Efficient Error Estimating Coding: Feasibility and Applications Binbin Chen Ziling Zhou Yuda Zhao Haifeng Yu School of Computing National University of.

Slides:



Advertisements
Similar presentations
Aaron Johnson with Joan Feigenbaum Paul Syverson
Advertisements

Ou Liang, Ahmet Sekercioglu and Nallasamy Mani
You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
GSA Pizza Talk - EPFL - Capillary routing with FEC by E. Gabrielyan 1 Capillary Multi-Path Routing for reliable Real-Time Streaming with FEC.
Adders Used to perform addition, subtraction, multiplication, and division (sometimes) Half-adder adds rightmost (least significant) bit Full-adder.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 10 User.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Effective Change Detection Using Sampling Junghoo John Cho Alexandros Ntoulas UCLA.
Iterative Equalization and Decoding
1 Multi-Channel Wireless Networks: Capacity and Protocols Nitin H. Vaidya University of Illinois at Urbana-Champaign Joint work with Pradeep Kyasanur Chandrakanth.
1 Retransmission Repeat: Simple Retransmission Permutation Can Resolve Overlapping Channel Collisions Li (Erran) Li Bell Labs, Alcatel-Lucent Joint work.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
1 Data Link Protocols By Erik Reeber. 2 Goals Use SPIN to model-check successively more complex protocols Using the protocols in Tannenbaums 3 rd Edition.
Vote Elicitation with Probabilistic Preference Models: Empirical Estimation and Cost Tradeoffs Tyler Lu and Craig Boutilier University of Toronto.
1 IP - The Internet Protocol Relates to Lab 2. A module on the Internet Protocol.
Streaming Video over the Internet
1 Haitao Zheng and Jill Boyce IEEE Transaction on Multimedia Leif 9/10/01 An Improved UDP Protocol for Video Transmission Over Internet-to-Wireless Networks.
MIMO Broadcast Scheduling with Limited Feedback Student: ( ) Director: 2008/10/2 1 Communication Signal Processing Lab.
Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved.
1 RAID Overview n Computing speeds double every 3 years n Disk speeds cant keep up n Data needs higher MTBF than any component in system n IO.
The IP Revolution. Page 2 The IP Revolution IP Revolution Why now? The 3 Pillars of the IP Revolution How IP changes everything.
ABC Technology Project
1 Chapter Overview Network Cables Network Interface Adapters Network Hubs.
One-Size-Fits-All Wireless Video Szymon Jakubczak with Hariharan Rahul and Dina Katabi.
The Capacity of Wireless Networks
Copyright © Chang Gung University. Permission required for reproduction or display. On Femto Deployment Architecture and Macrocell Offloading Benefits.
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
Differential Forms for Target Tracking and Aggregate Queries in Distributed Networks Rik Sarkar Jie Gao Stony Brook University 1.
Squares and Square Root WALK. Solve each problem REVIEW:
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Doc.: IEEE /0324r0 Submission Slide 1Michelle Gong, Intel March 2010 DL MU MIMO Error Handling and Simulation Results Date: Authors:
Addition 1’s to 20.
1 S Digital Communication Systems Advanced Modulation and Random Access Techniques.
25 seconds left…...
Dynamic Location Discovery in Ad-Hoc Networks
Week 1.
Practical Conflict Graphs for Dynamic Spectrum Distribution Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu *, Ben Y. Zhao and Haitao Zheng Department.
We will resume in: 25 Minutes.
Local Area Networks by R.S. Chang, Dept. CSIE, NDHU 1 Chapter 3 The Data Link Layer user A user B reliable transmission over unreliable physical link.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in.
and M-ary Quadrature Amplitude Modulation (M-QAM)
Company LOGO F OUNTAIN C ODES, LT C ODES AND R APTOR C ODES Susmita Adhikari Eduard Mustafin Gökhan Gül.
1 Understanding and Mitigating the Impact of RF Interference on Networks Ramki Gummadi (MIT), David Wetherall (UW) Ben Greenstein (IRS), Srinivasan.
Opportunistic Routing Is Missing Its Opportunities! Sachin Katti & Dina Katabi.
1 Wireless Sensor Networks Akyildiz/Vuran Administration Issues  Take home Mid-term Exam  Assign April 2, Due April 7  Individual work is required 
Network Coding Testbed Using Software-Defined Radio Abstract In current generation networks, network nodes operate by replicating and forwarding the packets.
Reliability & Channel Coding
CSCI 4550/8556 Computer Networks Comer, Chapter 7: Packets, Frames, And Error Detection.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 5th Lecture Christian Schindelhauer.
Chapter 5 Link Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 20.
Reliability and Channel Coding
Error Detection and Reliable Transmission EECS 122: Lecture 24 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
1/26 Chapter 6 Digital Data Communication Techniques.
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 1 Communication Reliability Asst. Prof. Chaiporn Jaikaeo, Ph.D.
Decoding Collisions Shyamnath Gollakota Dina Katabi.
Cross-Layer Optimization in Wireless Networks under Different Packet Delay Metrics Chris T. K. Ng, Muriel Medard, Asuman Ozdaglar Massachusetts Institute.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer introduction,
TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks
Improving Loss Resilience with Multi- Radio Diversity in Wireless Networks by Allen Miu, Hari Balakrishnan and C.E. Koksal Appeared in ACM MOBICOM 2005,
ZipTx: Harnessing Partial Packets in Networks Nate Kushman Kate Ching-Ju Lin, Dina Katabi.
Cross-Layer Approach to Wireless Collisions Dina Katabi.
Data and Computer Communications Eighth & Ninth Edition by William Stallings Chapter 6 – Digital Data Communications Techniques.
Wireless Communication
Wireless Sensor Networks 5th Lecture
mEEC: A Novel Error Estimation Code with Multi-Dimensional Feature
Presentation transcript:

Efficient Error Estimating Coding: Feasibility and Applications Binbin Chen Ziling Zhou Yuda Zhao Haifeng Yu School of Computing National University of Singapore

Background: Error Correcting Codes Error correcting codes play fundamental roles in communication systems: 2 10 decode encode Philosophy behind over 50 years of research on error correcting codes: Only want to deal with entirely correct data 10 senderreceiver network

Our Key Contribution Many state-of-art designs in wireless networking leverage partially correct packets More on these designs later… Look beyond error correcting codes? Our main contribution: Novel concept of Error Estimating Coding (EEC) Enable the receiver to estimate the number of errors (i.e., flipped bits) in a partially correct packet But cannot tell the positions of the errors 3

EEC: New Tradeoffs 4 Weaker functionality Smaller overhead Stronger functionality Larger overhead error correcting codes error estimating codes

EEC – Why is it interesting? 5 small redundancy overhead large redundancy overhead error correcting codes error estimating codes (n) 2% can only correct rather small # errors (e.g., 24 errors out of bits) O(log n) E.g., 2% overhead on 1500-byte packet If only want to know whether # errors exceeds some threshold -- just 4 bytes Can be viewed as generalized CRC

EEC – Why is it interesting? 6 small computational overhead large computational overhead error correcting codes error estimating codes Often need hardware support to be fast enough Some codes (e.g., Reed-Solomon codes) have highly optimized software implementation 10 to 100 times slower than EEC Hard to support a/g data rates Pure software implementation can support all a/g data rates on typical hardware platform today

EEC – Why is it interesting? 7 weaker functionality stronger functionality error correcting codes error estimating codes Estimate the number of errors Provable estimation quality No assumption needed on error correlation or independence

Roadmap Applications of EEC What designs deal with partial packets? How can EEC help them? Feasibility of Efficient EEC 8

Example Scenario: Streaming Video Source adds forward error correction Can recover a packet if BER below some threshold Router forwards all packets (even if partially correct) 9 source destination decode router

Streaming Video: How can EEC help? Packets with many errors cannot be recovered – router should have asked for retransmission BER-aware retransmission: Routers use EEC to determine whether to request retransmission Bit Error Rate: Fraction of corrupted bits 10 source destination decode decoding failure router

Summary of Experimental Results Implementation on Soekris Net routers BER-aware retransmission consistently outperforms other schemes that do not have access to BER info In all experimental settings (e.g., with/without interference, different link quality) Up to 5dB gain on PSNR of the streamed video 0.5dB gain is usually considered visually noticeable Details in paper… 11

Generalization: Treat different partial packets differently BER-aware packet forwarding Context: Cooperative relay Use analog-amplify for packets with large BER Use digital-amplify for packets with small BER BER-aware packet scheduling Context: Image sensor network for emergency response (e.g., [Kamra et al., SIGCOMM06] ) Let packets with small BER (and thus more valuable) go through first 12

