1 Network-Aware Distributed Algorithms for Wireless Networks Nitin Vaidya Electrical and Computer Engineering University of Illinois at Urbana-Champaign
2
3 Multi-Channel Wireless Networks: Theory to Practice Nitin Vaidya Electrical and Computer Engineering University of Illinois at Urbana-Champaign
4 Wireless Networks Infrastructure-Based Networks Infrastructure-Less (and Hybrid) Networks: –Mesh networks, ad hoc networks, sensor networks
What Makes Wireless Networks Interesting? Broadcast channel Interference management non-trivial Signal-interference are relative notions A B C D power Signal Interference
6 What Makes Wireless Networks Interesting? Many forms of diversity Time Route Antenna Path Channel
7 What Makes Wireless Networks Interesting? Antenna diversity C D A B Sidelobes not shown
8 What Makes Wireless Networks Interesting? Path diversity x 1 x 2 y 1 y 2
9 What Makes Wireless Networks Interesting? Channel diversity A B A B Low gain High gain A B C D A B C D Low interference High interference
Research Challenge Dynamic adaptation to exploit available diversity 10
11 Net-X Multi- Channel Wireless Mesh Theory to Practice Multi-channel protocol Channel Abstraction Module IP Stack Interface Device Driver User Applications ARP Interface Device Driver OS improvements Software architecture Capacity & Scheduling channels capacity A B C D E F Fixed Switchable Insights on protocol design Net-X testbed
12
Secret to happiness is to lower your expectations to the point where they're already met 13 with apologies to Bill Watterson (Calvin & Hobbes)
14 Network-Aware Distributed Algorithms for Wireless Networks Nitin Vaidya Electrical and Computer Engineering University of Illinois at Urbana-Champaign
Distributed Algorithms & Communications 15 Communications / Networking Distributed Algorithms
Distributed Algorithms & Communications Problems with overlapping scope But cultures differ 16 Communications / Networking Distributed Algorithms
17 Distributed Algorithms Black box networks Emphasis on order complexity Emphasis on “exact” performance metrics Constants matter Communications / Networking
18 Distributed Algorithms Black box networks Emphasis on order complexity Emphasis on “exact” performance metrics Constants matter Information transfer (typically “raw” info) Communications / Networking
19 Distributed Algorithms Computation affects communication Emphasis on “exact” performance metrics Constants matter Information transfer (typically “raw” info) Communications / Networking Black box networks Emphasis on order complexity
Distributed Algorithms & Communications 20 Communications / Networking Distributed Algorithms
Outline Two distributed algorithms Byzantine agreement Scheduling (CSMA) 21 Rate Region Communications / Networking Distributed Algorithms
Rate Region Defines the way links may share channel Interference posed to each other determines whether a set of links should be active together 22
“Ethernet” Rate Region 23 S 1 2 Rate S1 + Rate S2 ≤ C R1 + R2 ≤ C Private channels S1 and S2 Rate S1 Rate S2 sum-rate constraint
Point-to-Point Network Rate Region Rij ≤ Capacity ij 24 S 1 2 Each directed link independent of other links
Wireless Network: Rate Region Some links share channel with each other while others don’t R1 R2 R3 max(R1/C1, R3/C3) + (R2/C2) ≤ 1
Broadcast Channel: Rate Region R ≤ C1 S 2 3 1
Broadcast Channel: Rate Region > C1 S 2 3 R ≤ C2 “Range” varies inversely with rate 1
Broadcast Channel S S R1 R2 R12 R1/C1 + R2/C2 + R12/C12 ≤ 1
Outline Two distributed algorithms Byzantine agreement Scheduling (CSMA) 29
Impact of Rate Region Network rate region affects ability to perform multi-party computation Example: Byzantine agreement (broadcast) 30
Byzantine Agreement: Broadcast Source S wants to send message to n-1 receivers Fault-free receivers agree S fault-free agree on its message Up to f failures
Impact of Rate Region How does rate region affect broadcast performance ? How to quantify the impact ? 32
Throughput of Agreement Borrow notion of throughput from communications literature b(t) = number of bits agreed upon in [0,t] 33 Long timescale measure
Capacity of Agreement Supremum of achievable throughputs for a given rate region
Broadcast Channel Rate region R ≤ C 35 Agreement capacity = C S R
“Ethernet” Rate Region Sum of private link capacities ≤ C 36 Agreement capacity = C Communication complexity per agreed bit 1 S 2 3
“Ethernet” Rate Region Communication complexity per-agreed bit 37 L number of bits required to agree on L bits =
“Ethernet” Rate Region Communication complexity per-agreed bit 38 L number of bits required to agree on L bits =
“Ethernet” Rate Region Communication complexity per-agreed bit L = 1 : Ω(n 2 ) for n node [Dolev-Reischuk] (deterministic algorithms) 39 L number of bits required to agree on L bits =
“Ethernet” Rate Region Communication complexity per-agreed bit L = 1 : Ω(n 2 ) for n nodes L ∞ : can be shown O(n) (multi-value agreement) 40 L number of bits required to agree on L bits =
“Ethernet” Rate Region Communication complexity per-agreed bit L = 1 : Ω(n 2 ) for n nodes L ∞ : can be shown O(n) (multi-value agreement) 41 L number of bits required to agree on L bits = 41 bits per agreed-bit n(n-1) (n-f)
“Ethernet” Rate Region Sum of private link capacities ≤ C 42 Agreement capacity ≥ C n(n-1) (n-f) Conjecture: tight bound 1 S 2 3
A S B C Point-to-Point Network Each link has its own capacity Load ij ≤ Cij
A S B C Point-to-Point Network Each link has its own capacity Cij as shown Agreement Capacity ?
