introduction A Peer-to-Peer (P2P) network is a social

More information

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted

More information

Critical Communications State of the Play

Critical Communications State of the Play Critical Communications State of the Play Mladen Vratonjić, Chairman mladen.vratonjic@tcca.info Control Rooms Use Critical Communications CRITICAL COMMUNICATIONS are the ones that are vital for performing

More information

CS 599: Distributed Intelligence in Robotics

CS 599: Distributed Intelligence in Robotics CS 599: Distributed Intelligence in Robotics Winter 2016 www.cpp.edu/~ftang/courses/cs599-di/ Dr. Daisy Tang All lecture notes are adapted from Dr. Lynne Parker s lecture notes on Distributed Intelligence

More information

2.6.1: Program Outcomes

2.6.1: Program Outcomes 2.6.1: Program Outcomes Program: M.Sc. Informatics Program Specific Outcomes (PSO) PSO1 This program provides studies in the field of informatics, which is essentially a blend of three domains: networking,

More information

How to write a great research paper

How to write a great research paper How to write a great research paper Deep Learning Indaba, Stellenbosch Nando de Freitas, Ulrich Paquet and Stephan Gouws, DeepMind; Martin Arjovsky and Kyunghyun Cho, New York University y n a How to write

More information

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education. Paper 1 May/June hours 30 minutes

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education. Paper 1 May/June hours 30 minutes www.xtremepapers.com UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education *4670938493* COMPUTER STUDIES 0420/11 Paper 1 May/June 2012 2 hours 30 minutes

More information

Variations on the Index Coding Problem: Pliable Index Coding and Caching

Variations on the Index Coding Problem: Pliable Index Coding and Caching Variations on the Index Coding Problem: Pliable Index Coding and Caching T. Liu K. Wan D. Tuninetti University of Illinois at Chicago Shannon s Centennial, Chicago, September 23rd 2016 D. Tuninetti (UIC)

More information

Have you ever had one of the following situations happen in your photography endeavors?

Have you ever had one of the following situations happen in your photography endeavors? Image Stacking by Joe Wenninger I decided to write this article myself after having issues trying to do a Median blending technique from a book about Photoshop. You needed to have the extended version

More information

EMWIN OVERVIEW. Outline

EMWIN OVERVIEW. Outline EMWIN OVERVIEW Thursday, July 10, 2008 Santos Rodriguez NWS EMWIN 1 Outline EMWIN System Description Users of EMWIN EMWIN and the GOES-N Satellite Generation EMWIN and the GOES-R Satellite Generation Project

More information

Area Traffic Control System (ATCS)

Area Traffic Control System (ATCS) Area Traffic Control System (ATCS) 1. Introduction: Area Traffic Control System is an indigenous solution for Indian Road Traffic, which optimizes traffic signal, covering a set of roads for an area in

More information

Presentation Outline

Presentation Outline Presentation Outline Who and what is RANET? What does RANET do? Core RANET principles and philosophies. Overview of Technologies Satellite Community FM Where does RANET work? Who are we? Just tell me where

More information

Data Dissemination in Wireless Sensor Networks

Data Dissemination in Wireless Sensor Networks Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks

More information

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab

More information

Qualcomm Research Dual-Cell HSDPA

Qualcomm Research Dual-Cell HSDPA Qualcomm Technologies, Inc. Qualcomm Research Dual-Cell HSDPA February 2015 Qualcomm Research is a division of Qualcomm Technologies, Inc. 1 Qualcomm Technologies, Inc. Qualcomm Technologies, Inc. 5775

More information

Introduction to Local and Wide Area Networks

Introduction to Local and Wide Area Networks Introduction to Local and Wide Area Networks Lecturers Amnach Khawne Jirasak Sittigorn Chapter 1 1 Routing Protocols and Concepts Chapter 10 : Link-State Routing Protocols Chapter 11 : OSPF Chapter 1 2

