SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
RELATED
Paper: “ABC: A Simple Explicit Congestion
Controller for Wireless Networks”
Mohammad Alizadeh
Hari Balakrishnan
Network and Mobile Systems
Computer Science and Artificial Intelligence
Laboratory
Department of Electrical Engineering and
Computer Science
School of Engineering
Reducing delays in wireless networks
Congestion control system could help streaming video, mobile games, and other
applications run more smoothly.
To reduce lag times and increase quality
in video streaming, mobile gaming, and
other web services, researchers at MIT’s
Computer Science and Artificial
Intelligence Laboratory have designed a
congestion-control scheme for time-
varying wireless links, such as cellular
networks.
Image: José-Luis Olivares, MIT
MIT researchers have designed a congestion-control scheme for wireless networks that could
help reduce lag times and increase quality in video streaming, video chat, mobile gaming, and
other web services.
To keep web services running smoothly, congestion-control schemes infer information about a
network’s bandwidth capacity and congestion based on feedback from the network routers,
which is encoded in data packets. That information determines how fast data packets are sent
through the network.
Deciding a good sending rate can be a tough balancing act. Senders don’t want to be overly
conservative: If a network’s capacity constantly varies from, say, 2 megabytes per second to
500 kilobytes per second, the sender could always send traffic at the lowest rate. But then
your Netflix video, for example, will be unnecessarily low-quality. On the other hand, if the
sender constantly maintains a high rate, even when network capacity dips, it could overwhelm
the network, creating a massive queue of data packets waiting to be delivered. Queued
packets can increase the network’s delay, causing, say, your Skype call to freeze.
Things get even more complicated in wireless networks, which have “time-varying links,” with
rapid, unpredictable capacity shifts. Depending on various factors, such as the number of
network users, cell tower locations, and even surrounding buildings, capacities can double or
Rob Matheson | MIT News Office
April 9, 2020
ARCHIVES
Giving cryptocurrency
users more bang for
their buck
Using artificial
intelligence to enrich
digital maps
Artificial intelligence
could help data
centers run far more
efficiently
Monitoring network
traffic more efficiently
Programmable
network routers
drop to zero within fractions of a second. In a paper at the USENIX Symposium on Networked
Systems Design and Implementation, the researchers presented “Accel-Brake Control” (ABC),
a simple scheme that achieves about 50 percent higher throughput, and about half the
network delays, on time-varying links.
The scheme relies on a novel algorithm that enables the routers to explicitly communicate how
many data packets should flow through a network to avoid congestion but fully utilize the
network. It provides that detailed information from bottlenecks — such as packets queued
between cell towers and senders — by repurposing a single bit already available in internet
packets. The researchers are already in talks with mobile network operators to test the
scheme.
“In cellular networks, your fraction of data capacity changes rapidly, causing lags in your
service. Traditional schemes are too slow to adapt to those shifts,” says first author Prateesh
Goyal, a graduate student in CSAIL. “ABC provides detailed feedback about those shifts,
whether it’s gone up or down, using a single data bit.”
Joining Goyal on the paper are Anup Agarwal, now a graduate student at Carnegie Melon
University; Ravi Netravali, now an assistant professor of computer science at the University of
California at Los Angeles; Mohammad Alizadeh, an associate professor in MIT’s Department of
Electrical Engineering (EECS) and CSAIL; and Hari Balakrishnan, the Fujitsu Professor in
EECS. The authors have all been members of the Networks and Mobile Systems group at
CSAIL.
Achieving explicit control
Traditional congestion-control schemes rely on either packet losses or information from a
single “congestion” bit in internet packets to infer congestion and slow down. A router, such as
a base station, will mark the bit to alert a sender — say, a video server — that its sent data
