Mesh Networking Team Introduction Community Network

Total Page:16

File Type:pdf, Size:1020Kb

Mesh Networking Team Introduction Community Network 9/13/2004 6:32 PM Mesh Networking http://research.microsoft.com/mesh Victor Bahl Senior Researcher Systems and Networking Group Microsoft Research Team Introduction Community Network Executive Sponsor Craig Mundie, CTO & Senior Vice President Microsoft Microsoft Research Victor Bahl (Project Lead), Richard Draves, Jitu Padhye, Lili Qiu, Alec Wolman, Brian Zill The Venice Incubation Jeff Erwin (Project Lead), Pierre De Vries, Ian Ferrell, Jason Ginchereau, Steve Kelly, Alexander Popoff, Karen Community Network Applications Mesh Formation: Problem Internet use increased social contact, public participation and size of Formulation social network. (social capital - access to people, information and resources) Question Example Scenario Keith N. Hampton, MIT (author of “Netville Neighborhood How many homes in the Viable mesh: group of at least 25 Study”) neighborhood have to sign houses that form a connected URL: http://www.asanet.org/media/neville.html up before a viable mesh graph forms? Topology: A North Seattle Shared Broadband Internet Access Answer depends on Neighborhood. 8214 houses, Neighborhood watchdog (e.g. video surveillance) Definition of “viable” 4Km x 4Km Neighborhood TiVO Wireless range Neighborhood topology Wireless range: 50, 100, 200 and 1000 meters Medical & emergency response Probability of participation Distributed backup by a given houshold Houses decide to join at random, Neighborhood eBay, portals independent of each other. We consider 0.1% to 10% Bits produced locally, gets used locally participation rates. Social interaction © 2003-2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. 1 9/13/2004 6:32 PM Mesh Formation 5-10% subscription rate needed for suburban Suburbia topologies with documented Upper-middle class wireless ranges neighbourhood Houses about 40-120’ apart Once a mesh forms, it is 21 houses covering 7.8 Once a mesh forms, it is acres or ~1/3 acre lots usually well-connected Microwave ovens, cordless i.e. number of outliers are few phones, televisions etc. (most nodes have > 2 neighbors) cause interference Angled sheetrock and concrete walls, hills and Need to investigate other trees absorb signal and create multi-path joining models reflections Not a pleasant place to roll out wireless Business model One reason why cellular considerations will be uses 80’-100’ masts for their cell towers important Increasing range is key for good mesh connectivity 0 20 40 60 80 100120140160 802.11a in a Multihop Network Impact of path length on TCP Throughput 5 GHz: 12000 Bandwidth is good, provided you can get a 10000 mesh to form Published 802.11a ranges led us to believe we could 8000 achieve the yellow circle Measured range from the apartment trial is the red 6000 circle Range is not sufficient to TCP Throughput (Kbps) 4000 bootstrap mesh until installed % is quite high (in this diagram ~50%) 2000 0 01234567 Path Length (Hops) 0 20 40 60 80 100120140160 Round Trip Delay versus Collision between ISM devices Node Density Average RTT avg_rtt = 0.1*curr_sample + 0.9*avg_rtt One sample every 0.5 seconds 0.2 0.18 0.16 0.14 0.12 0.1 0.08 Average RTT 0.06 Phone 0.04 0.02 0 0 20 40 60 80 100 120 140 160 180 Time A new 100Kbps CBR connection starts every 10 seconds, between a new pair of nodes. All nodes hear each other. Panasonic 2.4GHz Spread Spectrum Phone 5m and 1 Wall from receiver © 2003-2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. 2 9/13/2004 6:32 PM Colliding standards Courtesy: Mobilian Corp. Conclusion Meshes are viable existing technologies are inadequate To make it real Identify and solve key problems build and deploy a mesh prototype Performance worsens when there are large number of short-range radios in the vicinity Problem Space Problem Space (Cont) Range and Capacity [Talk by Jim K; Poster by John D. & Ranveer C.] Smart Spectrum Utilization Electronically steerable directional antenna or MIMO for range enhancement Spectrum Etiquittes Multiple frequency meshes Agile Radios, cognitive radios Multi-radio hardware for capacity enhancement via greater spectrum utilization New data channel MAC for higher throughput Cognitive software & applications Tools for predicting & analyzing network viability & performance Analytical Techniques Multihop Routing [Talk by Rich D.; Poster & Demo by Jitu P. & Brian Z.] Information theoretic tools that predict expected capacity with practical L2.5 on-demand source routing. Routes selected based on link quality constraints, based on experimental data Route selection with multiple radios Digital Rights Management (DRM) Security and Fairness Broadband access will become popular with expanded digital content. Guard against malicious users (and freeloaders) Increase the value proposition for end-users/subscribers EAP-TLS between MeshBoxes, PEAPv2 or EAP-TLS between clients and MeshBoxes Priority based admission control, Secure traceroute Ease of use (Plug and play, HCI) Self Management & Self Healing [Talk by Lili Q.; Poster by AP] Make the user experience pleasant Desirable: avoid network operator - minimal human intervention QoS protocols over wireless meshes to improve content delivery Watchdog mechanism Data cleaning and liar detection Proof of Concept via rapid prototyping and testbed deployments Online simulation based fault isolation and diagnosis Scenario: Neighborhood Wireless Meshes Mesh Routing Functionality Mesh Box Mesh Management Module Configuration ITAP End Device Connects to a Mesh Router Standards Compliant Diagnostics Client Network Interface and Server DLLs TCP / IP S Mesh Router / MeshBox E Link Routes traffic within the C Mesh Connectivity Layer Monitor mesh and to the U (MCL) Module neighborhood Internet R Multi-hop Routing/Bridging Gateway I Radio Selection Metric Serves as access point for T Topology Control End Devices Y Diagnostics Kernel Mesh Router Module Neighborhood Internet Gateway Gateway between the mesh Control Channel nodes and the Internet Data Channel Radio End Device Miniport Driver Radio Miniport driver © 2003-2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. 3 9/13/2004 6:32 PM Research Results Research Results (cont.) Spectrum Etiquette P. Bahl, A. Hassan, P. Vries, Spectrum Etiquettes for Short Single Radio Mesh Performance Range Wireless Devices Operating in the Unlicensed Band - A R. Draves, J. Padhye, and B. Zill. Comparison of Routing Proposal,,White paper, Spectrum Policy: Property or Commons, Stanford Law School Metrics for Static Multi-Hop Wireless Networks. ACM SIGCOMM 2004 (also Technical Report, MSR-TR-2004-18, March 2004) Multi Radio Meshes A. Adya, P. Bahl, J. Padhye, A. Wolman, and L. Zhou. A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks. BroadNets 2004 (also Technical Report, MSR-TR-2003-41, June 2003) Single Radio Mesh Performance R. Draves, J. Padhye, and B. Zill. Routing in Multi-radio, Multi-hop Determining Mesh Capacity Wireless Mesh Networks, To appear in ACM MobiCom 2004 K. Jain, J. Padhye, V. Padmanabhan, and L. Qiu. Impact of Interference on Multi-hop Wireless Network Performance. ACM Mobicom, San Diego, CA, September 2003 Multi Radio Mesh Routing & Performance Mesh Self Management L. Qiu, P. Bahl, A. Rao, and L. Zhou. Fault Detection, Isolation, L. Qiu, P. Bahl, A. Rao, and L. Zhou. Fault Detection, Isolation, and and Diagnosis in Multi-hop Wireless Networks. Technical Diagnosis in Multi-hop Wireless Networks. Technical Report, MSR- Report, MSR-TR-2004-11, December 2003 TR-2004-11, December 2003 Report, MSR-TR-2004-11, December 2003 Capacity Enhancement Capacity Enhancement Problem In current IEEE 802.11 meshes Improve throughput via better utilization of the spectrum Design Constraints Require only a single radio per node Use unmodified IEEE 802.11 protocol Do not depend on existence of control channel Do not depend on existence of control channel Only one of 3 pairs is active @ any given time Assumption With MSR’s SSCH enabled meshes Node is equipped with an omni-direction antenna Ch 1 1 2 1 4 5 4 - MIMO technology is OK Ch 2 Multiple orthogonal channels are available 3 4 5 2 1 6 Channel switching time is 80 usecs. Ch 3 5 6 3 6 3 2 - current speeds 150 microseconds 10 msecs 10 msecs 10 msecs … Performance Mesh Diagnosis Visualization 100 nodes, IEEE 802.11a, 13 channels, every flow is multihop Module Avg. per node Throughput Total System Throughput 4 80 3.5 70 3 60 50 2.5 40 2 30 SSCH IEEE 802.11 1.5 20 Throughput (Mbps) 1 Throughput (Mbps) Throughput SSCH M802.11 10 0.5 0 10 20 30 40 50 0 Number of Flows 10 20 30 40 50 Number of Flows Significant capacity improvement when traffic load is on multiple separate flows © 2003-2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. 