REfactor-ing Content Overhearing to Improve Wireless Performance Shan-Hsiang Shen Aaron Gember Ashok Anand Aditya Akella abc 1d ab 1.

Slides:



Advertisements
Similar presentations
Brocade: Landmark Routing on Peer to Peer Networks Ben Y. Zhao Yitao Duan, Ling Huang, Anthony Joseph, John Kubiatowicz IPTPS, March 2002.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Inter-session Network Coding in wireless network Long Hai 10/02/2012.
XORs in The Air: Practical Wireless Network Coding
Analog Network Coding Sachin Katti Shyamnath Gollakota and Dina Katabi.
CodeTorrent: Content Distribution using Network Coding in VANET Uichin Lee, JoonSang Park, Joseph Yeh, Giovanni Pau, Mario Gerla Computer Science Dept,
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Strider : Automatic Rate Adaptation & Collision Handling Aditya Gudipati & Sachin Katti Stanford University 1.
CacheCast: Eliminating Redundant Link Traffic for Single Source Multiple Destination Transfers Piotr Srebrny, Thomas Plagemann, Vera Goebel Department.
REDUNDANCY IN NETWORK TRAFFIC: FINDINGS AND IMPLICATIONS Ashok Anand Ramachandran Ramjee Chitra Muthukrishnan Microsoft Research Lab, India Aditya Akella.
1 A Framework for Joint Network Coding and Transmission Rate Control in Wireless Networks Tae-Suk Kim*, Serdar Vural*, Ioannis Broustis*, Dimitris Syrivelis.
EndRE: An End-System Redundancy Elimination Service.
ICDCS’07, Toronto, Canada1 SCAP: Smart Caching in Wireless Access Points to Improve P2P Streaming Enhua Tan 1, Lei Guo 1, Songqing Chen 2, Xiaodong Zhang.
Carnegie Mellon University Computer Science Department Carnegie Mellon University Computer Science Department 1 Ditto : Eavesdropping for the Common Good.
XORs in the air: Practical Wireless Network Coding Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Medard, Jon Crowcroft SIGCOMM ‘06 Presented.
Compressive Oversampling for Robust Data Transmission in Sensor Networks Infocom 2010.
Receiver Based Forwarding for Wireless Sensor Networks Rodrigo Fonseca OASIS Retreat January 2005 Joint work with Ana Sanz Merino, Ion Stoica.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.
ExOR:Opportunistic Multi-Hop Routing For Wireless Networks
Exploiting Opportunism in Wireless Networks Aruna Balasubramanian Guest Lecture, CS 653 (Some slides borrowed from the ExOr and MORE presentations at SigComm.
Opportunistic Routing in Multi-hop Wireless Networks Sanjit Biswas and Robert Morris MIT CSAIL Presented by: Ao-Jan Su.
Performance Evaluation of IPv6 Packet Classification with Caching Author: Kai-Yuan Ho, Yaw-Chung Chen Publisher: ChinaCom 2008 Presenter: Chen-Yu Chaug.
MIMO-CAST: A CROSS-LAYER AD HOC MULTICAST PROTOCOL USING MIMO RADIOS Soon Y. Oh*, Mario Gerla*, Pengkai Zhao**, Babak Daneshrad** *Computer Science Dept.,
Opportunistic Routing in Multi-hop Wireless Networks Sanjit Biswas and Robert Morris MIT CSAIL
Collisions & Virtual collisions in IEEE networks Libin Jiang EE228a Communication Networks.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
Multipath Routing CS 522 F2003 Beaux Sharifi. Agenda Description of Multipath Routing Necessity of Multipath Routing 3 Major Components Necessary for.
ExOR: Opportunistic Multi-Hop Routing for Wireless Networks Sigcomm 2005 Sanjit Biswas and Robert Morris MIT Computer Science and Artificial Intelligence.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks Authors: Eric Rozner, Jayesh Seshadri, Yogita Ashok Mehta, Lili Qiu Published:
CS An Overlay Routing Scheme For Moving Large Files Su Zhang Kai Xu.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
TCP Throughput Collapse in Cluster-based Storage Systems
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Wireless Sensor Networks COE 499 Energy Aware Routing
Design and Implementation of a Multi-Channel Multi-Interface Network Chandrakanth Chereddi Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
1 Power-Aware Routing in Mobile Ad Hoc Networks S. Singh, M. Woo and C. S. Raghavendra Presented by: Shuoqi Li Oct. 24, 2002.
Structuring P2P networks for efficient searching Rishi Kant and Abderrahim Laabid Abderrahim Laabid.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Ditto - A System for Opportunistic Caching in Multi-hop Mesh Networks Fahad Rafique Dogar Joint work with: Amar Phanishayee, Himabindu Pucha, Olatunji.
EndRE: An End-System Redundancy Elimination Service Bhavish Aggarwal, Aditya Akella, Ashok Anand, Athula Balachandran, Pushkar Chitnis, Chitra Muthukrishnan,
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Jordan Howell Frank Geiger. Table of Contents  Question  Overview of example  Packets  OSI Model  Network Layer  Data Link Layer  Physical Layer.
Practical Network Coding for Wireless Mesh Networks Wenjun Hu Joint work with Sachin Katti, Hariharan Rahul, Dina Katabi, Jon Crowcroft and Muriel Médard.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Mohamed Elhawary Computer Science Department Cornell University PERCOM 2008 Zygmunt J. Haas Electrical and Computer Engineering Department Cornell University.
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
Low Power, Low Delay: Opportunistic Routing meets Duty Cycling Olaf Landsiedel 1, Euhanna Ghadimi 2, Simon Duquennoy 3, Mikael Johansson 2 1 Chalmers University.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
Piotr Srebrny 1.  Problem statement  Packet caching  Thesis claims  Contributions  Related works  Critical review of claims  Conclusions  Future.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
Dynamic Link Labels for Energy Efficient MAC Headers in Wireless Sensor Networks Sheng-Shih Wang Gautam Kulkarni, Curt Schurgers, and Mani Srivastava IEEE.
1 UFlood: High-Throughput Wireless Flooding Jayashree Subramanian Collaborators: Robert Morris, Ramakrishna Gummadi, and Hari Balakrishnan.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
DECOR: A Distributed Coordinated Resource Monitoring System Shan-Hsiang Shen Aditya Akella.
Trading Structure for Randomness in Wireless Opportunistic Routing Szymon Chachulski, Michael Jennings, Sachin Katti and Dina Katabi MIT CSAIL SIGCOMM.
An Efficient Implementation of File Sharing Systems on the Basis of WiMAX and Wi-Fi Jingyuan Li, Liusheng Huang, Weijia Jia, Mingjun Xiao and Peng Du Joint.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
AODV-OLSR Scalable Ad hoc Routing
Xors in the air Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Medard, Jon Crowcroft.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Broadcasting Delay-Constrained Traffic over Unreliable Wireless Links with Network Coding I-Hong Hou and P.R. Kumar.
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
ExOR:Opportunistic Multi-Hop Routing For Wireless Networks
Detect and Prevent Rogue Traffic in Mobile Ad Hoc Networks
Presentation transcript:

