coursWN1 Lucile2014
coursWN1 Lucile2014
coursWN1 Lucile2014
Wireless Networks
Topic: Network Coding and Opportunistic
routing in mobile social networks
Master 2 IFI Ubinet 2014-2015
L. Sassatelli
[email protected]
1
Opportunistic networks
Increasing integration of wireless short-range
communication technologies (Bluetooth, 802.11 WiFi) into
mobile devices
-> spontaneous communication, interaction and
collaboration are possible.
Spontaneous communication: opportunistic networking
Promising evolution in mobile ad-hoc networking.
Formed by mobile devices communicating while users are
in close proximity.
There are two prominent characteristics present in
opportunistic networks: 1) A user provides his personal
device as a network node. 2) Users are a priori unknown to
each other.
A. Heinemann, Collaboration in Opportunistic Networks, PhD dissertation, Darmstadt 2007
About
This course is about:
Network coding as a new networking paradigm
Fundamentals
Applications of NC to wireless networks, to
opportunistic networking
Not about
This course is not about:
Software implementations
Security and privacy issues of MANETs
Incentives to encourage collaboration,
competition in mobile networks (game theory)
Outline
I.
II.
Introduction
Application of NC to wireless networks: Xor in the air
Opportunistic routing
1.
2.
3.
4.
Network coding
Network coding: generalization of routing the intermediate nodes can modify the
payload of packets they have to transfer
Transport networks
source s
Water pipes
Pipelines
Transportation lanes
Freight traffic
Communication networks
Sink t
Conditions
Capacity c : V x V R with c(p, q) 0 and if (p, q) not in E then c(p, q) = 0
Flow f : V x V R
Source s V, sink (terminal) t V
Accessiblity: all the vertices are on a path from s to t
Constraint of capacity:
for all p, q V, f (p, q) c (p, q)
c(p, q)
f (p, q)
Anti-symmetry:
for all p, q V, f (q, p) = - f (p, q)
Flow conservation:
for all p V\{s,t}, (f (p, q) | q V ) = 0
p
7
Flow
source s
Properties
for all p V, f (p, p) = 0
for all q V, ( f (p, q) | p V ) = 0
flow / capacity
sink t
q
10
capacities
A
6
B 3
3 C
A
6/6
5/8
B 0/3 2/3 C
3
A maximum flow?
| f | = 11
6/6
3/3
8/8
3/6
sink t
11
Cut
s
A
6/6
6/8
B 1/3 3/3 C
5/6
3/3
8/8
4/6
F
t
| f | = 12
12
Properties
Properties:
1. For any cut (X,Y), we have f (X,Y) = | f |
2. For any cut (X,Y), f (X,Y) c(X,Y)
3. f is a maximum flow (allocation) iif
there exists a cut (X0,Y0) such that |f|= c (X0,Y0)
Min-cut
X0 = {A,C}
Y0= {B,D,E,F}
c(X0,Y0) = 12
(X0,Y0) of min capacity
f (X0,Y0) = 12
Max flow
A
6/6
6/8
B 1/3 3/3 C
5/6
X0
3/3
8/8
4/6
Y0
t
| f | = 12
14
Multicast Problem
Butterfly Networks: Each
edges capacity is 1.
Max-Flow from A to D = 2
Max-Flow from A to E = 2
Multicast Max-Flow from A
to D and E = 1.5
Max-Flow for each
individual connection is not
achieved.
C
F
E
15
by A. Limmanee
Network Coding
Introduction
Linear Network Coding
Transfer Matrix
Network Coding Solution
Connection between an Algebraic Quantity
and a Graph Theoretic Tool
Finding Network Coding Solution
16
by A. Limmanee
b1
B
b1
b2
C
b2
F
b1
b1
b1
b2
D
b1 b2
b2
b2
b1
b2
E
b1 b2
17
by A. Limmanee
b1 b2
Li et al. (2003)
Linear network coding is
enough to achieve the
maximum flow, for
multicast in directed
networks
b1
b2
b2
F
b1
b2
b 1 + b2
b1 + b2
D
b1 b2
R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung, Network information ow, IEEE
Transactions on Information Theory, vol. 46, no. 4, July 2000.
