Download presentation
Presentation is loading. Please wait.
Published byAdele Harmon Modified over 9 years ago
1
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 1
2
Unequal Error Protection: Application and Performance Limits END-OF-PHASE GOAL COMMUNITY CHALLENGE ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS “ bits” as the universal measure of information and interface to physical layer: a homogenous view. High priority control messages are sent over separated channels. No performance limits on UEP Perfect reliability assumed on network controls Joint coding allows flexible resource allocation; Priority of critical data in the form/costs of better error protections; Global optimization of resource allocation among heterogeneous data; MAIN RESULT: Optimizing the overall resource, the reliability of control signals has a threshold effect; Communicating at capacity, not even a single bit can be protected with positive exponent; Message-wise prioritization yields better tradeoffs than bit-pipe partitioning. HOW IT WORKS: Protecting special message is much easier than special bit; With feedbacks, a two-phase scheme can be used, where critical message is used to initiate retransmissions; Complete UEP tradeoff with geometric approach Data driven network controls, Layering and QoS as interface New interface to the physical layer leads to more flexible higher layer functionalities, and system level optimizations; the new interface also needs to be backward compatible to bit based networks Embedding control messages/significant data with UEP S. Borade, B. Nakiboglu, L. Zheng Better tradeoff in UEP has significant effects on overall system performance
3
Towards Strong Converses for MANETs: Moulin New tools are needed to derive tighter outer bounds on capacity regions MAIN ACHIEVEMENT: Derived capacity region for multiple-access Gelfand-Pinsker channel. The GP channel models transmission in the presence of known interference HOW IT WORKS: A set of typical channel outputs is defined. A sphere packing analysis is conducted to bound the number of codewords that can be packed based on the requirement that the error probability is small for exponentially many codewords. The approach is based on elementary statistics of the difference between empirical mutual informations (aka “self-informations” of codewords, or “information densities”) ASSUMPTIONS AND LIMITATIONS: Memoryless channel, but this is not a fundamental limitation of the approach This has been verified for a few problems (Verdu’s information spectrum, and Moulin’s fingerprinting problem) The conventional approach used for deriving (weak) converses, based on Fano’s inequality, is insufficient. There remains a gap between inner (achievable) and outer rate regions. For MACs, the strong converse with maximum-error criterion seems to be more tractable than average-error criterion Some creativity is needed to guess a suitable reference distribution over output space The approach could potentially be extended to the broadcast channel and possibly to complex networks First item planned. Extend approach to degraded broadcast channel. Second item planned. Extend approach to more complex networks. Extend this technique to more general networks IMPACT NEXT-PHASE GOALS [UPPER BOUNDS] STATUS QUO NEW INSIGHTS
4
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2
5
Understand how to combine code synchronization into the design of communication networks with Markov dynamics Identify classes of inhomogeneous indecomposable FSCs for which feedback achieves the maximum over all initial states Indecomposable Finite-State Channels With Feedback Ron Dabora and Andrea Goldsmith Introduce the notion of “weakly indecomposable” FSCs, i.e., FSC that are indecomposable only without feedback Capacity of indecomposable FSCs with feedback can be found without searching over all channels states Coding schemes that incorporate Tx-Rx synchronization into the code can achieve the maximum over all states for certain indecomposable channels Most communication channels are subject to correlated time variations MAIN ACHIEVEMENT: We identified classes of practical channels that can be modeled as indecomposable FSCs. We showed that their capacity with feedback is equal to the maximum over all channel states. HOW IT WORKS: We identified classes of practical channels that can be modeled as indecomposable FSCs. We showed that their capacity with feedback is equal to the maximum over all channel states. ASSUMPTIONS AND LIMITATIONS: The previous state contains all the past information. The current output and state depends on both the current input and previous state. Many practical communication channels are represented as inhomogeneous indecomposable FSCs When feedback is present, the capacity of indecomposable channels does not achieve the maximum over all states. Extension to multiuser channels with feedback Translation of the results obtained for the discrete channel to Gaussian channels with ISI and feedback IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS Finite-State Channel Tx Rx XiXi Y i-1 p(y i,s i |x i,s i-1 ) S i-1 SiSi D YiYi
6