4 9/13/2004 6:32 PM Testbeds Details 201 210 23 to 30 nodes 220 Inexpensive desktops (HP d530 SF) 205 Two radios in each node 203 226 NetGear WAG or WAB, Proxim 204 OriNOCO Cards can operate in a, b or g mode. 227 221 Purpose 207 Verification of the mesh software stack 206 Routing protocol behavior 208 225 211 224 Fault diagnosis and mesh management algorithms 223 Security and privacy architecture 209 Range and robustness @ 5 GHz with
Recommended publications
  • Building Blocks for Tomorrow's Mobile App Store
    Building Blocks for Tomorrow’s Mobile App Store by Justin G. Manweiler Department of Computer Science Duke University Date: Approved: Romit Roy Choudhury, Supervisor Jeffrey S. Chase Landon P. Cox Victor Bahl Dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2012 Abstract (0984) Building Blocks for Tomorrow’s Mobile App Store by Justin G. Manweiler Department of Computer Science Duke University Date: Approved: Romit Roy Choudhury, Supervisor Jeffrey S. Chase Landon P. Cox Victor Bahl An abstract of a dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2012 Copyright c 2012 by Justin G. Manweiler All rights reserved Abstract In our homes and in the enterprise, in our leisure and in our professions, mobile computing is no longer merely “exciting;” it is becoming an essential, ubiquitous tool of the modern world. New and innovative mobile applications continue to inform, entertain, and surprise users. But, to make the daily use of mobile technologies more gratifying and worthwhile, we must move forward with new levels of sophistication. The Mobile App Stores of the future must be built on stronger foundations. This dissertation considers a broad view of the challenges and intuitions behind a diverse selection of such new primitives. Some of these primitives will mitigate exist- ing and fundamental challenges of mobile computing, especially relating to wireless communication. Others will take an application-driven approach, being designed to serve a novel purpose, and be adapted to the unique and varied challenges from their disparate domains.
    [Show full text]
  • Annual Report
    ANNUAL REPORT 2019FISCAL YEAR ACM, the Association for Computing Machinery, is an international scientific and educational organization dedicated to advancing the arts, sciences, and applications of information technology. Letter from the President It’s been quite an eventful year and challenges posed by evolving technology. for ACM. While this annual Education has always been at the foundation of exercise allows us a moment ACM, as reflected in two recent curriculum efforts. First, “ACM’s mission to celebrate some of the many the ACM Task Force on Data Science issued “Comput- hinges on successes and achievements ing Competencies for Undergraduate Data Science Cur- creating a the Association has realized ricula.” The guidelines lay out the computing-specific over the past year, it is also an competencies that should be included when other community that opportunity to focus on new academic departments offer programs in data science encompasses and innovative ways to ensure at the undergraduate level. Second, building on the all who work in ACM remains a vibrant global success of our recent guidelines for 4-year cybersecu- the computing resource for the computing community. rity curricula, the ACM Committee for Computing Edu- ACM’s mission hinges on creating a community cation in Community Colleges created a related cur- and technology that encompasses all who work in the computing and riculum targeted at two-year programs, “Cybersecurity arena” technology arena. This year, ACM established a new Di- Curricular Guidance for Associate-Degree Programs.” versity and Inclusion Council to identify ways to create The following pages offer a sampling of the many environments that are welcoming to new perspectives ACM events and accomplishments that occurred over and will attract an even broader membership from the past fiscal year, none of which would have been around the world.
