MAC3: Medium Access Coding & Congestion Control Devavrat Shah (MIT) Damon Wischik (UCL)

Slides:



Advertisements
Similar presentations
A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
Advertisements

Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Nick Feamster CS 4251 Computer Networking II Spring 2008
Interference Alignment and Cancellation EE360 Presentation Omid Aryan Shyamnath Gollakota, Samuel David Perli and Dina Katabi MIT CSAIL.
Medium Access Issues David Holmer
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Ethernet – CSMA/CD Review
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
Wireless Network Design for Distributed Control Liu and Goldsmith - Appeared at CDC 2004 Presented by Vinod Namboodiri.
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
ECE 776 Information Theory Capacity of Fading Channels with Channel Side Information Andrea J. Goldsmith and Pravin P. Varaiya, Professor Name: Dr. Osvaldo.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
A Transmission Control Scheme for Media Access in Sensor Networks Presented by Jianhua Shao.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
Model and tools. Traffic Model Poisson law – Napoléon worries about the statistics of horse accidents of his generals – Poisson confirms these are unfrequent.
Chap 4 Multiaccess Communication (Part 1)
Communication over Bidirectional Links A. Khoshnevis, D. Dash, C Steger, A. Sabharwal TAP/WARP retreat May 11, 2006.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Opersating Mode DCF: distributed coordination function
Efficient Network-Coding-Based Opportunistic Routing Through Cumulative Coded Acknowledgments Dimitrios Koutsonikolas, Chih-Chun Wang and Y. Charlie Hu.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo and David Culler University of California at Berkeley Intel Research ACM SIGMOBILE.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
Wireless Network Coding Martin Xu. Outline Introduction New Solutions – COPE – ANC Conclusions.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
An Adaptive, High Performance MAC for Long- Distance Multihop Wireless Networks Presented by Jason Lew.
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Content caching and scheduling in wireless networks with elastic and inelastic traffic Group-VI 09CS CS CS30020 Performance Modelling in Computer.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
Optimization-based Cross-Layer Design in Networked Control Systems Jia Bai, Emeka P. Eyisi Yuan Xue and Xenofon D. Koutsoukos.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
The Medium Access Control Sublayer
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
MAC Protocols for Sensor Networks
A Taxonomy of Mechanisms for Multi-Access
High Speed LANs – Ethernet and Token Ring
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Javad Ghaderi, Tianxiong Ji and R. Srikant
Protocols.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Protocols.
Presentation transcript:

MAC3: Medium Access Coding & Congestion Control Devavrat Shah (MIT) Damon Wischik (UCL)

Information theory and coding theory “What is the theoretical limit on how much I can send?” full knowledge — coding — noisy channels Wireless MAC “How can I learn when it’s safe to send?” contention — adapting — distributed algorithm Congestion control “How can I learn how fast to send?” adapting — distributed algorithm — resource allocation — networks

The classic ALOHA model for a wireless channel is useful for studying contention & coordination. Let there be n users, each with an infinite backlog of packets. Over a long timescale, n varies. Time is slotted. In each timeslot, users can transmit a packet. If exactly one user transmits, its packet is successfully delivered. If more than one user transmits, the packets collide and none is successfully delivered. At the end of the timeslot, all users are told whether there were no attempts, one attempt, or more than one attempt. The Medium Access Control (MAC) protocol is the algorithm for deciding whether a user should attempt transmission in a given timeslot. How should the MAC protocol be designed?

What are the typical mechanisms of a MAC protocol? MAC protocols typically involve a random wait before transmission, and longer random back-off in the event of a collision.

In a network setting, it is more challenging to devise a good MAC protocol. The hidden terminal problem. User 1 does not hear users 2 or 3, so it does not know to back off, so the receiver is overloaded. The exposed terminal problem. Each user backs off when the other is transmitting, but this is not necessary since the receivers do not hear the collision.

