General Theory of Wireless Networks with Side Information Ahmad Khoshnevis, Debashis Dash Rice University Nokia Seminar February 10, 2006.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

PHY-MAC Dialogue with Multi-Packet Reception Workshop on Broadband Wireless Ad-Hoc Networks and Services 12 th -13 th September 2002 ETSI, Sophia Antipolis,
Interprocess Communication CH4. HW: Reading messages: User Agent (the user’s mail reading program) is either a client of the local file server or a client.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Analog Network Coding Sachin Katti Shyamnath Gollakota and Dina Katabi.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
A Transmission Control Scheme for Media Access in Sensor Networks Lee, dooyoung AN lab A.Woo, D.E. Culler Mobicom’01.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Medium Access Control in Wireless Sensor Networks.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
Performance Measurement and Management IACT 418 IACT 918 Corporate Network Planning.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
1 TDMA Scheduling in Competitive Wireless Networks Mario CagaljHai Zhan EPFL - I&C - LCA February 9, 2005.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Model and tools. Traffic Model Poisson law – Napoléon worries about the statistics of horse accidents of his generals – Poisson confirms these are unfrequent.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Communication over Bidirectional Links A. Khoshnevis, D. Dash, C Steger, A. Sabharwal TAP/WARP retreat May 11, 2006.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
Link Layer: Wireless Mesh Networks Capacity Y. Richard Yang 11/13/2012.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Message-Passing for Wireless Scheduling: an Experimental Study Paolo Giaccone (Politecnico di Torino) Devavrat Shah (MIT) ICCCN 2010 – Zurich August 2.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Medium Access Control Sub Layer
Multiple Access.
Chapter 6 Multiple Radio Access
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
End-to-End Performance and Fairness in Multihop Wireless Backhaul Networks V. Gambiroza, B. Sadeghi, and E. Knightly Rice University.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Wireless Networks with Limited Feedback: PHY and MAC Layer Analysis PhD Proposal Ahmad Khoshnevis Rice University.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
COSC 6590 Fall Multi-channel, multi-radio wireless networks.
Wireless Sensor Networks 4. Medium Access
Medium Access Control Protocols
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Make Random Access Contentions Transparent by Orthogonal Complementary Codes in Wireless Communications Xiaohua (Edward) Li Department of Electrical and.
Communication Networks NETW 501
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Goal Control the amount of traffic in the network
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Multi-channel, multi-radio
Chapter 6 Multiple Radio Access.
Multiple Access Control (MAC) Protocols
Is Random Access Fundamentally Inefficient?
Presentation transcript:

General Theory of Wireless Networks with Side Information Ahmad Khoshnevis, Debashis Dash Rice University Nokia Seminar February 10, 2006

Wireless Networks High data rate –WiMax, Mesh –802.11x –4G Irony –Current protocols such as cause 30-50% non-data communication (overhead) First question: Is existence of protocols necessary?

Why Protocols? Queues have time-varying state –Might be empty sometimes In effect, # of active nodes is time varying Design for Max # of user is conservative –Underutilized network for many traffic “Active” management of queue states = Medium Access Protocols q2q2 q1q1 S1S1 S2S2 q3q3 S3S3

How Much Overhead? Second Question: What is the minimum amount of overhead? How can it be reduced?

Observation If S 1 knows q 2 and S 2 knows q 1 –No need for handshaking –TDMA scheduling –No collision As load increases –Probability of queue empty reduces –Network utility increases Having the “side information” about Queue states, increases the utilization 1 2 q2q2 q1q1 S1S1 S2S2 D

Implementation of the idea Perfect carrier sense  no collision While q1 and q2 non empty –TDMA guarantees no collision When –q1 and q2 are empty –|t1-t2| <  –Collision happens Collision resolution takes resources –Modeled as wasted time,  c Probability of Collision is determined by probability of q1=q2=  q1q1 S1S1 1 2 q2q2 S2S2 D t S2S2 S1S1 t1t1 t2t2 cc

Performance

Generalization In general “side information” –Queue state –Number of nodes –Battery life, … Catch The “side information” is not of interest, data is Gathering “side information” requires resources –Perfect information causes a lot of overhead –Partial information gives more room for data, but more uncertainty

Fundamental Tradeoff There is a tradeoff between amount of side information and total throughput of a network. What is the maximum data rate for a given amount of side information?

New Source Model There are two information need to be transmitted –The actual data, M –The source state, S The message –Conveys useful information –Need to be sent error free The source state –Can’t be sent perfectly (takes all the capacity) –The rate of source information is controlled by distortion between S and S’ M SS’ X S.Enc C.Enc New Source Model

Channel Model Discrete memoryless channel The channel is described by P{Y|X 1,X 2 }

Formulating the Problem

Additional Insights Particularly in our approach –Generalization of side information & being independent of interpretation –Addressing penalty associated with knowing side information Considered in earlier models –Is extendable to a network with arbitrary number of users –Simultaneously can answer both question Total network throughput Per user throughput

Road Map Improving the Model –More interesting case is conferencing Find I(M 1,M 2 ;Y|S’ 1,S’ 2 ) Properties of solution space and possible solution for special cases