mobile peer-to-peer computing
TRANSCRIPT
![Page 1: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/1.jpg)
1
Lecture on Mobile P2P Computing
Prof. Maria PapadopouliUniversity of Crete
ICS-FORTHhttp://www.ics.forth.gr/mobile
![Page 2: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/2.jpg)
Agenda
• Introduction on Mobile Computing & Wireless Networks• Wireless Networks - Physical Layer• IEEE 802.11 MAC• Wireless Network Measurements & Modeling • Location Sensing• Performance of VoIP over wireless networks• Mobile Peer-to-Peer computing • Exciting research problems
2
![Page 3: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/3.jpg)
General Objectives
• Build some background on wireless networks, IEEE802.11, positioning, mobile computing
• Explore some research projects and possibly research collaborations
3
![Page 4: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/4.jpg)
Environmental Monitoring
Source: Joao Da Silva’s talk at Enisa, July 20th, 2008
![Page 5: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/5.jpg)
Tagged products
Source: Joao Da Silva’s talk at Enisa, July 20th, 2008
![Page 6: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/6.jpg)
Source: Joao Da Silva’s talk at Enisa, July 20th, 2008
![Page 7: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/7.jpg)
Source: Joao Da Silva’s talk at Enisa, July 20th, 2008
![Page 8: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/8.jpg)
New networking paradigms for efficient search and sharing mechanisms
Source: Joao Da Silva’s talk at Enisa, July 20th, 2008
![Page 9: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/9.jpg)
9
![Page 10: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/10.jpg)
10
Fast Growth of Wireless Use• Social networking (e.g., micro-blogging)• Multimedia downloads (e.g., Hulu, YouTube)• Gaming (Xbox Live)• 2D video conferencing • File sharing & collaboration• Cloud storage
Next generation applications• Immersive video conferencing• 3D Telemedicine• Virtual & Augmented reality• Assistive Technology
Rapid increase in the multimedia mobile Internet traffic
![Page 11: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/11.jpg)
Fast Growth of Wireless Use (2/2)
• Video driving rapid growth in mobile Internet traffic• Expected to rise 66x by 2013 (Cisco Visual
Networking Index-Mobile Data traffic Forecast)
11
![Page 12: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/12.jpg)
12
Energy constrains
![Page 13: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/13.jpg)
13
Wireless Internet via APs Data Access via Infostations Data Access using the Peer-to-Peer paradigm
Hybrid mobile information access (manifesting a combination of the above paradigms)
Paradigms of Mobile Information Access
![Page 14: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/14.jpg)
14
Aims at “continuous” wireless Internet access broadly defined by three types networks:
Wireless wide area networks (WANs) Wireless local area networks (LANs) Wireless personal area networks (PANs)
Wireless Internet via APs
![Page 15: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/15.jpg)
15
Infostations
• Wireless-enabled server attached to data repository• Wireless devices in range can query the infostation to acquire data• Can be – stand-alone servers – clustered with other infostations connected over terrerstrial links
![Page 16: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/16.jpg)
16
Distributed system without any Centralized control Infrastructure
Distinguished by the following criteria Self-organization Autonomy Symmetry
Peer-to-Peer systems
![Page 17: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/17.jpg)
Mobile Peer-to-Peer Computing
• When two devices (peers) are in wireless range of each other, they may share resources:– Share data– Network connection– Relay packets on behalf of each other
• Enable resource sharing among peers in a self-organizing, energy-efficient manner
![Page 18: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/18.jpg)
Wireless Network via an Infrastructure
Router
Internet
User A User B
AP
Switch
Peer-to-Peer Paradigm
Server-to-Client ParadigmClient gets data from AP
User C
How does information diffuse in mobile peer-to-peer systems ?
Trapping model from particle-kinetics
Server-to-Client:
![Page 19: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/19.jpg)
Applications Using Mobile P2P
• Location-based applications• Social networking application
For example: Facebook integrated with positioning, google maps, 7DS, photojournal
• User-centric access of the spectrum
19
![Page 20: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/20.jpg)
Photojournal
• Sharing multimedia files with your friends• Mobile P2P paradigm• Superimpose multimedia information on google
maps by correlating the timestamps of multimedia files and recorded positioning information
• Review, share, search multimedia files across a (single-hop) network of friends
20
![Page 21: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/21.jpg)
http://www.ics.forth.gr/mobile/
![Page 22: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/22.jpg)
http://www.ics.forth.gr/mobile/
![Page 23: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/23.jpg)
23
Research Issues on Cognitive Radios INFORTE Lecture Series
Prof. Maria PapadopouliUniversity of Crete
ICS-FORTHhttp://www.ics.forth.gr/mobile
![Page 24: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/24.jpg)
Underutilization of licensed spectrum
• Licensed portions of the spectrum are underutilized.– According to FCC, only 5% of the spectrum from 30 MHz to 30
GHz is used in the US.
