Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday



Similar documents
Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

Energy Optimal Routing Protocol for a Wireless Data Network

NEW applications of wireless multi-hop networks, such

CS268 Exam Solutions. 1) End-to-End (20 pts)

Using Wireless Mesh Networks for Video Surveillance Version: 1. Using Wireless Mesh Networks for Video Surveillance

ECE/CS 372 introduction to computer networks. Lecture 13

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Routing in packet-switching networks

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

Performance Monitoring on Networked Virtual Environments

How To Provide Qos Based Routing In The Internet

Final for ECE374 05/06/13 Solution!!

Measure wireless network performance using testing tool iperf

networks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

How To Monitor Performance On Eve

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

Three Key Design Considerations of IP Video Surveillance Systems

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Lecture 17: Wireless Networking"

SmartDiagnostics Application Note Wireless Interference

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

A Transport Protocol for Multimedia Wireless Sensor Networks

Secure Network Coding for Wireless Mesh Networks: Threats, Challenges, and Directions

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

CS335 Sample Questions for Exam #2

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Internet Infrastructure Measurement: Challenges and Tools

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

Dynamic Source Routing in Ad Hoc Wireless Networks

CS263: Wireless Communications and Sensor Networks

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK

Controlled Random Access Methods

Multi-Channel Wireless Networks: Capacity, Protocols, and Experimentation (with Net-X) Nitin Vaidya

Strategies. Addressing and Routing

Data Communication and Computer Network

ΤΕΙ Κρήτης, Παράρτηµα Χανίων

Congestion Control Overview

Influence of Load Balancing on Quality of Real Time Data Transmission*

Figure 1. The Example of ZigBee AODV Algorithm

Wireless Sensor Networks Chapter 3: Network architecture

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Introduction to LAN/WAN. Network Layer

Per-Flow Queuing Allot's Approach to Bandwidth Management

White paper. Latency in live network video surveillance

Key Components of WAN Optimization Controller Functionality

Outline. TCP connection setup/data transfer Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

IP Multicasting. Applications with multiple receivers

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Distributed Denial of Service Attacks & Defenses

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection

FORTH-ICS / TR-375 March Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

Software Defined Networking (SDN) - Open Flow

Allocating Network Bandwidth to Match Business Priorities

First Midterm for ECE374 02/25/15 Solution!!

other. A B AP wired network

TCP Westwood for Wireless

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Wireless LAN Concepts

CS 268: Lecture 13. QoS: DiffServ and IntServ

co Characterizing and Tracing Packet Floods Using Cisco R

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

A Digital Fountain Approach to Reliable Distribution of Bulk Data

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Transport Layer Protocols

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Transcription:

Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node to a server on the internet. Must transfer data over multiple wireless hops in unicast fashion. Data collection from sensors to the sink node in the sender network. Unicast transfer, with optional in-network processing / aggregation of data. Multicast distribution of data (e.g., video stream) to a subset of nodes in the multihop network. Flooding of information (e.g., code updates) to all nodes in a sensor network. This lecture: Issues: intra-path, inter-path interference Fixes with traditional routing, opportunistic routing

Intra-path interference Consider the following topology A B C D Suppose the route ABCD has been picked by the routing protocol as the best path and forward data using this path. What are the complications? A and B cannot send simultaneously because B can t receive and send at the same time. If A sends too fast, B will always be receiving and will not send time to empty its queue. A and C cannot send simultaneously because they interfere at B (and could possibly even be hidden terminals, leading to data loss). These issues are commonly classified as intra-path interference. TCP performance over multiple hops suffers.

Intra-path interference (2) Suppose every link in a path has a rate R. Suppose the path is N hops long. Suppose a sender interferes with nodes up to I hops from receiver. Then the effective throughput on this path can only be R/min(N,2+I). See the paper Flush: A Reliable Bulk Transport Protocol for Multihop Wireless Networks for a complete explanation of this formula. In reality, you may not achieve this value because CSMA does not ensure the perfect pipelining and spatial reuse required to reach this value. In the earlier example, A and C might end up sending together and lose packets. A might send too fast and overflow buffer at B. The effective throughput will be lower than the best possible value indicated by the formula above.

Intra-path interference (3) Some fixes proposed in research literature: Rate limit upstream nodes, so as to not overwhelm downstream nodes. For example, after A sends a packet to B, it must wait for enough time to ensure that the packet has passed from B to C to other nodes beyond its interference range. Implementing this simple concept in a distributed setting requires some clever thinking (the paper Flush in the references has a solution). Enforce some sort of a schedule over nodes to ensure optimal pipelining (the paper PIP in the references explores this idea). Put in multiple radios / directional antennas on each node so that transmissions along a path do not interfere. Find a way to decode concurrent transmissions (many creative research proposals exist)

Inter-path interference When multiple flows are active at the same time, similar issues arise (tradeoff between sending and receiving, hidden terminals etc.), but on a bigger scale. One possible fix: change routing to make paths interference-aware. That is, if one flow has picked one path, another flow can try to pick a non-overlapping path.

Opportunistic routing Consider the topology A B C D Suppose A sends and B, C both happen to receive the packet. With current routing + forwarding paradigm, B alone is next hop, so C will throw away its copy of the packet, and wait for B to forward it again. Wasteful! Instead, it would be great if we can decide on the next hop based on which one of B or C receive the packet. Traditional routing route first, forward later. Opportunistic routing forward first, see who got which packet, decide on the route based on this info.

Opportunistic routing (2) One idea: source sends packets. Nodes that will forward data to destination (forwarders) are prioritized based on distance to destination (highest priority closest to destination). After source sends packets, nodes closest to destination forward the packets the destination needs. Only if none of the closer nodes got the packet will the source retransmit again. So, in effect, the next hop for a particular packet will be the node that is as close to destination as possible. So nodes need to know who got which packet (a bitmap of some kind), and also decide who sends when (CSMA by default does not prioritize) Reference on class website ( ExOR ) solves these issues. It uses the ideas of batching, and propagates information of who got which packet at the level of batches (to reduce overhead). It also uses some kind of scheduling to let high priority nodes send first.

The idea of network coding Another idea that comes in useful in opportunistic routing, and also in flooding over multihop is the notion of network coding. Instead of keeping state of who got what packet, nodes can simply send linear combinations of packets (along with the coefficients used to create the linear combinations). The receiver can solve a set of N linear equations to recover N packets. This process of nodes in the network generating packets is called network coding. In contrast, transformation of application data into a form suitable for transmission at the source is called source coding. Applying this idea of network coding to opportunistic unicast and multicast transfers yields interesting results. You can read more in the references