    [Show full text]
  • Victor Bahl Microsoft Corporation
    Victor Bahl Microsoft Corporation SIGCOMM MobiArch 2007, August 2007 Source: Victoria Poncini, MS IT ~7, 000 Access Points ~65,000 XP & Vista Clients December 2006 ~40,000 connections/day ~35,000 handheld devices 100% 80% 39,6% 37,3% 42,2% 45,8% 47,1% 60% 40% 39,8% 39,7% 34,2% 44,2% 35,3% 20% 18,1% 20,1% 16,2% 17,6% 22,9% 0% Worldwide Americas w/o PS Puget Sound EMEA APJ Very SfSatisfied SSfSomewhat Satisfied SfSomewhat Dissatisfied or Very Dissati fied 2 Victor Bahl Microsoft’s IT Dept. logs several hundred complaints / month 70% calls are about client connectivity issues (e. g. ping-ponging between APs) 30% (and growing) are about performance problems due to interference End-users complain about Lack of RF coverage, performance & reliability Connectivity & authentication problems Network administrators worry about Providing adequate coverage, performance Security and unauthorized access Corporations spend lots of $$ on WLAN infrastructure WLAN hardware business to reach $2.6 billion in 2007. (Forester 2006) Heavy VC funding in this area (e.g. AirTight $36M in the last 16 months) 3 Victor Bahl 4 Victor Bahl FY05 Cost Element View Functional View Breakdown People 72% Applications 60% Data & Voice 16% App Development (29%) App Support (31%) Hardware 5% Facilities 5% Infrastructure 40% Software* 2% Network (14%) * 5% If MS software were included Data Center (7%) Employee Services (5%) Voice (5%) 30% Helpdesk (5%) New Increases Security (3%) Capability value 45% New 70% Capability Sustaining & Running Decreases Existing maintenance 55% Capability delivery Existing Capability 5 Victor Bahl Timeline HotNets’05 , MobiSys’ 06, NSDI ‘07 ACM CCR ’ 06 MobiCom’ 04 MobiSys’ 06 6 Victor Bahl Heterogeneous world Multiple technologies: 802.
    [Show full text]
  • (Cloudlets/Edges) for Mobile Computing
    emergence of micro datacenter (cloudlets/edges) for mobile computing Victor Bahl Wednesday, May 13, 2015 what if our computers could see? Microsoft’s’s HoloLens who? where? what? Video credits: Matthai Philipose Microsoft Research seeing is for real MSR’s Glimpse project vision is demanding recognition using deep neural networks face1 [1] scene [2] object2[3] memory (floats) 103M 76M 138M compute 1.00 GFLOPs 2.54 GFLOPs 30.9 GFLOPs accuracy 97% 51% 94% (top 5) 1: 4000 people; 2: 1000 objects from ImageNet, top 5: one of your top 5 matches human-level accuracy, heavy resource demands … offloading computation is highly desirable [1] Y. Taigman et al. DeepFace: Closing the Gap to Human-Level Performance in Face Verification. In CVPR 2014. (Facebook) [2] B. Zhou et al. Learning deep features for scene recognition using places database. In NIPS, 2014. [MIT, Princeton, ..] [3] K. Simonyan & A. Zisserman. Very deep convolutional networks for large-scale image recognition. 2014 [Google, Oxford] under review recognition: server versus mobile road sign recognition1 stage Mobile server Spedup (Samsung Galaxy Nexus) (i7, 3.6GHz, 4-core) (server:mobile) detection 2353 +/- 242.4 ms 110 +/- 32.1 ms ~15-16X feature extraction 1327.7 +/- 102.4 ms 69 +/- 15.2 ms ~18X recognition2 162.1 +/- 73.2 ms 11 +/- 1.6 ms ~14X Energy used 11.32 Joules 0.54 Joules ~21X 1convolution neural networks 2classifying 1000 objects with 4096 features using a linear SVM how long does it take to reach the cloud? 3g networks 4g-lte networks T-Mobile 450ms AT&T 350ms MobiSys 2010
    [Show full text]
  • Building Aggressively Duty-Cycled Platforms to Achieve Energy Efficiency
    UNIVERSITY OF CALIFORNIA, SAN DIEGO Building Aggressively Duty-Cycled Platforms to Achieve Energy Efficiency A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science (Computer Engineering) by Yuvraj Agarwal Committee in charge: Rajesh Gupta, Chair Paramvir Bahl William Hodgkiss Stefan Savage Alex Snoeren Geoff Voelker 2009 Copyright Yuvraj Agarwal, 2009 All rights reserved. The dissertation of Yuvraj Agarwal is approved, and it is acceptable in quality and form for publication on mi- crofilm and electronically: Chair University of California, San Diego 2009 iii DEDICATION To Dadi, Shyam Babaji, Papa and Ma. iv TABLE OF CONTENTS Signature Page .................................. iii Dedication ..................................... iv Table of Contents ................................. v List of Figures .................................. ix List of Tables ................................... xi Acknowledgements ................................ xii Vita and Publications .............................. xv Abstract of the Dissertation ........................... xvi Chapter 1 Introduction ............................ 1 1.1 Reducing the Energy Consumption of Computing Devices 3 1.2 Using Collaboration to Aggressively Duty-Cycle Platforms 5 1.3 Contributions ........................ 7 1.4 Organization ......................... 8 Chapter 2 Background and Related Work .................. 9 2.1 Mobile Platforms ...................... 9 2.2 Power and Energy ...................... 12 2.2.1 Measuring Power and Energy Consumption .... 13 2.3 Related Work ........................ 14 2.3.1 Power Management in Mobile Devices ....... 14 2.3.2 Power Management in Laptops and Desktop PCs 17 Chapter 3 Radio Collaboration - Cellular and LAN Data Radios ..... 20 3.1 Overview of a VoIP Deployment .............. 23 3.2 Alternatives to VoIP over Wi-Fi Radios .......... 24 3.2.1 Cellular Data vs. Wi-Fi .............. 25 3.2.2 Smartphone Power Measurements ......... 28 3.3 Cell2Notify Architecture .................
