Medium Access Control for Distributed Systems Faeze Heydaryan - - PowerPoint PPT Presentation

β–Ά
medium access control for distributed systems
SMART_READER_LITE
LIVE PREVIEW

Medium Access Control for Distributed Systems Faeze Heydaryan - - PowerPoint PPT Presentation

Medium Access Control for Distributed Systems Faeze Heydaryan Joint work with Yanru Tang Committee members: Prof. Rockey Luo Prof. Liuqing Yang Prof. Ali Pezeshki Prof. Haonan Wang Coordinated vs Distributed Communication Distributed


slide-1
SLIDE 1

Medium Access Control for Distributed Systems

Faeze Heydaryan Joint work with Yanru Tang

Committee members:

  • Prof. Rockey Luo
  • Prof. Liuqing Yang
  • Prof. Ali Pezeshki
  • Prof. Haonan Wang
slide-2
SLIDE 2

Coordinated vs Distributed Communication

Coordinated Communication

  • Joint coding optimization
  • long messages

Distributed Communication

  • Opportunistic channel access
  • Bursty short messages

1

slide-3
SLIDE 3

Classical Information and Network Theory

2

Wireless network requires both efficiency and modularity.

Classical Information Theory Classical Network Theory

  • Emphasizes on efficiency
  • Joint coding optimization
  • Long messages
  • Emphasizes on modularity
  • Layering architecture
  • User coordination can be expensive.
  • Binary transmission/ idlingde decisions at each

data link layer user

  • Power/rate adaptation not supported.

Problems in Distributed Communication Networks

slide-4
SLIDE 4

Enhanced Physical Link-layer Interface

3

Current Physical-Link Layer Interface Enhanced Physical-Link Layer Interface

  • Single transmission option
  • Multiple transmission options
  • Possible support of power/rate adaptation
slide-5
SLIDE 5

Distributed Channel Coding

Ensemble of channel codes at the physical layer Each code corresponding to a link layer transmission option

  • Transmitters choose channel code individually.
  • Receiver knows the code ensemble, but not the coding choices.
  • Message decoding or collision report due to reliability requirement.

4

  • If the transmitters happen to choose their options inside the region, the packet can be recovered with asymptotic

error probability of zero.

  • If the transmitters happen to choose their options outside the region, collision can be reported with asymptotic

probability of one.

Achievable Region

Achievable region for multiple access system over a discrete time memoryless channel

slide-6
SLIDE 6

Multiple Transmission Options at Link Layer

Back off by decreasing transmission probability in response to packet collison. Decrease communication rate in response to packet collision. With multiple transmission options: How system should respond to success transmission and packet collision? How to support such functions at the physical layer ? We propose a distributed MAC algorithm to optimize a general utility function with/without enhanced interface.

5

Current Protocol Efficient Approach Example Multiple access system with 𝐿 users + , 𝐿 users have messages (𝐿 is changing) If 𝑠

=

  • log 1 +
  • (bits/symbol) is fixed, maximum achievable sum rate is
  • log 1 +
  • .

If 𝑠

=

  • log 1 +
  • (bits/symbol) with rate adaptation, maximum achievable sum rate is
  • log 1 +
  • .
slide-7
SLIDE 7

Existing MAC Protocols

6

ALOHA protocol Tree-splitting algorithm Back-off approach Existing MAC algorithms either consider throughput optimization and/or collision channel. We consider a general channel, a general utility, with/without enhanced physical link-layer interface.

Current Distributed MAC Algorithms

Set of colliding users Transmitting users Non-Transmitting users Users maintain a transmission probability Transmission is successful Probability increases Probability decreases No Yes

slide-8
SLIDE 8

System Model

7

  • Multiple access network with 𝐿 homogenous users.
  • 𝐿 unknown to transmitters and receiver.
  • Each user is backlogged with a saturated message queue.
  • Time is slotted.
  • Each user has 𝑁 transmission options + an idling option.