New results on broadcast and secrecy capacity without relying on explicit degradation assumptions. New results on mutual information and estimation beyond the AWGN channel and squared error criterion. Mutual information and estimation in channels of exponential family type: Coleman and Raginsky Many channels have this exponential family structure. Can connect information theory to estimation theory and statistics. Exploit maximum entropy character of exponential families Instead of degradation, exploit the -monotonicity of information gain New insights into information/estimation lead to robust design principles for MANETs. MAIN ACHIEVEMENT: Analysis of dependence of mutual information on channel quality reduces to an estimation-theoretic problem with distortion function ( x,y ) HOW IT WORKS: Structure of E-type channels leads to a dual estimation-theoretic characterization of mutual information as the minimum rate needed to describe the channel output with a given constraint on E [ ( X,Y )] We can leverage this duality to prove monotonicity of I(X;Y) w.r.t. under an additional (reasonable) assumption on the behavior of posterior estimators ASSUMPTIONS AND LIMITATIONS: For a general E-type channel, can prove montonicity of mutual info only in high-SNR (high- ) regime How does channel quality impact performance? Need to explicitly assume channel family is ordered by degradation Need to check appropriate conditions on case-by-case basis Explore connections between information theory and statistics of E-type channels to obtain new performance results in the network setting. IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS
7
Provides explict capacity- achieving recursvie encoders for degraded broadcast channels Can be extended to many networks with tight converses Dynamics and Control Principles for Feedback Encoder Designs Coleman Converse to coding theorems with feedback directly guides us how encoders should operate State of the system is posterior distribution on message given Feedback encoder should be interpreted as a controller, trying to drive state to certainty. Formulate a stochastic control problem and find optimal policy Use Stochastic Control methodology for a principled, canonical approach to address:: noisy feedback (POMDP) Unknown channel (Q-learning) Delayed feedback A Canonical Controls Methodology to Design Iterative Feedback Coding Systems in MANETs MAIN RESULT: IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS The use of feedback is of the utmost importance in designing scalable, robust, reliable communication schemes Design principles for provably good iterative feedback encoders (essentially) limited to Gaussian scenarios ASSUMPTIONS AND LIMITATIONS: Noiseless feedback Memoryless Channels HOW IT WORKS: Converse theorems specify a stochastic control problem. An optimal policy implies the existence of a Lyapunov function The KL divergence acts as a Lyapunov function on the state of the system This directly implies achievabililty of all rates in capacity region with this explicit iterative encoding scheme 101 111 Stochastic Control and Lyapunov theory combined with converse theorems provide a canonical methodology to design low-complexity iterative encoders with feedback in MANETs that achieve capacity 101 111 XnXn Y 1 …. Y n
8
Found optimal ARQ protocol in multihop MIMO relay networks. Characterized DMDT surfaces provide insights for practical optimal ARQ protocols design. Optimal ARQ Protocol For Multihop MIMO Relay Networks Yao Xie, Deniz Gunduz, Andrea Goldsmith We characterize the diversity- multiplexing-delay tradeoff (DMDT) surface for various ARQ protocols Theorem: the fractional variable ARQ protocol achieves optimal DMDT “Relay should talk ASAP” ARQ provides one more dimension of tradeoff in MIMO relay networks. MAIN RESULTS 3D DMDT Surfaces for Various ARQ protocols ((4,1,3) system) ASSUMPTIONS AND LIMITATIONS: Long-term/short-term static channel Total number of ARQ rounds is L Decode-and-forward relaying strategy Channel state information at Rx, Rayleigh Fading Special cases: closed form DMDT; general case: DMDT solved using convex optimization Optimal ARQ protocol for general relay network Effects of power control Joint source-channel coding in MIMO relay network IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS What is the rate-reliability- delay tradeoff in multihop MIMO relay network? Block Variable ARQ Fractional Variable ARQ L = 1 L = 10 Long-term Short-term How it works: ARQ protocols in ARQ MIMO relay networks (2,2,2) system There are Diversity-multiplexing tradeoff (DMT) analysis for relay channel Diversity-multiplexing-delay tradeoff (DMDT) for point-to-point MIMO with ARQ ARQ 1 ARQ 2 H1 H2 diversity rate Fractional variable Block variable diversity rate Optimal Operational Point
9
Consider inter and/or intra cluster reception Combine structured and random codes Characterize non- symmetric achievable rate points Exact capacity regions are hard to obtain even with three nodes. Random codes are capacity achieving for many models. Decode-and-forward relaying used in most practical systems. The Multi-Way Relay Channel Deniz Gündüz, Aylin Yener, Andrea Goldsmith and Vincent Poor Joint source-channel coding techniques to achieve higher rates Structured codes might provide higher rates than random coding in some networks - Can we scale structured codes to multiple users? - Design of practical codes based on joint source-channel coding techniques Compress-and-forward relaying achieves symmetric rates within a constant gap of capacity. This gap decays with increasing number of users. MAIN RESULT: MODEL: Clusters of users: Each user in a cluster wants messages of all other users in the same cluster. Communication is enabled by the relay. ASSUMPTIONS AND LIMITATIONS: No signal received from other users Symmetric capacity for a symmetric system is analyzed * Achievable symmetric rate is characterized and compared to the upper bound END-OF-PHASE GOAL COMMUNITY CHALLENGE FLOWS & NEQUIT ACHIEVEMENT STATUS QUO NEW INSIGHTS
