The Scaling Law of SNR-Monitoring in Dynamic Wireless Networks Soung Chang Liew Hongyi YaoXiaohang Li.

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Ch 7.7: Fundamental Matrices
The Impact of Channel Estimation Errors on Space-Time Block Codes Presentation for Virginia Tech Symposium on Wireless Personal Communications M. C. Valenti.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
1 12. Principles of Parameter Estimation The purpose of this lecture is to illustrate the usefulness of the various concepts introduced and studied in.
Online Performance Guarantees for Sparse Recovery Raja Giryes ICASSP 2011 Volkan Cevher.
Enhancing Secrecy With Channel Knowledge
DYNAMIC POWER ALLOCATION AND ROUTING FOR TIME-VARYING WIRELESS NETWORKS Michael J. Neely, Eytan Modiano and Charles E.Rohrs Presented by Ruogu Li Department.
ECE Department Rice University dsp.rice.edu/cs Measurements and Bits: Compressed Sensing meets Information Theory Shriram Sarvotham Dror Baron Richard.
Volkan Cevher, Marco F. Duarte, and Richard G. Baraniuk European Signal Processing Conference 2008.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
Modeling OFDM Radio Channel Sachin Adlakha EE206A Spring 2001.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Location Estimation in Sensor Networks Moshe Mishali.
1 On the Performance of Slotted Aloha with Capture Effect in Wireless Networks Arash Behzad and Julan Hsu Professor Mario Gerla CS218 Project UCLA December.
Introduction to Cognitive radios Part two HY 539 Presented by: George Fortetsanakis.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 17th Lecture Christian Schindelhauer.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland Joint work with Randy Cogill, University of Virginia.
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
12- OFDM with Multiple Antennas. Multiple Antenna Systems (MIMO) TX RX Transmit Antennas Receive Antennas Different paths Two cases: 1.Array Gain: if.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
MAXIMIZING SPECTRUM UTILIZATION OF COGNITIVE RADIO NETWORKS USING CHANNEL ALLOCATION AND POWER CONTROL Anh Tuan Hoang and Ying-Chang Liang Vehicular Technology.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Communication over Bidirectional Links A. Khoshnevis, D. Dash, C Steger, A. Sabharwal TAP/WARP retreat May 11, 2006.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Wireless Sensor Networks COE 499 Energy Aware Routing
*P. C. Weeraddana **M. Codreanu, **M. Latva-Aho, ***A. Ephremides * KTH, Royal institute of Technology, Stockholm, Sweden ** CWC, University of Oulu, Finland.
Delay-Throughput Tradeoff with Correlated Mobility in Ad-Hoc Networks Shuochao Yao*, Xinbing Wang*, Xiaohua Tian* ‡, Qian Zhang † *Department of Electronic.
Streaming Algorithms Piotr Indyk MIT. Data Streams A data stream is a sequence of data that is too large to be stored in available memory Examples: –Network.
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: Deterministic vs. Random Maximum A Posteriori Maximum Likelihood Minimum.
Channel Capacity.
CODED COOPERATIVE TRANSMISSION FOR WIRELESS COMMUNICATIONS Prof. Jinhong Yuan 原进宏 School of Electrical Engineering and Telecommunications University of.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Yingzhe Li, Xinbing Wang, Xiaohua Tian Department of Electronic Engineering.
OPTIMUM INTEGRATED LINK SCHEDULING AND POWER CONTROL FOR MULTI-HOP WIRELESS NETWORKS Arash Behzad, and Izhak Rubin, IEEE Transactions on Vehicular Technology,
PROBABILITY AND STATISTICS FOR ENGINEERING Hossein Sameti Department of Computer Engineering Sharif University of Technology Principles of Parameter Estimation.
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
CHAPTER 5 SIGNAL SPACE ANALYSIS
Chapter 31 INTRODUCTION TO ALGEBRAIC CODING THEORY.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
Motivation Wireless Communication Environment Noise Multipath (ISI!) Demands Multimedia applications  High rate Data communication  Reliability.
University of Houston Cullen College of Engineering Electrical & Computer Engineering Capacity Scaling in MIMO Wireless System Under Correlated Fading.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
A Semi-Blind Technique for MIMO Channel Matrix Estimation Aditya Jagannatham and Bhaskar D. Rao The proposed algorithm performs well compared to its training.
The Scaling Law of SNR-Monitoring in Dynamic Wireless Networks Soung Chang Liew Hongyi YaoXiaohang Li.
Space Time Codes. 2 Attenuation in Wireless Channels Path loss: Signals attenuate due to distance Shadowing loss : absorption of radio waves by scattering.
Spectrum Sensing In Cognitive Radio Networks
Network RS Codes for Efficient Network Adversary Localization Sidharth Jaggi Minghua Chen Hongyi Yao.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
Network Coding Tomography for Network Failures
The Message Passing Communication Model David Woodruff IBM Almaden.
Overcoming the Sensing-Throughput Tradeoff in Cognitive Radio Networks ICC 2010.
Joint Routing and Scheduling Optimization in Wireless Mesh Networks with Directional Antennas A. Capone, I. Filippini, F. Martignon IEEE international.
- A Maximum Likelihood Approach Vinod Kumar Ramachandran ID:
New Characterizations in Turnstile Streams with Applications
Computing and Compressive Sensing in Wireless Sensor Networks
Presenter: Xudong Zhu Authors: Xudong Zhu, etc.
Learning From Observed Data
Presentation transcript:

The Scaling Law of SNR-Monitoring in Dynamic Wireless Networks Soung Chang Liew Hongyi YaoXiaohang Li

Channel Gain or Single-Noise- Ratio (SNR) The channel gain H of a wireless channel (S,R) is defined by: Y= H X + Z, where X is the signal sent by S, Y is the signal received by R and Z ~ N(0,1) is the noise term. For the simplicity, both noise power and transmit power are normalized to be 1. S H Z Channel Model R 1

Channel Gain Monitoring In a wireless network, the knowledge of channel gains are needed to design high performance communication schemes. Due to fading, node mobility and node power instability, channel gains vary with time. Thus, tracking and estimating channel gains of wireless channels is fundamentally important This work seeks the answer of the following question: What is the minimum communication overhead such that all network channels can be tracked? 2

Toy Example R S1S1 S2S2 S3S3 H1H1 H2H2 H3H3 Prior Knowledge: H 1 =1 and H 2 =1 and H 3 =1. Updat e There exists i in {1,2,3} such that H i varied. Monitoring Object: The receiver R wants to recover i and H i. 3

Toy Example Recovering i and x: Unit Probing R S1S1 S2S2 S3S3 111 Time Slot 1: Time Slot 2: Time Slot 3: Three time slots are required for probing. 4 H i is unknown, H j = 1 for

Toy Example (Differential Group Probing) R S1S1 S2S2 S3S3 111 Time Slot 1:Time Slot 2: R S1S1 S2S2 S3S3 123 Receive Y[1]=3+(H i -1)Receive Y[2]=6+(H i -1)i Using the a priori knowledge of the channel gains, R computes [Y’[1],Y’[2]]=[3,6] and then the difference: [Y[1],Y[2]] - [Y’[1],Y’[2]]=(H i -1)[1,i]. 5 Since [1,1], [1,2] and [1,3] are linear independent, R can decode i and then H i. - One time slot saving ! H i is unknown, H j = 1 for

Motivation Raised by the Toy Example Unit Probing VS. Differential Group Probing. Unit Probing (Scheduling Interference): Since we do not know which channel varied, all channels must be sampled one by one. Differential Group Probing (Embracing Interference): All channels are sampled simultaneously to explore the a prior knowledge. Question: Does differential group probing suffice to achieve the minimum communication overheads? Answer: YES! 6

Outline of the Talk Fundamental setting: multiple transmitters and one receiver. The scaling law of tracking all channel gains. Achieving the scaling law by ADMOT. General setting: multiple transmitters, relay nodes and receivers. The scaling law of above fundamental setting still holds. Achieving the scaling law by ADMOT-GENERAL. Simulation results. 7