![Page 25: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/25.jpg)
Cognitive radios
• Intelligent devices that can coexist with licensed users without affecting their quality of service– Licensed users have higher priority and are called primary users– Cognitive radios access the spectrum in an opportunistic way and are
called secondary users
• Networks of cognitive radios could function at licensed portions of the spectrum– Demand to access the ISM bands could be reduced
![Page 26: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/26.jpg)
Coexistence of secondary users
• Usually, in cognitive radio networks, a large number of secondary users compete to access the spectrum
• A protocol should define the behavior of all these users such that the network’s performance is maximized
• Performance metrics:– Spectrum utilization– Fairness– Interference to primary users
![Page 27: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/27.jpg)
Performance optimization• Proposed protocols in the literature define an
optimization problem– The utility function depends on the performance metrics
• Parameters of the problem are chosen from the following set:– Channel allocation– Adaptive modulation– Interference cancellation– Power control– Beamforming
![Page 28: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/28.jpg)
Definition of the problem
![Page 29: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/29.jpg)
1. Channel allocation• Problem formulation:
– 2 secondary users compete for access in the band [F1 F2].– The interference plus noise power as observed by the first user
is:
• Question: Which is the best way for this user to distribute its transmission power at the interval [F1 F2]?
![Page 30: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/30.jpg)
Channel capacity
• According to Shannon the maximum rate that can be achieved in a channel is:
• S: signal power• N: interference plus noise power• B: width of the channel
• As the power that is introduced to a channel increases, the achievable rate increases more and more slowly.
NSBSR 1log)( 2
NSB
NNS
BdSSdR
12ln
1
1
12ln
)(
![Page 31: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/31.jpg)
Energy investment in two channels
• We start by investing energy in the first channel until it’s total power becomes equal to N2.
• After that point, energy is divided equally among the two channels.
dsdR
dsdR
NB
NB
21
21
12ln
12ln
dsdR
dsdR
NB
PNB
21
211
12ln
12ln
![Page 32: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/32.jpg)
Water filling strategy• The best way for a
user to invest it’s power is to distribute it in the whole range of frequencies.
![Page 33: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/33.jpg)
Channel allocation problem
• M users compete to access a band– They do not use the selfish water filling strategy – Instead they cooperate and divide the spectrum among them in
the most efficient way
• The initial band is divided into a number of non overlapping frequency bins– An algorithm maps the bins to users in such a way that a global
utility function is maximized
![Page 34: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/34.jpg)
Cooperation
Is it possible for the two users to achieve a better rate if they cooperate?
Example:
When R1’> R1 then dividing the bandwidth among the two users
is more effective than water filling.
)2
1log(22
1 NPPBR
)1log('1 N
PBR
![Page 35: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/35.jpg)
Channel allocation algorithm
• There are various ways that a channel allocation algorithm could be designed.– Distributed or centralized.– Proactive or on demand.– Predetermined channel allocation.– Allocation of contiguous or non contiguous bins to devices.
![Page 36: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/36.jpg)
Primary and secondary channels
• Channels that are allocated to a user are called primary
• Channels that a user borrows from the neighborhood are called secondary
• Predetermined channel allocation is not so suitable for cognitive radio networks, duo to:– Changes of channel conditions caused by primary user activity– Network topology changes very often
![Page 37: Mobile Peer-to-Peer computing](https://reader035.vdocuments.mx/reader035/viewer/2022062504/586a39361a28aba47b8bd393/html5/thumbnails/37.jpg)
User-centric Spectrum Sharing
• Spectrum is a valuable resource! Improve its spectrum utilization• Primary users “sub-lease” part of spectrum• Secondary users take advantage of the unused
spectrum• Different algorithms for bin allocation across
secondary and primary users
37