Network Coding Protocols with Delay and Energy Constraints

Total Page:16

File Type:pdf, Size:1020Kb

Network Coding Protocols with Delay and Energy Constraints Maricica Nistor Network Coding Protocols with Delay and Energy Constraints MAP-tele Doctoral Programme em Telecommunications Departamento de Engenharia Eletrot´ecnica e de Computadores Faculdade de Engenharia da Universidade do Porto May 2014 Maricica Nistor Network Coding Protocols with Delay and Energy Constraints Tese submetida `aFaculdade de Engenharia da Universidade do Porto para obten¸c˜ao do grau de Doutor em Telecomunica¸c˜oes Orientadores: Professor Doutor Jo˜ao Barros, Universidade do Porto, Portugal Professor Doutor Daniel E. Lucani, Aalborg University, Denmark May 2014 2 Acknowledgements I would like to thank my advisor, Professor Jo˜ao Barros, for his support, en- couragement, and guidance throughout my PhD. I would also like to thank my co-advisor, Professor Daniel E. Lucani, for his help and patience, and the way he really made my life more enjoyable during these last years. I thank my colleagues from IT Porto for the good moments we spent to- gether and all research collaborators I worked with during my PhD. A special thank goes to my family for the unconditional support, trust, and because they never stop to believe in me. I would also like to thank my friends for the encouragements, advises, and for being always close to me. Finally, I would like to thank Luis Monteiro, for his love, patience, and support. I dedicate this work to Luis Monteiro! This work was partially funded by the Funda¸c˜ao Calouste Gulbenkian un- der grant 103905 and by Funda¸c˜ao para a Ciˆencia e Tecnologia (Portuguese Foundation for Science and Technology) under grant SFRH-BD-61953-2009. 3 4 Abstract Network coding is a technique that proposes a different approach for the protocol design in data communication networks. Thus, the nodes in the network are allowed not only to store and forward data packets, but also to process and mix different packets in a single coded packet. By using this technique, the throughput and robustness of the network can be significantly improved. However, the transmission delay of network coding is still not well understood. In real-time communication systems with stringent delay con- straints, understanding the transmission delay distribution is at the core of implementing network coding in practical scenarios. Moreover, the benefits of network coding for broadcast scenarios have been proven, but the use of this technique in data gathering applications is limited. Unlike broadcast applications, where the main objective is to minimize the transmission delay, in data gathering applications the challenge is to reduce the data collection time, called the completion time. The inherent diversity and requirements of data gathering applications make this completion time minimization even more challenging and application-driven. Beyond transmission time consid- erations, network coding requires additional processing to generate the coded packets, which may influence the data transmission performance. In practical scenarios, where the power levels are fixed for different processes, e.g., trans- mission of data, generation of coded packets, the main challenge to improve the energy efficiency of the system is to decrease the transmission time. This implies careful attention in terms of energy efficiency of the overall system. Thus, the focus of the thesis is on the design of communication protocols based on network coding subject to performance metrics that include the data transmission time, the data collection time, and the energy consump- tion. Moreover, we consider different constraints, i.e., application constraints (e.g., deadline, network size, topology, length of the data messages), network constraints (e.g., data loss), design constraints (e.g., feedback type, limited number of data packets). We start by exploring the delay behaviour of network coding in broad- cast applications. Previous results are typically asymptotic in nature or focus 5 mainly on the average delay performance. Seeking to characterize the com- plete delay distribution of network coding, we present a methodology that is feasible for fixed number of receivers, limited field size and number of data messages (generation size). Our findings can be used to optimize network coding protocols with respect to not only to their average but also to their worst-case delay. Second, we deal with the data transmission performance for data gath- ering applications, where the broadcast properties of network coding can be again explored in more challenged networks. Here, we employ different spar- sity levels for the coded data messages and types of feedback, and analyse the benefits of network coding for two topologies, i.e., random and line net- works, using analytical and numerical results. The findings can be extended to large scale networks. We conclude that minimizing the