Future Network Applications. A Brief Introduction to Protocol Layers. Challenges to meeting QoS. OSI vs. TCP/IP. Layer Functionality

Similar documents
Communication Networks. MAP-TELE 2011/12 José Ruela

Controlling the Internet in the era of Software Defined and Virtualized Networks. Fernando Paganini Universidad ORT Uruguay

Optimization models for congestion control with multipath routing in TCP/IP networks

Chapter 1: Introduction

Computer Networks CS321

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

CSE 3461 / 5461: Computer Networking & Internet Technologies

Data Communication Networks Introduction

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

CS 640: Introduction to Computer Networks. Goals of This Class. Goal of Networking. Page 1. Understand principles and practice of networking

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

WITH the advances of mobile computing technology

IT Data Communication and Networks (Optional)

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Objectives of Lecture. Network Architecture. Protocols. Contents

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

The TCP/IP Reference Model

Communications and Computer Networks

Assessing the quality of VoIP transmission affected by playout buffer scheme and encoding scheme

Chapter 1: Introduction

King Fahd University of Petroleum & Minerals Computer Engineering g Dept

CSE 123b Communications Software

Data Communication Networks and Converged Networks

DSL Spectrum Management

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

OPNET - Network Simulator

Real-Time (Paradigms) (51)

How To Understand The Layered Architecture Of A Network

IT4405 Computer Networks (Compulsory)

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Final for ECE374 05/06/13 Solution!!

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov

Transport and Network Layer

Horizon: Balancing TCP over multiple paths in wireless mesh networks

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

How will the programme be delivered (e.g. inter-institutional, summerschools, lectures, placement, rotations, on-line etc.):

Bilevel Models of Transmission Line and Generating Unit Maintenance Scheduling

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Optimizing Converged Cisco Networks (ONT)

A Separation Principle for Optimal IaaS Cloud Computing Distribution

Ethernet. Ethernet. Network Devices

OSI Reference Model: An Overview

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

Zarządzanie sieciami telekomunikacyjnymi

Transport Layer Protocols

Measuring IP Performance. Geoff Huston Telstra

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

1 Introduction to mobile telecommunications

Protocols and Architecture. Protocol Architecture.

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

Steelcape Product Overview and Functional Description

How To Design A Layered Network In A Computer Network

EPL 657 Wireless Networks

CS 218 Advanced Computer Networks Quarter: Fall 2003 Course ID : CS218 Class hour : MW 8:00-10:00 pm Classroom : BH 5273

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

How To Determine The Capacity Of An B Network

Network Programming TDC 561

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

The OSI & Internet layering models

Introduction to Computer Networks and Data Communications

GSM Network and Services

Decentralized Utility-based Sensor Network Design

VIDEOCONFERENCING. Video class

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Distributed Rate Assignments for Simultaneous Interference and Congestion Control in CDMA-Based Wireless Networks

A Transport Protocol for Multimedia Wireless Sensor Networks

Layered Architectures and Applications

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Contents. Biography. Acknowledgments. List of Abbreviations. List of Symbols

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

November Defining the Value of MPLS VPNs

Architecture of distributed network processors: specifics of application in information security systems

Network Simulation Traffic, Paths and Impairment

OPNET Network Simulator

Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Computing the Electricity Market Equilibrium: Uses of market equilibrium models

Per-Flow Queuing Allot's Approach to Bandwidth Management

CSMA/CA. Information Networks p. 1

Using Wireless Mesh Networks for Video Surveillance Version: 1. Using Wireless Mesh Networks for Video Surveillance

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Network Security A Decision and Game-Theoretic Approach

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Strategies. Addressing and Routing

Digital Audio Networking Demystified The OSI model helps bring order to the chaos of various digital audio network options.

Data Communication and Computer Network

Lecture 17: Wireless Networking"

Seamless Congestion Control over Wired and Wireless IEEE Networks

Analysis of IP Network for different Quality of Service

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Improving Throughput Performance of the IEEE MAC Layer Using Congestion Control Methods

The University of Winnipeg Medical Algorithms propose New Network Utility Maximize Problem

Transcription:

EE360: Lecture 17 Outline Cross-Layer Design Announcements Project poster session March 15 5:30pm (3rd floor Packard) Next HW posted, due March 19 at 9am Final project due March 21 at midnight Course evaluations available; worth 10 bonus points QoS in Wireless s protocol layers Overview of cross-layer design Example: video over wireless networks Optimization Layering as optimization decomposition Distributed optimization Game theory Future s Internet (for the Z generation) Cellular Entertainment Commerce Smart Homes/Spaces/Structures Sensor s Automated Highways/Factories s have hard delay constraints, rate requirements, energy constraints, and/or security constraints that must be met These requirements are collectively called QoS Challenges to meeting QoS Underlying channels, networks, and end-devices are heterogenous Traffic patterns, user locations, and network conditions are constantly changing Hard constraints cannot be guaranteed, and average constraints can be poor metrics. No single layer in the protocol stack can support QoS: cross-layer design needed A Brief Introduction to Protocol Layers Premise: Break network tasks into logically distinct entities, each built on top of the service provided by the lower layer entities. Session medium Session Example: OSI Reference Model OSI vs. TCP/IP OSI: conceptually define services, interfaces, protocols Internet: provides a successful implementation Session OSI Internet Host-tonetwork TCP/IP Telnet TCP LAN FTP DNS IP UDP Packet radio Layer Functionality Compression, error concealment, packetization, scheduling, End-to-end error recovery, retransmissions, flow control, Neighbor discovery and routing Access Channel sharing, error recovery/retransmission, packetization, Link Bit transmission (modulation, coding, ) 1

Layering Pros and Cons Advantages Simplification - Breaking the complex task of end-to-end networking into disjoint parts simplifies design Modularity Protocols easier to optimize, manage, and maintain. More insight into layer operation. Abstract functionality Lower layers can be changed without affecting the upper layers Reuse Upper layers can reuse the functionality provided by lower layers Disadvantages Suboptimal: Layering introduces inefficiencies and/or redundancy (same function performed at multiple layers) Information hiding: information about operation at one layer cannot be used by higher or lower layers Performance: Layering can lead to poor performance, especially for applications with hard QoS constraints Key layering questions How should the complex task of end-to-end networking be decomposed into layers What functions should be placed at each level? Can a function be placed at multiple levels? What should the layer interfaces be? Should networks be decomposed into layers? Design of each protocol layer entails tradeoffs, which should be optimized relative to other protocol layers What is the alternative to layered design? Cross-layer design No-layer design Crosslayer Design: Information Exchange Across Layers Information Exchange Access Link End-to-End Metrics s have information about the data characteristics and requirements Lower layers have information about network/channel conditions Substantial gains in throughput, efficiency, and QoS can be achieved with cross-layer design Crosslayer Techniques Adaptive techniques Link, MAC, network, and application adaptation Resource management and allocation Diversity techniques Link diversity (antennas, channels, etc.) Access diversity Route diversity diversity Content location/server diversity Scheduling scheduling/data prioritization Resource reservation Access scheduling Example: Video over s with MIMO links Use antennas for multiplexing: High-Rate Quantizer Use antennas for diversity Low-Rate Quantizer ST Code High Rate ST Code High Diversity Error Prone Decoder Decoder Low P e Diversity/Multiplexing/Delay Tradeoff at Links with ARQ 2

Delay/Throughput/Robustness across Multiple Layers A Multiple routes through the network can be used for multiplexing or reduced delay/loss can use single-description or multiple description codes Can optimize optimal operating point for these tradeoffs to minimize distortion B Cross-layer protocol design for real-time media Traffic flows Link state information Loss-resilient source coding and packetization Congestion-distortion optimized scheduling Congestion-distortion optimized routing Capacity assignment for multiple service classes Adaptive link layer techniques layer Rate-distortion preamble layer layer Link capacities MAC layer Link layer Video streaming performance Approaches to Optimization* s Optimization 5 db Dynamic Programming Utility Maximization Distributed Optimization Game Theory State Space Reduction Wireless NUM Multiperiod NUM Distributed Algorithms Mechanism Design Stackelberg Games Nash Equilibrium 3-fold increase 100 1000 (logarithmic scale) *Much prior work is for wired/static networks Dynamic Programming (DP) Simplifies a complex problem by breaking it into simpler subproblems in recursive manner. Not applicable to all complex problems Decisions spanning several points in time often break apart recursively. Viterbi decoding and ML equalization can use DP State-space explosion DP must consider all possible states in its solution Leads to state-space explosion Many techniques to approximate the state-space or DP itself to avoid this Utility Maximization Maximizes a network utility function Assumes Steady state Reliable links Fixed link capacities Dynamics are only in the queues max flow k U k ( r k ) s. t Ar R routing U 2 (r 2 ) U n (r n ) Optimization is Centralized U 1 (r 1 ) R i R j Fixed link capacity 3

