Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Interference Alignment and Cancellation EE360 Presentation Omid Aryan Shyamnath Gollakota, Samuel David Perli and Dina Katabi MIT CSAIL.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Analog Network Coding Sachin Katti Shyamnath Gollakota and Dina Katabi.
Relaying in networks with multiple sources has new aspects: 1. Relaying messages to one destination increases interference to others 2. Relays can jointly.
MAC3: Medium Access Coding & Congestion Control Devavrat Shah (MIT) Damon Wischik (UCL)
MIMO As a First-Class Citizen in Kate C.-J. Lin Academia Sinica Shyamnath Gollakota and Dina Katabi MIT.
Vivek Raghunathan (joint work with Min Cao, P. R. Kumar) Coordinated Science Laboratory University of Illinois, Urbana-Champaign Exploiting MAC layer diversity.
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
XORs in the air: Practical Wireless Network Coding Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Medard, Jon Crowcroft SIGCOMM ‘06 Presented.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
Network Coding and Reliable Communications Group DAWN PI meeting – October 2009 Network coding with unreliable, unknown bandwidths Muriel Medard EECS RLE.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Mobility Increases Capacity In Ad-Hoc Wireless Networks Lecture 17 October 28, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor.
DAC: Distributed Asynchronous Cooperation for Wireless Relay Networks 1 Xinyu Zhang, Kang G. Shin University of Michigan.
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
SourceSync: A Distributed Architecture for Sender Diversity Hariharan Rahul Haitham Hassanieh Dina Katabi.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Overcoming the Antennas-Per-AP Throughput Limit in MIMO Shyamnath Gollakota Samuel David Perli and Dina Katabi.
Z IG Z AG D ECODING : C OMBATING H IDDEN T ERMINALS IN W IRELESS N ETWORKS Shyamnath Gollakota and Dina Katabi MIT CSAIL SIGCOMM 2008 Presented by Paul.
Chap 4 Multiaccess Communication (Part 1)
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Communication over Bidirectional Links A. Khoshnevis, D. Dash, C Steger, A. Sabharwal TAP/WARP retreat May 11, 2006.
Opersating Mode DCF: distributed coordination function
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Link Layer: Wireless Mesh Networks Capacity Y. Richard Yang 11/13/2012.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
Wireless Network Coding Martin Xu. Outline Introduction New Solutions – COPE – ANC Conclusions.
Three-layer scheme dominates previous double-layer schemes Distortion-diversity tradeoff provides useful comparison in different operating regions Layered.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Decoding Collisions Shyamnath Gollakota Dina Katabi.
Cross-Layer Optimization in Wireless Networks under Different Packet Delay Metrics Chris T. K. Ng, Muriel Medard, Asuman Ozdaglar Massachusetts Institute.
Utility Maximization for Delay Constrained QoS in Wireless I-Hong Hou P.R. Kumar University of Illinois, Urbana-Champaign 1 /23.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
Novel network coding strategy for TDD Use of feedback (ACK) improves delay/energy/ throughput performance, especially for high latency- high errors scenarios.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
SEEDEX: A MAC protocol for ad hoc networks R. Rozovsky and P. R. Kumar ACM ACM MobiHoc 2001 speaker: Chien-Wen.
Interference in MANETs: Friend or Foe? Andrea Goldsmith
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Cross-Layer Approach to Wireless Collisions Dina Katabi.
Content caching and scheduling in wireless networks with elastic and inelastic traffic Group-VI 09CS CS CS30020 Performance Modelling in Computer.
Medium Access Control in Wireless networks
Key insight.  With drop-when-decoded, the busy period of the virtual queue contributes to the physical queue size calculation  Responding to ACK of the.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California
CRMA: Collision Resistant Multiple Access Lili Qiu University of Texas at Austin Joint work with Tianji Li, Mi Kyung Han, Apurv Bhartia, Eric Rozner, Yin.
Trading Structure for Randomness in Wireless Opportunistic Routing Szymon Chachulski, Michael Jennings, Sachin Katti and Dina Katabi MIT CSAIL SIGCOMM.
The Importance of Being Opportunistic Sachin Katti Dina Katabi, Wenjun Hu, Hariharan Rahul, and Muriel Medard.
Wireless Communication
Topics in Distributed Wireless Medium Access Control
Xors in the air Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Medard, Jon Crowcroft.
Resource Allocation in Non-fading and Fading Multiple Access Channel
Services of DLL Framing Link access Reliable delivery
Hidden Terminal Decoding and Mesh Network Capacity
Wireless Network Coding: Some Lessons Learned in ITMANET
Javad Ghaderi, Tianxiong Ji and R. Srikant
Decoding Collisions Shyamnath Gollakota Dina Katabi.
Chapter 6 Multiple Radio Access.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
ACHIEVEMENT DESCRIPTION
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks Ali ParandehGheibi Joint work with Jay Kumar Sundararajan, Muriel Medard