𝒒 𝑒 = π‘ž 𝑒 𝒆 𝑒 , 0 ≀ 𝑒 𝑒 ≀ 1, 𝑒 𝑒 = 1

  • 𝒒 𝑒 : Transmission probability vector of user 𝑙

π‘ž(𝑒): Transmission probability of user 𝑙 𝒆 𝑒 : Transmission direction vector of user 𝑙 Probabilities of choosing each option if user) 𝑙 transmits)

slide-9
SLIDE 9

8

Stochastic Approximation Framework

Updating Rule: 𝒒 𝑒 + 1 = 1 βˆ’ 𝛽 𝑒 𝒒 𝑒 + 𝛽 𝑒 𝒒 𝑒 = 𝒒 𝑒 + 𝛽(𝑒)(𝒒 𝑒 βˆ’ 𝒒 𝑒 ) 𝑸 𝑒 = 𝒒 𝑒 𝒒 𝑒 … 𝒒 𝑒 𝑸 𝑒 = 𝒒 𝑒 𝒒 𝑒 … 𝒒 𝑒 𝑸 𝑒 + 1 = 𝑸 𝑒 + 𝛽(𝑒)(𝑸 𝑒 βˆ’ 𝑸(𝑒)) Mean-Bias Condition Bias Term: 𝑯 𝑒 = 𝑯 𝑸 𝑒 = 𝐹 𝑸 𝑒 βˆ’ 𝑸 (𝑒) 𝑯 𝑒 ≀ 𝐿𝛾(𝑒) Lipschitz Continuity Condition 𝑸 𝑸 βˆ’ 𝑸 (𝑸) ≀ 𝐿 𝑸 βˆ’ 𝑸 for all 𝑸 and 𝑸 Associated Ordinary Differential Equation (ODE):

𝑸()

  • = βˆ’ 𝑸 𝑒 βˆ’ 𝑸

(𝑒) Equilibrium of ODE π‘Έβˆ— : π‘Έβˆ— = 𝑸 (π‘Έβˆ—) Target probability vector Noiseless version of 𝑸 𝑒

slide-10
SLIDE 10

9

Theorem 1

Assumptions:

  • Associated ODE has unique equilibrium π‘Έβˆ—
  • βˆ‘

𝛽 𝑒 = ∞, βˆ‘ 𝛽 𝑒 < ∞, βˆ‘ 𝛽 𝑒 𝛾 𝑒 < ∞.

  • Mean and Bias condition
  • Lipschitz Continuity condition

Conclusion:

  • 𝑸 𝑒 converges to π‘Έβˆ— with probability one.

Theorem 2

Assumptions:

  • Associated ODE has unique equilibrium π‘Έβˆ—
  • βˆƒ 0 < 𝛽 < 𝛽 < 1, βˆƒ π‘ˆ β‰₯ 0, 𝛽 ≀ 𝛽 𝑒 ≀ 𝛽, 𝛾 𝑒

≀ 𝛽, βˆ€π‘’ > π‘ˆ

  • Mean and Bias condition
  • Lipschitz Continuity condition

Conclusion:

  • 𝑸 𝑒 converges weakly to π‘Έβˆ— in the sense that

βˆ€πœ— > 0, βˆƒπΏ: lim sup

β†’

𝑄𝑠 𝑸 𝑒 βˆ’ π‘Έβˆ— β‰₯ πœ— < 𝐿𝛽.

slide-11
SLIDE 11

10

MAC Algorithm Design Challenges

Objective

Design a distributed MAC algorithm to satisfy Mean-Bias and Lipschitz Contunity conditions and to place unique equilibrium of associated ODE at a point that maximizes a chosen utility function.

  • There is a virtual packet in each time slot.
  • The receiver can estimate virtual packet success probability π‘Ÿ(𝑒).

Examples

  • Collision Channel:

Virtual packet success probability Idling probability π‘Ÿ 𝑒 = 1 βˆ’ π‘ž 𝑒 π‘Ÿ 𝑒

  • General Channel + Random Block Coding:

Reception of virtual packet Detecting whether transmission vector of real users belong to a specific region

Assumptions

Design Choice

  • Users should obtain the same target transmission probability vector

π‘Έβˆ— = πŸβ¨‚π’’βˆ— = πŸβ¨‚π’’ (π’’βˆ—)

slide-12
SLIDE 12

11

Single Option: Channel Model

Single transmission option 𝑁 = 1 𝒒 = π‘ž, 𝑸 = 𝒒 = π‘ž π‘ž … π‘ž Channel Model

Real channel parameter set 𝐷 for π‘˜ β‰₯ 0 Virtual channel parameter set 𝐷 for π‘˜ β‰₯ 0 𝐷 β‰₯ 𝐷() 𝐷: Conditional success probability