10
Novel network coding strategy for TDD Use of feedback (ACK) improves delay/energy/ throughput performance, especially for high latency- high errors scenarios Random linear coding allows extension to networks Random Linear Network Coding for Time Division Duplexing (TDD) Lucani, Médard, Stojanovic Extend broadcast: effect of clusters of cooperative nodes Sensitivity analysis Extend to general network scenario Feedback, coding and optimal choice of transmission time minimizes delay, while keeping throughput performance similar or better than typical TDD ARQ schemes MAIN RESULTS: Novel network coding scheme for TDD channels 1. Delay and Energy Analysis for Link and Broadcast cases 2. Exists optimal transmission time in terms of minimizing block delay, with close-to-optimal energy performance. 3. Outperforms Selective Repeat schemes in high latency- high error scenarios. Similar performance otherwise. 4. Delay/throughput is close to full duplex network coding, requiring much less energy IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS Network coding has studied throughput or delay performance considering minimal feedback TDD has used ARQ/FEC schemes ASSUMPTIONS AND LIMITATIONS: Random linear coding, prior knowledge/estimate of propagation delay and errors HOW IT WORKS: 1. Transmission time computed to minimize delay in data block transmissions, using ACK and channel conditions 2. Stop transmission to wait for ACK from receiver (s). ACK used to update transmission time 1. Use feedback to improve delay performance: ACK states required number of coded packets to decode data 2. Transmit coded packets for some time, stop to wait for ACK 3. Transmission time depends on ACK and channel conditions: Exists optimal choice Cluster Network
11
Three-layer scheme dominates previous double-layer schemes Distortion-diversity tradeoff provides useful comparison in different operating regions Layered Source-Channel Schemes: A Distortion-Diversity Perspective: Medard, Zheng Diversity can be achieved through source coding techniques, like multiple description codes We characterize source-channel schemes with distortion-diversity tradeoff Distortion-diversity tradeoff better characterizes layered source-channel schemes MAIN ACHIEVEMENT: A three-layer source-channel scheme, which includes previous multi-resolution-based and multi-description-based schemes as special cases HOW IT WORKS: Multi-description source code with a common refinement component Superposition coding with successive interference cancellation Joint source-channel decoding exploits source code correlation ASSUMPTIONS AND LIMITATIONS: Quasi-static block-fading channel Receivers have perfect channel state information, but the transmitter only has statistical knowledge of the channel Conventional source-channel scheme achieves a single level of reconstruction Diversity is usually achieved in the channel coding component Extend multi-description-based source-channel scheme while preserving the interface between source and channel coding More general channel model IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS
12
The Capacity Region of the Cognitive Z-interference Channel with a Noiseless Non-cognitive Link The Capacity Region of the Cognitive Z-interference Channel with a Noiseless Non-cognitive Link Nan Liu, Ivana Marić, Andrea Goldsmith and Shlomo Shamai In some scenarios, interference can be minimized by exploiting the structure of interference and cognition at the nodes. Cognition should be used by the encoder to precode against part of the interference caused to its receiver. Encoding scheme was proposed that exploits cognition and is optimal in certain scenarios MAIN ACHIEVEMENT: 1) The capacity region of the discrete cognitive Z- interference channel with a noiseless non-cognitive link 2) An inner and outer bound for the cognitive Z-interference channel 3) Solution to the generalized Gel’fand- Pinsker (GP) problem in which a transmitter- receiver pair communicates in the presence of interference non causally known to the encoder. Our solution determines the optimum structure of interference. HOW IT WORKS: Non-cognitive encoder uses superposition coding to enable partial decoding of interference. The cognitive encoder precodes against the rest of interference using GP encoding. ASSUMPTIONS AND LIMITATIONS: The considered channel model: Evaluate a numerical example Apply proposed encoding scheme to larger networks and to different cognitive node models IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS Capacity of networks with cognitive users are unknown. Consequently, optimal ways how to operate such networks are not understood, nor it is clear how cognitive nodes should exploit the obtained information. IT channel models suitable for networks with cognitive users still need to be proposed. Capacity of Z-interference channel is still unknown. Z-interference channel 1) Optimal scheme for some channels 2) Superposition coding and Gel’fand-Pinsker coding may be required in order to minimize interference, in some channels. This is in contrast to the Gaussian channel. 3) For the GP problem, the optimal interference has a superposition structure dest1 dest2 cognitive encoder non-cognitive encoder W 1, W 2 W2W2 W1W1 W2W2 dest1 dest2 source 1 source 2 W1W1 W2W2 W1W1 W2W2
