Non-Traditional Routing, Transport and Localization Y. Richard Yang 3/3/2009.

Slides:



Advertisements
Similar presentations
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Advertisements

Symbol Level Network Coding By Sachin Katti, Dina Katabi, Hari Balakrishnan, Muriel Medard Sigcomm 2008.
1 Wireless Sensor Networks Akyildiz/Vuran Administration Issues  Take home Mid-term Exam  Assign April 2, Due April 7  Individual work is required 
School of Information Technologies TCP Congestion Control NETS3303/3603 Week 9.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
IETF WG Presentation1 Beth Johnson TCP over Satellite (tcpsat)
An Overview of the Global Positioning Satellite System (GPS) Edward J. Delp N9YTE October 25, 2000
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Travis Grant – Mingzhe Li, Choong-Soo Lee, Emmanuel.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
Reliable Transport Layers in Wireless Networks Mark Perillo Electrical and Computer Engineering.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
1 Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Monday March 12, 2007 Acknowledgement:
Network Layer: Non-Traditional Wireless Routing Localization Intro Y. Richard Yang 12/4/2012.
Patrick Caldwell Chris Kellar. Overview  Basic Concepts  History  Structure  Applications  Communication  Typical Sources of Error.
Location Y. Richard Yang 4/6/ Wireless Networking: Summary send receive status info info/control - The ability to communicate is a foundational.
ECE 4450:427/527 - Computer Networks Spring 2015
Lecture 1 Wireless Networks CPE 401/601 Computer Network Systems slides are modified from Jim Kurose & Keith Ross All material copyright J.F.
SVY 207: Lecture 4 GPS Description and Signal Structure
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
Revisiting the Contract Between Layers Sachin Katti Dina Katabi, Hari Balakrishnan, Muriel Medard.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
TCP with Variance Control for Multihop IEEE Wireless Networks Jiwei Chen, Mario Gerla, Yeng-zhong Lee.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Trading Structure for Randomness in Wireless Opportunistic Routing Szymon Chachulski, Michael Jennings, Sachin Katti and Dina Katabi MIT CSAIL SIGCOMM.
Image Enhancement Objective: better visualization of remotely sensed images visual interpretation remains to be the most powerful image interpretation.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Revised 10/30/20061 Overview of GPS FORT 130 Forest Mapping Systems.
TCP over Wireless PROF. MICHAEL TSAI 2016/6/3. TCP Congestion Control (TCP Tahoe) Only ACK correctly received packets Congestion Window Size: Maximum.
Lecture Multiple Access Techniques Dr. Ghalib A. Shah
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
An Overview of the Global Positioning Satellite System (GPS)
IMPROVING OF WIRELESS MESH NETWORKS.
Cross Layer Design; Localization
Chapter 5 Link Layer and LANs
Click to edit Master subtitle style
Wireless LANs Wireless proliferating rapidly.
Wireless ATM & Congestion Control
Wireless Networks.
Wireless Transport.
Ad-hoc Transport Layer Protocol (ATCP)
CSE 4905 Network Security Overview
Net 435: Wireless sensor network (WSN)
CS 457 – Lecture 7 Wireless Networks
Network Layer: Non-Traditional Wireless Routing Localization Intro
Network Routing: Link Metrics and Non-Traditional Routing
Wireless Ad Hoc Network
Hidden Terminal Decoding and Mesh Network Capacity
Surveying Instruments
Off-Road Equipment Management TSM 262: Spring 2016
Network: Non Traditional Routing
Location Y. Richard Yang 4/6/2011.
IT351: Mobile & Wireless Computing
EE 122: Lecture 7 Ion Stoica September 18, 2001.
Network Architecture for Cyberspace
Building A Network: Cost Effective Resource Sharing
Transport Layer: Congestion Control
Review of Internet Protocols Transport Layer
Chapter 15. Satellite Services and the Internet
Impact of transmission errors on TCP performance
Presentation transcript:

Non-Traditional Routing, Transport and Localization Y. Richard Yang 3/3/2009

2 Admin. r Project proposal: m March 6 by to and r Exam date?

Outline r Admin. r Opportunistic routing r Transport overview r Localization overview 3

Recap: Opportunistic Routing r Basic idea: m Take advantage of spatial diversity r Key issue m Avoid redundancy and interference r Techniques m ExOR: coordination m MORE: coordination -> random network coding 4

S R1 R2 D 99% (10 -3 BER) Problem of MORE 0% Opportunistic Routing  50 transmissions Loss

MIXIT: Revisiting Link/ Network API PHY + LLDeliver correct symbols to higher layer NetworkForward correct symbols to destination R1 R2 S P1 P2 P1 P2 P1 P2

Key Question: What Should Each Router Forward? R1 R2 D S P1 P2 P1 P2 P1 P2

Key Question: What Should Each Router Forward? R1 R2 D S P1 P2 Forward everything  Inefficient P1 P2 P1 P2 P1 P2 P1 P2