b1
b1 + b2
E
b1 b2
18
by A. Limmanee
Z (ofv, l ) z0 (vtime
, l ),Weighted
z
(
v
,
l ),...adjacent
1
processes
from
processes generated at v
edges of e
Relationship between them
(v)
Y (e) l ,e X (v, l )
e comes out
of v
l 1
Z (v, j )
Weighted Combination
from all incoming
edges
Y (e)
e, e
e:head ( e) tail ( e )
e, j
e:head ( e) v
Y (e)
19
by A. Limmanee
Transfer Matrix
Let x ( X (v1 ,1), X (v1 ,2), X (v1 ,3)) Y (e1 ) 1,e1 X (v,1) 2,e1 X (v,2) 3,e1 X (v,3)
z (Z (v4 ,1), Ze1(v4 ,2), Z (v4 ,3)) Y (e2 ) 1,e2 X (v,1) 2,e2 X (v,2) 3,e2 X (v,3)
X (v1 ,1)
z x e M
v2
e5
Z (v4 ,1) Y (e ) Y (e ) Y (e )
4
e1 ,e4
1
e2 , e 4
2
e1v,e44 e4 ,e7 Z (v4 ,2)
X (vM
) A e ,e e ,e e ,e e ,e e ,eZ(vB4 ,3)
1 ,3
2 e
5
2 4
4 6
2 4
4 7
Y (e6 ) e3 ,e6 Y (e3 ) e4 ,e6 Y (e4 )
3
e7
v
e33 ,e6
e3 ,e7
Y (e7 ) e3 ,e7 Y (e3 ) e4 ,e7 Y (e4 )
0
1,e ,1 1,ee , 2 1,ee ,3
Z (v4 ,1) e5 ,1Y (e5 ) e6 ,1Y (e6 ) e7 ,1Y (e7 )
5
5
5
X (v1 ,2)
We want z x
e ,e e ,e e ,e e ,e e ,e
Choose A to be an
M A e ,e e ,e e ,e e ,e e ,e B
identity matrix.
e ,e
e ,e
0
Choose B to be the
1,e 1,e 1,e
inverse of
NETWORK CODING
SOLUTION EXISTS
3, e
3, e
e ,e e ,e e ,e e ,e e ,e
3, e
DETERMINANT OF M IS
e ,1 e , 2 e ,3
e ,e
e ,e
NON-ZERO
1 5
1 4
4 6
2 5
2 4
4 6
3 6
1 4
2 4
4 7
4 7
3 7
1 5
1 4
4 6
2 5
2 4
4 6
B e6 ,1 e6 , 2 e6 ,3
e7 , 3
e7 ,1 e7 , 2
3 6
1 4
2 4
4 7
4 7
3 7
by A. Limmanee
21
Ralf Koetter and Muriel Mdard. An algebraic approach to network coding. IEEE/ACM
Trans. on Netw. 11, 5, October 2003.
22
by A. Limmanee
m log 2 ( NR 1)
Ralf Koetter and Muriel Mdard. An algebraic approach to network coding. IEEE/ACM
Trans. on Netw. 11, 5, October 2003.
23
by A. Limmanee
--> Choosing the coding coefficient uniformly at random in , with q large enough, is
sufficient to ensure high probability of decoding at the sink(s)
Or: For a fixed success probability, the field size needs to be on the order of the number of
links multiplied by the number of receivers d.
--> Fully decentralized
RLNC achieves robustness to link failures
T. Ho, R. Koetter, M. Mdard, D. R. Karger, and M. Effros, The benets of coding over routing in a randomized
setting, in IEEE International Symposium on Information Theory, 2003.
T. Ho and D.S. Lun, Network Coding: An Introduction, Cambridge University Press, 2008
24
a+b
is necessary to achieve
optimal throughput in general
27
Practical Issues
Network Delay
Centralized Knowledge of Graph Topology
Packet Loss
Link Failures
Change in Topology or Capacity
28
by A. Limmanee
Outline
I.
II.
Introduction
Application of NC to wireless networks: Xor in the air
Opportunistic routing
1.
