1 Network-Aware Distributed Algorithms for Wireless Networks Nitin Vaidya Electrical and Computer Engineering University of Illinois at Urbana-Champaign.

Slides:



Advertisements
Similar presentations
A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
Advertisements

1 Multi-Channel Wireless Networks: Capacity and Protocols Nitin H. Vaidya University of Illinois at Urbana-Champaign Joint work with Pradeep Kyasanur Chandrakanth.
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Interference Alignment and Cancellation EE360 Presentation Omid Aryan Shyamnath Gollakota, Samuel David Perli and Dina Katabi MIT CSAIL.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Tradeoffs between performance guarantee and complexity for distributed scheduling in wireless networks Saswati Sarkar University of Pennsylvania Communication.
Vivek Raghunathan (joint work with Min Cao, P. R. Kumar) Coordinated Science Laboratory University of Illinois, Urbana-Champaign Exploiting MAC layer diversity.
Dynamic Index Coding Broadcast Station N N Michael J. Neely, Arash Saber Tehrani, Zhen Zhang University of Southern California Paper available.
Dynamic Index Coding User set N Packet set P Broadcast Station N N p p p Michael J. Neely, Arash Saber Tehrani, Zhen Zhang University.
Wireless Network Design for Distributed Control Liu and Goldsmith - Appeared at CDC 2004 Presented by Vinod Namboodiri.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
ExOR:Opportunistic Multi-Hop Routing For Wireless Networks
Cross Layer Design in Wireless Networks Andrea Goldsmith Stanford University Crosslayer Design Panel ICC May 14, 2003.
Mobility Increases Capacity In Ad-Hoc Wireless Networks Lecture 17 October 28, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor.
1 Using Multiple Channels and Spatial Backoff to Improve Wireless Network Performance Nitin Vaidya University of Illinois at Urbana-Champaign
1 Improving Performance of Wireless Networks Nitin Vaidya Joint work with Fan Wu, Tae Hyun Kim, Jian Ni, Vijay Raman, R. Srikant November 4, 2010.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Multi-Channel Wireless Networks: Capacity and Protocols Pradeep Kyasanur and Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Energy-Optimum Throughput and Carrier Sensing Rate in CSMA-Based Wireless Networks.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Communication over Bidirectional Links A. Khoshnevis, D. Dash, C Steger, A. Sabharwal TAP/WARP retreat May 11, 2006.
1 The Importance of Being Earnest * Nitin Vaidya Illinois Center for Wireless Systems University of Illinois at Urbana-Champaign NSF Workshop, Reston,
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
Selecting Transmit Powers and Carrier Sense Thresholds in CSMA Jason Fuemmeler, Nitin Vaidya, Venugopal Veeravalli ECE Department & Coordinated Science.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Equality Function Computation (How to make simple things complicated) Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Guanfeng.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Internetworking An internetwork is typically comprised of many physical networks over which data travels There are many different types of physical networks:
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Wireless Sensor Networks COE 499 Energy Aware Routing
Design and Implementation of a Multi-Channel Multi-Interface Network Chandrakanth Chereddi Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Link Estimation, CTP and MultiHopLQI. Learning Objectives Understand the motivation of link estimation protocols – the time varying nature of a wireless.
1 Exploiting Diversity in Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign Presentation at Mesh.
1 Multi-Channel Wireless Networks: Theory to Practice Nitin Vaidya Electrical and Computer Engineering University of Illinois at Urbana-Champaign Sept.
1 Distributed Resilient Consensus Nitin Vaidya University of Illinois at Urbana-Champaign.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
Medium Access Control in Wireless networks
A Cooperative Multi-Channel MAC Protocol for Wireless Networks IEEE Globecom 2010 Devu Manikantan Shila, Tricha Anjali and Yu Cheng Dept. of Electrical.
Trading Structure for Randomness in Wireless Opportunistic Routing Szymon Chachulski, Michael Jennings, Sachin Katti and Dina Katabi MIT CSAIL SIGCOMM.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
1 Multi-Channel Wireless Networks: Theory to Practice Nitin Vaidya Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
MAC Protocols for Sensor Networks
COSC 6590 Fall Multi-channel, multi-radio wireless networks.
MAC Protocols for Sensor Networks
Topics in Distributed Wireless Medium Access Control
Multi-channel, multi-radio wireless networks
Channel Allocation (MAC)
Can Theory Meet Practice: The Case of Multi-Channel Wireless Networks
Howard Huang, Sivarama Venkatesan, and Harish Viswanathan
The Capacity of Wireless Networks
Throughput-Optimal Broadcast in Dynamic Wireless Networks
ExOR:Opportunistic Multi-Hop Routing For Wireless Networks
Javad Ghaderi, Tianxiong Ji and R. Srikant
Pradeep Kyasanur Nitin H. Vaidya Presented by Chen, Chun-cheng
Presentation transcript:

1 Network-Aware Distributed Algorithms for Wireless Networks Nitin Vaidya Electrical and Computer Engineering University of Illinois at Urbana-Champaign

2

3 Multi-Channel Wireless Networks: Theory to Practice Nitin Vaidya Electrical and Computer Engineering University of Illinois at Urbana-Champaign

4 Wireless Networks  Infrastructure-Based Networks  Infrastructure-Less (and Hybrid) Networks: –Mesh networks, ad hoc networks, sensor networks

What Makes Wireless Networks Interesting?  Broadcast channel  Interference management non-trivial  Signal-interference are relative notions A B C D power Signal Interference

6 What Makes Wireless Networks Interesting? Many forms of diversity Time Route Antenna Path Channel

7 What Makes Wireless Networks Interesting? Antenna diversity C D A B Sidelobes not shown

8 What Makes Wireless Networks Interesting? Path diversity x 1 x 2 y 1 y 2

9 What Makes Wireless Networks Interesting? Channel diversity A B A B Low gain High gain A B C D A B C D Low interference High interference

Research Challenge Dynamic adaptation to exploit available diversity 10

11 Net-X Multi- Channel Wireless Mesh Theory to Practice Multi-channel protocol Channel Abstraction Module IP Stack Interface Device Driver User Applications ARP Interface Device Driver OS improvements Software architecture Capacity & Scheduling channels capacity A B C D E F Fixed Switchable Insights on protocol design Net-X testbed

12

Secret to happiness is to lower your expectations to the point where they're already met 13 with apologies to Bill Watterson (Calvin & Hobbes)

14 Network-Aware Distributed Algorithms for Wireless Networks Nitin Vaidya Electrical and Computer Engineering University of Illinois at Urbana-Champaign

Distributed Algorithms & Communications 15 Communications / Networking Distributed Algorithms

Distributed Algorithms & Communications  Problems with overlapping scope  But cultures differ 16 Communications / Networking Distributed Algorithms

17 Distributed Algorithms Black box networks Emphasis on order complexity Emphasis on “exact” performance metrics Constants matter Communications / Networking

18 Distributed Algorithms Black box networks Emphasis on order complexity Emphasis on “exact” performance metrics Constants matter Information transfer (typically “raw” info) Communications / Networking

19 Distributed Algorithms Computation affects communication Emphasis on “exact” performance metrics Constants matter Information transfer (typically “raw” info) Communications / Networking Black box networks Emphasis on order complexity

Distributed Algorithms & Communications 20 Communications / Networking Distributed Algorithms

Outline Two distributed algorithms  Byzantine agreement  Scheduling (CSMA) 21 Rate Region Communications / Networking Distributed Algorithms

Rate Region  Defines the way links may share channel  Interference posed to each other determines whether a set of links should be active together 22

“Ethernet” Rate Region 23 S 1 2 Rate S1 + Rate S2 ≤ C R1 + R2 ≤ C Private channels S1 and S2 Rate S1 Rate S2 sum-rate constraint

Point-to-Point Network Rate Region Rij ≤ Capacity ij 24 S 1 2 Each directed link independent of other links

Wireless Network: Rate Region  Some links share channel with each other while others don’t R1 R2 R3 max(R1/C1, R3/C3) + (R2/C2) ≤ 1

Broadcast Channel: Rate Region R ≤ C1 S 2 3 1

Broadcast Channel: Rate Region > C1 S 2 3 R ≤ C2 “Range” varies inversely with rate 1