13
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrusts 1&2
14
Relaying for Multiple Communicating Pairs Ivana Marić, Ron Dabora and Andrea Goldsmith In networks with multiple sources, relays can help beyond forwarding useful information, by increasing interference at the receivers. This allows receivers to decode the interference and cancel it prior to decoding their desired messages A relaying strategy for networks with multiple sources that can improve rates and achieve capacity in certain scenarios proposed. A tighter sum-rate bound on the performance developed. MAIN ACHIEVEMENT: 1) Achievable rate region for the interference channel with a relay channel 2) Strong interference conditions under which forwarding messages and interference achieves capacity 3) A new sum-rate outer bound to the performance HOW IT WORKS: The relay forwards an unwanted message, thus increasing the interference at the receiver. This allows the receiver to decode and cancel the interference. For the outer bound: a genie enables receiver to decode both messages ASSUMPTIONS AND LIMITATIONS: The considered channel model: the interference channel with a relay Simple encoding schemes investigated Consider interference forwarding in combination with other encoding strategies Apply interference forwarding and the outer bound to larger networks IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS Several relaying strategies for forwarding information to a single receiver exist Capacity of networks are still unknown; one of the key obstacles: how to handle and exploit interference? How to relay for multiple sources? Traditional approach: routing 1) Interference forwarding can increase rates 2) A tighter outer bound relay dest1 dest2 source 1 source 2
15
We derive the optimal achievable rate for MISO secondary users under coexistence constraints We propose practical strategies for cognition and cooperation in MIMO systems We find the relation between secondary user’s achievable rate and primary user’s power allocation scheme Cooperation and cognition in MIMO cognitive networks Ying Chang and Andrea Goldsmith Decompose the MIMO channel into orthogonal components and leverage secondary user’s beneficial and deteriorative impact to the primary user. Introduce cooperation to broadcast system In MIMO networks, we are more flexible to deal with interference MAIN ACHIEVEMENT: HOW IT WORKS: Secondary user has non causal knowledge of primary users’ transmission and performs cognition together with cooperation to compensate the interference to primary receiver. We study the cases with MISO and MIMO secondary transmission system and multiple primary receivers. ASSUMPTIONS AND LIMITATIONS: Primary users’ transmission rate is unchanged In literature, achievable rates of single-antenna secondary user is well studied How to do cooperation and cognition with multiple antennas and multiple primary users is our main focus Study multiple primary receivers with multiple antennas Information theoretical bounds on MIMO cognitive networks IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS MISO, single primary user MISO multiple primary users MIMO Single primary user How to utilize new degrees of freedom brought by MIMO technique? Single-primary-user cognitive network Multi-primary-user cognitive networks System model We consider a MIMO cognitive network as shown below. The cognitive transmitter determines its codeword as a function of the messages m p and m c. MISO cognitive user In this case, we have a MISO cognitive transmission pair. We propose an optimal transmission strategy for the cognitive user which projects its beamforming vector onto orthogonal and aligned channel components. The relation between the primary user’s rate and cognitive user’s rate is as follows: To not impact the transmission rate of primary (licensed) user, the cognitive user performs cooperation to compensate the interference it causes to the primary user. Encoding rule for the cognitive user: The cognitive encoder acts in two stages. For every message pair (m p, m c ), the cognitive encoder first generates a codeword for the primary message m p. In the second stage, the cognitive encoder generates a codeword for m c using Costa pre-coding. The two codewords are superimposed to form the cognitive codeword. MIMO cognitive user In this case, we have a MIMO cognitive transmission pair. We propose two sub-optimal transmission strategies for the cognitive user: Direct Channel SVD (D-SVD) The precoding matrix is obtained from the SVD of the cognitive user’s channel Projected Channel SVD (P-SVD) The cognitive user’s channel is projected onto the null space of the channel between the cognitive transmitter and primary receiver. Than SVD is performed on the projection. Under different power constraint, the performances of the two strategies are compared with the MIMO channel capacity. In this case, the primary transmitter broadcasts to several primary receivers. To maintain the capacity region of primary users, the cognitive user cooperate with each primary receiver. Power allocation scheme is developed for MISO and MIMO cognitive user. When the capacity region of the primary broadcast channel is achieved, the transmission rate for the cognitive user is as follows: Interestingly, we find out the relation between the primary users’ sum rate and cognitive user’s transmission rate is not monotonic.
