Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.

Slides:



Advertisements
Similar presentations
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Advertisements

Network Coding for Wireless Networks
XORs in The Air: Practical Wireless Network Coding
Analog Network Coding Sachin Katti Shyamnath Gollakota and Dina Katabi.
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
TCP Congestion Control Dina Katabi & Sam Madden nms.csail.mit.edu/~dina 6.033, Spring 2014.
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
1 A Framework for Joint Network Coding and Transmission Rate Control in Wireless Networks Tae-Suk Kim*, Serdar Vural*, Ioannis Broustis*, Dimitris Syrivelis.
1 XORs in the Air: Practical Wireless Network Coding Sachin Katti HariharanRahul, WenjunHu, Dina Katabi, Muriel Medard, Jon Crowcroft Presented by Lianmu.
XORs in the air: Practical Wireless Network Coding Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Medard, Jon Crowcroft SIGCOMM ‘06 Presented.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Network Coding and Xors in the Air 7th Week.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Exploiting Opportunism in Wireless Networks Aruna Balasubramanian Guest Lecture, CS 653 (Some slides borrowed from the ExOr and MORE presentations at SigComm.
Network coding for multicasting and unicasting in MANETs Muriel Médard LIDS Massachusetts Institute of Technology.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Link Layer & Network Layer Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof. Dina Katabi.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
XORs in The Air: Practical Wireless Network Coding Daniel Courcy- Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina.
1 How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding Jerry Le, John C.S. Lui, Dah Ming Chiu Chinese University of Hong.
MAC Reliable Broadcast in Ad Hoc Networks Ken Tang, Mario Gerla University of California, Los Angeles (ktang,
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
SEPT, 2005CSI Part 2.2 Protocols and Protocol Layering Robert Probert, SITE, University of Ottawa.
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Presentation on Osi & TCP/IP MODEL
XORs in the Air: Practical Wireless Network Coding Sachin Katti Hariharan Rahul Wenjun Hu Dina Katabi Muriel Medard Jon Crowcroft Presented by: Suvesh.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
1 Chapter 16 Protocols and Protocol Layering. 2 Protocol  Agreement about communication  Specifies  Format of messages (syntax)  Meaning of messages.
Wireless Network Coding Martin Xu. Outline Introduction New Solutions – COPE – ANC Conclusions.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Pushing the Limits of Wireless Networks Prof. Dina Katabi Jan 9, 2006.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
1 Congestion Control Computer Networks. 2 Where are we?
Practical Network Coding for Wireless Mesh Networks Wenjun Hu Joint work with Sachin Katti, Hariharan Rahul, Dina Katabi, Jon Crowcroft and Muriel Médard.
15-744: Computer Networking L-12 Wireless Broadcast.
Networking Basics CCNA 1 Chapter 11.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
2012 1/6 NSDI’08 Harnessing Exposed Terminals in Wireless Networks Mythili Vutukuru, Kyle Jamieson, and Hari Balakrishnan MIT Computer Science and Artificial.
1 Advanced Transport Protocol Design Nguyen Multimedia Communications Laboratory March 23, 2005.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Congestion Control 0.
1 Protocols and Protocol Layering. 2 Protocol Agreement about communication Specifies –Format of messages –Meaning of messages –Rules for exchange –Procedures.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PAC: Perceptive Admission Control for Mobile Wireless Networks Ian D. Chakeres Elizabeth M. Belding-Royer.
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
The Importance of Being Opportunistic Sachin Katti Dina Katabi, Wenjun Hu, Hariharan Rahul, and Muriel Medard.
BASICS Gabriella Paolini (GARR) 27/05/11 - ICCU Roma 1 How INTERNET works !
Chapter 9 Introduction To Data-Link Layer 9.# 1
Distributed Systems CS
Xors in the air Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Medard, Jon Crowcroft.
Congestion Control, Internet transport protocols: udp
Taking Advantage of Broadcast
Wireless Mesh Networks
Error Checking continued
Transport Layer 9/22/2019.
Presentation transcript:

Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering

Agenda An overview of the COPE A new forwarding architecture for wireless networks by Katti et. al. Sigcomm 2007 Optimization problems in wireless coding networks Joint work with Salim El Rouayheb and Asad Chaudhry