Forward random combinations of correct symbols R1 R2 D S P1 P2 Symbol Level Network Coding P1 P2 P1 P2

… … R1 R2 D … … … Routers create random combinations of correct symbols … Symbol Level Network Coding

R1 R2 D … … Solve 2 equations Destination decodes by solving linear equations Symbol Level Network Coding

… … R1 R2 D … … … Routers create random combinations of correct symbols … Symbol Level Network Coding

R1 R2 D … … Solve 2 equations Destination decodes by solving linear equations Symbol Level Network Coding

Problem: Mixed Correct and Incorrect Symbols Original Packets

Destination needs to know which combinations it received Use run length encoding Original Packets Coded Packet

Original Packets Coded Packet Use run length encoding Destination needs to know which combinations it received

Original Packets Coded Packet Destination needs to know which combinations it received Use run length encoding

Original Packets Coded Packet Destination needs to know which combinations it received Use run length encoding

Destination needs to know which combinations it received Use run length encoding

Evaluation Implementation on GNURadio SDR and USRP Zigbee (IEEE ) link layer 25 node indoor testbed, random flows Compared to: 1.Shortest path routing based on ETX 2.MORE: Packet-level opportunistic routing

Throughput (Kbps) CDF Throughput Comparison 2.1x 3x Shortest Path MORE MIXIT

Outline r Admin. r Opportunistic routing r Transport overview 22

23 Transport Layer vs. Network Layer r Provide logical communication between app’ processes r Transport protocols run in end systems r Transport vs. network layer services: m network layer data transfer between end systems m transport layer data transfer between processes relies on, enhances, network layer services application transport network data link physical application transport network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical logical end-end transport

24 Transport Layer Services and Protocols r Transport services m multiplexing/demultiplexing m flow control m reliable data transfer m congestion/rate control r Transport protocols in the Internet m UDP m TCP

25 flow 2 (5 Mbps) flow 1 router 1 10 Mbps 5 Mbps 20 Mbps Key Challenge in Transport: Rate /Congestion Control Assume m flow 2 fixed at 5 Mbps m no retransmission m the link from router 1 to router 2 has finite buffer 5 Mbps 20 Mbps sending rate by flow 1 (Mbps) throughput of flows 1 & 2 (Mbps) r when packet dropped at the link from router 2 to router 5, the upstream transmission from router 1 to router 2 used for that packet was wasted! 0 router 3 router 4 router 2 router 5 router 6

26 TCP Reliability/Rate Control m End-to-end, sliding window-based reliability m Use the AIMD algorithm to adjust the sliding window size dynamically m after receiving an ACK for a packet, increase cwin by 1/cwin m if any loss, reduce cwin to half cwnd w

27 TCP/Reno: Cwin Time cwnd congestion avoidance Loss congestion avoidance Loss congestion avoidance Q: Is TCP rate control effective in wireless networks?

28 TCP/Reno Throughput as a Function of Loss Rate r Given mean packet loss rate p, mean round- trip time RTT, packet size S

29 Example r Assume a TCP flow with S = 1000 bits, RTT = 10 ms r Assume the link bandwidth is 11 Mbps r If there is only one flow, then the (congestion) loss rate to fully utilize the link r Assume a wireless network with packet (corruption) loss rate of 4%, m then the maximum achievable rate using TCP/Reno is 700 Kbps r If we increase RTT = 200 ms (satellite) m the rate is 35 Kbps

Discussion r Does TCP perform really that bad in wireless? 30 mobile host base station “wired“ Internet

31 Wireless Networking: Summary send receive status info info/control - The ability to communicate is a foundational support of wireless mobile networks - Unfortunately, the capacity of such networks using current techniques is limited - Much progress has been made, but still more are coming.

Outline r Admin. r Opportunistic routing r Transport overview r Localization m overview 32

33 Motivations r The ancient question: Where am I? r Localization is the process of determining the positions of the network nodes r This is as fundamental a primitive as the ability to communicate

34 Localization: Many Applications r Location aware information services m e.g., E911, location-based search, advertisement, inventory management, traffic monitoring, emergency crew coordination, intrusion detection, air/water quality monitoring, environmental studies, biodiversity, military applications, resource selection (server, printer, etc.)  “ Sensing data without knowing the location is meaningless. ” [IEEE Computer, Vol. 33, 2000]

35 Measurements The Localization Process Localizability (opt) Location Computation Applications Using Location

36 Classification of Localization based on Measurement Modality r Coarse-grained measurements, e.g., m signal signature a database of signal signature (e.g. pattern of received signal, visible set of APs ( at different locations match to the signature m connectivity r Usage m e.g., Microsoft “Locate Me” m Place lab: r Advantages m low cost; measurements do not need line-of-sight r Disadvantages m low precision For a detailed study, see “Accuracy Characterization for Metropolitan-scale Wi-Fi Localization,” in Mobisys 2005.