completion time can be achieved for a wide variety of sparsity-feedback pairs given the oppor- tunity that network designers have to choose the setting that best matches their devices capabilities. We then focus on the hardware characteristics of battery-powered devices that are critical for the design of energy efficient communication protocols. Aiming at a systematic approach to choose protocols based on specific devices or to devise protocols that adapt to device characteristics, we first identify the hardware features of various devices and define a total energy consumption model of the network, which leads to a new hardware abstraction. Secondly, we illustrate the need of the hardware abstraction by evaluating the en- ergy cost of two communication protocols, one based on network coding and the other based on Automatic Repeat reQuest and Time Division Multiple Access. The findings show that (a) the energy cost for a protocol varies sig- nificantly on different device platforms and (b) the protocols can be adapted to the underlying hardware for a maximum energy efficiency. Our results are supported with real-life measurements using sensor motes, i.e., TelosB. With this in mind, we use the new hardware abstraction to provide mech- anisms to optimize a communication protocol in terms of energy consump- tion. For this, we consider different levels of feedback to acknowledge the successful transmission of the data. Thus, we provide the potential of our contributions by illustrating how to (1) optimize the protocol to match the hardware and (2) optimize the protocol and the hardware jointly. The results show that the correct level of feedback is highly dependent on the platform of the device. We cross-validate the results with real-life implementations. 6 Resumo A codifica¸c˜ao de rede (network coding) ´euma t´ecnica que prop˜oe uma abor- dagem differente para a concep¸c˜ao de protocol em redes de comunica¸c˜ao de dados. Os n´os na rede s˜ao permitidos n˜ao apenas para armazenar e trans- mitir pacotes de dados, mas tamb´em para processar e misturar diferentes pacotes num ´unico pacote codificado. Ao utilizar esta t´ecnica, o rendimento e a robustez da rede podem ser significativamente melhorados. No entanto, o atraso das transmiss˜oes (transmission delay) da codifica¸c˜ao de rede ainda n˜ao ´ecompletamente compreendido. Em sistemas de comunica¸c˜ao em tempo real com restri¸c˜oes r´ıgidas relativas ao atraso da informa¸c˜ao, a compreens˜ao da distribui¸c˜ao deste atraso ´emuito importante para a implementa¸c˜ao de cod- ifica¸c˜ao de rede em cen´arios pr´aticos. Os benef´ıcios da codifica¸c˜ao de rede em ambientes de transmiss˜ao em broadcast tˆem sido constantemente prova- dos, por´em, o uso desta t´ecnica em aplica¸c˜oes de recolha massiva de dados ´edesconhecida. Ao contrario das aplica¸c˜oes de broadcast onde o principal objectivo ´eminimizar o atraso das transmiss˜oes, nas aplica¸c˜oes de recolha de dados o grande desafio ´eminimizar o tempo de coleta destes (comple- tion time). A diversidade e os requisitos inerentes `as aplica¸c˜oes de coleta de dados tornam esta minimiza¸c˜ao do tempo de coleta ainda mais desafiante e orientada `as aplica¸c˜oes. Para al´em das considera¸c˜oes do tempo de trans- miss˜ao, a codifica¸c˜ao de rede requer processamento adicional para realizar as combina¸c˜oes dos pacotes de dados. Em cen´arios pr´aticos, onde os n´ıveis de potˆencia s˜ao fixos para os diferentes processos, e.g., a transmiss˜ao de dados, gera¸c˜ao de pacotes codificados, o principal desafio para melhorar a eficiˆencia energ´etica do sistema ´ediminuir o tempo de transmiss˜ao. Isto implica uma aten¸c˜ao especial em termos de eficiˆencia energ´etica do sistema global. Assim, o foco da tese est´ana concep¸c˜ao de protocolos de comunica¸c˜ao baseados em codifica¸c˜ao de rede, considerando como m´etricas de desempenho destes o tempo de transmiss˜ao, o tempo da coleta de dados e o consumo de energia. Al´em disso, tomamos em conta diferentes condicionalismos, como s˜ao os requisitos aplicacionais (e.g., o prazo de entrega, o tamanho da rede, a topologia, o comprimento das mensagens de dados), as limita¸c˜oes da rede 7 (e.g., perda de dados) e as condi¸c˜oes impostas pelo projeto (e.g., o tipo de feedback, o n´umero limitado dos pacotes de dados). Em primeiro lugar, exploramos o comportamento de atraso de codifica¸c˜ao de rede em aplica¸c˜oes de broadcast. Os resultados anteriores s˜ao tipicamente assint´oticos e concentram-se principalmente no desempenho m´edio de atraso. Para determinar uma completa caracteriza¸c˜ao da distribui¸c˜ao de atraso para a codifica¸c˜ao de rede, ´eapresentada uma metodologia que ´evalida para um determinado n´umero de receptores, tamanho de campo e n´umero de mensagens de dados (tamanho da gera¸c˜ao). Os nossos resultados podem ser usados para optimizar os protocolos de codifica¸c˜ao de rede n˜ao s´oem rela¸c˜ao ao desempenho medio, mas tamb´em em fun¸c˜ao do comportamento no pior caso.