What are the design goals of a MAC protocol? Let θ i be the rate of successfully delivered packets for user i. Let user i have a utility function U i ( θ i ). A reasonable objective is The MAC layer has to discover how many users there are, and what rates are attainable, and solve this optimization. It should be a distributed algorithm, and it should react quickly when the network changes. It should work in a multihop network.

A remarkable recent MAC algorithm shows a new way of thinking about contention The wireless medium is additive. Therefore, even when transmissions collide, ZigZag may be able to decode the signal. But this decoding only works when there are few packets colliding. ZigZag relies on ALOHA-style adaptive backoff, to ensure that collisions are rare. “ZigZag decoding: combating hidden terminals in wireless networks”, Gollakota and Katabi, SIGCOMM 2008

I propose a toy model for MAC, with which to explore some new styles of resource allocation Let there be n users, each with an infinite backlog of packets. Over a long timescale, n varies. Consider a slotted-time binary noiseless additive channel. How should users choose what to send, in order to maximize aggregate utility?

A simple MAC encoding Suppose there are two users. Let user 1 have packets P 1, P 2, … ϵ {0,1} K to send. Let user 2 have packets Q 1, Q 2, … Let A ⊂ {0,1} K×K be a set of invertible matrices. Let A 1, A 2, … and B 1, B 2, … be sequences of IID matrices drawn from A. User 1 sendsA 1 P 1 A 2 P 1 A 3 P 1 A 4 P 2 A 5 P 2 A 6 P 2 A 7 P 3 User 2 sendsB 1 Q 1 B 2 Q 1 B 3 Q 2 B 4 Q 2 B 5 Q 3 B 6 Q 3 B 7 Q 4 Receiver hearsY1Y1 Y2Y2 Y3Y3 Y4Y4 Y5Y5 Y6Y6 Y7Y7

A simple MAC decoder Suppose the receiver knows – the sequences A 1, A 2, … and B 1, B 2, … – which packets are transmitted in which timeslots The receiver also knows, at time 1, thatA 1 P 1 + B 1 Q 1 = Y 1 at time 2, thatA 2 P 1 + B 2 Q 1 = Y 2 at time 3, thatA 3 P 1 + B 3 Q 2 = Y 3 at time 4, thatA 4 P 2 + B 4 Q 2 = Y 4 …

How well does this MAC decoder work? Let user i introduce new packets at rate θ i The receiver acquires new equations at rate 1 / timeslot New unknowns are introduced at rate ∑θ i / timeslot This decoder’s success rate depends somehow on ∑θ i and on the degree of linear independence in the equations.

A simple congestion controller When the receiver fails to decode some packets, let it send a congestion notification to all the users whose signals it hears. (This notification might be “out of band”.) Let each user i adapt θ i according to his utility function – increase θ i steadily when there is no congestion – decrease θ i when it receives congestion feedback. This should automatically solve the network utility maximization problem.

The wireless medium is additive. ALOHA-style back-off protocols are a type of coding. There are other types of coding that take advantage of additivity: for these codes it is useful for users to keep sending all the time, so that the channel is never wasted. It is necessary to study MAC design and channel coding together. It is possible to combine coding with utility- maximizing congestion control. This automatically solves the hidden terminal and exposed terminal problems, and it applies automatically to multihop networks.

Some questions For the MAC I described, what is the probability of successfully decoding a packet? How does it depend on A and on ( θ i, 1 ≤ i ≤ n)? What is a better MAC? How can the good features of this toy model, especially the congestion control mechanism, be implemented in a practical system?

Our naïve decoder requires the receiver to be able to decode everything it hears, giving the capacity bound θ 1 + θ 2 + θ 3 ≤ 1. Shannon’s bound suggests we should be able to do better: θ 1 + H ( H -1 (θ 2 ) ⊕ H -1 (θ 3 ) ) ≤ 1 where p ⊕ q=p(1-q)+q(1-p). How might we achieve this? If the three users coordinate their transmissions, the capacity constraint is even better: θ 1 + max(θ 2,θ 3 ) ≤ 1. How might users coordinate themselves?

Software radios invite us to rethink how networks are organized – to rethink the layers of the network stack.