1 / 37

Lecture on Mobile P2P Computing Prof. Maria Papadopouli University of Crete ICS-FORTH

Lecture on Mobile P2P Computing Prof. Maria Papadopouli University of Crete ICS-FORTH http://www.ics.forth.gr/mobile. Agenda. Introduction on Mobile Computing & Wireless Networks Wireless Networks - Physical Layer IEEE 802.11 MAC Wireless Network Measurements & Modeling

meyersc
Download Presentation

Lecture on Mobile P2P Computing Prof. Maria Papadopouli University of Crete ICS-FORTH

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lecture on Mobile P2P Computing Prof. Maria Papadopouli University of Crete ICS-FORTH http://www.ics.forth.gr/mobile

  2. Agenda • Introduction on Mobile Computing & Wireless Networks • Wireless Networks - Physical Layer • IEEE 802.11 MAC • Wireless Network Measurements & Modeling • Location Sensing • Performance of VoIP over wireless networks • Mobile Peer-to-Peer computing • Exciting research problems

  3. General Objectives • Build some background on wireless networks, IEEE802.11, positioning, mobile computing • Explore some research projects and possibly research collaborations

  4. Environmental Monitoring Source: Joao Da Silva’s talk at Enisa, July 20th, 2008

  5. Tagged products Source: Joao Da Silva’s talk at Enisa, July 20th, 2008

  6. Source: Joao Da Silva’s talk at Enisa, July 20th, 2008

  7. Source: Joao Da Silva’s talk at Enisa, July 20th, 2008

  8. New networking paradigms for efficient search and sharing mechanisms Source: Joao Da Silva’s talk at Enisa, July 20th, 2008

  9. Fast Growth of Wireless Use • Social networking (e.g., micro-blogging) • Multimedia downloads (e.g., Hulu, YouTube) • Gaming (Xbox Live) • 2D video conferencing • File sharing & collaboration • Cloud storage • Next generation applications • Immersive video conferencing • 3D Telemedicine • Virtual & Augmented reality • Assistive Technology Rapid increase in the multimedia mobile Internet traffic

  10. Fast Growth of Wireless Use (2/2) • Video driving rapid growth in mobile Internet traffic • Expected to rise 66x by 2013 (Cisco Visual Networking Index-Mobile Data traffic Forecast)

  11. Energy constrains

  12. Paradigms of Mobile Information Access • Wireless Internet via APs • Data Access via Infostations • Data Access using the Peer-to-Peerparadigm • Hybrid mobile information access • (manifesting a combination of the above paradigms)

  13. Wireless Internet via APs Aims at “continuous” wireless Internet access broadly defined by three types networks: • Wireless wide areanetworks (WANs) • Wireless local area networks (LANs) • Wireless personalarea networks (PANs)

  14. Infostations • Wireless-enabled server attached to data repository • Wireless devices in rangecan query the infostation to acquiredata • Canbe • stand-alone servers • clustered with other infostations connected over terrerstrial links

  15. Peer-to-Peer systems • Distributed system withoutany • Centralized control • Infrastructure • Distinguished by the followingcriteria • Self-organization • Autonomy • Symmetry

  16. Mobile Peer-to-Peer Computing • When two devices (peers) are in wireless range of each other, they may share resources: • Share data • Network connection • Relay packets on behalf of each other • Enable resource sharing among peers in a self-organizing, energy-efficient manner

  17. Trapping model from particle-kinetics Server-to-Client: Internet Router Server-to-Client Paradigm Client gets data from AP Switch Peer-to-Peer Paradigm AP User C User A User B Wireless Network via an Infrastructure How does information diffuse in mobile peer-to-peer systems ?

  18. Applications Using Mobile P2P • Location-based applications • Social networking application  For example: Facebook integrated with positioning, google maps, 7DS, photojournal • User-centric access of the spectrum

  19. Photojournal • Sharing multimedia files with your friends • Mobile P2P paradigm • Superimpose multimedia information on google maps by correlating the timestamps of multimedia files and recorded positioning information • Review, share, search multimedia files across a (single-hop) network of friends

  20. http://www.ics.forth.gr/mobile/

  21. http://www.ics.forth.gr/mobile/

  22. Research Issues on Cognitive Radios INFORTE Lecture Series Prof. Maria Papadopouli University of Crete ICS-FORTH http://www.ics.forth.gr/mobile 23

  23. Underutilization of licensed spectrum • Licensed portions of the spectrum are underutilized. • According to FCC, only 5% of the spectrum from 30 MHz to 30 GHz is used in the US.

  24. Cognitive radios • Intelligent devices that can coexist with licensed users without affecting their quality of service • Licensed users have higher priority and are called primary users • Cognitive radios access the spectrum in an opportunistic way and are called secondary users • Networks of cognitive radios could function at licensed portions of the spectrum • Demand to access the ISM bands could be reduced

  25. Coexistence of secondary users • Usually, in cognitive radio networks, a large number of secondary users compete to access the spectrum • A protocol should define the behavior of all these users such that the network’s performance is maximized • Performance metrics: • Spectrum utilization • Fairness • Interference to primary users

  26. Performance optimization • Proposed protocols in the literature define an optimization problem • The utility function depends on the performance metrics • Parameters of the problem are chosen from the following set: • Channel allocation • Adaptive modulation • Interference cancellation • Power control • Beamforming

  27. Definition of the problem

  28. 1. Channel allocation • Problem formulation: • 2 secondary users compete for access in the band [F1 F2]. • The interference plus noise power as observed by the first user is: • Question: Which is the best way for this user to distribute its transmission power at the interval [F1 F2]?

  29. Channel capacity According to Shannon the maximum rate that can be achieved in a channel is: S: signal power N: interference plus noise power B: width of the channel As the power that is introduced to a channel increases, the achievable rate increases more and more slowly.

  30. Energy investment in two channels We start by investing energy in the first channel until it’s total power becomes equal to N2. After that point, energy is divided equally among the two channels.

  31. Water filling strategy The best way for a user to invest it’s power is to distribute it in the whole range of frequencies.

  32. Channel allocation problem • M users compete to access a band • They do not use the selfish water filling strategy • Instead they cooperate and divide the spectrum among them in the most efficient way • The initial band is divided into a number of non overlapping frequency bins • An algorithm maps the bins to users in such a way that a global utility function is maximized

  33. Cooperation Is it possible for the two users to achieve a better rate if they cooperate? Example:  When R1’> R1 then dividing the bandwidth among the two users is more effective than water filling.

  34. Channel allocation algorithm • There are various ways that a channel allocation algorithm could be designed. • Distributed or centralized. • Proactive or on demand. • Predetermined channel allocation. • Allocation of contiguous or non contiguous bins to devices.

  35. Primary and secondary channels • Channels that are allocated to a user are called primary • Channels that a user borrows from the neighborhood are called secondary • Predetermined channel allocation is not so suitable for cognitive radio networks, duo to: • Changes of channel conditions caused by primary user activity • Network topology changes very often

  36. User-centric Spectrum Sharing • Spectrum is a valuable resource!  Improve its spectrum utilization • Primary users “sub-lease” part of spectrum • Secondary users take advantage of the unused spectrum • Different algorithms for bin allocation across secondary and primary users

More Related