    [Show full text]
  • CVPR), July, 1996
    Vishal Misra Professor [email protected] Department of Computer Science http://www.cs.columbia.edu/∼misra/ Columbia University Work : (212) 939 7061 New York, NY 10027-7003 EDUCATION University of Massachusetts Amherst Amherst, MA Ph.D. in Electrical Engineering May 2000 Advisor: Wei-Bo Gong University of Massachusetts Amherst Amherst, MA M.S. in Electrical Engineering May, 1996 Advisor: Lewis E. Franks Indian Institute of Technology Mumbai, India Bachelor of Technology in Electrical Engineering 1992 EXPERIENCE Columbia University New York, NY Professor, Dept. of Computer Science Spring 2016 - Present Vice Chair, Dept. of Computer Science July 2009 - June 2012 Associate Professor, Dept. of Computer Science Spring 2006 - Fall 2015 Assistant Professor, Dept. of Computer Science Fall 2001 - Fall 2005 Google New York, NY Visiting Scientist July 2017 - Present Infinio Inc. Cambridge, MA Founder and CEO June 2011 - October 2012 Founder and CTO October 2012 - June 2014 Founder and Chief Scientist June 2014 - March 2017 University of Massachusetts Amherst, MA Post-Doctoral Research Associate, Computer Networks Research Group 2000-Fall 2001 Research Assistant, Complex Systems Modeling and Control Lab 1996-2000 Verizon (formerly Nynex Science & Technology) White Plains , NY Student Intern Summer 1994, 1995 CricInfo (http://espncricinfo.com) London, UK Founding CTO 1993-1998 Indian Institute of Technology Mumbai, India Research Associate 1992-93 Vishal Misra page 2 AWARDS • Distinguished Alumnus Award, IIT Bombay, 2019 • Elected ACM Fellow, 2018 • Elected IEEE Fellow, 2016 • Elected Chair, ACM Sigmetrics, 2015-2017 • Outstanding Young Alumni Award, UMass-Amherst College of Engineering, 2014 • Elected Vice Chair, ACM Sigmetrics, 2011-2015 • Elected to the Board of Directors, ACM Sigmetrics, 2007-2011 • Elected Member, IFIP Working Group 7.3 on Computer Performance Modeling and Analysis, 2005.
    [Show full text]
  • Mobile Edge Computing Empowers Internet of Things
    IEICE TRANS. ??, VOL.Exx–??, NO.xx XXXX 200x 1 INVITED PAPER Mobile Edge Computing Empowers Internet of Things Nirwan ANSARIya) and Xiang SUNyb), SUMMARY In this paper, we propose a Mobile Edge Internet of Things lored for IoT devices is critical to empowering the current (MEIoT) architecture by leveraging the fiber-wireless access technology, IoT system. In addition, only providing interconnections to the cloudlet concept, and the software defined networking framework. The share raw data among IoT devices is not enough to gain the MEIoT architecture brings computing and storage resources close to Internet of Things (IoT) devices in order to speed up IoT data sharing and analytics. insight behind the big IoT data; the insight is more valuable Specifically, the IoT devices (belonging to the same user) are associated to for the society as a whole. Thus, it is beneficial to provision a specific proxy Virtual Machine (VM) in the nearby cloudlet. The proxy the IoT system with a comprehensive cognitive capability VM stores and analyzes the IoT data (generated by its IoT devices) in real- such that high-level knowledge can be extracted from the time. Moreover, we introduce the semantic and social IoT technology in the context of MEIoT to solve the interoperability and inefficient access big IoT raw data streams by applying various types of data control problem in the IoT system. In addition, we propose two dynamic mining and machine learning methods [3]. The data center proxy VM migration methods to minimize the end-to-end delay between infrastructure has been demonstrated to provision resources proxy VMs and their IoT devices and to minimize the total on-grid energy flexibly and efficiently [4]; meanwhile, various parallel com- consumption of the cloudlets, respectively.