  • f a real packet should it be

transmitted in parallel with j other real packets. 𝐷: Success probability of a virtual packet should it be transmitted in parallel with j real packets. 𝐾 = 𝑏𝑠𝑕 min

  • 𝐷 > 𝐷() + πœ—

Definition

slide-13
SLIDE 13

12

Single Option: Utility Optimization

Maximize a symmetric network utility

  • Sum system throughput:

𝑉 𝐿, π‘ž, 𝐷 = 𝐿 𝐿 βˆ’ 1 π‘˜ π‘ž 1 βˆ’ π‘ž 𝐷

  • Asymptotically optimal transmission probability satisfies lim

β†’ πΏπ‘ž βˆ— = π‘¦βˆ—

π‘¦βˆ— = 𝑏𝑠𝑕 max

  • lim

β†’ 𝑉 𝐿, 𝑦

𝐿 , 𝐷 Set the system equilibrium at π‘žβˆ— = π‘›π‘—π‘œ π‘ž,

βˆ— , π‘ž = π‘›π‘—π‘œ 1, βˆ— without knowing 𝐿.

Channel contention measure: π‘Ÿ(π‘ž, 𝐿) = βˆ‘ 𝐿 π‘˜ π‘ž 1 βˆ’ π‘ž 𝐷

  • Weighed sum system throughput

𝑉 𝐿, π‘ž, 𝐷 = 𝐿 𝐿 βˆ’ 1 π‘˜ π‘ž 1 βˆ’ π‘ž 𝐷 βˆ’ πΏπ‘žπΉ

slide-14
SLIDE 14

13

Single Option: Two Monotonicity Properties

Estimated users number: 𝐿

  • Target transmission probability: π‘žΜ‚ = π‘›π‘—π‘œ π‘ž,

βˆ—

  • .

Contribution:Theorems

With 𝐷 β‰₯ 𝐷() for all π‘˜ β‰₯ 0, π‘Ÿ π‘ž, 𝐿 is non-increasing in π‘ž. Furthermore

,

  • < 0 for 𝐿 > 𝐾 and π‘žπœ—(0,1) .

Theoretical channel contention measure π‘Ÿ

βˆ—

𝑂 = 𝐿 : Largest integer below 𝐿

  • π‘Ÿ

βˆ— π‘žΜ‚ = π‘žΜ‚ βˆ’ π‘ž

π‘ž βˆ’ π‘ž π‘Ÿ π‘žΜ‚ + π‘ž βˆ’ π‘žΜ‚ π‘ž βˆ’ π‘ž π‘Ÿ π‘žΜ‚ π‘ž = π‘›π‘—π‘œ π‘ž,

βˆ— ,

π‘Ÿ π‘ž = 𝑂 π‘˜ π‘ž 1 βˆ’ π‘ž 𝐷

  • If π‘¦βˆ— > 0 and 𝑐 β‰₯ 𝑛𝑏𝑦 1, π‘¦βˆ— βˆ’ 𝛿 with 𝛿 being defined as

𝛿 = min

,,βˆ— βˆ‘

  • ()
  • βˆ‘
  • ()
  • then π‘Ÿ

βˆ— π‘žΜ‚ is non-decreasing in π‘žΜ‚.

Furthermore if 𝑐 > 𝑛𝑏𝑦 1, π‘¦βˆ— βˆ’ 𝛿 ,π‘Ÿ

βˆ— π‘žΜ‚ is strictly increasing in π‘žΜ‚

for π‘žΜ‚πœ— (0, π‘ž).

slide-15
SLIDE 15

14

Single Option: Distributed MAC algorithm

Transmitters Receiver

Initialize transmission probability Measures the success probability

  • f virtual packet π‘Ÿ and feeds it back to the

transmitters. Derive target transmission probability π‘žΜ‚ by solving π‘Ÿ

βˆ— π‘žΜ‚ = π‘Ÿ

Update transmission probability by π‘ž = 1 βˆ’ 𝛽 π‘ž + π›½π‘žΜ‚ 𝑔𝑝𝑠 𝑙 = 1, … , 𝐿 Converge No Yes End

slide-16
SLIDE 16

15

Single Option: Convergence and Optimality

  • 𝑐 > 𝑛𝑏𝑦 1, π‘¦βˆ— βˆ’ 𝛿
  • Using proposed MAC algorithm
  • ODE has unique equilibrium at π’’βˆ— = π‘›π‘—π‘œ π‘ž,

βˆ— 𝟐

  • π‘žΜ‚(𝒒) satisfies Mean-Bias and Lipschitz Continuity conditions.