packets are in a long queue, signaling congestion. In response, the sender will then reduce its
rate by sending fewer packets. The sender also reduces its rate if it detects a pattern of
packets being dropped before reaching the receiver.
In attempts to provide greater information about bottlenecked links on a network path,
researchers have proposed “explicit” schemes that include multiple bits in packets that specify
current rates. But this approach would mean completely changing the way the internet sends
data, and it has proved impossible to deploy.
“It’s a tall task,” Alizadeh says. “You’d have to make invasive changes to the standard Internet
Protocol (IP) for sending data packets. You’d have to convince all Internet parties, mobile
network operators, ISPs, and cell towers to change the way they send and receive data
packets. That’s not going to happen.”
With ABC, the researchers still use the available single bit in each data packet, but they do so
in such a way that the bits, aggregated across multiple data packets, can provide the needed
real-time rate information to senders. The scheme tracks each data packet in a round-trip loop,
from sender to base station to receiver. The base station marks the bit in each packet with
“accelerate” or “brake,” based on the current network bandwidth. When the packet is received,
the marked bit tells the sender to increase or decrease the “in-flight” packets — packets sent
but not received — that can be in the network.
Topics:
If it receives an accelerate command, it means the packet made good time and the network
has spare capacity. The sender then sends two packets: one to replace the packet that was
received and another to utilize the spare capacity. When told to brake, the sender decreases
its in-flight packets by one — meaning it doesn’t replace the packet that was received.
Used across all packets in the network, that one bit of information becomes a powerful
feedback tool that tells senders their sending rates with high precision. Within a couple
hundred milliseconds, it can vary a sender’s rate between zero and double. “You’d think one
bit wouldn’t carry enough information,” Alizadeh says. “But, by aggregating single-bit feedback
across a stream of packets, we can get the same effect as that of a multibit signal.”
Staying one step ahead
At the core of ABC is an algorithm that predicts the aggregate rate of the senders one round-
trip ahead to better compute the accelerate/brake feedback.
The idea is that an ABC-equipped base station knows how senders will behave — maintaining,
increasing, or decreasing their in-flight packets — based on how it marked the packet it sent to
a receiver. The moment the base station sends a packet, it knows how many packets it will
receive from the sender in exactly one round-trip’s time in the future. It uses that information to
mark the packets to more accurately match the sender’s rate to the current network capacity.
In simulations of cellular networks, compared to traditional congestion control schemes, ABC
achieves around 30 to 40 percent greater throughput for roughly the same delays.
Alternatively, it can reduce delays by around 200 to 400 percent by maintaining the same
throughput as traditional schemes. Compared to existing explicit schemes that were not
designed for time-varying links, ABC reduces delays by half for the same throughput.
“Basically, existing schemes get low throughput and low delays, or high throughput and high
delays, whereas ABC achieves high throughput with low delays,” Goyal says.
Next, the researchers are trying to see if apps and web services can use ABC to better control
the quality of content. For example, “a video content provider could use ABC’s information
about congestion and data rates to pick the resolution of streaming video more intelligently,”
Alizadeh says. “If it doesn’t have enough capacity, the video server could lower the resolution
temporarily, so the video will continue playing at the highest possible quality without freezing.”
Research Computer science and technology Algorithms
Artificial intelligence Machine learning Internet Networks
Data Energy Mobile devices Technology and society
Computer Science and Artificial Intelligence Laboratory (CSAIL)
Electrical Engineering & Computer Science (eecs)
School of Engineering

