Mobile Peer-to-Peer computing

advertisement
Lecture on Mobile P2P Computing
Prof. Maria Papadopouli
University of Crete
ICS-FORTH
http://www.ics.forth.gr/mobile
1
Agenda
•
•
•
•
•
•
•
•
Introduction on Mobile Computing & Wireless Networks
Wireless Networks - Physical Layer
IEEE 802.11 MAC
Wireless Network Measurements & Modeling
Location Sensing
Performance of VoIP over wireless networks
Mobile Peer-to-Peer computing
Exciting research problems
2
General Objectives
• Build some background on wireless networks,
IEEE802.11, positioning, mobile computing
• Explore some research projects
and possibly research collaborations
3
Environmental Monitoring
Source: Joao Da Silva’s talk at Enisa, July 20th, 2008
Tagged products
Source: Joao Da Silva’s talk at Enisa, July 20th, 2008
Source: Joao Da Silva’s talk at Enisa, July 20th, 2008
Source: Joao Da Silva’s talk at Enisa, July 20th, 20
New networking paradigms for efficient search
and sharing mechanisms
Source: Joao Da Silva’s talk at Enisa, July 20th, 20
9
Fast Growth of Wireless Use
•
•
•
•
•
•
Social networking (e.g., micro-blogging)
Multimedia downloads (e.g., Hulu, YouTube)
Gaming (Xbox Live)
2D video conferencing
File sharing & collaboration
Cloud storage
Next generation applications
• Immersive video conferencing
• 3D Telemedicine
• Virtual & Augmented reality
• Assistive Technology
 Rapid increase in the multimedia mobile Internet traffic
10
Fast Growth of Wireless Use (2/2)
• Video driving rapid growth in mobile Internet traffic
• Expected to rise 66x by 2013 (Cisco Visual
Networking Index-Mobile Data traffic Forecast)
11
Energy constrains
12
Paradigms of Mobile Information Access
 Wireless Internet via APs
 Data Access via Infostations
 Data Access using the Peer-to-Peer paradigm

Hybrid mobile information access
(manifesting a combination of the above paradigms)
13
Wireless Internet via APs
Aims at “continuous” wireless Internet access
broadly defined by three types networks:
 Wireless wide area networks (WANs)
 Wireless local area networks (LANs)
 Wireless personal area networks (PANs)
14
Infostations
• Wireless-enabled server attached to data repository
• Wireless devices in range can query the infostation to acquire data
• Can be
– stand-alone servers
– clustered with other infostations connected over terrerstrial links
15
Peer-to-Peer systems
 Distributed system without any
 Centralized control
 Infrastructure
 Distinguished by the following criteria
 Self-organization
 Autonomy
 Symmetry
16
Mobile Peer-to-Peer Computing
• When two devices (peers) are in wireless range of
each other, they may share resources:
– Share data
– Network connection
– Relay packets on behalf of each other
• Enable resource sharing among peers in a selforganizing, energy-efficient manner
Internet
Server-to-Client Paradigm
Client gets data from AP
AP
Server-to-Client:
Trapping model from
particle-kinetics
Router
Switch
Peer-to-Peer Paradigm
User C
User A
User B
Wireless Network via an Infrastructure
How does information diffuse in mobile peer-to-peer systems ?
Applications Using Mobile P2P
• Location-based applications
• Social networking application
 For example: Facebook integrated with positioning,
google maps, 7DS, photojournal
• User-centric access of the spectrum
19
Photojournal
• Sharing multimedia files with your friends
• Mobile P2P paradigm
• Superimpose multimedia information on google
maps by correlating the timestamps of multimedia
files and recorded positioning information
• Review, share, search multimedia files across a
(single-hop) network of friends
20
http://www.ics.forth.gr/mobile/
http://www.ics.forth.gr/mobile/
Research Issues on Cognitive Radios
INFORTE Lecture Series
Prof. Maria Papadopouli
University of Crete
ICS-FORTH
http://www.ics.forth.gr/mobile
23
Underutilization of licensed spectrum
• Licensed portions of the spectrum are underutilized.
– According to FCC, only 5% of the spectrum from 30 MHz to 30
GHz is used in the US.
Cognitive radios
• Intelligent devices that can coexist with licensed users without
affecting their quality of service
– Licensed users have higher priority and are called primary users
– Cognitive radios access the spectrum in an opportunistic way and are
called secondary users
• Networks of cognitive radios could function at licensed portions
of the spectrum
– Demand to access the ISM bands could be reduced
Coexistence of secondary users
• Usually, in cognitive radio networks, a large number of
secondary users compete to access the spectrum
• A protocol should define the behavior of all these users such
that the network’s performance is maximized
• Performance metrics:
– Spectrum utilization
– Fairness
– Interference to primary users
Performance optimization
• Proposed protocols in
optimization problem
the
literature
define
an
– The utility function depends on the performance metrics
• Parameters of the problem are chosen from the following
set:
–
–
–
–
–
Channel allocation
Adaptive modulation
Interference cancellation
Power control
Beamforming
Definition of the problem
1. Channel allocation
• Problem formulation:
– 2 secondary users compete for access in the band [F1 F2].
– The interference plus noise power as observed by the first user
is:
• Question: Which is the best way for this user to distribute
its transmission power at the interval [F1 F2]?
Channel capacity
• According to Shannon the maximum rate that can be
achieved in a channel is:
S

R( S )  B log2 1  
 N
• S: signal power
• N: interference plus noise power
• B: width of the channel
dR(S )
B
1 1
B
1


dS
ln 2 1  S N ln 2 S  N
N
• As the power that is introduced to a channel increases,
the achievable rate increases more and more slowly.
Energy investment in two channels
B 1
B 1


ln 2 N1 ln 2 N 2
B
1
B 1


ln 2 N1  P1 ln 2 N 2
dR1 dR2

ds
ds
dR1 dR2

ds
ds
• We start by investing energy in the first channel until it’s
total power becomes equal to N2.
• After that point, energy is divided equally among the two
channels.
Water filling strategy
• The best way for a
user to invest it’s
power is to distribute
it in the whole range
of frequencies.
Channel allocation problem
• M users compete to access a band
– They do not use the selfish water filling strategy
– Instead they cooperate and divide the spectrum among them in
the most efficient way
• The initial band is divided into a number of non
overlapping frequency bins
– An algorithm maps the bins to users in such a way that a global
utility function is maximized
Cooperation
Is it possible for the two users to achieve a better rate if they
cooperate?
Example:
R1  2 B log(1 
P
)
P2  2 N
R1  B log(1 
'
P
)
N
 When R1’> R1 then dividing the bandwidth among the two users
is more effective than water filling.
Channel allocation algorithm
• There are various ways that a channel allocation
algorithm could be designed.
–
–
–
–
Distributed or centralized.
Proactive or on demand.
Predetermined channel allocation.
Allocation of contiguous or non contiguous bins to devices.
Primary and secondary channels
• Channels that are allocated to a user are called primary
• Channels that a user borrows from the neighborhood are
called secondary
• Predetermined channel allocation is not so suitable for
cognitive radio networks, duo to:
– Changes of channel conditions caused by primary user activity
– Network topology changes very often
User-centric Spectrum Sharing
• Spectrum is a valuable resource!
 Improve its spectrum utilization
• Primary users “sub-lease” part of spectrum
• Secondary users take advantage of the unused
spectrum
• Different algorithms for bin allocation across
secondary and primary users
37
Download