16
Tight results for several families of networks with side information. A wider range of scenarios where cut-set analysis applies. An interesting and fruitful connection to successive refinement of information. On Networks with Side Information A. Cohen, S. Avestimehr and M. Effros Canonical source coding problems can be used to derive bounds for more complex networks. Network coding can play a key role even in non-multicast problems. Strategies intended for small problems, joint with network codes, can solve complex networks MAIN ACHIEVEMENT: New inner and outer bounds were derived for networks with side information. The bounds are tight for several network topologies. HOW IT WORKS: Converse results for the canonical problem are generalized to multi-node networks. The achievable schemes are used at the terminals (sources and sinks), together with network coding. Successive refinement of both the source and side information descriptions is used when there are multiple sinks. ASSUMPTIONS & LIMITATIONS: One source node; one helper. Bounds are not tight in general. Extend this methodology to various source coding problems. Derive new bounds and find network topologies for which they are tight. Different demand models(e.g. distortion) IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS X Y X ENC DEC ENC To large extent, our knowledge of networks with side information is limited to the model above. However, we are interested in more complex networks:
17
Increase in capacity is potentially unbounded. Power consumption by remote sources can be decreased by employing feedback from the central receivers. Feedback and Network Coding Effros and Bakshi Feedback increases the capacity region. By knowing what the receiver already knows from other sources, source nodes can avoid unnecessary transmission. Feedback increases the capacity of networks MAIN ACHIEVEMENT: In several examples networks, the capacity with feedback is strictly bigger than that without feedback - Butterfly network - Source coding with coded side information - Multiterminal source coding HOW IT WORKS: Receiver sends back everything it knows to the transmitter nodes. e.g. - Encoder 2 knows X after the feedback. - Sum rate required is only H(X) ASSUMPTIONS AND LIMITATIONS: Feedback links are assumed to have infinite capacity Sources nodes are assumed to have sufficient processing power In today’s networks, bulk of transmission from sources to sinks Remote sources have often lesser power available than sinks Feedback is studied mostly in the context of channel knowledge, not source knowledge Cost of feedback?. Feedback links may not always be “free” IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS
18
Optimal two-layer network co-operative scheme for any traffic demand built on multi- hop and hierarchical scheme Geometry of capacity region: it is nice and round Multicast Capacity Region of a Large Wireless Network Urs Niesen Piyush Gupta Devavrat Shah Complete characterization of multicast capacity region: separation of NET and PHY layer MAIN ACHIEVEMENT: Characterization of dim. multicast region Easily computable in terms of 2n `weighted cuts’ Under Gaussian fading channel model HOW IT WORKS: Achievability Realize `tree’ network using co-operative relay built on multi-hop and hierarchical (virtual MAC and BC) depending upon channel characteristics Use this as multicast `tree’ Converse Establish tightness of 2n cuts, each of them corresponds to a `node’ of tree ASSUMPTIONS AND LIMITATIONS: Random node placement Very little known about multicast capacity region of wireless network of n nodes It is dimensional Lack of fundamental understanding of co-operative relay schemes Multicast capacity scaling Arbitrary node placement IMPACT NEXT-PHASE GOALS ACHIEVEMENT STATUS QUO NEW INSIGHTS Equivalence relation Wireless network = “tree- structure” This decides optimal structure for network-wide co-operation
19
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 3
20
