Information Theory for Mobile Ad-Hoc Networks (ITMANET) Thrust I Michelle Effros, Ralf Koetter, & Muriel Médard (and everyone!)

Slides:



Advertisements
Similar presentations
Impact of Interference on Multi-hop Wireless Network Performance
Advertisements

Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
Derives the optimal achievable rate for MISO secondary users under coexistence constraints Proposes practical strategy for cognition and cooperation in.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Relaying in networks with multiple sources has new aspects: 1. Relaying messages to one destination increases interference to others 2. Relays can jointly.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project FLoWS Team Update: Andrea Goldsmith ITMANET PI Meeting Jan 27, 2011.
Enhancing Secrecy With Channel Knowledge
1 Network Coding: Theory and Practice Apirath Limmanee Jacobs University.
June 4, 2015 On the Capacity of a Class of Cognitive Radios Sriram Sridharan in collaboration with Dr. Sriram Vishwanath Wireless Networking and Communications.
Node Cooperation and Cognition in Dynamic Wireless Networks
Amplify-and-Forward in Wireless Relay Networks Samar Agnihotri, Sidharth Jaggi, Minghua Chen Institute of Network Coding The Chinese University of Hong.
Cooperation and Crosslayer Design in Wireless Networks Andrea Goldsmith Stanford University DAWN ARO MURI Program Review U.C. Santa Cruz September 12,
Network Coding Theory: Consolidation and Extensions Raymond Yeung Joint work with Bob Li, Ning Cai and Zhen Zhan.
Cross Layer Adaptive Control for Wireless Mesh Networks (and a theory of instantaneous capacity regions) Michael J. Neely, Rahul Urgaonkar University of.
Network Coding and Reliable Communications Group Algebraic Network Coding Approach to Deterministic Wireless Relay Networks MinJi Kim, Muriel Médard.
4/17/2017 UCSC: MIT: Stanford University: UC Berkeley: UCLA: UIUC:
1 40 th Annual CISS 2006 Conference on Information Sciences and Systems Some Optimization Trade-offs in Wireless Network Coding Yalin E. Sagduyu Anthony.
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
Coding Schemes for Multiple-Relay Channels 1 Ph.D. Defense Department of Electrical and Computer Engineering University of Waterloo Xiugang Wu December.
Network Alignment: Treating Networks as Wireless Interference Channel Chun Meng Univ. of California, Irvine.
Networking Seminar Network Information Flow R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. Network Information Flow. IEEE Transactions on Information.
Communication over Bidirectional Links A. Khoshnevis, D. Dash, C Steger, A. Sabharwal TAP/WARP retreat May 11, 2006.
Multiple-access Communication in Networks A Geometric View W. Chen & S. Meyn Dept ECE & CSL University of Illinois.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project FLoWS Overview and Update Andrea Goldsmith.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project FLoWS Progress and Next Steps Andrea Goldsmith Phase 3 Kickoff Sept ,
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2 Layerless Dynamic Networks Lizhong Zheng, Todd Coleman.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 3 Application Metrics and Network Performance Asu Ozdaglar and Devavrat.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 3 Application Metrics and Network Performance Asu Ozdaglar and Devavrat.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Overview of Research Activities Aylin Yener
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project FLoWS Overview and Update Andrea Goldsmith.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2: Layerless Dynamic Networks Lizhong Zheng.
Cooperative Wireless Networks Hamid Jafarkhani Director Center for Pervasive Communications and Computing
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrusts 0 and 1 Metrics and Upper Bounds Muriel Medard, Michelle Effros and.
Cooperative Communication in Sensor Networks: Relay Channels with Correlated Sources Brian Smith and Sriram Vishwanath University of Texas at Austin October.
Some new(ish) results in network information theory Muriel Médard RLE EECS MIT Newton Institute Workshop January 2010.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2 Overview: Layerless Dynamic Networks Lizhong Zheng.
Some Networking Aspects of Multiple Access Muriel Medard EECS MIT.
Superposition encoding A distorted version of is is encoded into the inner codebook Receiver 2 decodes using received signal and its side information Decoding.
Transmission over composite channels with combined source-channel outage: Reza Mirghaderi and Andrea Goldsmith Work Summary STATUS QUO A subset Vo (with.
EE360: Lecture 9 Outline Announcements Cooperation in Ad Hoc Networks
Local Phy + Global Routing: A Fundamental Layering Principle for Wireless Networks Pramod Viswanath, University of Illinois July, 2011.
Interference in MANETs: Friend or Foe? Andrea Goldsmith
The Scaling Law of SNR-Monitoring in Dynamic Wireless Networks Soung Chang Liew Hongyi YaoXiaohang Li.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project FLoWS Overview and Progress Andrea Goldsmith.
We aim to exploit cognition to maximize network performance What is the side information at a cognitive node? What is the best encoding scheme given this.
The High, the Low and the Ugly Muriel Médard. Collaborators Nadia Fawaz, Andrea Goldsmith, Minji Kim, Ivana Maric 2.
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrusts 0 and 1 Metrics and Upper Bounds Muriel Medard, Michelle Effros and.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 3 Application Metrics and Network Performance Asu Ozdaglar and Devavrat.
Scheduling Considerations for Multi-User MIMO
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
March 18, 2005 Network Coding in Interference Networks Brian Smith and Sriram Vishwanath University of Texas at Austin March 18 th, 2005 Conference on.
1)Effect of Network Coding in Graphs Undirecting the edges is roughly as strong as allowing network coding simplicity is the main benefit 2)Effect of Network.
The Capacity of Interference Channels with Partial Transmitter Cooperation Ivana Marić Roy D. Yates Gerhard Kramer Stanford WINLAB, Rutgers Bell Labs Ivana.
Optimization-based Cross-Layer Design in Networked Control Systems Jia Bai, Emeka P. Eyisi Yuan Xue and Xenofon D. Koutsoukos.
Impact of Interference on Multi-hop Wireless Network Performance
Joint Source, Channel, and Network Coding in MANETs
Layerless Dynamic Networks
ACHIEVEMENT DESCRIPTION
Ivana Marić, Ron Dabora and Andrea Goldsmith
Resource Allocation in Non-fading and Fading Multiple Access Channel
Distributed MIMO Patrick Maechler April 2, 2008.
Pradeep Kyasanur Nitin H. Vaidya Presented by Chen, Chun-cheng
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Application Metrics and Network Performance
ACHIEVEMENT DESCRIPTION
Towards characterizing the capacity of the building block of MANETs
Presentation transcript:

