Dynamic Aspects of Multiple Access Channel and Wireless Networks

dynamic aspects of multiple access channel n.w
1 / 53
Embed
Share

Explore the dynamic aspects of multiple-access channels and wireless networks, touching upon topics such as communication, collision resolution, and contention problems in network transmissions. Learn about the challenges and solutions in ensuring successful transmission among entities in wireless environments.

  • Wireless Networks
  • Communication
  • Collision Resolution
  • Contention Resolution
  • Dynamic Aspects

Uploaded on | 1 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Dynamic Aspects of Multiple-Access Channel Darek Kowalski University of Liverpool joint work with: Bogdan Chlebus U. Colorado Andrzej Pelc U. Quebec Mariusz Rokicki IBM R&D Marcin Bienkowski U. Wroclaw Tomasz Jurdzinski U. Wroclaw Miroslaw Korzeniowski TU. Wroclaw

  2. Wireless Networks Entities communicating by wireless (unguided) medium Model parameters: Noise Rules for receiving a message Scenarios (worst-case, stochastic, saturated, restricted) Timing Power/Frequency/Code modulation Failures (jamming, crashes, Byzantine) Universality Goal: algorithmics independent from (reasonable) models

  3. Multiple Access Channel Consists of n stations Each station has unique id from {0, ,n-1} Stations transmit packets in discrete rounds (slots) Transmission reaches all the stations in the same round 0 2 n-1 1 . . . Channel 3

  4. Multiple Access Channel: Communication 0 1 2 n-1 . . . Successful Transmission Transmission is successfully received by all the stations in the system if and only if one station transmits in a round 4

  5. Multiple Access Channel: Communication cont. 0 1 2 n-1 . . . Collision If there are at least two stations transmitting in the same round then collision occurs and no packet is successfully received If channel provides collision detection capability then stations are able to distinguish between silence and collision; otherwise collision is undistinguishable from silence 5

  6. Contention Resolution Problem Packets are injected dynamicallyinto stations Stations store injected packets in their private queues Each station runs its instance of a protocol, which decides about packet s transmissions Goal: design a protocol that minimizes queue sizes and packet latency Injection pattern is modeled by worst case adversary (theoretical analysis) stochastic adversary (simulations) Scalability is an issue (asymptotic analysis) 6

  7. Leaky Bucket Adversary (LBA) Leaky bucket adversary is defined by two parameters: injection rate burstiness b In each interval of a t rounds the adversary can inject at most t + b packets to the system Adversary decides which stations get injected packets 7

  8. Protocols Input parameters for a protocol contains only: station id n - total number of stations in the system Protocol is an automaton. State transition is determined by the following round s events: Feedback from the channel: Successful transmission Additionally packet may carry extra bits used by a protocol Silence Collision, for the channel with collision detection Number of packets injected into the station 8

  9. Quality of Protocol Packet latency max time after which a packet is transmitted We say that protocol is (strongly) fair if packet latency is bounded Queue size max number of pending packets in the system We say that protocols is stable if queue size is bounded 9

  10. Classes of Deterministic Protocols Full sensing protocol: stations are synchronized by global round number; protocol can transmit only packets (without additional bits) Adaptive protocol: extension of full-sensing protocol in which control bits can be piggybacked on packets e.g., station can indicate that it has transmitted the last packet from its queue 10

  11. Randomized Protocols Backoff protocols: after ith failure to transmit a packet, wait r rounds to retransmit, where r is chosen uniformly at random from , 1 ) i , ( F Binary Exponential Backoff uses F(i) = 2i ; Polynomial Backoff uses F(i) = ic, where c > 1 11

  12. Related Work: stochastic approach Packets are injected into stations with saturated or some stochastic distribution e.g., Poisson, Bernoulli: Analysis of backoff protocols for multiple access channels [Hastad, Leighton, Rogoff SICOMP 1996] stochastic [Bianchi IEEE J. on Selected Areas in Comm. 2000] saturated A bound on the capacity of backoff and acknowledgement- based protocols [Goldberg, Jerrum, Kannan, Paterson SICOMP 2004] stochastic Contention resolution with constant expected delay [Goldberg, MacKenzie, Paterson, Srinivasan JACM 2000] stochastic 12

