Prediction-based Handoff in Heterogeneous Networks Bill Phillips 09 March 2007.

Slides:



Advertisements
Similar presentations
1 Mobility-Based Predictive Call Admission Control and Bandwidth Reservation in Wireless Cellular Networks Fei Yu and Victor C.M. Leung INFOCOM 2001.
Advertisements

Hash Tables CS 310 – Professor Roch Weiss Chapter 20 All figures marked with a chapter and section number are copyrighted © 2006 by Pearson Addison-Wesley.
An Array-Based Algorithm for Simultaneous Multidimensional Aggregates By Yihong Zhao, Prasad M. Desphande and Jeffrey F. Naughton Presented by Kia Hall.
Applied Algorithmics - week7
Michael Alves, Patrick Dugan, Robert Daniels, Carlos Vicuna
Quick Review of Apr 10 material B+-Tree File Organization –similar to B+-tree index –leaf nodes store records, not pointers to records stored in an original.
SIMS-201 Compressing Information. 2  Overview Chapter 7: Compression Introduction Entropy Huffman coding Universal coding.
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
IEEE PIMRC A Comparative Measurement Study of the Workload of Wireless Access Points in Campus Networks Maria Papadopouli Assistant Professor Department.
Mobility and Predictability of Ultra Mobile Users Jeeyoung Kim and Ahmed Helmy.
1 William Lee Duke University Department of Electrical and Computer Engineering Durham, NC Analysis of a Campus-wide Wireless Network February 13,
Analysis of a Campus-wide Wireless Network David Kotz Kobby Essien Dartmouth College September 2002.
Algorithm Programming Some Topics in Compression Bar-Ilan University תשס"ח by Moshe Fresko.
By Libo Song and David F. Kotz Computer Science,Dartmouth College.
BTrees & Bitmap Indexes
Tirgul 8 Universal Hashing Remarks on Programming Exercise 1 Solution to question 2 in theoretical homework 2.
Simulation.
Submission doc.: IEEE /1452r0 November 2014 Leif Wilhelmsson, EricssonSlide 1 Frequency selective scheduling in OFDMA Date: Authors:
Clustering Ram Akella Lecture 6 February 23, & 280I University of California Berkeley Silicon Valley Center/SC.
Source Coding Hafiz Malik Dept. of Electrical & Computer Engineering The University of Michigan-Dearborn
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1 Exact Set Matching Charles Yan Exact Set Matching Goal: To find all occurrences in text T of any pattern in a set of patterns P={p 1,p 2,…,p.
Modeling client arrivals at access points in wireless campus-wide networks Maria Papadopouli Assistant Professor Department of Computer Science University.
Presented by Tao HUANG Lingzhi XU. Context Mobile devices need exploit variety of connectivity options as they travel. Operating systems manage wireless.
By Ravi Shankar Dubasi Sivani Kavuri A Popularity-Based Prediction Model for Web Prefetching.
1 Pattern Matching Using n-grams With Algebraic Signatures Witold Litwin[1], Riad Mokadem1, Philippe Rigaux1 & Thomas Schwarz[2] [1] Université Paris Dauphine.
Noiseless Coding. Introduction Noiseless Coding Compression without distortion Basic Concept Symbols with lower probabilities are represented by the binary.
15-853Page :Algorithms in the Real World Data Compression II Arithmetic Coding – Integer implementation Applications of Probability Coding – Run.
Research Methods in Psychology
Symbol Tables Symbol tables are used by compilers to keep track of information about variables functions class names type names temporary variables etc.
Dynamic Load Balancing through Association Control of Mobile Users in WiFi Networks 2013 YU-ANTL Seminal November 9, 2013 Hyun dong Hwang Advanced Networking.
Optimal Degree Distribution for LT Codes with Small Message Length Esa Hyytiä, Tuomas Tirronen, Jorma Virtamo IEEE INFOCOM mini-symposium
Page 110/6/2015 CSE 40373/60373: Multimedia Systems So far  Audio (scalar values with time), image (2-D data) and video (2-D with time)  Higher fidelity.
