Addressing, Routing, and Forwarding
Download
Report
Transcript Addressing, Routing, and Forwarding
Cool Topics in Networking
CS144 Review Session 8
November 20, 2009
Samir Selman
Announcements
• Lab 5 : Due Thursday Dec 3
• Final Exam: Wednesday, December 9
12:15pm - 3:15pm
• For those of you submitting late, contact us
before your deadline if you need an additional
extension. Tell us:
– Where you are
– How much more time you need
Today’s Cool Topics
1. Network Coding
2. Wireless Sensor Networks
Current Wireless
Router
C
Current Wireless
Router
C
Traditional Routing requires 4 time slots
Current Wireless
Router
C
Traditional Routing requires 4 time slots
Network Coding
Router
C
XOR =
Traditional Routing requires 4 time slots
Network Coding
Router
C
Traditional Routing requires 4 time slots
Network Coding
Router
C
XOR
=
XOR
Traditional Routing requires 4 time slots
With Network Coding need only 3 time slots
Higher throughput
=
I - COPE
Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi,
Muriel Medard, and Jon Crowcroft, "XORs In The Air: Practical
Wireless Network Coding," ACM SIGCOMM, 2006.
COPE Coding Opportunities
COPE Coding Opportunities
II- Opportunistic Routing
• Traditional routing chooses next hop before transmitting a
packet.
• Poor Link Quality => Probability of chosen next hop receiving
packet is low
• Solution: Opportunistic Routing allows any node that
overhears the transmission and is closer to the destination to
participate in forwarding the packet
• Challenge: Multiple nodes might hear a packet broadcast and
unnecessarily forward the same packet.
EXOR
• EXOR solves this issue by tying the MAC to the Routing and
imposing a strict schedule on the routers.
•The scheduler goes in rounds. Forwarders transmit in order, and
only one forwarder is allowed to transmit at a given time.
•Other nodes listen to learn which packets were overheard by
other nodes.
•Problem: This strict scheduling prevents forwarders from
exploiting spatial reuse (even when multiple packets can be
received by their respective receivers).
MORE
Szymon Chachulski, Michael Jennings, Sachin Katti, and Dina
Katabi, "Trading Structure for Randomness in Wireless
Opportunistic Routing," ACM SIGCOMM, 2007
MORE
• MORE solves the problem with Opportunistic Coding
without tying Routing to the MAC.
• Instead it uses Network Coding + Randomness.
• Basically nodes randomly mix packets before
forwarding them.
• This ensures the routers hearing the same
transmission do not forward the same packet.
MORE - Examples
Unicast Case
•Src sends P1,P2
•Dest luckily overhears P1.
•Router doesn’t know what dest received (P1).
•In any case R can forward P1 + 2P2
•Dest now has two received packets
• P1
•P1 + 2P2
•Dest can solve 2 eqns with 2 unknowns to retrieve P2.
•Conclusion: R only forwarded one packet instead of two =>Higher
throughput
MORE - Examples
Multicast Case
•Without Network Coding, src has to retransmit the union of the lost
packets ( 4 pkts ).
•With Network coding can retransmit only 2 randomly coded pkts and
allow all destinations to decode their respective packets.
• Src retransmits pa = p1+ p2 + p3 + p4, and pb= p1 + 2p2 + 3p3 + 4p4.
Analog Network Coding
Sachin Katti, Shyamnath Gollakota, and Dina
Katabi, "Embracing Wireless Interference: Analog Network
Coding," ACM SIGCOMM, 2007.
Analog Network Coding
Instead of router mixing packets…
Exploit that the wireless channel naturally mixes
signals
Analog Network Coding (ANC)
Analog Network Coding
Router
C
Analog Network Coding
Router
C
Interference
1) Phil and David transmit simultaneously
Analog Network Coding
Router
C
1) Phil and David transmit simultaneously
2) Router amplifies and broadcasts interfered signal
Analog Network Coding
Router
C
1) Phil and David transmit simultaneously
2) Router amplifies and broadcasts interfered signal
3) Phil subtracts known signal from interfered signal
Analog Network Coding
Router
C
1) Dina Network
and RobertCoding
transmitrequires
simultaneously
Analog
2 time slots
2) Router amplifies
and broadcasts
interfered signal
Higher
throughput
3) Dina subtracts known signal from interfered signal
It Is More Than Going From 3 To 2!
• Philosophical shift in dealing with interference
• Strategically exploit interference instead of
avoiding it
• Promises new ways of dealing with hidden
terminals
Hidden Terminal Scenario
C
Src
C
R1
C
R2
C
Dst
Hidden Terminal Scenario
C
Src
P1
C
R1
C
R2
C
Dst
Hidden Terminal Scenario
C
Src
P2
C
R1
C
R2
P1
1) Src and R2 transmit simultaneously
C
Dst
Hidden Terminal Scenario
C
Src
C
R2
C
R1
P1
C
Dst
P2
1) Src and R2 transmit simultaneously
2) R1 subtracts P1, which he relayed earlier to
recover P2 that he wants
Hidden Terminal Scenario
C
Src
C
R2
C
R1
P1
C
Dst
P2
R2 and Src are hidden terminals
Today : Simultaneous transmission Collision
ANC : Simultaneous transmission Success!
Hidden Terminal Scenario
C
Src
C
R1
C
R2
C
Dst
Other Benefits of ANC:
First step toward addressing hidden terminals
ANC extends network coding to new scenarios
Wireless Sensor Networks
1. A sensor network is an Ad-hoc network composed of
densely populated tiny electronic sensing devices.
2. Basic function of the network is to observe some
phenomenon.
3. Characteristics:
a.
b.
c.
d.
Low cost, Low power, Light weight
Densely deployed
Prone to failures
Two ways of deployment: randomly, pre-determined
4. Objectives:
1.
2.
3.
Monitor Activities
Gather and fuse information
Communicate it to special node “Base Station”.
Computer Revolution
Original IBM PC (1981)
MICAZ Mote (2005)
4.77 MHz
4 MHz
16-256 KB RAM
128 KB RAM
160 KB Floppies
512 KB Flash
~ $6K (today)
~ $35
~ 64 W
~14 mW
25 lb, 19.5 x 5.5 x 16 inch
0.5 oz, 2.25 x 1.25 x 0.25 inch
Sensor Node Hardware Platform
Software Platform
WSN Applications
WSN Applications
WSN Applications
WSN Applications
WSN Applications
WSN protocols
Protocol Requirements:
1.
2.
3.
4.
5.
Energy Efficient (Maximize node lifetime)
Self Configuring
Scalable
Redundant
Efficient (less computation, less memory
requirements, less energy consumption…)
6. Robust
Energy Efficiency
I.
Sources of Energy Consumption:
1. Communications (Transmitting & Receiving)
2. Computations
3. Sensing
II. Sources of Energy Wastage in Communications:
1.
2.
3.
4.
5.
Collisions
Overhearing
Idle Listening
Control Packets overhead
Over emitting
WSN Protocol Research
Questions?