Recommended publications
  • Theory and Modelling of Single-Electronic Systems
    Theory and Modelling of Single-Electronic Systems Sharief Fadul Babikir October 1993 A Thesis presented to the University of Glasgow Department of Electronics and Electrical Engineering for the degree of Doctor of Philosophy © Sharief Fadul Babikir, 1993 ProQuest Number: 13833803 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a com plete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. uest ProQuest 13833803 Published by ProQuest LLC(2019). Copyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States C ode Microform Edition © ProQuest LLC. ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106- 1346 GLASGOW university irm&RY _ 4S .1 "I3 G ( i ) Abstract In this thesis a theoretical study is made of the behaviour of single- electronic devices and systems. It is argued that the properties of single- electronic systems can be determined if the densities of the legal soliton states are known. The dynamics of the tunnelling electrons in such systems are modelled as a traffic process. An exact analytical technique based on the conventional Traffic Theory is formulated in the thesis. This new technique is compared with the traditional Monte-Carlo method and is shown to be superior, both in accuracy and speed. An algorithm that correctly and efficiently determines the set of active soliton states and the relationship between the states is also described.
    [Show full text]
  • Fountain Codes
    6.972 PRINCIPLES OF DIGITAL COMMUNICATION II Fountain Codes Gauri Joshi, Joong Bum Rhim, John Sun, Da Wang December 8, 2010 Contents 1 Digital Fountain Ideal3 2 Preliminaries 4 2.1 Binary Erasure Channel...................................4 2.2 Edge Degree Distributions..................................4 3 Tornado Codes 5 3.1 Code Construction......................................5 3.2 Optimal Degree Sequences..................................7 3.3 Practical Considerations...................................9 3.3.1 Matlab Implementation...............................9 4 LT Codes 9 4.1 Code Construction...................................... 10 4.1.1 Encoding Process................................... 10 4.1.2 Decoding Process................................... 10 4.2 Degree Distribution...................................... 11 4.2.1 The Ideal Soliton Distribution............................ 12 4.2.2 The Robust Soliton Distribution.......................... 13 4.3 Performance Analysis.................................... 14 4.3.1 Degree Distribution................................. 15 4.3.2 Density Evolution.................................. 15 4.4 Implementation........................................ 17 5 Raptor Codes 17 5.1 Code Construction...................................... 18 5.2 Error Analysis......................................... 19 5.3 Practical Considerations................................... 19 5.3.1 Finite-length Raptor Codes............................. 20 5.3.2 Systematic Raptor Codes.............................. 20 5.3.3
    [Show full text]
  • Design of High Performance Low Latency Rateless Codes
    DESIGN OF HIGH PERFORMANCE LOW LATENCY RATELESS CODES A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF NATURAL AND APPLIED SCIENCES OF ÇANKAYA UNIVERSITY BY NADHIR IBRAHIM ABDULKHALEQ IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF PHILOSOPHY OF DOCTORATE IN THE DEPARTMENT OF ELECTRONIC AND COMMUNICATION ENGINEERING SEPTEMBER 2017 ABSTRACT DESIGN OF HIGH PERFORMANCE LOW LATENCY RATELESS CODES ABDULKHALEQ, Nadhir Ibrahim Ph.D., Electronic and Communication Engineering Department Supervisor: Assoc. Prof. Dr. Orhan GAZI September 2017, 109 pages Luby Transform (LT) codes are one of the best rateless codes mainly designed for binary erasure channel. The characteristics of such codes perfectly performing when used with bulk data files, however a performance degradation has been observed when using them with short length messages. In this thesis, we present a new design for rateless codes, particularly an efficient LT codes using robust soliton distribution (RSD) as a degree generation method and tested in both binary erasure channel (BEC) and noisy channels like the additive white Gaussian noise (AWGN) channel. First, a new proposed decoding technique is defined as belief propagation-pattern recognition (BP-PR) is implemented to enhance the decoding ability of the conventional (BP) algorithm to overcome the problem of losing degree-one coded symbols which caused early decoding termination. The simulation results approve the improvement of the BP-PR when used with LT-RSD and outperforms the bit error rate (BER) records for the state of art techniques like memory-based robust Soliton distribution using conventional BP (LT-MBRSD-BP) or the Gaussian elimination assisted belief iv propagation (LT-RSD-BP-GE) and improve the records for the BER when used with MBRSD, ISD and optimal degree distribution (ODD), to form the new code called (LT-MBRSD-BP-PR),(LT-ISD-BP-PR) and (LT-ODD-BP-PR) respectively.