More information

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless

More information

Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks. Wei Wang, Vikram Srinivasan, Kee-Chaing Chua

Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks. Wei Wang, Vikram Srinivasan, Kee-Chaing Chua Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua Coverage in sensor networks Sensors are often randomly scattered in the field

More information

Network Layer (Routing)

Network Layer (Routing) Network Layer (Routing) Where we are in the ourse Moving on up to the Network Layer! Application Transport Network Link Physical SE 61 University of Washington Topics Network service models Datagrams (packets),

More information

LTE Essentials. Thursday, January 17, 2013 at 1:00 PM (ET)

LTE Essentials. Thursday, January 17, 2013 at 1:00 PM (ET) LTE Essentials Thursday, January 17, 2013 at 1:00 PM (ET) Instructor: Annabel Z. Dodd Author of "The Essential Guide to Telecommunications, Fifth Edition Questions for the Instructor or for a Logistics

More information

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks Tyler W Moore (joint work with Jolyon Clulow, Gerhard Hancke and Markus Kuhn) Computer Laboratory University of Cambridge Third European

More information

From network-level measurements to Quality of Experience: Estimating the quality of Internet access with ACQUA

From network-level measurements to Quality of Experience: Estimating the quality of Internet access with ACQUA From network-level measurements to Quality of Experience: Estimating the quality of Internet access with ACQUA Chadi.Barakat@inria.fr www-sop.inria.fr/members/chadi.barakat/ Joint work with D. Saucez,

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Introduction to OSPF. ISP Workshops. Last updated 11 November 2013

Introduction to OSPF. ISP Workshops. Last updated 11 November 2013 Introduction to OSPF ISP Workshops Last updated 11 November 2013 1 OSPF p Open Shortest Path First p Open: n Meaning an Open Standard n Developed by IETF (OSPF Working Group) for IP RFC1247 n Current standard

More information

BASIC CONCEPTS OF HSPA

BASIC CONCEPTS OF HSPA 284 23-3087 Uen Rev A BASIC CONCEPTS OF HSPA February 2007 White Paper HSPA is a vital part of WCDMA evolution and provides improved end-user experience as well as cost-efficient mobile/wireless broadband.

More information

Historical Allegory. Paperback Movies, Put a movie on a CD (a trivial problem) Asymmetrical coding (versus H.261)

Historical Allegory. Paperback Movies, Put a movie on a CD (a trivial problem) Asymmetrical coding (versus H.261) Historical Allegory Paperback Movies, 1984 Task: Approach: Result: By-product: Put a movie on a CD (a trivial problem) Asymmetrical coding (versus H.261) Scalable Video Decouple the Transmitter, channel,

More information

Lec 19 Error and Loss Control I: FEC

Lec 19 Error and Loss Control I: FEC Multimedia Communication Lec 19 Error and Loss Control I: FEC Zhu Li Course Web: http://l.web.umkc.edu/lizhu/teaching/ Z. Li, Multimedia Communciation, Spring 2017 p.1 Outline ReCap Lecture 18 TCP Congestion

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #16 Cross-Layer Attack & Defense 2016 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #16 Cross-Layer Attack & Defense 2015 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games

More information

Using Cooperation for Low Power Low Latency Cellular Connectivity

Using Cooperation for Low Power Low Latency Cellular Connectivity Using Cooperation for Low Power Low Latency Cellular Connectivity Cătălin Nicuțar, Dragoș Niculescu, Costin Raiciu University Politehnica of Bucharest, ROMANIA UE FP7 Project UEFISCDI Romania mobile kibbutz

More information

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR 5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Mar 22, 2011 Class #19 Cross-layer attacks and defenses Announcements Homework #3 is due March 24 Exam in class March 31 Agenda Cross-layer attacks

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted

More information

Using Online Communities as a Research Platform

Using Online Communities as a Research Platform CS 498 KA Experimental Methods for HCI Using Online Communities as a Research Platform Loren Terveen, John Riedl, Joseph A. Konstan, Cliff Lampe Presented by: Aabhas Chauhan Objective What are Online Communities?