37 Classification of Localization based on Measurement Modality (cont’) r Fine-grained localization m distance m angle (esp. with MIMO) r Usage m GPS, sensor networks r Advantages m high precision r Disadvantages m measurements need line-of-sight for good performance Cricket

Outline r Admin. r Opportunistic routing r Transport overview r Localization m Overview m GPS 38

39 Global Position Systems r US Department of Defense: need for very precise navigation r In 1973, the US Air Force proposed a new system for navigation using satellites r The system is known as: Navigation System with Timing and Ranging: Global Positioning System or NAVSTAR GPS

40 GPS Operational Capabilities Initial Operational Capability - December 8, 1993 Full Operational Capability declared by the Secretary of Defense at 00:01 hours on July 17, 1995

41 NAVSTAR GPS Goals r What time is it? r What is my position (including attitude)? r What is my velocity? r Other Goals: - What is the local time? - When is sunrise and sunset? - What is the distance between two points? - What is my estimated time arrival?

42 GSP Basics Simply stated: The GPS satellites are nothing more than a set of wireless base stations in the sky r The satellites simultaneously broadcast beacon messages (called navigation messages) r A GPS receiver measures time of arrival to the satellites, and then uses “trilateration” to determine its position

43 GPS Basics: Triangulation r Measurement: Computes distance

44 GPS Basics: Triangulation r In reality, receiver clock is not sync’d with satellites r Thus need to estimate clock called pseudo range

45 Why Do I Need To See 4 Satellites?

46 GPS Design/Operation r Segments (components) m user segment: users with receivers m control segment: control the satellites m space segment: the constellation of satellites transmission scheme

47 Control Segment Master Control Station is located at the Consolidated Space Operations Center (CSOC) at Flacon Air Force Station near Colorado Springs

48 CSOC r Track the satellites for orbit and clock determination r Time synchronization r Upload the Navigation Message r Manage Denial Of Availability (DOA)

49 Space Segment: Constellation

50 Space Segment: Constellation r System consists of 24 satellites in the operational mode: 21 in use and 3 spares 3 other satellites are used for testing r Altitude: 20,200 Km with periods of 12 hr. r Current Satellites: Block IIR- $25,000, KG r Hydrogen maser atomic clocks m these clocks lose one second every 2,739,000 million years

51 GPS Orbits

52 GPS Satellite Transmission Scheme: Navigation Message r To compute position one must know the positions of the satellites r Navigation message consists of: - satellite status to allow calculating pos - clock info r Navigation Message at 50 bps m each frame is 1500 bits m Q: how long for each message? More detail: see

53 GPS Satellite Transmission Scheme: Requirements r All 24 GPS satellites transmit Navigation Messages on the same frequencies r Resistant to jamming r Resistant to spoofing r Allows military control of access (selected availability)

54 GPS As a Communication Infrastructure r All 24 GPS satellites transmit on the same frequencies BUT use different codes m i.e., Direct Sequence Spread Spectrum (DSSS), and m Code Division Multiple Access (CDMA) m Using BPSK to encode bits

55 GPS PHY and MAC Layers

56 GPS Identifying Codes r Two types of codes m C/A Code - Coarse/Acquisition Code available for civilian use on L1 m P Code - Precise Code on L1 and L2 used by the military encrypted P code (called Y code) provides selected availability and anti-spoofing

57 GPS Receiver r Typical receiver: C/A code on L1 r During the “acquisition” time you are receiving the navigation message also on L1 r The receiver then reads the timing information and computes the “pseudo- ranges”

58 Denial of Accuracy (DOA) r The US military uses two approaches to prohibit use of the full resolution of the system r Selective availability (SA) m noise is added to the clock signal and m the navigation message has “lies” in it m SA is turned off permanently in 2000 r Anti-Spoofing (AS) - P-code is encrypted

59 Extensions to GPS r Differential GPS m ground stations with known positions calculate positions using GPS m the difference (fix) transmitted using FM radio m used to improve accuracy r Assisted GPS m put a server on the ground to help a GPS receivers m reduces GPS search time from minutes to seconds

iPhone GPS r Hammerhead™ II 60

61 GPS: Summary r GPS is among the “simplest” localization technique (in terms topology): one-step trilateration r Russia has a system known as GLONASS r The EU is deploying GALLIOS

62 GPS Limitations r Hardware requirements vs. small devices r GPS jammed by sophisticated adversaries r Obstructions to GPS satellites common each node needs LOS to 4 satellites GPS satellites not necessarily overhead, e.g., urban canyon, indoors, and underground

63 Percentage of localizable nodes localized by Trilateration. Uniformly random 250 node network. Limitation of Trilateration Ratio Average Degree

Backup Slides 64