2.
3.
4.
30
The problem
Wireless networks are highly resource
constrained
Bandwidth is the most expensive
Power is sometimes an issue too
--> Serious problems for mesh networks
Alice
Alices packet
Bobs packet
Bob
Bobs packet
Alices packet
Relay
Alice
Alices packet
Bobs packet
Bob
Bobs packet
Alices packet
3 transmissions instead of 4
Saves bandwidth & power
33% throughput increase
by Wenjun Hu
33
34
by Wenjun Hu
Bob
Bob
Charlie
Charlie
Alice
XOR
Alice
Alices packet
Bobs packet
Charlies packet
Charlie
Charlies packet
Alices packet
Bobs packet
XOR
Relay
Bob
Bobs packet
Charlies packet
Alices packet
35
by Wenjun Hu
How it works(Cont.)
Relay Encoding
Alice/Bob Decoding
Generalize to COPE
Nodes snoop on the medium
Reception reports to neighbours
When encoding
Identify what packets neighbours have
Reception reports and guesses
Opportunistic listening
Helps create more coding opportunities
38
by Wenjun Hu
Pseudo-broadcast
COPE gain is from broadcast medium
But 802.11 broadcast doesnt work!
No reliability scheme to mask collision loss
Send packets at lowest bit rate
May actually reduce throughput!
Pseudo-broadcast
Send encoded packets as if unicast
Other neighbours overhear
Benefit as a unicast packet
39
by Wenjun Hu
Implementation
A shim between MAC and IP
Agnostic to protocols above/below
Emulations
General COPE
Emsim (part of Emstar) environment
Testbed
Based on the Alice/Bob scenario
Extension to Roofnet code (in Click)
40
by Wenjun Hu
Emulation Scenario
100 nodes in 800m x 800m
Consider range ~50m
Random senders/receivers
Senders always backlogged
Bit rate at 11 Mb/s
Geographic routing
Metric: end-to-end data traffic throughput
over all flows
41
by Wenjun Hu
Emulation performance
Throughput (KB/s)
Testbed setup
Indoor PCs with 802.11b cards
Intersil Prism 2.5 802.11b chipset
Connected to omni-directional antenna
RTS/CTS disabled
802.11 ad hoc mode
Testbed results
Ratio of Throughput with Coding to No-Coding
2
1.8
1.6
1.4
1.2
1
1
5.5
11
Alice
Bob
Summary
Opportunistic approach allows practical
integration of network coding into current
stack
Throughput can double in practice
Cross-layer effects
Congestion plays in our favour
Outline
I.
II.
Introduction
Application of NC to wireless networks: Xor in the air
Opportunistic routing
1.
2.
3.
4.
Opportunistic networks
Increasing integration of wireless short-range
communication technologies (Bluetooth, 802.11 WiFi) into
mobile devices
-> spontaneous communication, interaction and
collaboration are possible.
Spontaneous communication: opportunistic networking
Promising evolution in mobile ad-hoc networking.
Formed by mobile devices communicating while users are
in close proximity.
There are two prominent characteristics present in
opportunistic networks: 1) A user provides his personal
device as a network node. 2) Users are a priori unknown to
each other.
A. Heinemann, Collaboration in Opportunistic Networks, PhD dissertation, Darmstadt 2007
48
Pocket-switched networks
Thank you but you are in
the opposite direction!
Reach an access
point.
There is one in
my pocket
Search La
Bonheme.mp3 for me
Internet
Finally, it
arrives
Search La
Bonheme.mp3 for me
Search La
Bonheme.mp3 for me
J. Crowcroft,P. Hui, A. Chaintreau, J. Scott, R. Gass, C. Diot, Pocket Switched Networks, Univ. of Cambridge & Intel Research
50
Applications
Provide network access to remote communities
Provide cheaper content access by file exchange in ad hoc mode
Offload the telcos networks
Growing demand for contents --> infrastructure-centric networking paradigm has
limitations
51
http://www.nytimes.com/2009/09/03/technology/companies/03att.html
http://venturebeat.com/2009/05/11/iphone-users-eating-up-atts-network/
52
https://www.youtube.com/playlist?list=PL4buVHalBRoPhqHKMBOU2yqPLtaN5vfKC
53
Outline
I.