Fundamental Setting Multiple transmitters and one receiver: R S1S1 S2S2 SnSn H1H1 H2H2 HnHn … For S i, the probe in the s’th time slot is X i [s]. R receives: The term Z[s] is the noise i.i.d. (of s) ~ N(0,1). Definition (State): The state H is a length n vector, with the i’th component equaling H i. The vector H’ is the a priori knowledge of H preserved by R. 8

State Variation The state variation H-H ’ is said to be approx-k- sparse if there are at most k “ significant ” nonzero components in H-H ’. Practical interpretation: Approx-k-sparse state variation means there are at most k channels suffering significant variations, while the variations of other channels are negligible. Details about “ approx ” can be found in paper [1]. 9

Main Theorem Theorem: When the state variation H-H ’ is approx-k-sparse, we have: Scaling Law: At least time slots are required for reliably estimating all the n channels. Achievability: There exists a monitoring scheme using time slots, such that R can estimate all the n channels in a reliable and computational efficient manner. 10

Proof of the Scaling Law Assuming T time slots are used for allowing R estimating H from the a priori knowledge H ’. For the clarity, we simplify the problem by assuming the noise term Z[s]=0 for each time slot s. Thus, R receives for s={1,2, … T}. 11

Proof of the Scaling Law Using H ’, R computes and Note that recovering H is the same as recovering H-H ’ by using the linear samples D[s] for s={1,2, …,T}. Using the results in [2], at least linear samples are required for reliably recovering a approx-k-sparse vector H-H ’ [1]. Key Idea: Wireless interference only provides linear samples. 12

Achieve the Scaling Law by ADMOT Systematical View of ADMOT: Core techniques in ADMOT: Differential Group Probing+ Compressive Sensing. 13

The Training Data of ADMOT The matrix of dimensions consists of the training data of ADMOT. Here, N is the maximum number of time slots allowed by ADMOT, and n is the number of transmitters. Each component of is i.i.d. chosen from {-1,1} with equal probability. The i ’ th column of is the training data of transmitter S i. To be concrete, in the s ’ th time slot, S i sends, as: 14

Construction of ADMOT ADMOT(m, H ’ ) Variables Initialization: H* is the estimation of H. Vector Y is of dimension m. Matrix consists of the 1,2, …,m ’ th rows of. Step A (Probing): For s = 1, 2, … m, in the s ’ th time slot: For each i in {1,2, …,n}, S i sends Receiver R sets Y[s] (i.e., the s ’ th component of Y) to be the received sample. Thus, Then we have 15

Construction of ADMOT ADMOT(m, H ’ ) Continued from previous slide Step B (Computing Differences): Receiver R computes Step C (Norm-1 Sparse Recovering): Receiver R finds the solution E* of the following convex program: Minimize, subject to Step D (Estimating) : Receiver R estimates H as H*=H ’ +E*. Step E: Terminate ADMOT. 16

Comments for ADMOT The computational complexity of R is dominated by a norm-1 minimization convex program. If H-H ’ is approx-k-sparse, using the results of Compressive Sensing[3], E* is a reliable estimation of H-H ’ provided that m=Cklog(n/k) for a constant C. The receiver can adapt the system parameter m for future rounds of ADMOT by analyzing the square-root estimation error |H-H*| 2. Details can be found in [1]. 17 Tightly Match the Scaling Law!

Outline of the Talk Fundamental setting: multiple transmitters and one receiver. The scaling law of tracking all channel gains. Achieving the scaling law by ADMOT. General setting: multiple transmitters, relay nodes and receivers. The scaling law of above fundamental setting still holds. Achieving the scaling law by ADMOT-GENERAL. Simulation results. 18

General Communication Networks There are multiple transmitters in S, multiple relay nodes in V and multiple receivers in R. For each node, all its incoming channels (from S and V) require monitoring. In the following toy network, the directed lines denote the channel requiring monitoring. SR V1V1 V2V2 19

Simplified Model The challenging of general communication network rises from the existence of relay nodes in V. For the simplicity, we consider a network with only relay nodes V={v 1,v 2, …,v n }. Thus, for each node v i in V, it wants to track the channel (v j,v i ) for each j=1,2, …,n. 20 Complete Network!