REfactor-ing Content Overhearing to Improve Wireless Performance Shan-Hsiang Shen Aaron Gember Ashok Anand Aditya Akella abc 1d ab 1

Improve Wireless Performance Focus on throughput Leverage wireless overhearing 2 abc

Leveraging Overheard Packets Reduced transmissions => more capacity Several techniques – RTS-id: suppress transmissions [Afanasyev ‘08] – ExOR: better forwarding [Biswas ‘05] – COPE: network coding [Katti ‘08] 3 Do not leverage duplication across transfers

Content-Based Overhearing Ditto [Dogar ‘08] 4 C1 C2 C C C C B B B B A A A A A A AB ABC A A AB ABC A A AB ABC C C B B A A 4 Request Gateway Does not remove sub-packet redundancy Only works for some applications M A N Y M I S S E D O P P O R T U N I T I E S

Application Transport Network Link Physical We REfactor content overhearing Content overhearing at the network layer 5 Identify sub-packet redundancy

Outline Benefits of REfactor approach How REfactor works Challenges & design innovations Additional scenarios Evaluation results 6

Benefits of REfactor Approach Operates at finer granularity – Ditto only works in 8-32KB object chunks – Object chunks require overhearing several packets (not possible at 75% of nodes 50% of the time) 7 Savings from redundancy as small as 64 bytes Leverages any overhearing, even a single packet

Benefits of REfactor Approach Operates at the network layer – Transport-layer approach ties data to application or object chunk – Transport approach requires payload reassembly 8 Redundancy elimination (RE) across all flows Per-packet processing exceeding 600Mbps

Benefits of REfactor Approach Operates in more scenarios – Ditto design limits applicability 9 Improvements in several wireless scenarios

Redundancy Elimination (RE) [Spring ’00] REfactor Overview ChunkReception Prob Chunk AP C1C2 C1 A B E F ChunkReception Prob. 1AB 2 3EF 4 ChunkReception Prob. 1ABC1=1; C2= EFC1=1; C2=0.8 4 Chunk 1AB 2 3EF 4 Chunk 1AB 2 3EF 4 10 C1 A B E F AP does not know which clients overheard

ABGH Data: Chunk 1AB 2 3EF 4 Chunk 1AB 2 3EF 4 ChunkReception Prob. 1ABC1=1; C2= EFC1=1; C2=0.8 4 REfactor Overview AP C1C2 A B G H ChunkReception Prob. 1ABC1=1; C2= EFC1=1; C2=0.8 4 ChunkReception Prob. 1ABC1=1; C2= EFC1=1; C2=0.8 4GHC1=0.7; C2=1 Chunk 1AB 2 3EF 4 C2 A B G H C2 G H Only have estimate of whether client has chunk