More information

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area

More information

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation

More information

Resource Allocation Challenges in Future Wireless Networks

Resource Allocation Challenges in Future Wireless Networks Resource Allocation Challenges in Future Wireless Networks Mohamad Assaad Dept of Telecommunications, Supelec - France Mar. 2014 Outline 1 General Introduction 2 Fully Decentralized Allocation 3 Future

More information

Multi-Hop Probing Asymptotics In Available Bandwidth Estimation: Stochastic Analysis

Multi-Hop Probing Asymptotics In Available Bandwidth Estimation: Stochastic Analysis Multi-Hop Probing Asymptotics In Available Bandwidth Estimation: Stochastic Analysis Xiliang Liu, Kaliappa Ravindran City University of New York Dmitri Loguinov Texas A&M University 1 Problem Statement

More information

A Super trainer with advanced hardware and software features only found in very expensive equipment.

A Super trainer with advanced hardware and software features only found in very expensive equipment. PLC Trainer PTS T100 LAB EXPERIMENTS A Super trainer with advanced hardware and software features only found in very expensive equipment. You won t find any similar equipment among our competitors at such

More information

Diffusion of Networking Technologies

Diffusion of Networking Technologies Diffusion of Networking Technologies ISP Bellairs Workshop on Algorithmic Game Theory Barbados April 2012 Sharon Goldberg Boston University Princeton University Zhenming Liu Harvard University Diffusion

More information

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)

More information

Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function

Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function John MacLaren Walsh & Steven Weber Department of Electrical and Computer Engineering

More information

Leica Spider Infrastructure HW Solutions Introducing: Leica GR30 & GR50

Leica Spider Infrastructure HW Solutions Introducing: Leica GR30 & GR50 Leica Spider Infrastructure HW Solutions Introducing: Leica GR30 & GR50 Reliable solutions for today and tomorrow Leica Spider Integrated Solutions Introducing: Leica GR30 & GR50 Outline Introducing Leica

More information

CS649 Sensor Networks IP Lecture 9: Synchronization

CS649 Sensor Networks IP Lecture 9: Synchronization CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization

More information

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE. Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18

More information

2016 AMSAT Field Day

2016 AMSAT Field Day 2016 AMSAT Field Day It's that time of year again; summer and Field Day! Each year the American Radio Relay League (ARRL) sponsors Field Day as a picnic, a campout, practice for emergencies, an informal

More information

Control issues in cognitive networks. Marko Höyhtyä and Tao Chen CWC-VTT-Gigaseminar 4th December 2008

Control issues in cognitive networks. Marko Höyhtyä and Tao Chen CWC-VTT-Gigaseminar 4th December 2008 Control issues in cognitive networks Marko Höyhtyä and Tao Chen CWC-VTT-Gigaseminar 4th December 2008 Outline Cognitive wireless networks Cognitive mesh Topology control Frequency selection Power control

More information

Datasheet. Tag Piccolino for RTLS-TDoA. A tiny Tag powered by coin battery V1.1

Datasheet. Tag Piccolino for RTLS-TDoA. A tiny Tag powered by coin battery V1.1 Tag Piccolino for RTLS-TDoA A tiny Tag powered by coin battery Features Real-Time Location with UWB and TDoA Technique Movement Detection / Sensor Data Identification, unique MAC address Decawave UWB Radio,

More information

Mobility Online Graduation Student

Mobility Online Graduation Student Mobility Online Graduation Student This manual is to guide you through the Mobility Online tool used for graduation: standard and extended. It depends on your faculty if you should apply in the standard

More information

Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System

Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System Sandy Clark Travis Goodspeed Perry Metzger Zachary Wasserman Kevin Xu Matt Blaze Usenix

More information

Long Term Evolution (LTE) and 5th Generation Mobile Networks (5G) CS-539 Mobile Networks and Computing