II.
Introduction
Application of NC to wireless networks: Xor in the air
Opportunistic routing
1.
2.
3.
4.
55
Node:
Xn+1
Xn
56
J.-Y. Le Boudec, M. Vojnovid, Random Trip Mobility Models, Tutorial ACM Mobicom 2006
Pr{ X = x } = exp(- x)
CDF: Pr, X x - = 1 - exp(- x) ,
M. Ibrahim, Routing and Performance Evaluation of Disruption Tolerant Networks, PhD defense, UNS 2008
57
Outline
I.
II.
Introduction
Application of NC to wireless networks: Xor in the air
Opportunistic routing
1.
2.
3.
4.
Network model
Settings:
only a single unicast session
= 1/ : average number of meetings a node has per time unit
sparse DTN: =N remains constant as N increases
--> the network is connectivity-limited
mobility model: fast and uniform (RW, RWP,)
Objective: optimize the file transfer from S to D by minimizing both its delay, the
memory and energy required by the store, carry and forward process
59
Two-hop routing
Only the source can disseminate copies of the packet, the
relays can only deliver their
copy to the destination
D
D
S
D
D
D
C
B
60
Epidemic routing
The packet is flooded into the network
D
D
D
E
D
D
S
D
D
D
C
B
61
T. G. Kurtz, Solutions of Ordinary Differential Equations as Limits of Pure Jump Markov Processes, Journal of Applied Probability, vol. 7, no. 1,
pp. 4958, 1970.
M. Benam and J.-Y. Le Boudec, A class of mean eld interaction models for computer and communication systems, Performance Evaluation,
vol. 65, no. 11-12, pp. 823838, 2008.
62
T. G. Kurtz, Solutions of Ordinary Differential Equations as Limits of Pure Jump Markov Processes, Journal of Applied Probability, vol. 7, no. 1,
pp. 4958, 1970.
M. Benam and J.-Y. Le Boudec, A class of mean eld interaction models for computer and communication systems, Performance Evaluation,
vol. 65, no. 11-12, pp. 823838, 2008.
63
T. G. Kurtz, Solutions of Ordinary Differential Equations as Limits of Pure Jump Markov Processes, Journal of Applied Probability, vol. 7, no. 1,
pp. 4958, 1970.
M. Benam and J.-Y. Le Boudec, A class of mean eld interaction models for computer and communication systems, Performance Evaluation,
vol. 65, no. 11-12, pp. 823838, 2008.
64
T. G. Kurtz, Solutions of Ordinary Differential Equations as Limits of Pure Jump Markov Processes, Journal of Applied Probability, vol. 7, no. 1,
pp. 4958, 1970.
M. Benam and J.-Y. Le Boudec, A class of mean eld interaction models for computer and communication systems, Performance Evaluation,
vol. 65, no. 11-12, pp. 823838, 2008.
65
Zhang, X., Neglia, G., Kurose, J., Towsley, D.: Performance Modeling of Epidemic Routing. Computer Networks 51, 28672891
(2007)
66
Zhang, X., Neglia, G., Kurose, J., Towsley, D.: Performance Modeling of Epidemic Routing. Computer Networks 51, 28672891
(2007)
67
68
Outline
I.
II.
Introduction
Application of NC to wireless networks: Xor in the air
Opportunistic routing
1.
2.
3.
4.
Spray-and-Wait routing
- Goal: control the total number of disseminated copies thanks to a counter per packet
- i hands floor(c/2) forwarding tokens to j and keeps the rest ceil(c/2) for itself
1D
2D
1D
B
1D
E
5D
D
2D
1D
3D
1D
C
B
T. Spyropoulos, K. Psounis, and C. Raghavendra, Efficient routing in intermittently connected mobile networks: the multi-copy case,
IEEE/ACM Trans. Netw., vol. 16, no. 1, pp. 7790, Feb 2008.
70
Spray-and-Wait:
number of transmissions nb of pkts . L
When all nodes move in an IID manner, for any given max
number of copies L, Spray-and-Wait minimizes the expected
delivery time.