Broadcast Channel S S R1 R2 R12 R1/C1 + R2/C2 + R12/C12 ≤ 1

Outline Two distributed algorithms  Byzantine agreement  Scheduling (CSMA) 29

Impact of Rate Region  Network rate region affects ability to perform multi-party computation  Example: Byzantine agreement (broadcast) 30

Byzantine Agreement: Broadcast Source S wants to send message to n-1 receivers  Fault-free receivers agree  S fault-free  agree on its message  Up to f failures

Impact of Rate Region  How does rate region affect broadcast performance ?  How to quantify the impact ? 32

Throughput of Agreement  Borrow notion of throughput from communications literature  b(t) = number of bits agreed upon in [0,t] 33 Long timescale measure

Capacity of Agreement  Supremum of achievable throughputs for a given rate region

Broadcast Channel Rate region R ≤ C 35 Agreement capacity = C S R

“Ethernet” Rate Region  Sum of private link capacities ≤ C 36 Agreement capacity = C Communication complexity per agreed bit 1 S 2 3

“Ethernet” Rate Region Communication complexity per-agreed bit 37 L number of bits required to agree on L bits =

“Ethernet” Rate Region Communication complexity per-agreed bit 38 L number of bits required to agree on L bits =

“Ethernet” Rate Region Communication complexity per-agreed bit  L = 1 : Ω(n 2 ) for n node [Dolev-Reischuk] (deterministic algorithms) 39 L number of bits required to agree on L bits =

“Ethernet” Rate Region Communication complexity per-agreed bit  L = 1 : Ω(n 2 ) for n nodes  L  ∞ : can be shown O(n) (multi-value agreement) 40 L number of bits required to agree on L bits =

“Ethernet” Rate Region Communication complexity per-agreed bit  L = 1 : Ω(n 2 ) for n nodes  L  ∞ : can be shown O(n) (multi-value agreement) 41 L number of bits required to agree on L bits = 41 bits per agreed-bit n(n-1) (n-f)

“Ethernet” Rate Region  Sum of private link capacities ≤ C 42 Agreement capacity ≥ C n(n-1) (n-f) Conjecture: tight bound 1 S 2 3

A S B C Point-to-Point Network Each link has its own capacity Load ij ≤ Cij

A S B C Point-to-Point Network Each link has its own capacity Cij as shown Agreement Capacity ?

Point-to-Point Network Cij as shown Agreement Capacity = 2 A S B C

Point-to-Point Network є Cij as shown Agreement Capacity = 6 A S B C

A S B C Point-to-Point Network Capacity-achieving scheme for Arbitrary 4 node networks Approach:  Upper bound based on min-cuts  Lower bound using coding

A S B C Point-to-Point Network Capacity-achieving scheme for Arbitrary 4 node networks Minimum number of rounds required depends on link capacities

A S B C Point-to-Point Network Open problem: Everything else Capacity-achieving scheme for Arbitrary 4 node networks

Open Problems  Capacity-achieving agreement with general rate regions  Subset of nodes as “receivers” 50

Open Problems  Capacity-achieving agreement with general rate regions  Subset of nodes as “receivers”  Even the multicast problem with Byzantine nodes is unsolved - For multicast, source S fault-free 51

Rich Problem Space  Broadcast channel allows overhearing  Transmit to 2 at high rate, or low rate ? - Low rate allows reception at 1 (broadcast advantage) 52 S 2 3 1

Rich Problem Space  Broadcast channel allows overhearing  Transmit to 2 at high rate, or low rate ? - Low rate allows reception at 1 (broadcast advantage) 53 S Low rate

Rich Problem Space  Broadcast channel allows overhearing  Transmit to 2 at high rate, or low rate ? - Low rate allows reception at 1 (broadcast advantage) 54 S High rate

Rich Problem Space  How to model & exploit reception with probability < 1 ? –Need opportunistic algorithms  Use of available diversity affects rate region –How to dynamically adapt to channel variations ? 55

Rich Problem Space  Similar questions relevant for any multi-party computation 56 Communications / Networking Distributed Algorithms