Implementation – Consensus algorithms & Information distribution Adaptation – Reinforcement learning techniques Integration with Network Coding projects: Code around network hot-spots What is the state of the art and what are its limitations? Notes from Austin: MW routing inflexible, and does not easily incorporate multi- access capacity region in wireless. Workload relaxation techniques: Tremendous value for policy synthesis based on dynamic hot- spots in the network Can these techniques be extended to wireless models? Relaxation Techniques for Net Opt W. Chen & S. Meyn KEY NEW INSIGHTS: Extend to wireless? YES Geometric picture is very different. Interpretation: The number of resources is infinite Structure of optimal solution to relaxation is very simple, even for very complex networks New application of relaxation: Q-learning and TD-learning for routing and power control Un-consummated union challenge: Integrate coding and resource allocation Generally, solutions to complex decision problems should offer insight Algorithms for dynamic routing: Visualization and Optimization END-OF-PHASE GOAL COMMUNITY CHALLENGE ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS MAIN RESULT: HOW IT WORKS: Step 1: Estimate capacity region near estimated allocation rate vector Step 2: Construct ellipsoidal, and half-space relaxations Step 3: Optimal policy for relaxation, and interpret for original network Numerical findings: With many flows, the rate region appears smooth even in a static interference model Dynamics of 720 queues Half space relaxation provides: Impact: Network cut is no longer a useful concept Lower bound on performance and Tools for policy synthesis Infinite complexity leads to simple solution:
21
Stochastic resource allocation Boyd and Akuiyibo Optimal dynamic resource allocation with heterogeneous flows MAIN RESULT: Explicit optimal control laws for resource allocation in a system with quadratic cost, linear dynamics, and random linear constraints. ASSUMPTIONS AND LIMITATIONS: Assumes that the first and second moments of the resources are known Utility is quadratic; dynamics must be linear Current resource allocation research focus on iterative methods. These automatically adapt to changing data assuming they are held constant. Utility maximizing estimation techniques Decentralized solutions IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS Formulate as stochastic control problem Resource limits are random Allocate resources based on availability and system state Stochastic allocation of competing network resources i.e., bandwidth, power, flow rates, etc. Simple control laws (linear coefficients can be computed ahead of time). Target value, x =6 greedy algorithm trajectory optimal trajectory averaging input algorithm
22
Significant performance improvements with the distributed Newton method compared to standard subgradient methods. A Distributed Newton Method for Network Optimization Jadbabaie and Ozdaglar Distributed Second Order Methods with Convergence Guarantees MAIN ACHIEVEMENT: We developed a Newton method that solves network optimization problems in a distributed manner. We provide convergence and rate of convergence guarantees for the proposed method. Simulation experiments on a series of randomly generated graphs suggest superiority of the distributed Newton method over dual subgradient methods. HOW IT WORKS: Constrained Newton method Dual Newton step found by solving a discrete Poisson equation involving the graph Laplacian. Using a consensus-based local averaging scheme, this can be done using only local information. ASSUMPTIONS AND LIMITATIONS: Solves minimum cost network flow problems Extension to network utility maximization All existing distributed optimization methods rely on dual decomposition and subgradient (first order) algorithms These algorithms easy to distribute However, they can be quite slow to converge limiting their use in rapidly changing dynamic wireless networks. Second order methods for distributed network optimization Suggests an extensive research agenda for the investigation of these methods in decentralized environments IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS Combine Newton (second order) methods with consensus policies to distribute the computations associated with the dual Newton step
23
Robust system design in the presence of non-cooperative users utilizing the desirable properties of potential games. Distributed Scheduling and Equilibrium Dynamics in Wireless Networks with Correlated Fading Channels (Candogan, Menache, Ozdaglar, Parrilo) A potential game approach for distributed scheduling in wireless networks Achievements Game-theoretic analysis of a distributed approach to scheduling that adapts to dynamically varying channel conditions. Simple convergent distributed dynamics and equilibrium characterization. Efficiency loss analysis suggests that finer state quantization can improve equilibrium performance. How it works: Design incentives for the mobiles to project the game onto an (exact) potential game with desirable properties (such as convergence of simple