  13. Related Work: deterministic settings Static k -conflict resolution problem: given kpackets injected to kout of n stations, the goal is to design protocol which transmits all kpackets in the shortest possible time O klogn Upper bound: k [Komlos, Greenberg IEEE Trans. Inf. Theory 1985] log n Lower bound: [Greenberg, Winograd JACM 1985] klog k 13

  14. Related Work: adversarial queuing Adversarial queuing was introduces in the context of store and forward networks to study stability of routing protocols: Universal-stability results and performance bounds for greedy contention-resolution protocols [Andrews, Awerbuch, Fernandez, Leighton, Liu, Kleinberg JACM 2001] Adversarial queuing theory [Borodin, Kleinberg, Raghavan, Sudan, Williamson JACM 2001] Adversarial contention resolution for simple channels, queue-free model, randomized algorithms [Bender, Farach-Colton, He, Kuszmaul, Leiserson SPAA 2005] 14

  15. Injection rate =1 =1 15

  16. Main results n = 1 n 2 full-sensing Stable and Fair No Stable No Stable and Fair Stable adaptive Stable and Fair [Chlebus, Kowalski, Rokicki, Distributed Computing 2009] 16

  17. Impossibility Result No protocol is fair and stable against the leaky bucket adversary with = 1 and b = 1 in the system of at least two stations. Idea of the proof: 1.Assume that stable and fair protocol exists 2.Enforce a silent round while maintaining injection rate 1, by implementing one of the following two executions 3.Repeatedly enforce a silent round while maintaining injection rate 1 A B 17

  18. Impossibility Result - proof Execution 1: 1.Round t0 adversary starts injecting one packet per round into station A; we assume that adversary can use its burstiness b = 1 2.Round t1 station B becomes empty; such round exists since the protocol is fair and the adversary injects packets only into station A 3. Round t1 + 1 adversary uses its burstiness b = 1 to inject one packet into station B 4. Round t2 station A pauses its transmission and station B transmits its packet; such round exists due to fairness 18

  19. Impossibility Result proof cont. Execution 2: 1.Round t0 adversary starts injecting one packet per round into station A; we assume that the adversary can use its burstiness b = 1 2.Round t1 station B becomes empty; such round exists since protocol is fair and the adversary injects packets only into station A 3. Round t1 + 1 adversary does not inject into station B 4. Round t2 silent round; station A pauses its transmission and station B does not transmit 19

  20. Introduction to Stable Protocol We say that station is big if it queues at least n packets Order of station s transmission is determined by the cycled list with the list beginning pointer; initially set to station 0 Each station maintains a copy of the list; initially the list is ordered according to stations ids Each station maintains a pointer to the active station; only one station is active in a round; initially station 0 is active 20

  21. Description of MBTF Protocol Move Big To Front (MBTF): Repeat: active station transmits, provided it has a packet if the active station is big then it is moved to the front of the list and it keeps transmitting until its queue contains n 1 packets the next station on the list becomes active 21

  22. MBTF - execution LBA(=1, Round 1 Round 1 =1, b b=1) =1) Adversary injects one packet into station 2 0 2 1 22

  23. MBTF - execution LBA(=1, Round 2 Round 2 =1, b b=1) =1) Adversary injects one packet into station 2 0 2 1 23

  24. MBTF - execution LBA(=1, Round 3 Round 3 =1, b b=1) =1) Adversary injects one packet into station 2 Station 2 becomes big and it is moved to the front 0 2 1 24

  25. MBTF - execution LBA(=1, Round 4 Round 4 =1, b b=1) =1) Adversary injects one packet into station 2 Station 2 continues being big 2 1 0 25

  26. MBTF - execution LBA(=1, Round 5 Round 5 =1, b b=1) =1) Adversary injects two packets one into station 1 and one into station 2 Station 2 continues being big 2 1 0 26

  27. MBTF - execution LBA(=1, Round 6 Round 6 =1, b b=1) =1) Adversary injects one packet into station 1 Station 2 stops to be big 2 1 0 Round 6 27

  28. MBTF - execution LBA(=1, Round 7 Round 7 =1, b b=1) =1) Adversary injects one packet into station 1 2 1 0 Round 7 28

  29. MBTF - execution LBA(=1, Round 8 Round 8 =1, b b=1) =1) Adversary injects one packet into station 1 Station 1 becomes big and it is moved to the front 2 1 0 29

  30. MBTF - execution LBA(=1, Round 9 Round 9 =1, b b=1) =1) Adversary injects one packet into station 1 Station 1 continues being big 1 0 2 30