Average Rate control as stochastic optimization max E[ U ( rm ( G))] st E[ r( G)] E[ R( S( G), G)] E[ S( G)] S Wireless NUM Extends NUM to wireless networks Random lossy links Error recovery mechanisms dynamics Can include Adaptive PHY layer and reliability Existence convergence properties Channel estimation errors Improvement over NUM Rethinking Layering How to, and how not to, layer? A question on architecture Functionality allocation: who does what and how to connect them? More fuzzy question than just resource allocation but want answers to be rigorous, quantitative and simple How to quantify benefits of better modulationcodes-schedule-routes... for network applications? Layering As Optimization Decomposition The Goal A Mathematical Theory of Architectures Layering As Optimization Decomposition: A Mathematical Theory of Architectures By Mung Chiang, Steven H. Low, A. Robert Calderbank, John C. Doyle The First unifying view and systematic approach : Generalized NUM Layering architecture: Decomposition scheme Layers: Decomposed subproblems Interfaces: Functions of primal or dual variables Horizontal and vertical decompositions NUM Formulation Objective function: What the end-users and network provider care about Can be a function of throughput, delay, jitter, energy, congestion... Can be coupled, eg, network lifetime Variables: What're under the control of this design Constraint sets: What're beyond the control of this design. and economic limitations. Hard QoS constraints (what the users and operator must have) Layering Give insights on both: What each layer can do (Optimization variables) What each layer can see (Constants, Other subproblems' variables) Connections With Mathematics Convex and nonconvex optimization Decomposition and distributed algorithm 4

Primal Decomposition Simple example: Decomposed into: Dual-based Distributed Algorithm NUM with concave smooth utility functions: Convex optimization with zero duality gap Lagrangian decomposition: New variable α updated by various methods Interpretation: Direct resource allocation (not pricingbased control) Dual problem: Horizontal vs Vertical Decomposition Horizontal Decompositions Reverse engineering: Layer 4 TCP congestion control: Basic NUM (LowLapsley99, RobertsMassoulie99, MoWalrand00, YaicheMazumdarRosenberg00, etc.) Scheduling based MAC is known to be solving max weighted matching Vertical Decompositions Jointly optimal congestion control and adaptive coding or power control (Chiang05a) Jointly optimal routing and scheduling (KodialamNandagopal03) Jointly optimal congestion control, routing, and scheduling ( ChenLowChiangDoyle06) Jointly optimal routing, resource allocation, and source coding(yuyuan05) Alternative Decompositions Many ways to decompose: Primal Decomposition Dual Decomposition Multi-level decomposition Different combinations Lead to alternative architectures with different engineering implications Key Messages Other Extensions Existing protocols in layers 2,3,4 have been reverse engineered Reverse engineering leads to better design Loose coupling through layering price Many alternatives in decompositions and layering architectures Convexity is key to proving global optimality Decomposability is key to designing distributed solution Still many open issues in modeling, stochastic dynamics, and nonconvex formulations Architecture, rather than optimality, is the key On-line learning Hard delay constraints (not averages) Traffic dynamics Distributed optimization 5

Distributed and Asynchronous Optimization of s Consider a network consisting of m nodes (or agents) that cooperatively minimize a common additive cost (not necessarily separable) Each agent has information about one cost component, and minimizes that while exchanging information locally with other agents. Model similar in spirit to distributed computation model of Tsitsiklis Mostly an open problem. Good distributed tools have not yet emerged Game Theory Game theory is a powerful tool in the study and optimization of both wireless and wired networks Enables a flexible control paradigm where agents autonomously control their resource usage to optimize their own selfish objectives Game-theoretic models and tools provide potentially tractable decentralized algorithms for network control Most work on network games has focused on: Static equilibrium analysis Establishing how an equilibrium can be reached dynamically Properties of equilibria Incentive mechanisms that achieve general system-wide objectives Distributed user dynamics converge to equilibrium in very restrictive classes of games; potential games is an example Examples: power control; resource allocation Key Questions What is the right framework for crosslayer design? What are the key crosslayer design synergies? How to manage crosslayer complexity? What information should be exchanged across layers, and how should this information be used? How to balance the needs of all users/applications? Summary: To Cross or not to Cross? With cross-layering there is higher complexity and less insight. Can we get simple solutions or theorems? What asymptotics make sense in this setting? Is separation optimal across some layers? If not, can we consummate the marriage across them? Burning the candle at both ends We have little insight into cross-layer design. Insight lies in theorems, analysis (elegant and dirty), simulations, and real designs. Cross-Layer Wireless Multimedia Transmission: Challenges, Principles, and New Paradigms By Mihaela Van Scharr, Sai Shankar Presented by Chris Li 6