𝒒 converges to π’’βˆ—

Theorem

Optimality concern Ideal transmission probability: π‘žβˆ— = min {1,

βˆ— }

Transmission probability at the equilibrium: π‘žβˆ— = π‘›π‘—π‘œ π‘ž,

βˆ—

  • 𝑐 should be small

𝛿 and 𝐾 not much smaller than π‘¦βˆ— π‘ž close to one 𝐾 not much larger than π‘¦βˆ— Requires an appropriate virtual packet design

slide-17
SLIDE 17

16

Single Option: Simulation

Collision channel Sum system throughput Fading channel Sum system throughput weighted by transmission energy cost 𝐷 = 1, 𝐷 = 0 𝑔𝑝𝑠 π‘˜ > 0 π‘¦βˆ— = 1 𝐷 = 1, 𝐷 = 0 𝑔𝑝𝑠 π‘˜ > 0 πœ— = 0.01, 𝛿 = 𝐾 = 0 𝐷 = 1, 𝑔𝑝𝑠 π‘˜ < 4, 𝐷 = 0.7 𝑔𝑝𝑠 4 ≀ π‘˜ < 6, 𝐷 = 0 𝑔𝑝𝑠 π‘˜ β‰₯ 6 π‘¦βˆ— = 3.29 𝐷 = 𝐷 = 0 𝑔𝑝𝑠 π‘π‘šπ‘š π‘˜ β‰₯ 0 πœ— = 0.01, 𝛿 = 𝐾 = 3

slide-18
SLIDE 18

17

Multiple Options :Channel Model

Multiple transmission options 𝑁 β‰₯ 1 𝒒 = π‘žπ’†, 𝑸 = 𝒒

𝒒 … 𝒒

Channel Model

Real channel parameter function set 𝐷(𝒆) for 1 ≀ 𝑗 ≀ 𝑁, π‘˜ β‰₯ 0 Virtual channel parameter function set 𝐷(𝒆) for π‘˜ β‰₯ 0 𝐷(𝒆) β‰₯ 𝐷 (𝒆) 𝐷(𝒆): Conditional success probability of a real packet corresponding to 𝑗th transmission

  • ption, should it be

transmitted in parallel with j other real packets. 𝐷(𝒆): Success probability

  • f a virtual packet should it be

transmitted in parallel with j real packets. 𝐾 𝒆 = 𝑏𝑠𝑕 min

  • 𝐷(𝒆) > 𝐷 (𝒆) + πœ—

Definition

slide-19
SLIDE 19

18

Multiple Options: Utility Optimization

Intend to design a distributed MAC algorithm to maximize a chosen utility 𝑉 𝐿, 𝒒, 𝐷(𝒆) by maintaining channel contention measure π‘Ÿ at the desired level. Channel contention measure: π‘Ÿ(𝒒, 𝐿) = βˆ‘ 𝐿 π‘˜ π‘ž 1 βˆ’ π‘ž 𝐷 𝒆 , 𝒒 = π‘žπ’†

  • Example

π’’βˆ— = π‘ž

βˆ—, π‘ž βˆ— = 𝑏𝑠𝑕 max 𝒒

𝑉 𝐿, 𝒒, 𝐷(𝒆) π’’βˆ— = π‘žβˆ—π’†βˆ—, π’†βˆ— = 1,0 𝑔𝑝𝑠 𝐿 ≀ 4, π’†βˆ— = 0,1 𝑔𝑝𝑠𝐿 β‰₯ 10

slide-20
SLIDE 20

19

Multiple Options: Conditions and Definition

Head and Tail Condition

There exist two integer-valued constants 0 < 𝐿 ≀ 𝐿 such that 𝐿 β‰₯ 𝐾(𝒆(𝐿)) and 𝒆 𝐿 = 𝒆(𝐿) for 𝐿 ≀ 𝐿, 𝐿 β‰₯ 𝐾(𝒆(𝐿)) and 𝒆 𝐿 = 𝒆(𝐿) for 𝐿 β‰₯ 𝐿.