COPE New Architecture For Wireless Networks Substantially improves throughput Inserts a coding layers between MAC and IP Identifies coding opportunities Benefits from them by mixing packets

Background Bob and Alice Relay Requires 4 transmissions

Background Bob and Alice Relay Requires 3 transmissions XOR

Broadcast medium Each packet is broadcasted, for free, in a small neighborhood around its path

Coding opportunity Each node stores the overheard packets for a short time Each node tells its neighbors which packets it has heard by annotating the packets it sends

Opportunistic coding When a node transmits a packet it uses its knowledge of what its neighbors have heard

COPE Overview Opportunistic Listening COPE sets all nodes in promiscuous mode Nodes snoop on all communications over the wireless medium Store the overheard packets for a limited period of time T (default T=0.5 s).

COPE Overview Each node broadcasts reception reports to tell its neighbors what packets are stored Reception reports are sent by annotating the data packets the node transmits A node that has no data packets to transmit periodically sends the reception reports in special control packets

Opportunistic coding The key question is what packets to code together to maximize throughput The node should maximize the number of native packets delivered in a single transmission, while ensuring that each intended nexthop has enough information to decode its native packet Use a simple heuristic We analyze this problem in the second part of the talk

Learning Neighbor State How does a node know what packets its neighbors have? By using reception reports Problems At times of sever congestion, reception reports may get lost in collisions At time of light traffic they can arrive too late A node cannot relay on reception reports and may need whether a neighbor has a particular packet May need to guess whether a neighbor has a particular packet

Intelligent guessing Leveraging the routing protocols Routing protocols compute the delivery probability between every pair of nodes This information needed for identifying good paths Occasionally, a node can make an incorrect guess

Coding gain Defined as a ratio between the number of packets required by the current non-coding approach to the minimum number of transmissions used by COPE The gain is equal to 1.33 in the Bob and Alice experiment Relay Requires 3 transmissions XOR

Coding+MAC gain Experiments show that the throughput improvement sometimes greatly exceeded the coding gain The interactions between coding and MAC produces a beneficial side effect For example, in the Bob and Alice example, the MAC divides the bandwidth equally between the three users However, the router needs to transmit twice as many packets Halve the packets transmitted by the edge nodes are dropped at the router queue

Coding+MAC gain COPE allows the router to XOR packets and drop them twice as fast Coding and MAC gain is higher for many topologies

Practical considerations Never delay a packet Transmit when a wireless channel is available If no coding opportunities exists, do not wait for the arrival of a new packet. Let the node to opportunistically overload each transmission with additional information

Practical considerations (cont.) Dealing with packets of different lengths Give preference to XORing packets of the same length Coding small packets with large packets reduces bandwidth savings Empirical studies show that the packet distribution in the Internet is bimodal with picks at 40 and 1500 bytes Dealing with packets of two different sizes

Practical considerations (cont.) Internet packet size distribution

Practical considerations (cont.) Packet reordering We would like to limit reordering packets from the same flow Because TCP considers it as a congestion signal Consider packets according to their order in the queue Reordering can arise because of the need to retransmit packets which were lost in quessing COPE has a module that puts TCP packets in order before delivering them to the transport layer

Pseudo-broadcast has two modes: broadcast and unicast Broadcast mode cannot be used because of poor reliability and lack of backoff Unicast mode: retransmission of the packet until a synchronous ack is received Solution: unicast packets which are intended for broadcast COPE require each nexthop node to ack the packet

Packet format Packet ID- a 32-bit hash of the packet's source IP address and IP sequence number

Performance Large Scale Experiment 20 nodes 2 floors Pick sender and receiver randomly Packet size based on actual measurement Flow arrival are Possion

Large Scale Exp. Offered load in Mb/s Scare Coding Opp. At Low Demands Demand Up / Congestion Up / Gain Up

Findings Network coding does have practical benefits, and can substantially improve wireless throughput. When the wireless medium is congested and the traffic consists of many random UDP flows, COPE increases the throughput by 3-4x. Hidden terminals create a high collision rate that cannot be masked even with the maximum number of retransmissions. In these environments, TCP does not send enough to utilize the medium, and thus does not create coding opportunities.