And Now for Something Completely Different * * Monty Python 57

Outline Two distributed algorithms  Byzantine agreement  Scheduling (CSMA) 58

Scheduling Objective  Network stability L0 L2 L3

Scheduling Objective  Network stability L0 L2 L L0 L2 L3

Scheduling L0 L2 L3 1/2 Arrival rates

L0 L2 L3 Arrivals in even slots Arrivals in odd slots

End of slot L0 L2 L3 0 0

End of slot L0 L2 L Low priority to L2

End of slot L0 L2 L Low priority to L2

End of slot L0 L2 L Low priority to L2

End of slot L0 L2 L  Traffic not stabilized  High priority to L2 will stabilize this

Throughput-Optimal Scheduler  A scheduler is throughput-optimal if it can serve all schedulable traffic [Tassiulas92] Schedule = arg max ∑ ri qi Load 1 Load 2

Throughput-Optimal CSMA (Carrier-Sense Multiple Access)  Continuous-time CSMA-like algorithm shown to achieve stability [Jiang-Walrand’08]  Extended to discrete-time CSMA-like algorithms in later work CSMA model: A link can sense conflicting transmissions

70 CSMA model: A link can sense conflicting transmissions L0 L2 L3

71

Imperfect Carrier Sensing 72  Conflicting transmissions may not always be sensed, potentially leading to collisions

Imperfect Carrier Sensing  Stability with imperfect carrier sensing ?  Yes, almost 73

Proposed CSMA Algorithm Two access probability:  a : probability with which a node attempts to transmit first packet in a “train”  p : probability with which a “train” is extended 74

DATA Scheduling Example probe ACK DATA probe Access by a A Access by a B Access by p B Sensed busy by Link A & C Preempted by Link B Sensed idle by Link A & C probe ACK DATA probe ACK DATA Preempted by Link A & C probe BA ABCABC A and C may transmit together

With CSMA Failure probe ACK probe Access by a A Access by a B Access by p B Sensed busy by Link A & C Preempted by Link B Sensed idle by Link A & C CSMA failure at B probe DATA BA probe ACK DATA probe ACK DATA ABCABC A and C may transmit together

Stability with Sensing Failure  Small enough access probability (a) suffices to stabilize arbitrarily large fraction of rate region  Continuation probability (p) being function of queue size 77

Open Problems  Carrier sensing failures … correlation over time and space  Asymmetric collisions  Dynamic adaptation to time-varying channel 78

What does this have to do with distributed algorithms ? 79

Network stability  No semantics attached to bits  Traffic patterns weakly constrained  Distributed congestion control  Awareness of algorithm’s objective  Traffic completely specified by the algorithm  Distributed control ? 80 Distributed algorithms

Can the gap be bridged?  Multi-party algorithms that dynamically adapt to network characteristics 81 Communications / Networking Distributed Algorithms

Can the gap be bridged?  Theory versus practice: How to exploit the diversity?  Unknowns in practice (unknown unknowns as well) 82 Communications / Networking Distributed Algorithms

Thanks! / wireless

Thanks! / wireless

 Goal: Agreement on a large file 85 File Message Separate instance of “mini”-algorithm for each message

Back-up slides 86

BA complexity for sum-rate constraint  Goal: Agreement on a large file 87 File Message (n-f) data symbols (2n-2, n-f) code

n-1 receivers 2(n-1) symbol codeword of dimension n-f

Algorithm Outline 89 Initial machine M0 M1 Mmax No more failures time O(n)

CSMA 90

Scheduling Objective  Network stability L2 L3 L0 Rate region characterized by conflict graph L0 L2 L3 Network

Throughput-Optimal Scheduler  Schedule = arg max ∑ qi (for constant r) max ( q0+q3, q2)  Centralized scheduler L0 L2 L3

Channel Access Model Last α -duration of each time slot for carrier sense Access probability a Continuation probability p

Preemptive CSMA  Two access probabilities: a i and p i Carrier sense u(t): preemption x(t): transmission schedule C i : set of conflict links of i ACK reception

Carrier Sense Failure: Main Result  By choosing small enough access probability, possible to stabilize arbitrarily large fraction of capacity region Proof complexity: Markov chain is no longer reversible Use perturbation theory for Markov chains