    [Show full text]
  • An ECSO-Based Approach for Optimizing Degree Distribution of Short-Length LT Codes Peng Luo1*, Hui Fan1, Weiguang Shi2, Xiaoli Qi2, Yuhao Zhao1 and Xueqing Zhou1
    Luo et al. EURASIP Journal on Wireless Communications and Networking (2019) 2019:76 https://doi.org/10.1186/s13638-019-1376-6 RESEARCH Open Access An ECSO-based approach for optimizing degree distribution of short-length LT codes Peng Luo1*, Hui Fan1, Weiguang Shi2, Xiaoli Qi2, Yuhao Zhao1 and Xueqing Zhou1 Abstract Degree distribution plays a great role in the performance of Luby transform codes. Typical degree distributions such as ideal soliton distribution and robust soliton distribution are easy to implement and widely used. Nevertheless, their adaptabilities are not always outstanding in various code lengths, especially in the case of short length. In this paper, our work is to optimize degree distributions for the short-length LT codes by using swarm intelligence algorithm, considering its conceptual simplicity, high efficiency, flexibility, and robustness. An optimization problem model based on sparse degree distributions is proposed in the first place. Then, a solution on the basis of an enhanced chicken swarm optimization algorithm, termed as ECSO, is designed for the problem. In ECSO, substitution of bottom individuals, revision of chicks’ update equation, and introduction of differential evolution are designed to enhance the ability of optimization. Simulation comparisons show that the proposed solution achieves much better performance than two other swarm intelligence-based solutions. Keywords: Fountain codes, LT code, Degree distribution, Differential evolution, Chicken swarm optimization 1 Introduction leading a wider scope of application, including deep space Power line communication (PLC) is regarded as a ser- communication [8], data distribution [9], wireless sensor ious candidate for the realization of smart grid networks networks [10], and cloud storage [11].
    [Show full text]
  • Incremental Redundancy, Fountain Codes and Advanced Topics
    GRAPH CODES AND THEIR APPLICATIONS 2014 DRAFT Incremental Redundancy, Fountain Codes and Advanced Topics Suayb S. Arslan 141 Innovation Dr. Irvine, CA 92617 [email protected] “All men by nature desire knowledge." Aristotle Version 0.2 – July 2014 Revision History: • Jan. 2014, First version is released. • Feb. 2014, Uploaded on arXiv.org for public access. • Jul. 2014, Version 0.2 is released. – Table of Contents is added for easy reference. – Fixes few grammatical errors, changes the organization and extends the section of systematic fountain code constructions arXiv:1402.6016v2 [cs.IT] 14 Jul 2014 1 GRAPH CODES AND THEIR APPLICATIONS 2014 DRAFT CONTENTS 1 Abstract 3 2 Introduction 4 2.1 Notation ........................................ 4 2.2 ChannelModelandLinearCodes . ..... 5 2.3 IncrementalRedundancy . ..... 6 3 Linear Fountain Codes 8 3.1 High density Fountain codes: Maximum Likelihood Decoding .......... 11 3.2 Low Density Fountain codes: BP decoding and LT Codes . .......... 14 3.3 Asymptotical performance of LT codes under BP Decoding . ........... 20 3.4 Expected Ripple size and Degree Distribution Design . ............. 23 3.5 Systematic Constructions of LT codes . ......... 26 3.6 Generalizations/Extensions of LT codes: Unequal Error Protection . 27 4 Concatenated Linear Fountain Codes 29 4.1 Asymptotically good degree distributions . ............ 30 4.2 Precoding ....................................... 32 4.2.1 TornadoCodesasPrecodes . 33 4.2.2 LDPCCodesasPrecodes . 34 4.2.3 HammingCodesasPrecodes . 36 4.2.4 Repeat and Accumulate Codes as Precodes . ...... 38 4.3 Concatenated Fountain Code Failure Probability . ............ 38 4.4 Systematic Constructions of Concantenated Fountain Codes ........... 40 5 Advanced Topics 45 5.1 Connectionstotherandomgraphtheory . ........ 46 5.2 InactivationDecoding . ...... 49 5.3 Standardized Fountain Codes for Data Streaming .
    [Show full text]