Demo. Overview Overall the project has two main goals: 1) Develop a method to use sensor data to determine behavior probability. 2) Use the behavior probability.
Ahmed Helmy, USC1 State Analysis and Aggregation for Multicast-based Micro Mobility Ahmed Helmy Electrical Engineering Department University of Southern.
Find regular encounter pattern from mobile users. Regular encounter indicates an encounter trend that is repetitive and consistent. Using this metric can.
Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic Minho Sung Networking & Telecommunications Group College.
Approximate Encoding for Direct Access and Query Processing over Compressed Bitmaps Tan Apaydin – The Ohio State University Guadalupe Canahuate – The Ohio.
Analysis of Branch Predictors
1 Strings CopyWrite D.Bockus. 2 Strings Def: A string is a sequence (possibly empty) of symbols from some alphabet. What do we use strings for? 1) Text.
The Pumping Lemma for Context Free Grammars. Chomsky Normal Form Chomsky Normal Form (CNF) is a simple and useful form of a CFG Every rule of a CNF grammar.
Generic Approaches to Model Validation Presented at Growth Model User’s Group August 10, 2005 David K. Walters.
Cryptographic Attacks on Scrambled LZ-Compression and Arithmetic Coding By: RAJBIR SINGH BIKRAM KAHLON.
Multimedia Data Introduction to Lossless Data Compression Dr Sandra I. Woolley Electronic, Electrical.
1 Pattern Matching Using n-gram Sampling Of Cumulative Algebraic Signatures : Preliminary Results Witold Litwin[1], Riad Mokadem1, Philippe Rigaux1 & Thomas.
Compression.  Compression ratio: how much is the size reduced?  Symmetric/asymmetric: time difference to compress, decompress?  Lossless; lossy: any.
Faster Algorithm for String Matching with k Mismatches (II) Amihood Amir, Moshe Lewenstin, Ely Porat Journal of Algorithms, Vol. 50, 2004, pp
Lossless Compression CIS 465 Multimedia. Compression Compression: the process of coding that will effectively reduce the total number of bits needed to.
Introduction to Algorithms Chapter 16: Greedy Algorithms.
Analysis of Topic Dynamics in Web Search Xuehua Shen (University of Illinois) Susan Dumais (Microsoft Research) Eric Horvitz (Microsoft Research) WWW 2005.
CSCI 6461: Computer Architecture Branch Prediction Instructor: M. Lancaster Corresponding to Hennessey and Patterson Fifth Edition Section 3.3 and Part.
Data Compression Meeting October 25, 2002 Arithmetic Coding.
The Changing Usage of a Mature Campus-wide Wireless Network CS525m – Mobile and Ubiquitous Computing Andrew Stone.
Wireless Trace Analysis. Project Goals Summary of project goals: First goal: analyze wireless access patterns Second goal: implement Markov predictor.
IMPORTANCE OF STATISTICS MR.CHITHRAVEL.V ASST.PROFESSOR ACN.
An importer of Herbs and Spices claims that average weight of packets of Saffron is 20 grams. However packets are actually filled to an average weight,
Discrete Random Variables. Introduction In previous lectures we established a foundation of the probability theory; we applied the probability theory.
Lecture 7 Source Coding and Compression Dr.-Ing. Khaled Shawky Hassan
1 CS 430: Information Discovery Lecture 5 Ranking.
Prof. Paolo Ferragina, Algoritmi per "Information Retrieval" Basics
Huffman code and Lossless Decomposition Prof. Sin-Min Lee Department of Computer Science.
1 IP Routing table compaction and sampling schemes to enhance TCAM cache performance Author: Ruirui Guo, Jose G. Delgado-Frias Publisher: Journal of Systems.
Lampel ZIV (LZ) code The Lempel-Ziv algorithm is a variable-to-fixed length code Basically, there are two versions of the algorithm LZ77 and LZ78 are the.
Online Sequential Prediction via Incremental Parsing: The Active LeZi Algorithm Source: IEEE Intelligent Systems, 22(1), pp , 2007 Authors: Karthik.
CSE 589 Applied Algorithms Spring 1999
Applied Algorithmics - week7
CS 704 Advanced Computer Architecture
Authors Bo Sun, Fei Yu, Kui Wu, Yang Xiao, and Victor C. M. Leung.
Samples and Populations
Presentation transcript:

Prediction-based Handoff in Heterogeneous Networks Bill Phillips 09 March 2007

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 2 Outline General motivation Dartmouth large-scale Wi-Fi study Predictors –Markov –LZ –PPM –SPM Discussion of Dartmouth results References

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 3 Motivation Accurate mobile user location prediction facilitates: –Smoother session handoff –Improved network resource allocation –Better mobility management –Enhanced assignment of cells to location areas –More efficient paging –Decreased infrastructure costs No location predication: resources potentially reserved in each cell Location predication: resources reserved in only cell B AA B

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 4 Dartmouth Wi-Fi Study Data collected from April 2001 – May 2003 from Dartmouth Wi-Fi campus network Over 6,000 WLAN users –Average of 3,000 users active each day 543 access points cover entire campus (interior and exterior) Recorded registered access point every 5-seconds by MAC address –Not physical location of user –Not physical movement of user Analyzed 4 domain-independent predictors –Markov –Lempel-Ziv Algorithm (LZ) –Prediction by Partial Matching (PPM) –Sampled Pattern Matching (SPM)

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 5 Dartmouth Campus 200 acres 161 buildings –82 residential –32 academic –6 library –19 recreational –22 administrative b WLAN 543 APs 81 Subnets 400 feet

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 6 Test Environment Wireless network included all offices, classrooms, dorm rooms, and athletic/recreational facilities All students required to have a computer, 70% laptop. Indoor AP range feet Dartmouth population: 5,500 students & 1,215 faculty Residential – dominated all traffic A few APs never received any traffic due to remoteness, malfunction, or misconfiguration Data collection: syslog events (3.5 million records), SNMP polling (193 million records), and tcpdump sniffers (22 APs, all packet headers)

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 7 Format of data collection Domain-Independent measurements: –Only changes in location are recorded –No time data –No geographic data, no association between access points, mobile users, and geographic coordinates Sample cell map & Sample location history: L = gbdcbgcefbdbde(off)ecd g b c d e f

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 8 Distribution of data collected 50% of users had a trace length smaller than 500 points 50% of users had a trace length greater than 500 points 50% of users visited less than 25 APs 50% of users visited more than 25 APs CDF: # users vs trace length CDF: # users vs # APs visited X X Half the WLAN users remained in a fairly small subset of the overall network

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 9 Markov Predictors Order-k Markov predictors, O(k), assume that the next location can be predicted using the last k locations. Example: L = abacbcbcabab… –O(1): P(a|b) = 1/2, P(b|b) = 0, P(c|b) = 1/2 O(1) Markov predictor would not know whether to choose a or c as the next location –O(2): P(a|ab) = 1, P(b|ab) = 0, P(c|ab) = 0 O(2) Markov predictor would choose a as the next location Probabilities are represented by a transition probability matrix, M. Using the O(1) example: After each prediction, history is incremented, and M is recalculated Moving from this state into this state Rows always sum to 1

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 10 Lempel-Ziv (LZ) Predictors Often used in text compression (UNIX compress, WinZip) Consider the text compression implementation first Initialize dictionary with length 1 blocks Encode entry with index Add 1 to the length of the previously encoded entry, and enter into dictionary a b b a a b b a a b a b b a a a a b a a b b a Dictionary IndexEntryIndexEntry 0 a 7 baa 1 b 8 aba 2 ab 9abba 3 bb 10 aaa 4 ba 11 aab 5 aa 12baab 6 abb 13 bba repeat

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 11 Lempel-Ziv (LZ) Predictors Parses string into unique substrings from left to right Each new substring differs in length by only 1 from a previously listed substring Example: L = abacbcbcaba –Substrings:  a, b, ac, bc, bca, ba Substrings are commonly represented by a LZ tree that includes measurement frequency. Predication occurs by using the relative frequency of substrings Empty String  a:2 b:4 c:1 c:2 a:1  is an empty string