The Scaling Law of General Setting Assume for each node v i in V, the incoming channels of v i suffer approx-k-sparse variation. Directly using the scaling law of the single receiver scenario, at least time slots are required. Surprisingly, this scaling law is also tight for general communication networks. 21

Achieving the Scaling Law Full-Duplex model: Any node in V can transmit and receive in the same time slot. Due to the broadcast nature of wireless medium, each node in V can probe under ADMOT, and in the mean time receive the probes of other nodes in V. In the end, each node in V can estimate its incoming channels following ADMOT. Thus, the overall overhead is Half-Duplex Model: Any node in V can not transmit and receive in the same time slot. The generalization is non-straightforward and shown in the following slides. For both models, the achievability schemes are implemented in a distributed manner, i.e., no centralized controller is needed. 22

Achieving the Scaling Law for Half-Duplex Model We construct ADMOT-GENERAL to achieve overheads for a constant C ’. The matrix of dimensions consists of the training data. Each component of is i.i.d. chosen from {0,-1,1} with probability {1/2,1/4,1/4}. The i ’ th column of is the training data of v i. 23

High-level Construction of ADMOT-GENERAL ADMOT-GENERAL runs m time slots. In the s ’ th time slot, if node v i receives in the time slot; Otherwise, v i sends in the time slot. In the end, with large probability (Chernoff Bound), each node, say v i, received at least m/3 data. Let the vector Y i consist of the received data of v i, and H i be the vector consisting of all incoming channel gains of v i. Each component of Y i is a linear sample (with noise) of H i. That is,, where consists of at least m/3 rows of. 24

High-level Construction of ADMOT-GENERAL Node v i computes the difference using the a priori knowledge H i ’ for its incoming channel gains. Note each component of is i.i.d. sampled from {0,- 1/2,1/2} with probability {0.5, 0.25, 0.25}, which are therefore sub-Gaussian ensembles. Approx-k-sparse H i -H i ’ can be recovered provided that RowNumber( ) for a constant C ’ [4]. 25 Tightly Match the Scaling Law!

Outline of the Talk Fundamental setting: multiple transmitters and one receiver. The scaling law of tracking all channel gains. Achieving the scaling law by ADMOT. General setting: multiple transmitters, relay nodes and receivers. The scaling law of above fundamental setting still holds. Achieving the scaling law by ADMOT-GENERAL. Simulation results. 26

Simulations Setting: n=500 transmitters. One receiver. Average SNR = 20 dB. Approx-k state variation. Define channel stability=1-k/n. ADMOT is implemented as the consecutive manner: 27

Simulations 28

Future Works General Setting: Network Tomography + Channel Gain Estimation? Current ADMOT-GENERAL requires the internal nodes in V performing sophisticated protocol (ADMOT) for channel gain estimation. Can we estimate internal channel gains as “ tomography ”, in which relay nodes do normal network transmission, only the transmitters and receivers perform sophisticated protocols? 29

Thanks! & Questions? [1]. H. Yao and X. Li and S. C. Liew, “ Achieving the Scaling Law of SNR-Monitoring for Dynamic Wireless Networks ”, arxiv [2]. K. D. Ba, P. Indyk, E. Price, and D. P. Woodruff, “ Lower bounds for sparse recovery, ” in Proc. of SODA, [3]. E. Cand´es, J. Romberg, and T. Tao, “ Stable signal recovery from incomplete and inaccurate measurements, ” Communications on Pure and Applied Mathematics, [4]. S. Mendelson, A. Pajor, and N. T. Jaegermann, “ Uniform uncertainty principle for bernoulli and subgaussian ensembles, ” Constructive Approximation,