Information Theory for Mobile Ad-Hoc Networks (ITMANET) Thrust I Michelle Effros, Ralf Koetter, & Muriel Médard (and everyone!)

Capacity Delay Energy Upper Bound Lower Bound Capacity and Fundamental Limits Application Metrics Capacity Delay Energy/SNR Utility=U(C,D,E) End-to-End Performance and Network Utility (C*,D*,E*) Constraints Degrees of Freedom Models and Dynamics Application Metrics and Network Performance Layerless Dynamic Networks New Paradigms for Upper Bounds Models New MANET Theory MANET Metrics Metrics Fundamental Limits of Wireless Systems

Goals Characterize the performance potential of ITMANETs. Objectivity: Upper bounds provide an objective assessment of: How well current schemes are doing Where future efforts are best spent Utility: To be useful, upper bounds must be Concrete Computable Helpful Practical Generality: We seek general upper bounds to apply to Arbitrary networks Arbitrary demands Reality: Traditional assumptions are a poor match for ITMANETs.- to develop realistic upper bounds, we must master Delay Variability Non-ergodicity

Final goal Final objective: Network SPICE, “SPINE” (Simulation Program with Integrated Network Emphasis)

Traditional approaches – tools and results Tools: –Fano’s Inequality The information that we want to estimate must be determined by our evidence. –Min-cut Max-flow Theorem Information flow through a network is limited by the tightest bottleneck on the best routes. Results: –Small systems (e.g., relay channel) –Asymptotic results under assumptions re: structure and size (e.g., scaling laws)

Traditional approaches - results A simple 3-node network (Kramer et al.)

Traditional approaches - results

New approaches – overview and progress Network equivalences Code type equivalences Conflict graph presentation Hierarchical analyses

Network equivalences – original results

Network equivalences - progress

Code type equivalencies - conjecture Goal: Show that restricting the code type at all nodes of the network does not reduce the space of achievable results.

Conflict graph representation – connecting elements through codes A vertex represents a configuration of the network in terms of codes among components of the network –An edge between two vertices if the two configuration cause conflict (i.e. They cannot be served simultaneously). Stable Set: no edge connecting any pair of vertices in the set –Stable set of G → valid network configuration Koetter, Medard et al.

Analog network coding s1s1 s2s2 relay node 5 node 4 X1X1 X2X2 Y3Y3 Y4Y4 Y5Y5 X3X3 Y 3 =h 13 X 1 +h 23 X 2 +Z 3 W1W1 W2W2 Y 4 =h 14 X 1 +h 24 X 2 +h 34 X 3 +Z 4 Y 5 =h 15 X 1 +h 25 X 2 +h 35 X 3 +Z 5 Channel outputs relay Channel input at the relay X 3,n = f n (Y 3,n-1 …, Y 3,1 ) node 4 node 5 Analog network coding no delay Analog network coding Routing outer bounds Goldsmith, Medard, et al.