Theoretical channel contention measure π’“π’˜

βˆ—

𝐿 ≀ 𝐿, 𝐿 β‰₯ 𝐿 π‘Ÿ

βˆ— 𝐿

= π‘ž(𝐿 ) βˆ’ π‘ž(𝑂 + 1) π‘ž(𝑂) βˆ’ π‘ž(𝑂 + 1) π‘Ÿ π‘ž 𝐿 , 𝑂 + π‘ž(𝑂) βˆ’ π‘ž(𝐿 ) π‘ž(𝑂) βˆ’ π‘ž(𝑂 + 1) π‘Ÿ π‘ž 𝐿 , 𝑂 + 1 𝐿 < 𝐿 < 𝐿 π‘Ÿ

βˆ— 𝐿

= 𝑂 + 1 βˆ’ 𝐿 π‘Ÿ π‘ž 𝐿 , 𝑂 + 𝐿 βˆ’ 𝑂 π‘Ÿ π‘ž 𝐿 , 𝑂 + 1 With varying 𝒆 𝐿 , highly difficult to guarantee the two monotonicity properties.

Challenge

slide-21
SLIDE 21

20

Pinpoints Condition 𝑀 + 1 integers: 𝐿 = 𝐿 < 𝐿 < … < 𝐿 = 𝐿 For 𝑗 = 0, … , 𝑀 and 0 ≀ πœ‡ < 1, define 𝐿 = 1 βˆ’ πœ‡ 𝐿 + πœ‡πΏ

  • 𝒆 = 1 βˆ’ πœ‡ 𝒆 𝐿

+ πœ‡π’† 𝐿

  • π‘Ÿ

βˆ—

= 1 βˆ’ πœ‡ π‘Ÿ

βˆ— 𝐿

+ πœ‡π‘Ÿ

βˆ— 𝐿

  • Interpolation Approach
  • βˆƒ πœ— such that π‘Ÿ

βˆ— 𝐿

βˆ’ π‘Ÿ

βˆ— 𝐿

β‰₯ πœ—.

  • βˆƒ πœ— such that 𝐿

> 𝐾(𝒆).

  • βˆƒ 0 < π‘ž < π‘ž < 1 such that π‘ž ≀ π‘ž(𝐿

) ≀ π‘ž.

  • Extension of definition of π‘Ÿ(𝒒, 𝐿

) for non-integer 𝐿

  • π‘Ÿ 𝒒, 𝐿

= 𝐿 + 1 βˆ’ 𝐿 π‘Ÿ 𝒒, 𝐿

  • + 𝐿

βˆ’ 𝐿

  • π‘Ÿ(𝒒, 𝐿

+ 1) This inequality should be satisfied π‘Ÿ π‘žπ’†, 𝐿 ≀ π‘Ÿ

βˆ—

≀ π‘Ÿ π‘žπ’†, 𝐿 . π‘ž 𝐿 is designed for 𝑀 + 1 integers 𝐿 = 𝐿 < 𝐿 < … < 𝐿 = 𝐿 to satisfy Pinpoints Condition. For every 𝐿 = 𝐿 , choose π‘ž 𝐿 as the solution of π‘Ÿ π‘ž(𝐿 )𝒆, 𝐿 = π‘Ÿ

βˆ— .

slide-22
SLIDE 22

21

Multiple Options: Distributed MAC Algorithm

Transmitters Receiver

Initialize transmission probability vector Measures the success probability of virtual packet π‘Ÿ and feeds it back to the transmitters. Derive a user number estimate 𝐿 by solving π‘Ÿ

βˆ— 𝐿

= π‘Ÿ Update transmission probability vector by 𝒒 = 1 βˆ’ 𝛽 𝒒 + 𝛽𝒒(𝐿 )𝑔𝑝𝑠 𝑙 = 1, … , 𝐿 Converge End Yes No At equilibrium: If 𝐿 = 𝐿 then π‘Ÿ

βˆ— 𝐿

= π‘Ÿ If 𝐿 > 𝐿 then π‘Ÿ

βˆ— 𝐿

< π‘Ÿ If 𝐿 < 𝐿 then π‘Ÿ

βˆ— 𝐿

> π‘Ÿ Need to prove only monotonicity of π‘Ÿ

βˆ—(𝐿

)

slide-23
SLIDE 23

22

Multiple Options: Convergence

Monotonicity and Gradient Condition

For 𝐿 ≀ 𝐿 ≀ 𝐿:

  • 𝒒 𝐿

= π‘ž 𝐿 𝒆(𝐿 ) should be Lipschitz continuous in 𝐿

  • 𝒒 𝐿

βˆ’ 𝒒 𝐿

  • ≀ 𝐿

𝐿

βˆ’ 𝐿 .