Point-to-Point Network Cij as shown Agreement Capacity = 2 A S B C
Point-to-Point Network є Cij as shown Agreement Capacity = 6 A S B C
A S B C Point-to-Point Network Capacity-achieving scheme for Arbitrary 4 node networks Approach: Upper bound based on min-cuts Lower bound using coding
A S B C Point-to-Point Network Capacity-achieving scheme for Arbitrary 4 node networks Minimum number of rounds required depends on link capacities
A S B C Point-to-Point Network Open problem: Everything else Capacity-achieving scheme for Arbitrary 4 node networks
Open Problems Capacity-achieving agreement with general rate regions Subset of nodes as “receivers” 50
Open Problems Capacity-achieving agreement with general rate regions Subset of nodes as “receivers” Even the multicast problem with Byzantine nodes is unsolved - For multicast, source S fault-free 51
Rich Problem Space Broadcast channel allows overhearing Transmit to 2 at high rate, or low rate ? - Low rate allows reception at 1 (broadcast advantage) 52 S 2 3 1
Rich Problem Space Broadcast channel allows overhearing Transmit to 2 at high rate, or low rate ? - Low rate allows reception at 1 (broadcast advantage) 53 S Low rate
Rich Problem Space Broadcast channel allows overhearing Transmit to 2 at high rate, or low rate ? - Low rate allows reception at 1 (broadcast advantage) 54 S High rate
Rich Problem Space How to model & exploit reception with probability < 1 ? –Need opportunistic algorithms Use of available diversity affects rate region –How to dynamically adapt to channel variations ? 55
Rich Problem Space Similar questions relevant for any multi-party computation 56 Communications / Networking Distributed Algorithms
And Now for Something Completely Different * * Monty Python 57
Outline Two distributed algorithms Byzantine agreement Scheduling (CSMA) 58
Scheduling Objective Network stability L0 L2 L3
Scheduling Objective Network stability L0 L2 L L0 L2 L3
Scheduling L0 L2 L3 1/2 Arrival rates
L0 L2 L3 Arrivals in even slots Arrivals in odd slots
End of slot L0 L2 L3 0 0
End of slot L0 L2 L Low priority to L2
End of slot L0 L2 L Low priority to L2
End of slot L0 L2 L Low priority to L2
End of slot L0 L2 L Traffic not stabilized High priority to L2 will stabilize this
Throughput-Optimal Scheduler A scheduler is throughput-optimal if it can serve all schedulable traffic [Tassiulas92] Schedule = arg max ∑ ri qi Load 1 Load 2
Throughput-Optimal CSMA (Carrier-Sense Multiple Access) Continuous-time CSMA-like algorithm shown to achieve stability [Jiang-Walrand’08] Extended to discrete-time CSMA-like algorithms in later work CSMA model: A link can sense conflicting transmissions
70 CSMA model: A link can sense conflicting transmissions L0 L2 L3
71
Imperfect Carrier Sensing 72 Conflicting transmissions may not always be sensed, potentially leading to collisions
Imperfect Carrier Sensing Stability with imperfect carrier sensing ? Yes, almost 73
Proposed CSMA Algorithm Two access probability: a : probability with which a node attempts to transmit first packet in a “train” p : probability with which a “train” is extended 74
DATA Scheduling Example probe ACK DATA probe Access by a A Access by a B Access by p B Sensed busy by Link A & C Preempted by Link B Sensed idle by Link A & C probe ACK DATA probe ACK DATA Preempted by Link A & C probe BA ABCABC A and C may transmit together
With CSMA Failure probe ACK probe Access by a A Access by a B Access by p B Sensed busy by Link A & C Preempted by Link B Sensed idle by Link A & C CSMA failure at B probe DATA BA probe ACK DATA probe ACK DATA ABCABC A and C may transmit together
Stability with Sensing Failure Small enough access probability (a) suffices to stabilize arbitrarily large fraction of rate region Continuation probability (p) being function of queue size 77
Open Problems Carrier sensing failures … correlation over time and space Asymmetric collisions Dynamic adaptation to time-varying channel 78
What does this have to do with distributed algorithms ? 79
Network stability No semantics attached to bits Traffic patterns weakly constrained Distributed congestion control Awareness of algorithm’s objective Traffic completely specified by the algorithm Distributed control ? 80 Distributed algorithms
Can the gap be bridged? Multi-party algorithms that dynamically adapt to network characteristics 81 Communications / Networking Distributed Algorithms
Can the gap be bridged? Theory versus practice: How to exploit the diversity? Unknowns in practice (unknown unknowns as well) 82 Communications / Networking Distributed Algorithms
Thanks! / wireless
Thanks! / wireless
Goal: Agreement on a large file 85 File Message Separate instance of “mini”-algorithm for each message
Back-up slides 86
BA complexity for sum-rate constraint Goal: Agreement on a large file 87 File Message (n-f) data symbols (2n-2, n-f) code
n-1 receivers 2(n-1) symbol codeword of dimension n-f
Algorithm Outline 89 Initial machine M0 M1 Mmax No more failures time O(n)
CSMA 90
Scheduling Objective Network stability L2 L3 L0 Rate region characterized by conflict graph L0 L2 L3 Network
Throughput-Optimal Scheduler Schedule = arg max ∑ qi (for constant r) max ( q0+q3, q2) Centralized scheduler L0 L2 L3
Channel Access Model Last α -duration of each time slot for carrier sense Access probability a Continuation probability p
Preemptive CSMA Two access probabilities: a i and p i Carrier sense u(t): preemption x(t): transmission schedule C i : set of conflict links of i ACK reception
Carrier Sense Failure: Main Result By choosing small enough access probability, possible to stabilize arbitrarily large fraction of capacity region Proof complexity: Markov chain is no longer reversible Use perturbation theory for Markov chains