dynamics) Improved bounds on equilibrium performance can be obtained as a function of a technology related system parameter. Assumptions and limitations: Full correlation across individual channel state processes. Fixed number of users and an uplink scenario. IMPACT NEXT-PHASE GOALS FLOWS ACHIEVEMENT STATUS QUO NEW INSIGHTS Game-theoretic scheduling models allow the flexibility to incorporate different user objectives and arrive at an efficient operating point in a distributed manner. Correlated channel states are more realistic than existing models as they incorporate joint fading effects. Partial channel state correlation Projection of general games to ordinal potential games Convergence of dynamics with asynchronous updates Multi-hop network topologies Combine tools from optimization and game theory Potential games allow establishing existence and uniqueness of equilibrium, and convergence of simple distributed algorithms. $ $ $ Equilibrium Local components (buildings) Example: Collision Channel with two users. The resulting game is an ordinal potential game with two equilibria (TX, I) & (I, TX)
24
Approach provides guarantees independent of network structure. Guarantees existence of an equilibrium that achieves a system cost of at most 50% higher than the optimal. This offers an improvement over opportunistic coding. Game theory is an applicable tool for distributed optimization in network coding MAIN ACHIEVEMENT: Introduced game theory as a distributed tractable mechanism to obtain good network performance HOW IT WORKS: Model interactions as a non-cooperative game - players (unicast flows) - actions (available paths) Assign each player a “cost” function Analyze efficiency of equilibrium behavior ASSUMPTIONS AND LIMITATIONS: Limited form of network coding (reverse carpool) Players have knowledge of available paths Players equilibrate faster than network changes Global Objective: Efficiently use network using network coding Approach: Centralized solutions. (e.g., opportunistic coding) Fix paths, use coding opportunities if available Understand the potential of game theory in network coding problems IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS A Game Theoretic Approach to Network Coding Marden and Effros What about distributed solutions? What if flows were allowed to select path in response to local “cost”? Goal: Let users create coding opportunities to improve efficiency Establish desirable distributed learning algorithms with good convergence rates Extend game theoretic approach to more general network coding problems
25
Our results provide a general framework to study the interaction of multiple devices. Further, our results: unify existing models for which such limits were known and provide simple exogeneous conditions that can be checked to ensure the main result holds Oblivious equilibrium for stochastic games with concave utility S. Adlakha, R. Johari, G. Weintraub, A. Goldsmith In principle, tracking state of other devices is complex. We approximate state of other devices via a mean field limit. Real environments are reactive and non-stationary; this requires new game-theoretic models of interaction MAIN RESULT: Consider stochastic games per-period utility and state dynamics that are increasing, concave, submodular. Then in a large system, each node can find approximately optimal policies by treating the state of other nodes as constant. HOW IT WORKS: Under our assumptions, no single node is overly influential ) we can replace other nodes’ states by their mean. So the optimal policies decouple between nodes. ASSUMPTIONS AND LIMITATIONS: This result holds under much more general technical assumptions than our early results on the problem. A key modeling limitation, however, is that the limit requires all nodes to interact with each other. Thus the results apply only to dense networks. Many cognitive radio models do not account for reaction of other devices to a single device’s action. In prior work, we developed a general stochastic game model to tractably capture interactions of many devices. State of device i State of other devices Action of device i Utility Current state or current action Next state Current state or current action # of other devices with given state State IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS We will apply our results to a model of interfering transmissions among energy-constrained devices. Our main goal is to develop a related model that applies when a single node interacts with a small number of other nodes each period.