T. Spyropoulos, K. Psounis, and C. Raghavendra, Efcient routing in intermittently connected mobile networks: the multi-copy case,
IEEE/ACM Trans. Netw., vol. 16, no. 1, pp. 7790, Feb 2008.
71
Outline
I.
II.
Introduction
Application of NC to wireless networks: Xor in the air
Opportunistic routing
1.
2.
3.
4.
73
74
75
Random-graph theory
In mathematical terms a network is represented by a
graph. A graph is a pair of sets G(V,E), where V is a set
of N vertices V1, V2, ..., VN and E is a set of edges.
The theory of random graphs was introduced by Paul
Erdos and Alfred Renyi (1959-1961) after Erdos
discovered that probabilistic methods were often
useful in tackling problems in graph theory.
Problem: generating random graphs close to those
arising in the real-world (same features)
R. Albert and A.-L. Barabasi: Statistical mechanics of complex networks, Rev. Mod. Phys., Vol. 74, No. 1, January 2002
76
77
78
Social networks
Most of our friends come from our
geographical or professional neighborhood.
+ Our friends tend to have the same friends
--> High clustering coefficient
But also
There seems to exist short paths between any
pair of nodes
--> Low diameter
R. Albert and A.-L. Barabasi: Statistical mechanics of complex networks, Rev. Mod. Phys., Vol. 74, No. 1, January 2002
79
--> Combine both to model real networks: the Watts and Strogatz model
L=logkN
L = n/(2k)
Almost no clustering
Highly clustered
C=k/n
C=3/6
80
Small-World Networks
R. Albert and A.-L. Barabasi: Statistical mechanics of complex networks, Rev. Mod. Phys., Vol. 74, No. 1, January 2002
81
83
T. Hossmann, T. Spyropoulos, F. Legendre, A complex network analysis of human mobility, NETSCICOM 2011
84
85
Human mobility:
- Inter-meeting times have shown
to follow power law distribution
CCDF: Pr{ X > x } = (x/d)
86
Chaintreau et al.: Impact of human mobility on the design of opportunistic forwarding algorithms. Infocom, 2006
Outline
I.
II.
Introduction
Application of NC to wireless networks: Xor in the air
Opportunistic routing
1.
2.
3.
4.
88
Utility-based routing
T. Spyropoulos, T. Turletti, and K. Obraczka, Routing in delay-tolerant networks comprising heterogeneous node populations, IEEE Trans. on
Mob. Comp., vol. 8, pp. 1132 1147, 2009.
89
T. Spyropoulos, T. Turletti, and K. Obraczka, Routing in delay-tolerant networks comprising heterogeneous node populations, IEEE Trans. on
Mob. Comp., vol. 8, pp. 1132 1147, 2009.
90
T. Spyropoulos, T. Turletti, and K. Obraczka, Routing in delay-tolerant networks comprising heterogeneous node populations, IEEE Trans. on
Mob. Comp., vol. 8, pp. 1132 1147, 2009.
91
P. Hui, J. Crowcroft, and E. Yoneki, Bubble rap: Social-based forwarding in delay tolerant networks, IEEE Trans. on Mob. Comp., vol. 10, no.
11, pp. 1576 1589, Nov 2011.
92
P. Hui, J. Crowcroft, and E. Yoneki, Bubble rap: Social-based forwarding in delay tolerant networks, IEEE Trans. on Mob. Comp., vol. 10, no.
11, pp. 1576 1589, Nov 2011.
93
P. Hui, J. Crowcroft, and E. Yoneki, Bubble rap: Social-based forwarding in delay tolerant networks, IEEE Trans. on Mob. Comp., vol. 10, no.
11, pp. 1576 1589, Nov 2011.
94
95
96
Outline
I.
II.
Introduction
Application of NC to wireless networks: Xor in the air
Opportunistic routing
1.
2.
3.
4.