Long Term Evolution (LTE) and 5th Generation Mobile Networks (5G) CS-539 Mobile Networks and Computing Long Term Evolution (LTE) and 5th Generation Mobile Networks (5G) Long Term Evolution (LTE) What is LTE? LTE is the next generation of Mobile broadband technology Data Rates up to 100Mbps Next level of

More information

Chapter 2 Channel Equalization

Chapter 2 Channel Equalization Chapter 2 Channel Equalization 2.1 Introduction In wireless communication systems signal experiences distortion due to fading [17]. As signal propagates, it follows multiple paths between transmitter and

More information

Background: Cellular network technology

Background: Cellular network technology Background: Cellular network technology Overview 1G: Analog voice (no global standard ) 2G: Digital voice (again GSM vs. CDMA) 3G: Digital voice and data Again... UMTS (WCDMA) vs. CDMA2000 (both CDMA-based)

More information

Gregory Bock, Brittany Dhall, Ryan Hendrickson, & Jared Lamkin Project Advisors: Dr. Jing Wang & Dr. In Soo Ahn Department of Electrical and Computer

Gregory Bock, Brittany Dhall, Ryan Hendrickson, & Jared Lamkin Project Advisors: Dr. Jing Wang & Dr. In Soo Ahn Department of Electrical and Computer Gregory Bock, Brittany Dhall, Ryan Hendrickson, & Jared Lamkin Project Advisors: Dr. Jing Wang & Dr. In Soo Ahn Department of Electrical and Computer Engineering March 1 st, 2016 Outline 2 I. Introduction

More information

SourceSync. Exploiting Sender Diversity

SourceSync. Exploiting Sender Diversity SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored

More information

Version 9.2. SmartPTT PLUS. Capacity Max Configuration Guide

Version 9.2. SmartPTT PLUS. Capacity Max Configuration Guide Version 9.2 Configuration Guide Januar 2018 Contents Contents 1 3 1.1 Configuring 5 1.2 Configuring Trunk Controller 9 1.3 Configuring MNIS Data Gateway 15 1.4 Configuring MNIS VRC Gateway 22 1.5 Configuring

More information

Distributed Virtual Environments!

Distributed Virtual Environments! Distributed Virtual Environments! Introduction! Richard M. Fujimoto! Professor!! Computational Science and Engineering Division! College of Computing! Georgia Institute of Technology! Atlanta, GA 30332-0765,

More information

MILnews. IP-based split-site operation with the R&S M3SR Series4100 HF radios. Offprint from MILnews 12. Electronics for security and defense

MILnews. IP-based split-site operation with the R&S M3SR Series4100 HF radios. Offprint from MILnews 12. Electronics for security and defense MILnews Electronics for security and defense Offprint from MILnews 12 IP-based split-site operation with the R&S M3SR Series4100 HF radios IP-based split-site operation with the R&S M3SR Series4100 HF

More information

The Wireless Data Crunch: Motivating Research in Wireless Communications

The Wireless Data Crunch: Motivating Research in Wireless Communications The Wireless Data Crunch: Motivating Research in Wireless Communications Stephen Hanly CSIRO-Macquarie University Chair in Wireless Communications stephen.hanly@mq.edu.au Wireless Growth Rate Cooper s

More information

Networks: how Information theory met the space and time. Philippe Jacquet INRIA Ecole Polytechnique France

Networks: how Information theory met the space and time. Philippe Jacquet INRIA Ecole Polytechnique France Networks: how Information theory met the space and time Philippe Jacquet INRIA Ecole Polytechnique France Plan of the talk History of networking and telecommunication Physics, mathematics, computer science

More information

SafeMobile Radio Configuration

SafeMobile Radio Configuration SafeMobile Radio Configuration SafeMobile offers a world of wireless applications that help organizations better manage their mobile assets, fleet and personnel. For more information, see www.safemobile.com.