    [Show full text]
  • CHOICE – the World's First Public Area Wifi Hot-Spot Network
    An Overview of the CHOICE Network Victor Bahl http://research.microsoft.com/~bahl December 18, 2000 Demos you will see today CHOICE – Phase 1 Demo 1 – Network advertisement, user authentication, access enforcement, security, accounting, and mobility management CHOICE – Phase 2 Location based personalized services Demo 2 – Location based buddy list Demo 3 – Mall On-Sale Service Victor Bahl December 18, 2000 Broadband Wireless Internet Access in Public Places The CHOICE Network - Phase 1 Global authentication, Local access, First-hop security, Accounting, Differentiated Service, Mobility management & Auto-configuration The Choice Network Project: Motivation Enable high speed wireless internet access in public places (e.g. hotels, conferences, malls, airports) WLAN much faster than 3G cell phones Design, implement, and deploy a network service that grants secure, customized, and accountable network access to possibly unknown users A system that protects users and network operators supports different business models e.g. free intranet and/or fee-based internet access makes access seamless and robust Multiple authentication schemes for first-time users Bootstrap network accesses for mobile clients Scale to large network settings Tolerate system failures Victor Bahl December 18, 2000 Review: Existing Access Mechanisms Mostly built for enterprise networks Layer-2 Filtering MAC based filtering – is on its way out Shared key encryption – is being used today …but key management is broken Several Problems: Network can be compromised
    [Show full text]
  • Past Distinguished Lecturers Last Updated 1/2/2020
    IEEE Communications Society Past Distinguished Lecturers Last updated 1/2/2020 Speaker Name DL Topics DL Term ● Multiuser communication ● Multiple access communication ● Spectrum Sharing in wireless communication Term effective Behnaam Aazhang ● Cooperative Communication through 31 December 2007 ● Scheduling in Wireless Communication ● Feedback in Wireless Communication ● Delivering Ubiquitous Services Over Heterogeneous Networks (In the Term effective Context of End-to-End Networking) Hamid Aghvami through 31 December ● Future Broadband Access Networks-Challenges 2006 ● Communication and Bio-Sensors Technologies Integration for Cost-Effective Ubiquitous Healthcare Term effective ● Energy Efficiency in Mobile Healthcare Systems Nazim Agoulmine through 31 December ● Autonomic Fixed and Wireless Networks: Concepts and 2014 Implementations ● An overview of 5G network research ● 10 years of Future Internet research: where do we stand? Term effective ● Reconsidering management challenges in chaotic telecommunication Rui Luis Aguiar through 31 December environments 2018 ● Questioning Quality of Service in telecommunications today ● New Technologies (3G, IP, WDM) Impact on Network Operations Term effective Salah Aidarous ● Evolution to NGOSS and Transition Strategies through 31 December 2002 ● Cognitive Radio and Dynamic Spectrum Access Term effective ● Energy Harvesting Communication Networks Sonia Aissa through 31 December ● Wireless Power Transfer 2016 1 IEEE Communications Society Past Distinguished Lecturers Last updated 1/2/2020 ● Fundamentals
    [Show full text]
  • Synthesizing Plausible Infrastructure Configurations for Evaluating Edge
    Synthesizing Plausible Infrastructure Configurations for Evaluating Edge Computing Systems Thomas Rausch Clemens Lachner Pantelis A. Frangoudis Philipp Raith TU Wien TU Wien TU Wien TU Wien Schahram Dustdar TU Wien Abstract evaluating edge computing systems under different conditions This paper proposes a framework for synthesizing infrastruc- and parameters. We examine the commonalities of emerging ture configurations for evaluating edge computing systems application scenarios that leverage edge infrastructure in the under different conditions. There are a number of tools to sim- entire compute continuum, to elevate common concepts into ulate or emulate edge systems, and while they typically pro- our framework domain. The result is a set of primitives and vide ways of modeling infrastructure and network topologies, building blocks for generating edge infrastructure configura- they lack reusable building blocks common to edge scenarios. tions and topologies. Based on data we have gathered for the Consequently, most edge computing systems evaluations to scenarios, we identify a parameter space for these building this date rely on either highly application-specific testbeds, or blocks, to give researchers the ability to vary different aspects abstract scenarios and abstract infrastructure configurations. of the generated topology, s.t. the cluster topologies remain We analyze four existing or emerging edge infrastructure sce- plausible extensions of the original scenarios grounded in narios, from which we elicit common concepts. The scenarios empirical data. We demonstrate the applicability of our open- serve as input to synthesize plausible infrastructure config- source tool, ether [32], by synthesizing configurations for urations, that are parameterizable in cluster density, device selected scenarios, and showing how the synthetic configura- heterogeneity, and network topology.