98
100
Density-based Aggregation
A more useful and robust approach than time-based aggregation, can be to choose
the aggregation function such that the resulting social graph has a given density:
If we want to operate the social graph at a certain density, say, d(Gn) = 0.2, we
choose the best edges, according to some criterion, such that En will have the
desired cardinality:
Most Recent Contacts
Most Frequent Contacts
T. Hossmann, F. Legendre, T. Spyropoulos, From Contacts to Graphs: Pitfalls in Using Complex Network Analysis for DTN Routing, in IEEE
NetSciCom 09, Rio de Janeiro, Brazil, April, 2009
101
T. Hossmann, F. Legendre, T. Spyropoulos, From Contacts to Graphs: Pitfalls in Using Complex Network Analysis for DTN Routing, in IEEE
NetSciCom 09, Rio de Janeiro, Brazil, April, 2009
102
Conclusion
A lot of other community-based routing algorithms for
mobile social DTN (PSN): SimBet, PeopleRank, etc
Some other problems to overcome:
What are the contacts that matter: are they regular contacts, or
random contacts?
Considering content caching, what are the relays the content
should be placed to?
What social features to consider to better match social mobility?
What do we put inside social information: needs to
understand what type of social information is the most relevant
for forwarding, and analyze the impact of choosing a good and
meaningful social information on social forwarding decisions.
103
Outline
I.
II.
Introduction
Application of NC to wireless networks: Xor in the air
Opportunistic routing
1.
2.
3.
4.
105
106
by Yunfeng Lin
Network model
Settings:
only a single unicast session
: average number of meetings a node has per time unit
sparse DTN: =N remains constant as N increases
--> the network is connectivity-limited
mobility model: fast and uniform (RW, RWP,)
C
D
D
D
There are already 3 copies,
no more forwarding
B
A
108
Spray-and-Wait:
number of transmissions nb of pkts . L
mean time for delivery of one packet: log2(L)+N/L
109
Motivation NC Vs Replication
b a
1
D 110
Motivation NC Vs Replication
a+b
b a
2a+b
1
D 111
Protocol - Principle
This protocol called the E-NCR, is a combination of Network coding and
Binary spraying.
ER
NCER
Binary Spraying
E-NCR
112
by Yunfeng Lin
Protocol - Assumptions
There is one source S with K info packets to be transmitted, n relay nodes
and a destination D
For every opportunistic contact, only one packet can be transmitted.
Relay nodes have buffer space B, defined as 1 B K
No other background traffic
A packet in the buffer of a node is purged as soon as an ACK is received
from D or the Time-to-live field reaches zero.
Buffer structure:
pkt_index
pkt_counter
pkt_content
113
by Yunfeng Lin
K=2
K=3
L=7
E-NCR: an example
Time
0
1
Node 1
Node 2
R1
R2
d=a+b
e=2a+3b
f=a+2b
R1
R2
R2
R3
pkt_index
pkt_counter
pkt_content
S
S
Buffer structure:
3d+5e
114
Protocol - Description
SOURCE-RELAY:
Protocol - Description
RELAY-RELAY, SENDER SIDE:
do
{
if(detect any node X)
{
get spray list of X; //list element is a tuple <i, l>,where i is index of packet, l is the
//remaining spray count
do
{
compare this->spraylist with x->spraylist;
if(any this->spraylist-><i, l> such that l >=0 and i does not exist in x->spraylist)
{
send encoded packet <i, floor(l/2)> to node x;
update tuple <i, l> to <i, ceil(l/2)>;
}
}while(end of x->spraylist);
}
}while(true);
116
by Yunfeng Lin
Protocol - Description
RELAY-RELAY, RECEIVER SIDE:
DESTINATION:
if(packet received)
{
if(buffer size == max_buffer_size)
{
encode incoming packet with all
packets in list;
}
else
{
place packet in free slot;
}
add <i,l> of incoming packet to spray
list;
}
do
{
if(got a packet)
{
add to packet list
try to decode list of packets;
if(decode possible)
{
exit loop;
}
}
}while(true);
117
by Yunfeng Lin
Performance
118
by Yunfeng Lin
Some Limitations
Destination has to wait till minimum of K
encoded packets are received
Some packets which have linear dependence
could arise during encoding at relays.
119
by Yunfeng Lin