New approach for contention management in wireless networks Throughput and completion delay improvement without coordination among senders Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks Medard Collision Recovery e.g. ZigZag decoding Algebraic representation of the collisions Combine finite-field network coding with analog network coding (in the form of collisions) Collision recovery improves the performance of a MAC with no coordination among senders MAIN ACHIEVEMENT: 1. Delivery time: Slotted Aloha: nlog(n) Centralized Scheduling: n/(1-p) Collision Recovery: n+O(1) 2. Stability Region: Achieve the cut-set bound HOW IT WORKS: Exploit the diversity gain of the links to different senders by allowing more simultaneous transmissions Priority-based acknowledgement mechanism Each sender broadcasts a random linear combination of the packets in its queue ACK seen packets instead of decoded packets ASSUMPTIONS AND LIMITATIONS: High SNR regime Perfect feedback channel available for ACKs Interference management in wireless networks: Simultaneous transmissions are are considered lost (collision) in most MAC protocols Collisions are normally avoided using centralized scheduling or Aloha-type mechanisms Per packet delay: Understand the decoding process at the receivers Half-duplex constraint: Requires scheduling between transmit and receive state IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS Alice Bob AP X Tx 1 Tx n Rx 1 Rx 2

Motivation 3 Approaches to Medium Access Control: –Centralized scheduling –Random access –Back-off mechanism –Distributed collision avoidance e.g. CSMA/CA Collided packets may still be decodable! Alice Bob AP X Collision BAD!!! REALLY?

ZigZag Decoding 4 Chunk 1 from user A from 1 st copy of collided packet can be decoded successfully –Subtract from 2 nd copy to decoded the Chunk 1 of user B Subtract from 1 st copy of collided packet to decode Chunk 2 from user A –Subtract from 2 nd copy of collided packet to decode Chunk 2 from user B [1] Shyamnath Gollakota and Dina Katabi, "ZigZag Decoding: Combating Hidden Terminals in Wireless Networks," ACM SIGCOMM, Best Paper Award"ZigZag Decoding: Combating Hidden Terminals in Wireless Networks,"

Algebraic Abstraction 5 Every collision is a “new” linear equation involving collided packets as unknowns Assumption: If packets involved in a reception have not all been decoded, then the reception is considered to be innovative Decoding n packets requires n receptions involving only those packets Generalization: Network Coding with Collision Recovery –Send linear combination of the packets at the transmitter –Treat each reception as a new linear equation of the original packets xy z Tx 1 Rx Tx 2

System Model – Problem Formulation 6 Time is slotted Packet erasures i.i.d. across links and over time Perfect feedback channel is available for acknowledgements (ACKs) Each sender’s packets to be delivered reliably to all of its neighbor receivers Tx 1 Rx 2 Tx 2 Rx 3 Rx 1 Performance measures: 1.Delay: –Each sender has one packet –Goal: Characterize the expectation of the Delivery time, T D 2.Throughput: –Packets arrive at each sender according to independent arrival processes, e.g. Bernoulli process –Goal: Characterize the queue stability region

Centralized Scheduling: Sequentially assign the channel to senders Random Access: Each sender transmits with probability q Collision Recovery: Every sender keeps transmitting until ACKed Collision Recovery with Random Access: Collisions of up to C packets are recoverable where Delivery Time – Single Receiver 7 Tx 1 Tx i Tx n Rx

Stability Region – Single Receiver 8 Rx A Centralized Scheduling: –Scheduler allocates the channel to the sender with the longest queue –May schedule a queue when its channel is in erasure –Without prior channel knowledge, cannot beat the simplex Collision Recovery: –Observation: Upon a successful reception, can acknowledge any of the connected senders –Key idea: By choosing whom to acknowledge, we can preferentially “serve” any of the connected queues –Priority-based policy achieves any corner point of the region

Delivery Time – Multiple Receiver Case 9 Tx 1 Rx 2 Tx 2 Rx 3 Rx 1 Delivery time of receiver j = Neighbor set of receiver j = Centralized Scheduling: –It is not always feasible to activate one sender for each receiver in every time slot Collision Recovery: –Each sender keeps sending its packet until acknowledge by all of the neighbor senders –Each receiver acknowledges any of the packets involved in each reception (collision) that have not been already acknowledged

Stability Region – Multiple Receiver Case 10 Code-ACK policy: - Transmission mechanism: Each sender transmits a random linear combination of its queue content at every time slot - Acknowledgement mechanism: Each receiver j acknowledges the last seen packet of one of the senders in given by the priority-based policy Cut-set bound: For each receiver j Theorem: Code-ACK policy stabilizes the queues for any set of arrival rates satisfying the cut-set bound. Proof sketch: -Virtual queue Q ij for each sender-receiver pair, (i,j), containing the packets at sender i not yet ACKed by receiver j -Stability of each virtual queue by stability of priority-based policy -Stability of physical queues by:

Conclusions 11 Collision Recovery: a new approach to contention management Algebraic abstraction to treat collisions as linear equations of packets Generalized collision recovery for coded packets Collision recovery achieves smaller delivery time compared to centralized scheduling Collision recovery at the receivers combined with random linear network coding at the transmitters achieves larger stability region compared to centralized scheduling Priority-based acknowledgement policy stabilizes the entire rate region given by the cut-set bound without queue-length information Collision recovery approach eliminates the need for coordination among contending sender and leads to fully distributed algorithms implemented over a wireless network