More information

Engineering Scope and Sequence Student Outcomes (Objectives Skills/Verbs)

Engineering Scope and Sequence Student Outcomes (Objectives Skills/Verbs) The World of Modern Engineering What do Scientists and Engineers do? What is the difference between analog and digital devices? How do Engineers organize their designs? Introduction to LabView software

More information

Scalable Routing Protocols for Mobile Ad Hoc Networks

Scalable Routing Protocols for Mobile Ad Hoc Networks Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview

More information

America Invents Act. What does it mean for you?

America Invents Act. What does it mean for you? America Invents Act What does it mean for you? + Outline When is something patentable? Under first-to-invent Under first-to-file What do the changes mean for you? What do you need to (if anything) before

More information

Raffles, silent auctions, golf outings, OH MY!

Raffles, silent auctions, golf outings, OH MY! Raffles, silent auctions, golf outings, OH MY! Fundraiser/event best practices Ohio State Alumni Clubs and Societies Overview: Purpose and brainstorming Establishing planning timeline Create an outline

More information

Configuring the maximum number of external LSAs in LSDB 27 Configuring OSPF exit overflow interval 28 Enabling compatibility with RFC Logging

Configuring the maximum number of external LSAs in LSDB 27 Configuring OSPF exit overflow interval 28 Enabling compatibility with RFC Logging Contents Configuring OSPF 1 Overview 1 OSPF packets 1 LSA types 1 OSPF areas 2 Router types 4 Route types 5 Route calculation 6 OSPF network types 6 DR and BDR 6 Protocols and standards 8 OSPF configuration

More information

VEX IQ Challenge Inspection

VEX IQ Challenge Inspection Overview VEX IQ Challenge Inspection Every robot will be required to pass an inspection before being cleared to participate in the VEX IQ Challenge. The deadline for teams to successfully complete the

More information

Interference Alignment. Extensions. Basic Premise. Capacity and Feedback. EE360: Lecture 11 Outline Cross-Layer Design and CR. Feedback in Networks

Interference Alignment. Extensions. Basic Premise. Capacity and Feedback. EE360: Lecture 11 Outline Cross-Layer Design and CR. Feedback in Networks EE360: Lecture 11 Outline Cross- Design and Announcements HW 1 posted, due Feb. 24 at 5pm Progress reports due Feb. 29 at midnight (not Feb. 27) Interference alignment Beyond capacity: consummating unions

More information

Performance Analysis of Power Control and Cell Association in Heterogeneous Cellular Networks

Performance Analysis of Power Control and Cell Association in Heterogeneous Cellular Networks Performance Analysis of Power Control and Cell Association in Heterogeneous Cellular Networks Prasanna Herath Mudiyanselage PhD Final Examination Supervisors: Witold A. Krzymień and Chintha Tellambura

More information

PB Works e-portfolio Optimizing Photographs using Paintshop Pro 9

PB Works e-portfolio Optimizing Photographs using Paintshop Pro 9 PB Works e-portfolio Optimizing Photographs using Paintshop Pro 9 Digital camera resolution is rated in megapixels. Consumer class digital cameras purchased in 2002-05 typically were rated at 3.1 megapixels

More information

CANADIAN SIP TRUNKING MARKET REPORT

CANADIAN SIP TRUNKING MARKET REPORT i CANADIAN SIP TRUNKING MARKET REPORT ii TABLE OF CONTENTS Section Page SECTION 1: INTRODUCTION & INDUSTRY BACKGROUND... 1 1.1 Introduction... 2 1.2 How SIP Trunking Works... 4 1.3 Competitive Landscape...