Weitere ähnliche Inhalte

Was ist angesagt?

A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksA Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centereSAT Journals
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellulareSAT Publishing House
 
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennaincct
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsVijay Karan
 
Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...iosrjce
 
ON THE CELL BREATHING TECHNIQUE TO REDUCE CONGESTION APPLYING BANDWIDTH LIMIT...
ON THE CELL BREATHING TECHNIQUE TO REDUCE CONGESTION APPLYING BANDWIDTH LIMIT...ON THE CELL BREATHING TECHNIQUE TO REDUCE CONGESTION APPLYING BANDWIDTH LIMIT...
ON THE CELL BREATHING TECHNIQUE TO REDUCE CONGESTION APPLYING BANDWIDTH LIMIT...ijgca
 

Was ist angesagt? (8)

A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksA Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting center
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellular
 
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...
 
C0941017
C0941017C0941017
C0941017
 
ON THE CELL BREATHING TECHNIQUE TO REDUCE CONGESTION APPLYING BANDWIDTH LIMIT...
ON THE CELL BREATHING TECHNIQUE TO REDUCE CONGESTION APPLYING BANDWIDTH LIMIT...ON THE CELL BREATHING TECHNIQUE TO REDUCE CONGESTION APPLYING BANDWIDTH LIMIT...
ON THE CELL BREATHING TECHNIQUE TO REDUCE CONGESTION APPLYING BANDWIDTH LIMIT...
 

Ähnlich wie Reducing delays in wireless networks

Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ijgca
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsVijay Karan
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsVijay Karan
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
 
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKS
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKSA STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKS
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKSJournal For Research
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Networkinventionjournals
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkIRJET Journal
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKcscpconf
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksIJMER
 
M.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsM.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsVijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsVijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsVijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsVijay Karan
 

Ähnlich wie Reducing delays in wireless networks (20)

Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKS
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKSA STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKS
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKS
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for Networks
 
M.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsM.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing Projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 

Mehr von Abaram Network Solutions

Why Cloud Technology Is Expected To Dominate 2021
Why Cloud Technology Is Expected To Dominate 2021Why Cloud Technology Is Expected To Dominate 2021
Why Cloud Technology Is Expected To Dominate 2021Abaram Network Solutions
 
The Real Year of 5G: What it Means For Cloud Technology
The Real Year of 5G: What it Means For Cloud TechnologyThe Real Year of 5G: What it Means For Cloud Technology
The Real Year of 5G: What it Means For Cloud TechnologyAbaram Network Solutions
 
10 Tips for protecting your cloud accounts
10 Tips for protecting your cloud accounts10 Tips for protecting your cloud accounts
10 Tips for protecting your cloud accountsAbaram Network Solutions
 
An Architect's Guide to Hybrid Cloud Storage
An Architect's Guide to Hybrid Cloud StorageAn Architect's Guide to Hybrid Cloud Storage
An Architect's Guide to Hybrid Cloud StorageAbaram Network Solutions
 
Cloud storage tips: Pro advice for power users
Cloud storage tips: Pro advice for power usersCloud storage tips: Pro advice for power users
Cloud storage tips: Pro advice for power usersAbaram Network Solutions
 
Cloud Computing Trends in 2021: Optimization is #1 Priority
Cloud Computing Trends in 2021: Optimization is #1 PriorityCloud Computing Trends in 2021: Optimization is #1 Priority
Cloud Computing Trends in 2021: Optimization is #1 PriorityAbaram Network Solutions
 
Cloud computing is the inventible future of data analytics
Cloud computing is the inventible future of data analyticsCloud computing is the inventible future of data analytics
Cloud computing is the inventible future of data analyticsAbaram Network Solutions
 
What does the future hold for cloud and edge computing?
What does the future hold for cloud and edge computing?What does the future hold for cloud and edge computing?
What does the future hold for cloud and edge computing?Abaram Network Solutions
 
How cloud-based AI is set transform mobile apps
How cloud-based AI is set transform mobile appsHow cloud-based AI is set transform mobile apps
How cloud-based AI is set transform mobile appsAbaram Network Solutions
 
This cutting-edge cloud-computing service is helping researchers track COVID'...
This cutting-edge cloud-computing service is helping researchers track COVID'...This cutting-edge cloud-computing service is helping researchers track COVID'...
This cutting-edge cloud-computing service is helping researchers track COVID'...Abaram Network Solutions
 
This cloud computing certification bundle is on sale for 98% off
This cloud computing certification bundle is on sale for 98% offThis cloud computing certification bundle is on sale for 98% off
This cloud computing certification bundle is on sale for 98% offAbaram Network Solutions
 
What does the future with cloud computing look like
What does the future with cloud computing look likeWhat does the future with cloud computing look like
What does the future with cloud computing look likeAbaram Network Solutions
 