GHCD Data: ChunkReception Prob. 1ABC1=1; C2= EFC1=1; C2=0.8 4GHC1=0.7; C2=1 Chunk 1AB 2 3EF 4 Chunk 1AB 2 3EF 4 REfactor Overview AP C1C2 C1 G H C D Chunk 1AB 2 3EF 4 AP 4 4 Chunk 1AB 2 3EF 4GH C1 G H C D C1 C D 4 4 C1 4 = GH 12 ChunkReception Prob. 1ABC1=1; C2=0.8 2CDC1=1; C2=0.5 3EFC1=1; C2=0.8 4GHC1=0.7; C2=1 ChunkReception Prob. 1ABC1=1; C2=0.8 2CDC1=1;C2=0.5 3EFC1=1; C2=0.8 4GHC1=0.7; C2=1 Need to be able to handle cache misses

Challenges Overhearing is probabilistic – Lack tight cache synchronization Resource constrained nodes – Need to limit cache size and processing overhead 13

Caching Two issues: – How do we store chunks? – How do we refer to them in shim headers? Hash table with pointers to log of chunks Identify with SHA-1 hash 14 Large hash is expensive Consistent across caches

Caching Self-addressing chunks – 20-bit hash used as index into cache 15 Consistent across caches Efficient use of memory Need to properly handle cache collisions

Removing Redundancy 16 Traditional RE has tight synchronization and can remove all identified redundancy – Not the case with wireless overhearing Reception probability vector – Does client cache contain chunk? Model-Driven RE – What is the benefit from removing a redundant chunk?

Reception Probability Vectors Destination client (d) definitely has chunk Overhearing client (o) may have chunk – Compare r d and r o 17 Rate used to send to destination (d) Last rate used to send to overhearing client (o) rdrd roro

Model-Driven RE 2.Cache miss => extra transmissions 18 Expected benefit = [transmission time savings] – [cache miss cost] Expected benefit = [transmission time savings] – [cache miss cost] 1.Reduced packet size air time savings higher goodput =>

C1C2C4C3 Relay Network Coding Scenario Chunk 1AB 2 3 Chunk 1 2CD 3 C3 & C4 Chunk 1AB 2 3 Chunk 1 2CD 3 E F 1 1 C3 2 2 G H C4 C3 A B E F 19 COPE [Katti ’08] + REfactor C4 C D G H C4 C D G H C3 A B E F C D G H C3 & C4

Evaluation Implemented in Click Single AP with two clients – C1: perfect overhearing; high rate – C2: varied overhearing; varied rate Traces derived from real-world traffic – 49% inter-client redundancy 20 C1C2 Near Middle Far

Testbed Results Goodput = Total Data Transferred Total Transmission Time C2’s Distance From AP REfactor Goodput No RE Goodput Percentage Improvement 3m (near)4.0 Mbps3.4 Mbps20% 6m (middle)3.0 Mbps2.6 Mbps14% 10m (far)1.3 Mbps1.2 Mbps6% 21

Simulation Results 22

Conclusion Up to 20% improvement in wireless goodput Fine-grained at network layer – Enables better leveraging of overhearing – Savings with any type of application Improvements in several wireless scenarios 23

Evaluating REfactor + Network Coding Click simulation with REfactor + COPE [Katti ‘06] C3 & C4 Overhearing Percentage Percent better than just COPE 90%14% 50%10% 3% 24

SHA-1 vs. Self-addressed Chunks 25 Minimum chunk size REfactorSHA Hash Based Redundancy Detected Effective RERedundancy Detected Effective RE

Memory vs. Unique Chunks Tradeoff Require 2 n * m bytes of memory to store 2 n chunks of maximize size m 26

Model-Driven RE 27 Use model to decide on removal of 64B chunk

Simulation Results - Airtime 28

C1C2 AP1 To: C1 ABEF To: C1 ABEF Chunk Multi-AP Scenario AP2 Chunk 1AB 2 3EF Chunk 1AB 2 3EF Chunk 1AB 2 3EF Chunk To: C2 ABCD To: C2 CD 1 1 Chunk 1AB 2CD 3 To: C1 ABCD Chunk 1AB 2 3EF 29

Ad-hoc Mesh Scenario R1 R2 C2C1 Chunk To: C2 ABEF Chunk AB 2 3EF Chunk 1AB 2 3EF Chunk 1AB 2 3EF Chunk 1AB 2 3EF To: C2 ABEF To: C1 ABCD Chunk 1AB 2CD 3EF Chunk 1AB 2CD 3EF Chunk 1AB 2CD 3EF To: C1 CD 4 4 Chunk 1AB 2 3EF To: C1 ABCD 30