More information

Cross-Layer Design and CR

Cross-Layer Design and CR EE360: Lecture 11 Outline Cross-Layer Design and CR Announcements HW 1 posted, due Feb. 24 at 5pm Progress reports due Feb. 29 at midnight (not Feb. 27) Interference alignment Beyond capacity: consummating

More information

Autonomous Self-deployment of Wireless Access Networks in an Airport Environment *

Autonomous Self-deployment of Wireless Access Networks in an Airport Environment * Autonomous Self-deployment of Wireless Access Networks in an Airport Environment * Holger Claussen Bell Labs Research, Swindon, UK. * This work was part-supported by the EU Commission through the IST FP5

More information

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous

More information

More Efficient Routing Algorithm for Ad Hoc Network

More Efficient Routing Algorithm for Ad Hoc Network More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks

More information

Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System. Candidate: Paola Pulini Advisor: Marco Chiani

Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System. Candidate: Paola Pulini Advisor: Marco Chiani Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System (AeroMACS) Candidate: Paola Pulini Advisor: Marco Chiani Outline Introduction and Motivations Thesis

More information

P. 241 Figure 8.1 Multiplexing

P. 241 Figure 8.1 Multiplexing CH 08 : MULTIPLEXING Multiplexing Multiplexing is multiple links on 1 physical line To make efficient use of high-speed telecommunications lines, some form of multiplexing is used It allows several transmission

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

EENG 444 / ENAS 944 Digital Communication Systems

EENG 444 / ENAS 944 Digital Communication Systems EENG 444 / ENAS 944 Digital Communication Systems Introduction!! Wenjun Hu Communication Systems What s the first thing that comes to your mind? Communication Systems What s the first thing that comes

More information

SwiftBroadband Technical workshop

SwiftBroadband Technical workshop SwiftBroadband Technical workshop Dale Irish Head of Aviation Product Management Gwenael Marchand Aviation Technical Specialist Agenda Current status Rapid growth amongst wide mix of users Network upgrades

More information

Grundlagen der Rechnernetze. Introduction

Grundlagen der Rechnernetze. Introduction Grundlagen der Rechnernetze Introduction Overview Building blocks and terms Basics of communication Addressing Protocols and Layers Performance Historical development Grundlagen der Rechnernetze Introduction

More information

Active Road Management Assisted by Satellite. ARMAS Phase II

Active Road Management Assisted by Satellite. ARMAS Phase II Active Road Management Assisted by Satellite ARMAS Phase II European Roundtable on Intelligent Roads Brussels, 26 January 2006 1 2 Table of Contents Overview of ARMAS System Architecture Field Trials Conclusions

More information

Games. Episode 6 Part III: Dynamics. Baochun Li Professor Department of Electrical and Computer Engineering University of Toronto

Games. Episode 6 Part III: Dynamics. Baochun Li Professor Department of Electrical and Computer Engineering University of Toronto Games Episode 6 Part III: Dynamics Baochun Li Professor Department of Electrical and Computer Engineering University of Toronto Dynamics Motivation for a new chapter 2 Dynamics Motivation for a new chapter

More information

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS Jie Chen, Tiejun Lv and Haitao Zheng Prepared by Cenker Demir The purpose of the authors To propose a Joint cross-layer design between MAC layer and Physical

More information

Basics of Error Correcting Codes

Basics of Error Correcting Codes Basics of Error Correcting Codes Drawing from the book Information Theory, Inference, and Learning Algorithms Downloadable or purchasable: http://www.inference.phy.cam.ac.uk/mackay/itila/book.html CSE

More information

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, 6.4.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Medium Sharing Techniques Static Channelization FDMA TDMA Attempt to produce an orderly access

More information

Chapter 6. Agile Transmission Techniques

Chapter 6. Agile Transmission Techniques Chapter 6 Agile Transmission Techniques 1 Outline Introduction Wireless Transmission for DSA Non Contiguous OFDM (NC-OFDM) NC-OFDM based CR: Challenges and Solutions Chapter 6 Summary 2 Outline Introduction

More information

The Business of Internet Radio. George Capalbo VP Engineering, Backbone Networks Corporation 2004

The Business of Internet Radio. George Capalbo VP Engineering, Backbone Networks Corporation 2004 The Business of Internet Radio George Capalbo VP Engineering, Backbone Networks Corporation 2004 Introduction This presentation is about the business and technology of Internet radio You are viewing because

More information