The Dos and Don'ts for SMB Cybersecurity in 2021
The Dos and Don'ts for SMB Cybersecurity in 2021The Dos and Don'ts for SMB Cybersecurity in 2021
The Dos and Don'ts for SMB Cybersecurity in 2021Abaram Network Solutions
 
These are the top cybersecurity challenges of 2021
These are the top  cybersecurity challenges of 2021These are the top  cybersecurity challenges of 2021
These are the top cybersecurity challenges of 2021Abaram Network Solutions
 
What's in store for cybersecurity in 2021?
What's in store for cybersecurity in 2021?What's in store for cybersecurity in 2021?
What's in store for cybersecurity in 2021?Abaram Network Solutions
 
How To Level Up Your Cybersecurity In 2021
How To Level Up Your Cybersecurity In 2021How To Level Up Your Cybersecurity In 2021
How To Level Up Your Cybersecurity In 2021Abaram Network Solutions
 
The growing role of AI anf ML in cybersecurity
The growing role of AI anf ML in cybersecurityThe growing role of AI anf ML in cybersecurity
The growing role of AI anf ML in cybersecurityAbaram Network Solutions
 

Mehr von Abaram Network Solutions (20)

Why Cloud Technology Is Expected To Dominate 2021
Why Cloud Technology Is Expected To Dominate 2021Why Cloud Technology Is Expected To Dominate 2021
Why Cloud Technology Is Expected To Dominate 2021
 
The Real Year of 5G: What it Means For Cloud Technology
The Real Year of 5G: What it Means For Cloud TechnologyThe Real Year of 5G: What it Means For Cloud Technology
The Real Year of 5G: What it Means For Cloud Technology
 
10 Tips for protecting your cloud accounts
10 Tips for protecting your cloud accounts10 Tips for protecting your cloud accounts
10 Tips for protecting your cloud accounts
 
An Architect's Guide to Hybrid Cloud Storage
An Architect's Guide to Hybrid Cloud StorageAn Architect's Guide to Hybrid Cloud Storage
An Architect's Guide to Hybrid Cloud Storage
 
Cloud storage tips: Pro advice for power users
Cloud storage tips: Pro advice for power usersCloud storage tips: Pro advice for power users
Cloud storage tips: Pro advice for power users
 
How to Optimize Cloud Storage Costs
How to Optimize Cloud Storage CostsHow to Optimize Cloud Storage Costs
How to Optimize Cloud Storage Costs
 
Cloud Computing Trends in 2021: Optimization is #1 Priority
Cloud Computing Trends in 2021: Optimization is #1 PriorityCloud Computing Trends in 2021: Optimization is #1 Priority
Cloud Computing Trends in 2021: Optimization is #1 Priority
 
Cloud computing is the inventible future of data analytics
Cloud computing is the inventible future of data analyticsCloud computing is the inventible future of data analytics
Cloud computing is the inventible future of data analytics
 
What does the future hold for cloud and edge computing?
What does the future hold for cloud and edge computing?What does the future hold for cloud and edge computing?
What does the future hold for cloud and edge computing?
 
How cloud-based AI is set transform mobile apps
How cloud-based AI is set transform mobile appsHow cloud-based AI is set transform mobile apps
How cloud-based AI is set transform mobile apps
 
This cutting-edge cloud-computing service is helping researchers track COVID'...
This cutting-edge cloud-computing service is helping researchers track COVID'...This cutting-edge cloud-computing service is helping researchers track COVID'...
This cutting-edge cloud-computing service is helping researchers track COVID'...
 
This cloud computing certification bundle is on sale for 98% off
This cloud computing certification bundle is on sale for 98% offThis cloud computing certification bundle is on sale for 98% off
This cloud computing certification bundle is on sale for 98% off
 
What does the future with cloud computing look like
What does the future with cloud computing look likeWhat does the future with cloud computing look like
What does the future with cloud computing look like
 
The Dos and Don'ts for SMB Cybersecurity in 2021
The Dos and Don'ts for SMB Cybersecurity in 2021The Dos and Don'ts for SMB Cybersecurity in 2021
The Dos and Don'ts for SMB Cybersecurity in 2021
 
These are the top cybersecurity challenges of 2021
These are the top  cybersecurity challenges of 2021These are the top  cybersecurity challenges of 2021
These are the top cybersecurity challenges of 2021
 
What's in store for cybersecurity in 2021?
What's in store for cybersecurity in 2021?What's in store for cybersecurity in 2021?
What's in store for cybersecurity in 2021?
 