26
Fluid limits for gossip processes V. Manshadi and R. Johari Several goals: (1)Extend fluid analysis to include heterogeneous random graphs. (2)Get finer understanding of behavior when initial number of informed nodes is constant as N ! infinity. (3)Extend the model to include link failures. The simplicity of macroscopic models for information gossip can be combined with the accuracy of microscopic stochastic models MAIN RESULT: We consider a random graph model where each node has d neighbors, and we consider a limit where the number of nodes N approaches infinity. We prove that the (random) sample path of the micro model converges to the (deterministic) path of the corresponding macro model. HOW IT WORKS: We approximately characterize how information flows in the micro model between the sets of informed and uninformed nodes. This approximation is exact as N ! infinity. ASSUMPTIONS AND LIMITATIONS: Our results currently only apply under specific topological assumptions. Gossip is a simple model for communication between nodes: at random times, each node contacts a neighbor and relays its information. Prior work has studied the time until all nodes acquire the information. Two versions of this model: a “micro” model and a “macro” model. N(t) Time t “Macro” N(t) Time t “Micro” The micro model tracks exactly which nodes have the information. The macro model is a mean field limit: what fraction of nodes have learned the information? We connect these two models. … … … … … Nodes that currently have the info Nodes that currently do not have the info Micro and macro models of gossip processes have been available for several decades. Unifying these will allow us to translate macro-level control insights to micro-level system designs. IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS
27
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrusts 1,2,&3
28
Key insight. With drop-when-decoded, the busy period of the virtual queue contributes to the physical queue size calculation Responding to ACK of the degrees of freedom ensures only queuing delay of virtual queues contributes to physical queue size Consequences. Queue size now grows linearly with 1/(1- ρ) Reduces the amount of storage needed at intermediate nodes for performing re-encoding Analysis also applies when only some nodes do re-encoding ACK of degrees of freedom allows traditional queuing results to be applied easily in scenarios with network coding Queuing analysis for coded networks with feedback J. Sundararajan, D. Shah, M. Médard, M. Mitzenmacher, J. Barros The proposed approach to queue management will play a key role in interfacing TCP with network coding, especially when intermediate nodes re-encode MAIN ACHIEVEMENT: Propose novel ACK mechanism that allows nodes to manage queue occupancy effectively Characterize expected queue size at each node Packets can be dropped from queue only upon confirmation of decoding This means the queue sizes will be unnecessarily long In particular, as load factor ρ approaches capacity, queue grows quadratically as a function of 1/(1- ρ) Extend queue management protocol to more general (wireless) scenarios Multipath routing with coding Multicast traffic pattern IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS λ x (Time between node ( i -1) seeing pkt and node i seeing pkt) λ x (Time for receiver’s ACK to propagate from source to node k) 1 0 0 0 1 - - - - - - - p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 Decoded Seen Unseen Coefficient vectors of received linear combinations, after Gaussian elimination Number of seen packets = Rank of matrix HOW IT WORKS: Acknowledge “seen” packets Almost as if there is link-by-link feedback… ASSUMPTIONS AND LIMITATIONS: Perfect and delay-free feedback used in analysis, though not critical for the approach Field size assumed to be very large 1 kN 2 Tx Rx
29
Shows that the performance of well-known scheduling techniques is very poor. Suggests a largely improved bandwidth efficiency. New notion of scheduling conflicts, when network coding is used. Scheduling for Network Coded Multicast Medard, Traskov, Heindlmaier, Koetter Scheduling matched to the network coding subgraph largely improves performance. MAIN ACHIEVEMENT: Hyperarc scheduling outperforms well-known scheduling techniques. HOW IT WORKS: Valid network configurations can be identified as stable sets in the conflict graph. Jointly solve subgraph selection and scheduling problem. Distributed algorithm. ASSUMPTIONS AND LIMITATIONS: Convergence speed of algorithm. Scaling with the size of the network. Current scheduling techniques use the bandwidth very inefficiently. Extension to INTER-session network coding. Investigations on performance/complexity trade- offs. IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS No systematic approach to multi-access for network coding. Graphical model for conflicts between hyperarcs. Do not try to minimize the number of collisions per se.
30
Identifying the two-fold role of relays as: being part of the source- receiver link conveying information about interferer’s signal Optimal mobility patterns could be used to gain insight into Optimal relay placement Positioning of nodes in coexistent interfering networks. MANETs : Focus has been mainly on mutual interlinking and cooperation of nodes with randomized mobility in the backdrop. Lack of results on interference-mitigating mobility strategies. Interference-Mitigating Mobility Strategies in MANETs: Naini and Moulin Mobility should be seen as a resource to actively avoid interference from other nodes. Optimal mobility strategies can be established for nodes in noncooperative scenarios Allow for relay mobility Include multi-hop relaying Extension to non-greedy and multi-objective cost function. Exploit mobility to dynamically enlarge capacity regions MAIN RESULT: Derived optimal interference-mitigating strategies for receiver node in a network with fixed relays Cut-set bound on capacity used as the cost-function. Saddle point strategies are feasible for the receiver and interferer. ASSUMPTIONS AND LIMITATIONS: Greedy mobility strategy is assumed Nodes know neighboring nodes location and transmission power Surrogate capacity cost function is used IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.