  31. MBTF - execution LBA(=1, Round 10 Round 10 =1, b b=1) =1) Adversary injects one packet into station 1 Station 1 continues being big 1 0 2 31

  32. MBTF - execution LBA(=1,b=1) Round 11 Round 11 =1,b=1) Adversary injects does not inject any packet Station 1 continues being big 1 0 2 32

  33. MBTF - execution LBA(=1,b=1) Round 12 Round 12 =1,b=1) Adversary injects two packets into station 0 Station 1 stops being big 1 0 2 33

  34. MBTF - execution LBA(=1,b=1) Round 13 Round 13 =1,b=1) Adversary injects one packet into station 2 1 0 2 34

  35. MBTF - execution LBA(=1,b=1) Round 14 Round 14 =1,b=1) Adversary injects one packet into station 0 Station 0 becomes big and it is moved to the front 1 0 2 35

  36. MBTF - execution LBA(=1,b=1) Round 15 Round 15 =1,b=1) Adversary injects one packet into station 0 Station 0 continues being big 0 2 1 36

  37. Performance of MBTF Protocol Move Big to Front (MBTF) is stable but not fair against LB( = 1, b 1) MBTF stores at most O(n2 + b) packets in the system Each protocol stable against LB( = 1, b 1) has to store at least (n2 + b) packets 37

  38. Improvement - SCAT Max-SCAT-Queue = O(n) Max-OPT-Queue + O(n) Bounded queues, on average, for injection rates < 1 Infinite number of rounds with empty queues for injection rates = 1, on average 38

  39. Stability Algorithm SCAT Update of global variables at time t case mode = trimming if 1 j n(kj j) > 0 then if ktoken tokenthen token min{l > token | kl > l} else token 1 mode scanning case mode = scanning if 1 j token(kj+ pj j) token and token < n then token token + 1 else sort L in non-increasing order of keys the potential function of keys if there exists i such that ki > ithen token min{i | ki > i} mode trimming else token 1 L list of queues kj size of j-th queue pj binary indicator j j-th potential

  40. Properties of SCAT Max-Queue-SCAT = O(n) Max-Queue-OPT + O(n) Bounded queues, on average, for injection rates < 1 Infinite number of rounds with empty queues for injection rates = 1, on average Bienkowski, Jurdzinski, Korzeniowski, K., DISC 2012

  41. Injection rate <1 Anantharamu, Chlebus, K., Rokicki INFOCOM 2010 41

  42. Protocols RRW and OFRRW Round Robin Withholding (RRW): Stations unload their queues in round-robin manner; More precisely: let assume that station i is the current station unloading its queue; after the first silent round the next station i + 1 modulo n takes over to unload its queue Phase of the protocolis one run over all the stations from station 0 to station n 1 Packet is old if it was injected in the previous phase(s) Old-First Round Robin Withholding (OFRRW): In the current phase only old packets can be transmitted 42

  43. Protocols SRR and OFSRR In case collision detection is available: Search Round Robin (SRR): Similar to RRW, the only difference is that a new station to transmit is found using a binary search on the (cycled) list of subsequent stations; binary search uses collision detection Phase of the protocolis one run over all the stations from station 0 to station n 1 Packet is old if it was injected in the previous phase(s) Old-First Search Round Robin (OFSRR): In the current phase only old packets can be transmitted 43

  44. Protocol queue sizes: summary 0 < 1/n 1/n< < 1 O n + b 1 O b ( ) OFRRW O n2+ b ( ) O b ( ) MBTF 44

  45. Packet latency: summary 0 < 1/n 1/n < 1/(2 log n) 1/(2 log n) < < 1 OFSSR min{ n + b , b log n} min{ n + b , b log n} n + b 1 SSR b log n b log n n + b (1 )2 OFRRW n + b n + b 1 n + b 1 n + b (1 )2 RRW n + b n + b (1 )2 MBTF n2+ nb 1 n2+ nb 1 n2+ nb 1 45

  46. Parameters and Methodology of Simulations Basic parameters: Injection rate Burstiness Number of stations Number of rounds Additional parameters: Activity rate (packets injected only to active stations) Probability of changing activity status Fixed Poisson distribution of the number of injected packets 46

  47. Low activity deterministic 47

  48. Medium activity deterministic 48

  49. High activity deterministic 49

  50. High activity randomized 50

Related


More Related Content