5 cybersecurity predictions for 2021
5 cybersecurity predictions for 20215 cybersecurity predictions for 2021
5 cybersecurity predictions for 2021
 
How To Level Up Your Cybersecurity In 2021
How To Level Up Your Cybersecurity In 2021How To Level Up Your Cybersecurity In 2021
How To Level Up Your Cybersecurity In 2021
 
The growing role of AI anf ML in cybersecurity
The growing role of AI anf ML in cybersecurityThe growing role of AI anf ML in cybersecurity
The growing role of AI anf ML in cybersecurity
 
Top cloud computing tips of 2020
Top cloud computing tips of 2020Top cloud computing tips of 2020
Top cloud computing tips of 2020
 

Kürzlich hochgeladen

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Reducing delays in wireless networks

  • 1. RELATED Paper: “ABC: A Simple Explicit Congestion Controller for Wireless Networks” Mohammad Alizadeh Hari Balakrishnan Network and Mobile Systems Computer Science and Artificial Intelligence Laboratory Department of Electrical Engineering and Computer Science School of Engineering Reducing delays in wireless networks Congestion control system could help streaming video, mobile games, and other applications run more smoothly. To reduce lag times and increase quality in video streaming, mobile gaming, and other web services, researchers at MIT’s Computer Science and Artificial Intelligence Laboratory have designed a congestion-control scheme for time- varying wireless links, such as cellular networks. Image: José-Luis Olivares, MIT MIT researchers have designed a congestion-control scheme for wireless networks that could help reduce lag times and increase quality in video streaming, video chat, mobile gaming, and other web services. To keep web services running smoothly, congestion-control schemes infer information about a network’s bandwidth capacity and congestion based on feedback from the network routers, which is encoded in data packets. That information determines how fast data packets are sent through the network. Deciding a good sending rate can be a tough balancing act. Senders don’t want to be overly conservative: If a network’s capacity constantly varies from, say, 2 megabytes per second to 500 kilobytes per second, the sender could always send traffic at the lowest rate. But then your Netflix video, for example, will be unnecessarily low-quality. On the other hand, if the sender constantly maintains a high rate, even when network capacity dips, it could overwhelm the network, creating a massive queue of data packets waiting to be delivered. Queued packets can increase the network’s delay, causing, say, your Skype call to freeze. Things get even more complicated in wireless networks, which have “time-varying links,” with rapid, unpredictable capacity shifts. Depending on various factors, such as the number of network users, cell tower locations, and even surrounding buildings, capacities can double or Rob Matheson | MIT News Office April 9, 2020
  • 2. ARCHIVES Giving cryptocurrency users more bang for their buck Using artificial intelligence to enrich digital maps Artificial intelligence could help data centers run far more efficiently Monitoring network traffic more efficiently Programmable network routers drop to zero within fractions of a second. In a paper at the USENIX Symposium on Networked Systems Design and Implementation, the researchers presented “Accel-Brake Control” (ABC), a simple scheme that achieves about 50 percent higher throughput, and about half the network delays, on time-varying links. The scheme relies on a novel algorithm that enables the routers to explicitly communicate how many data packets should flow through a network to avoid congestion but fully utilize the network. It provides that detailed information from bottlenecks — such as packets queued between cell towers and senders — by repurposing a single bit already available in internet packets. The researchers are already in talks with mobile network operators to test the scheme. “In cellular networks, your fraction of data capacity changes rapidly, causing lags in your service. Traditional schemes are too slow to adapt to those shifts,” says first author Prateesh Goyal, a graduate student in CSAIL. “ABC provides detailed feedback about those shifts, whether it’s gone up or down, using a single data bit.” Joining Goyal on the paper are Anup Agarwal, now a graduate student at Carnegie Melon University; Ravi Netravali, now an assistant professor of computer science at the University of California at Los Angeles; Mohammad Alizadeh, an associate professor in MIT’s Department of Electrical Engineering (EECS) and CSAIL; and Hari Balakrishnan, the Fujitsu Professor in EECS. The authors have