Student: Omar Jarushi Instructor: Dr. Asaf Cohen 1.

Slides:



Advertisements
Similar presentations
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Advertisements

Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
MAC3: Medium Access Coding & Congestion Control Devavrat Shah (MIT) Damon Wischik (UCL)
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
Network Coding in Peer-to-Peer Networks Presented by Chu Chun Ngai
Gossip algorithms : “infect forever” dynamics Low-level objectives: – One-to-all: Disseminate rumor from source node to all nodes of network – All-to-all:
Cooperative Multiple Input Multiple Output Communication in Wireless Sensor Network: An Error Correcting Code approach using LDPC Code Goutham Kumar Kandukuri.
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Entropy Rates of a Stochastic Process
Chapter 6 Information Theory
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Network Coding and Xors in the Air 7th Week.
1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota.
Distributed Video Coding Bernd Girod, Anne Margot Aagon and Shantanu Rane, Proceedings of IEEE, Jan, 2005 Presented by Peter.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
BASiCS Group University of California at Berkeley Generalized Coset Codes for Symmetric/Asymmetric Distributed Source Coding S. Sandeep Pradhan Kannan.
1 Validation and Verification of Simulation Models.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
Collecting Correlated Information from a Sensor Network Micah Adler University of Massachusetts, Amherst.
Compression with Side Information using Turbo Codes Anne Aaron and Bernd Girod Information Systems Laboratory Stanford University Data Compression Conference.
Noise, Information Theory, and Entropy
Can Network Coding Help in P2P Networks? Dah Ming Chiu, Raymond W Yeung, Jiaqing Huang and Bin Fan Chinese University of Hong Kong Presented by Arjumand.
COCONET: Co-Operative Cache driven Overlay NETwork for p2p VoD streaming Abhishek Bhattacharya, Zhenyu Yang & Deng Pan.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
By Avinash Sridrahan, Scott Moeller and Bhaskar Krishnamachari.
Wireless Sensor Networks COE 499 Energy Aware Routing
Information Coding in noisy channel error protection:-- improve tolerance of errors error detection: --- indicate occurrence of errors. Source.
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
X1X1 X2X2 Encoding : Bits are transmitting over 2 different independent channels.  Rn bits Correlation channel  (1-R)n bits Wireless channel Code Design:
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Computer Networks Group Universität Paderborn TANDEM project meeting Protocols, oversimplification, and cooperation or: Putting wireless back into WSNs.
Growth Codes: Maximizing Sensor Network Data Persistence abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rubenstein Columbia University, Google Inc. (SIGSOMM’06)
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
Cooperative Communication in Sensor Networks: Relay Channels with Correlated Sources Brian Smith and Sriram Vishwanath University of Texas at Austin October.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Coding Theory Efficient and Reliable Transfer of Information
Data Collection and Dissemination. Learning Objectives Understand Trickle – an data dissemination protocol for WSNs Understand data collection protocols.
1 Quantization Error Analysis Author: Anil Pothireddy 12/10/ /10/2002.
Superposition encoding A distorted version of is is encoded into the inner codebook Receiver 2 decodes using received signal and its side information Decoding.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
Samuel Cheng, Shuang Wang and Lijuan Cui University of Oklahoma
Block Coded Modulation Tareq Elhabbash, Yousef Yazji, Mahmoud Amassi.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
SPIN: Sensor Protocols for Information via Negotiation
Distributed Compression For Still Images
Data Collection and Dissemination
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
2018/9/16 Distributed Source Coding Using Syndromes (DISCUS): Design and Construction S.Sandeep Pradhan, Kannan Ramchandran IEEE Transactions on Information.
Net 435: Wireless sensor network (WSN)
Coordination and computation over wireless networks
Su Yi Babak Azimi-Sadjad Shivkumar Kalyanaraman
Strayer University at Arlington, VA
Data Collection and Dissemination
Direct Sequence Spread Spectrum Modulation and Demodulation using Compressive Sensing Under the guidance of M.Venugopala Rao Submitted by K.Y.K.Kumari.
Distributed Compression For Binary Symetric Channels
Presentation transcript:

Student: Omar Jarushi Instructor: Dr. Asaf Cohen 1

O VERVIEW :  Introduction  Theoretical background  Random binning simulation  A simple, one source, three sinks network  A Gossip algorithm with correlated data 1. Design 2. Simulations 2

B ACKGROUND A ND M OTIVATION To date, most algorithms for information dissemination assume the data available at the nodes is independent. In case correlation exists, it is usually ignored. However, new algorithms for distributed source coding suggest that taking into account the correlation in data can result in significantly lower rates. Cost: A moderate price in decoding complexity. 3

A BOUT O UR W ORK Explore the applicability of distributed source coding techniques to existing data dissemination protocols, (The case study we will check: Gossip with correlated data). Implement network coding instead of store-and- forward mechanisms, which can provide substantial benefits in distributed networks. o Design and analyze a current communication protocol for data dissemination under the assumption of correlated data, using encoding and decoding at the relevant nodes. P ROJECT G OAL 4

P OTENTIAL A PPLICATIONS 1. Ecology and environmental monitoring: (For example): A weather measurement system, based on a wireless sensor network. 5