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 12 Lempel-Ziv (LZ) Predictors Prediction probability is dependent on the prefix frequency Example: L = abacbcbcaba … –Substrings:  a, b, ac, bc, bca, ba Prefixes: –a (2 times) –b (4 times) –bc (2 times) P(a|L) = 1/4, P(b|L) = 1/2, P(bc|L) = 1/4 Empty String  a:2 b:4 c:1 c:2 a:1

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 13 Prediction by Partial Matching (PPM) Used in text compression Similar to Markov predictors in that a variable subset, k, of past measurements is used to predict the next location Differs from Markov predictors in that only the last immediate k measurements are used for the prediction PPM constructs multiple O(k) Markov models for this subset of k measurements, and blends them into a singel prediction Example: L = … abdcada O(6) PPM uses the last 6 measurements, and O(1 to 6) Markov predictors to determine that the next most like value is a

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 14 Sampled Pattern Matching (SPM) Sampled Pattern Matching Similar to Markov predictors, but with a variable order that depends on the longest common substring Example: acabcdcabcbabc –Longest substring = abc (length n) –The variable order O(k=  /n) depends on  where 0 <  <1 –  = 1/3, yields a O(1) Markov predictor –  = 2/3, yields a O(2) Markov predictor This process is repeated for each user after each predication = Computationally intensive  is a predetermined, fixed constant

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 15 Tie Breaking At times the prediction algorithm has equal probability of choosing two different outcomes. The following are 3 tie breaking techniques: –First added: use the location that appears first in the location history –Most recently added: (opposite of first added) use the location that does not appear first in the location string –Most recent: use the location that was most recently visited by the mobile user The Dartmouth study showed no difference in prediction between any of the 3 methods, so the first added technique was used L = acabcbab... a if using first added c if using most recently added a if using most recent Predicted value Assuming equal probability of predicting a or c

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 16 Markov Results This figure shows that the accuracy of Markov prediction improved with larger samples (rightmost curve) O(2) was the best predictor (rightmost curve, above) O(2) out-performed O(3) and O(4) Among 543 access points, pattern lengths of 3 or 4 were not as common as 2 Most accurate for location histories greater than 1000 (35% of users)

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 17 Markov fine-tuning Investigated potential improvements to the O(2) Markov predictor in the case that the algorithm could make no prediction (i.e. encountered a new location pair) –Fallback to O(1) –Fallback to most frequently used location –Time aided prediction (classrooms during the day/dining halls, recreational facilities at night) O(2) with fallback to O(1) was the best performer Time aided prediction topic for future study

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 18 Other Predictors LZ performed well, but not as good as Markov O(2) LZ PPM SPM PPM performed equally well at O(2), O(3), O(4), and O(5), so number of previously considered locations did not seem to matter once greater than 2 SPM performed marginally better at  = 0.5, but not as well as Markov O(2) with O(1) fallback  = 0.5 is a good balance between too much and too little information

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 19 Conclusion More computationally complex predictors yielded results that were at best equivalent to the simpler Markov model, O(2) with O(1) fallback All predictors (Markov, LZ, PPM, SPM) faired poorly with movement histories under 100 (not enough samples) There was negligible improvement for trace lengths greater than 1000 locations Best predictor, Markov O(2) with O(1) fallback –Median prediction accuracy of 63% overall –Median prediction accuracy of 72% for location histories exceeding 1000 –Not known whether this is the optimal predictor for longer traces, or once time dependent measurements are considered

March 9, 2007Prediction-based Handoff in Heterogeneous Networks 20 References David Kotz, and Kobby Essien, “Analysis of a Campus- wide Wireless Network,” MOBICOM ’02, Sep 23-26, Libo Song, David Kotz, Ravi Jain, and Xiaoning He, “Evaluating Next-Cell Predictors with Extensive Wi-Fi Mobility Data,” IEEE Transactions on Mobile Computing, vol. 5, no.12, pp , Dec Leon-Garcia, Alberto. Probability and Random Processes for Electrical Engineering, Addison Wesley,