all been members of the Networks and Mobile Systems group at CSAIL. Achieving explicit control Traditional congestion-control schemes rely on either packet losses or information from a single “congestion” bit in internet packets to infer congestion and slow down. A router, such as a base station, will mark the bit to alert a sender — say, a video server — that its sent data packets are in a long queue, signaling congestion. In response, the sender will then reduce its rate by sending fewer packets. The sender also reduces its rate if it detects a pattern of packets being dropped before reaching the receiver. In attempts to provide greater information about bottlenecked links on a network path, researchers have proposed “explicit” schemes that include multiple bits in packets that specify current rates. But this approach would mean completely changing the way the internet sends data, and it has proved impossible to deploy. “It’s a tall task,” Alizadeh says. “You’d have to make invasive changes to the standard Internet Protocol (IP) for sending data packets. You’d have to convince all Internet parties, mobile network operators, ISPs, and cell towers to change the way they send and receive data packets. That’s not going to happen.” With ABC, the researchers still use the available single bit in each data packet, but they do so in such a way that the bits, aggregated across multiple data packets, can provide the needed real-time rate information to senders. The scheme tracks each data packet in a round-trip loop, from sender to base station to receiver. The base station marks the bit in each packet with “accelerate” or “brake,” based on the current network bandwidth. When the packet is received, the marked bit tells the sender to increase or decrease the “in-flight” packets — packets sent but not received — that can be in the network.
  • 3. Topics: If it receives an accelerate command, it means the packet made good time and the network has spare capacity. The sender then sends two packets: one to replace the packet that was received and another to utilize the spare capacity. When told to brake, the sender decreases its in-flight packets by one — meaning it doesn’t replace the packet that was received. Used across all packets in the network, that one bit of information becomes a powerful feedback tool that tells senders their sending rates with high precision. Within a couple hundred milliseconds, it can vary a sender’s rate between zero and double. “You’d think one bit wouldn’t carry enough information,” Alizadeh says. “But, by aggregating single-bit feedback across a stream of packets, we can get the same effect as that of a multibit signal.” Staying one step ahead At the core of ABC is an algorithm that predicts the aggregate rate of the senders one round- trip ahead to better compute the accelerate/brake feedback. The idea is that an ABC-equipped base station knows how senders will behave — maintaining, increasing, or decreasing their in-flight packets — based on how it marked the packet it sent to a receiver. The moment the base station sends a packet, it knows how many packets it will receive from the sender in exactly one round-trip’s time in the future. It uses that information to mark the packets to more accurately match the sender’s rate to the current network capacity. In simulations of cellular networks, compared to traditional congestion control schemes, ABC achieves around 30 to 40 percent greater throughput for roughly the same delays. Alternatively, it can reduce delays by around 200 to 400 percent by maintaining the same throughput as traditional schemes. Compared to existing explicit schemes that were not designed for time-varying links, ABC reduces delays by half for the same throughput. “Basically, existing schemes get low throughput and low delays, or high throughput and high delays, whereas ABC achieves high throughput with low delays,” Goyal says. Next, the researchers are trying to see if apps and web services can use ABC to better control the quality of content. For example, “a video content provider could use ABC’s information about congestion and data rates to pick the resolution of streaming video more intelligently,” Alizadeh says. “If it doesn’t have enough capacity, the video server could lower the resolution temporarily, so the video will continue playing at the highest possible quality without freezing.” Research Computer science and technology Algorithms Artificial intelligence Machine learning Internet Networks Data Energy Mobile devices Technology and society Computer Science and Artificial Intelligence Laboratory (CSAIL) Electrical Engineering & Computer Science (eecs) School of Engineering