Example Scenario: Bulk data transfer Leverage partial packets and correct errors end-to-end Combining multiple partial packets [Dubois-Ferriere et al., Sensys05] Use network coding as in MIXIT [Katti et al., SIGCOMM08] Destination requests extra error correcting redundancy if needed (i.e., similar to ZipTX [Lin et al., MobiCom08] ) 13

14 Bulk data transfer: How can EEC help? In these systems, EEC can help to do better WiFi rate adaptation Select the data rate with the best goodput Based on current tradeoff between data rates and packet BER The mapping between data rates and BER is the key info needed by rate adaptation EEC exactly provides the BER info at current rate

Comparison: Previous Rate Adaptation Schemes Based on packet loss ratio Coarse grained info Need multiple packets to observe properly Based on signal-to-noise ratio Indirect measure and needs training SoftRate [Vutukuru et al., SIGCOMM09] : Modify physical layer to obtain BER info Not supported by todays commercial hardware 15

Summary of Experimental Results EEC-Rate implemented in MadWifi Use per-packet BER to guide rate adaptation EEC-Rate consistently outperforms state-of-art schemes based on packet loss ratio or SNR In all experimental settings (e.g., indoor/walking/ outdoor, with/without interference) Up to 50% higher goodput in walking scenario Up to 130% higher goodput in outdoor scenario Details in paper… 16

Generalization: Wireless carrier selection General problem of wireless carrier selection Multiple wireless carriers (e.g., sending rates) Dynamically select the carrier with the best goodput More examples: 1.Wireless channel selection 2.Transmission power selection 3.Directional antenna orientation selection 4.Routing in multi-hop wireless networks … 17

Roadmap Applications of EEC More application scenarios in paper… Feasibility of Efficient EEC 18

Model A packet holds n data bits and k EEC bits, in n+k slots p fraction of the slots are erroneous p is not a probability Positions of erroneous slots can be arbitrary (e.g., fully clustered or fully spread) Goal: Generate an estimation for p (with certain target estimation quality) 19

Naïve Sampling Using Pilot Bits Problem: Ineffective for small p p = 0.01: needs roughly 100 pilot bits to see one error BER is usually a small value… 20 XXXX XXXX data bit pilot bit 4 slots erroneous out of 12 slots X erroneous slot p estimated to be 1/3 need enough errors on the pilot bits to estimate properly

Use a Parity Bit to Sample a Group of Bits Hope to sample a group of 100 slots together Use a parity bit to sample a group of data bits Larger group size More likely to see errors Helps to deal with small p – Just use larger groups 21 Parity bit for a group of 4 data bits data bit parity bit (EEC bit)

Challenges 1.Parity information is limited -- Cannot even distinguish 1 error from 3 errors in the group 2.Parity bits themselves may be erroneous 3.Error prob of an parity bit and error prob of data bits in the group are correlated 22 XXXX XXXX Data bits error prob higher Data bits error prob lower Will leave details on these challenges to paper…

permute EEC Encoding on Sender Single-level EEC 23 data bitsEEC bits packet On receiver, let q be the fraction of parity check failures: If q [0.25, 0.4], BER can be estimated as f(q) (see paper for the closed-form of f() ) Each EEC bit is the parity bit of a group of randomly selected data bits (all groups have the same size).

Multi-level EEC Single-level EEC succeeds only for q [0.25, 0.4] Multi-level EEC: log( n ) levels with geometrically distributed group sizes 2, 4, 8, 16, …, n Claim: There almost always exists some level such that q [0.25, 0.4] on that level Complication: With multiple levels, undesirable rare events will be more common…see paper Various extensions…see paper 24

Formal Guarantees (Rough) Theorem: For any given 0< <1 and 0< <1, using log( n ) levels with O(1) EEC bits per level will ensure: 25

EEC and SoftPHY SoftPHY [Jamieson et al., SIGCOMM07] Physical layer exposing confidence level for each bit received Can estimate BER – in fact, offer additional info beyond BER Todays commercial WiFi hardware does not provide such functionality EEC is a pure software solution Flexibility, easier to adopt or upgrade Will be attractive for lower-end wireless devices even if SoftPHY becomes available on future WiFi devices But if need per-bit confidence info, EEC cannot substitute SoftPHY 26

27 Conclusions Key contribution: Error estimating coding Estimate the # of errors (with provable estimation quality), without correcting them New tradeoff between functionality and overhead Why is EEC interesting? EEC functionality significantly benefits modern designs in wireless networks EEC overhead orders of magnitude smaller than error correcting codes (e.g., allows highly efficient software implementation)