Scaling laws using multiple access Source-destination pairs relay traffic over dense squarelets Induces virtual multiple antenna multiple access and broadcast channels For the best communication scheme for ε > 0 arbitrarily small and for any2 < α 3 Thus scheme is order optimal for 2 < α < 3, so that decomposition is not detrimental in an order sense Squarelet acts as a component and interconnections occur among components, albeit in a multiple access fashion Shah, Gupta et al.

New bounding techniques Shah: multiple access decomposition for constructive scaling laws Achievements Overview Goldsmith, Medard, Katabi: Generalized joint relaying, combine symbols in PHY, bits, or network layer Koetter: likelihood forwarding, relay information before decoding Goldsmith: Interference channel with cognitive user, “asymmetric” cooperation Zheng: error exponents unequal error protection, embedded control messages to reduce overhead. Medard, Koetter: network coding capacity based on the notion of conflict graphs Moulin: covert channel by timing information Koetter, Effros, Medard: Equivalence classes of networks based on ability of a channel or a building block to emulate arbitrary channels Effros: A characterization of the source coding region of networks for “line networks” Code construction Network information theory Koetter, Effros: matroidal codes Networking and optimization Combinatorial Tools

Thrust Synergies: An Example Thrust 1 Upper Bounds Thrust 2 Layerless Dynamic Networks Capacity Delay Energy Upper Bound Lower Bound Thrust 3 Application Metrics and Network Performance Capacity Delay Energy (C*,D*,E*) Shah: multiple access decomposition for constructive scaling laws Goldsmith, Medard, Katabi: Generalized joint relaying, combine symbols in PHY, bits, or network layer Koetter: likelihood forwarding, relay information before decoding Koetter, Effros, Medard: Equivalence classes of networks based on ability of a channel or a building block to emulate arbitrary channels Medard, Koetter: network coding capacity based on the notion of conflict graphs

Roadmap Generalized equivalence results beyond point –to-point multiple access and broadcast components Derive bounds in cases where equivalence fails Conflict graphs for soft constraints such as multiple access constraints Schedule creation from conflict graph (thrust 3 interaction) Explore code-type equivalence conjecture Investigate code design implications of restricted code types

Publications S. Yang and R. Koetter, "Network Coding over a Noisy Relay : a Belief Propagation Approach", IEEE International Symposium on Information Theory (ISIT), 2007, Nice, France. J.-K. Sundararajan, Médard, M., Kim, M., Eryilmaz, A., Shah, D., and Koetter, R., “Network Coding in a Multicast Switch,” Proceeding of INFOCOM 2007, pp M. Kim, Sundararajan, J.-K., and Médard, M., “Network Coding for Speedup in Switches,” International Symposium on Information Theory (ISIT),2007, Nice, France V. Doshi, D. Shah, M. Médard, S. Jaggi, “Graph Coloring and Conditional Graph Entropy”, Asilomar Conference on Signals, Systems, and Computers,2006, Monterey, CA, pp V. Doshi, D. Shah, M. Médard, S. Jaggi, “Distributed Functional Compression through Graph Coloring”, Data Compression Conference (DCC), 2007, Snowbird, UT. V. Doshi, Shah, D., and Médard, M., “Source Coding with Distortion through Graph Coloring,” International Symposium on Information Theory (ISIT),2007, Nice, France. Y. Liang, A Goldsmith, M. Effros, "Distortion Metrics of Composite Channels with Receiver Side Information". I. Maric, A. Goldsmith, G. Kramer and S. Shamai (Shitz), "On the Capacity of Interference Channels with a Cognitive Transmitter", 2007 Workshop on Information Theory and Applications (ITA), Jan.29 - Feb. 2, Chris T. K. Ng and Andrea J. Goldsmith,“The Impact of CSI and Power Allocation on Relay Channel Capacity and Cooperation Strategies,” submitted to IEEE Transactions on Information Theory, I. Maric, A. Goldsmith, G. Kramer and S. Shamai (Shitz), "On the Capacity of Interference Channels with a Partially- Cognitive Transmitter", ISIT Chris T. K. Ng and Andrea J. Goldsmith, “Capacity and Cooperation in Wireless Networks,” Information Theory and Applications (ITA) Workshop, February 6–10, 2006, La Jolla, CA. (Invited) Chris T. K. Ng, Nihar Jindal, Andrea J. Goldsmith and Urbashi Mitra, “Capacity Gain from Two-Transmitter and Two-Receiver Cooperation,” accepted for publication in IEEE Transactions on Information Theory, M. Effros, A. Goldsmith and Y. Liang, "Capacity definitions of general channels with receiver side information",To appear, IEEE International Symposium on Information Theory M. Bakshi and M. Effros and W. Gu and R. Koetter, On network coding of independent and dependent sources in line networks, ISIT, 2007