2. Content Distribution: (For example): Bit-Torrent in a (P2P) network, (simultaneously disseminate different fragments of a file among peers). Initial problems: > Prob. of acquiring a novel fragment decreases with the number of those already collected. > As the number of peers increases, it becomes harder to do optimal scheduling of distributing fragments to receivers. Solution: The Microsoft Secure Content Distribution (MSCD) / (Also known as Avalanche). It is an example of a P2P system attempting to alleviate such problems using network coding. 6 P OTENTIAL A PPLICATIONS

D ISTRIBUTED S OURCE C ODING - (E NCODING OF CORRELATED SOURCES ) In order to encode a source X, a rate R > H(X) is sufficient. (By the AEP: data compression theorem). Suppose we have two sources (X,Y)~p(x, y). If we are encoding them together, a rate H(X,Y) is sufficient. But, if X & Y must be described separately for some user, a rate R=Rx +Ry > H(X) + H(Y) is sufficient, (but over exaggerated). Slepian & Wolf show that a total rate R=H(X,Y) is sufficient, even for separate encoding. 7

S LEPIAN -W OLF T HEOREM Consider the following figure for the distributed source coding problem: (X, Y) are drown i.i.d ~ p(x, y). 8  Theorem: The achievable rate region is given by R1 >= H(X|Y), R2 >= H(Y|X), R1 + R2 >= H(X,Y). Encoder Decoder Rate R1 Rate R2 X Y

N ETWORK C ODING In routing: we do not code data content in the network. Consider the following figure: 9 X Y X or Y o By network coding: we can code the data content. X Y X + Y o In order to achieve bandwidth optimality, coding needs to be employed at the intermediate nodes.

Consider the network in the following figure: 10 N ETWORK C ODING (B UTTERFLY NETWORK ): With Network coding S t1t2 encoded into the bit mod2 With Routing S t1t2

G OSSIP ALGORITHMS : Extremely simple. Distributed Approach. Robust against network dynamics. Efficient in resource utilization. o Used in: networks in which lacks knowledge of the topology in nodes, where it is likely to: > Exhibit unpredictable dynamics. > face stringent resource constraints. Asynchronous information exchange protocol. 11

G OSSIP A LGORITHMS (A N EXAMPLE ): 12 o Assume the following simple network: o Assume: nodes in the network have only local information. o Communication between nodes proceed in time steps called rounds.

B INNING WITH M ULTIPLE D ECODERS 13  Required quantity of information to each target depends on correlation level between the source sequence and the specific target side information sequence.  Hence: the description done by nested random binning.  To prevent redundancy, encoder builds one binning scheme for use with all the targets. ( binning for using bins).  I would also explain before, what is random binning at the first place (when we have just one sink).

Send a set of combinations of “binary result” equations, instead of sending the whole index of the bin as in traditional Slepian-Wolf encoding. “Binary result” equation: 14 B INNING WITH M ULTIPLE D ECODERS (C ONT.)  Suppose we are interested in transmitting the source sequence towards 2 targets we have.  Suppose also: first target needs 4 bins, and the second target needs 8 bins). Consider the scheme bellow:  An alternative encoding method:

R ANDOM B INNING AND I NDEPENDENT E QUATIONS : The figure bellow represents binning to 8 bins and its binary representation: 15 o Note that: the bin we received is not the one ‘intended’ to send, but: It has the correct size. It contains the true.

R ANDOM B INNING S IMULATION There exists 1 source & 1 destination. o Uniform distributed source, (i.e. p(X[n]=0)=p(X[n]=1)=0.5). o Build a random binning scheme at the source and reveal it to the destination. o Encoding: choose at random a typical sequence X^n, and transmits its bin index. 16 within this specific bin. (If there are more than one possible, declare an error). o Decoding: have a side information sequence Y^n. receives bin index and looks for a typical set

Construct different bins. Inspect the probability of error in decoding, while the value of changes. 17 R ANDOM B INNING S IMULATION o N- Sequence Length. o f - BSC error probability, (a BSC channel between X^n as an input and Y^n as an output). Prob. Of error in decoding 0.14

1 SOURCE 3 SINKS SIMULATION A scheme which describes an initial stage in the information dissemination process within a discussed network. Consider the following scheme: 18 o The source creates a random “binary result” equations based on the longest bin index (i.e. the index with length: ), chooses a random neighbor and sends him a linear combination on the bin index he holds. And so on… o A sink collects an independent equations, until owning its requested quantity, (sink(i) needs independent equations).

The following 2 figures show how many rounds takes to every sink to receive the whole set of independent needed equations, while the later value is joined -the low columns-, while proceeding in source sequence length N SOURCE 3 SINKS SIMULATION o The following figure shows the case where X[n], differs from Yi[n] in probabilities: 0.01, 0.02 and 0.03 respectively.

o The following figure shows the case where X[n], differs from Yi[n] in probabilities: 0.1, 0.2 and 0.3 respectively SOURCE 3 SINKS SIMULATION

A DDITIONAL S IMULATION N ETWORKS 21 Tree Network Random Net. (60 nodes) Random Network