  • π‘Ÿ

βˆ—(𝐿

) should be continuous and strictly decreasing in 𝐿

  • π‘Ÿ

βˆ— 𝐿

βˆ’ π‘Ÿ

βˆ— 𝐿

  • β‰₯ πœ— 𝐿

βˆ’ 𝐿 .

  • βˆƒ πœ— > 0 ; 𝐿

> 𝐾(𝒆(𝐿 )).

  • βˆƒ 0 < π‘ž < π‘ž < 1 such that π‘ž ≀ π‘ž(𝐿

) ≀ π‘ž.

  • Users update their transmission probability vectors by

adopting proposed MAC algorithm.

  • Head and Tail Condition is satisfied.
  • For 𝐿

≀ 𝐿 and 𝐿 β‰₯ 𝐿: 𝒒(𝐿 ) and π‘Ÿ

βˆ—(𝐿

) are designed like single transmission option

  • For 𝐿 ≀ 𝐿

≀ 𝐿: 𝒒(𝐿 ) and π‘Ÿ

βˆ—(𝐿

) satisfy Monotonicity and Gradient Condition.

  • Associated ODE has unique equilibrium at

π‘Έβˆ— = πŸβ¨‚π’’(𝐿).

  • Target transmission probability vector 𝒒

(𝑸) satisfies Mean-Bias and Lipschitz continuity Conditions

  • Transmission probability vectors of all

users converge to π‘Έβˆ— = πŸβ¨‚π’’(𝐿).

Contribution: Theorem

Using Interpolation Approach, π‘ž 𝐿 and π‘Ÿ

βˆ—(𝐿

) satisfy Monotonicity and Gradient Condition. Theorem

slide-24
SLIDE 24

23

Multiple Options: Simulation

Head Regime Tail Regime 𝒆 = 1 0 𝐷 = 1 ; π‘˜ ≀ 2, 𝐷 = 0 ; π‘˜ > 2 𝐷 = 𝐷; π‘˜ β‰₯ 0 𝑦

βˆ— = 2.27, 𝑐 = 1.01, 𝛿 = 2

𝒆 = 0 1 𝐷 = 1 ; π‘˜ ≀ 11, 𝐷 = 0 ; π‘˜ > 11 𝐷 = 1 ; π‘˜ ≀ 8, 𝐷 = 0 ; π‘˜ > 8 𝑦

βˆ— = 8.82, 𝑐 = 1.01, 𝛿 = 8

𝐿 = 𝐿 = 4, 𝐿 = 5, , 𝐿 = 6, , 𝐿 = 𝐿 = 10

slide-25
SLIDE 25

24

Future Research: Priority Users and Multiple Channels

  • Multiple access network with two groups of users.
  • Single transmission option.
  • 𝐿 homogenous high-priority users and 𝐿 homogenous low-priority users.
  • Model a general channel using real channel parameter set 𝐷 and the virtual channel parameter set 𝐷 .
  • There exists a virtual packet in each time slot.
  • Define 𝛿 =
  • .

π‘ž π‘ž Extend the result to network with multiple user groups with different priority levels network with multi channels

Future Research Problem Two User Groups

slide-26
SLIDE 26

Preliminary Ideas

Step 1

  • Define the theoretical channel contention measure as a function of 𝛿 and 𝑂

to be decreasing in 𝑂 .

  • Estimate the number of low-priority users by comparing the theoretical channel contention measure

with the real channel contention measure. Step 2

  • Develop a distributed MAC algorithm to guarantee the system converges to a unique equilibrium.
  • Prove its Convergence and uniqueness of the equilibrium.

Step 3

  • Investigate the impact of a mismatched 𝛿 on location of system equilibrium.

Steps

25

slide-27
SLIDE 27

Thanks