    [Show full text]
  • White Space Networking, Summer School in Networking, Bangalore, India (June 2009)
    Victor Bahl Joint work with Paula Boyd, Ranveer Chandra, Paul Garnett, Thomas Moscibroda, and MSR Interns (Rohan Murty, George Nychis, Xiaohui Wang , Yuan Yuan) WS • Work with regulators to nail • Identify & solve technical down sensible problems specifications • Build proof-of-concept • Help achieve world-wide prototypes harmonization • Help policy teams with • Engage with silicon vendors recommendations based & system integrators on solid science •Build community mindshare Strategy Research & Policy Product Business • Gather requirements & nail down specs • Help create industry • Develop business Standards models • Harden research code, • Identify Applications & develop & test on Services Windows • Build alliances for greater connectivity Version 1: Ad hoc networking in white spaces 700 MHz operation, TV sensing capability, one-to-one opportunistic networking, control-channel based MAC, varying channel width operation, multi-radio design, design analysis through simulations Version 2: Infrastructure based networking (WhiteFi) White Space freq. operation, TV sensing Capability, limited microphone sensing, one-to-many opportunistic networking, Wi-Fi MAC, time-domain analysis (SIFT), demo-ed at Microsoft events (e.g. TechFest 2009) Version 3: Campus-wide backbone network (WhiteFi with Geolocation) All of V2 + geolocation DB, Windows network stack improvements, bridging between Wi-Fi and WhiteFi, coverage in MS Shuttles FCC Experimental License (Granted: July 6, 2009) Centered at (47.6442N, 122.1330W) Goal: Deploy a white space network
    [Show full text]
  • Telecommunications Reclaimed: a Hands-On Guide to Networking Communities
    1 2 3 TELECOMMUNICATIONS RECLAIMED: A HANDS-ON GUIDE TO NETWORKING COMMUNITIES MÉLANIE DULONG DE ROSNAY & FÉLIX TRÉGUER (EDS.) 4 Acknowledgements The research presented in this book, the writing residency and the editing process were funded by the Horizon 2020 programme of the European Union (Grant Number 688768), project netCommons Network Infrastructure as Commons (netcommons.eu). The production of this book was co-funded by the European project netCommons (see above) and published with the additional support of the Internet Society (Jane Coffin) and the Association for Progressive Communications (Flavia Fascendini and Carlos Rey- Moreno). ISBN 978-92-95113-15-2 Published by Internet Society Printed in the USA 2019 Disclaimer: The views expressed in this book are not necessarily the views of the Internet Society. This book is licensed under a Creative Commons Attribution- ShareAlike 4.0 available at International license www.creativecommons.org/ licenses/by-sa/4.0/. You can download this book at www.netcommons.eu/ telecommunications-reclaimed 5 Editors Illustrations and layout Mélanie Dulong de Rosnay, CNRS Sarah Viguer Félix Tréguer, CNRS Booksprint facilitator Authors Andreas Wichmann Panayotis Antoniadis, NetHood Ileana Apostol, NetHood Peer review Virginie Aubrée, University of Trento, Christian Fuchs, University of University of Paris Nanterre Westminster Adam Burns, free2air Renato Lo Cigno, University of Trento, Mélanie Dulong de Rosnay, CNRS University of Brescia Maria Michalis, University of Bruno Spiquel, SCANI Westminster
    [Show full text]