-
Pinching Antennas: Principles, Applications and Challenges
Authors:
Zheng Yang,
Ning Wang,
Yanshi Sun,
Zhiguo Ding,
Robert Schober,
George K. Karagiannidis,
Vincent W. S. Wong,
Octavia A. Dobre
Abstract:
Flexible-antenna systems, such as fluid antennas and movable antennas, have been recognized as key enabling technologies for sixth-generation (6G) wireless networks, as they can intelligently reconfigure the effective channel gains of the users and hence significantly improve their data transmission capabilities. However, existing flexible-antenna systems have been designed to combat small-scale f…
▽ More
Flexible-antenna systems, such as fluid antennas and movable antennas, have been recognized as key enabling technologies for sixth-generation (6G) wireless networks, as they can intelligently reconfigure the effective channel gains of the users and hence significantly improve their data transmission capabilities. However, existing flexible-antenna systems have been designed to combat small-scale fading in non-line-of-sight (NLoS) conditions. As a result, they lack the ability to establish line-of-sight links, which are typically 100 times stronger than NLoS links. In addition, existing flexible-antenna systems have limited flexibility, where adding/removing an antenna is not straightforward. This article introduces an innovative flexible-antenna system called pinching antennas, which are realized by applying small dielectric particles to waveguides. We first describe the basics of pinching-antenna systems and their ability to provide strong LoS links by deploying pinching antennas close to the users as well as their capability to scale up/down the antenna system. We then focus on communication scenarios with different numbers of waveguides and pinching antennas, where innovative approaches to implement multiple-input multiple-output and non-orthogonal multiple access are discussed. In addition, promising 6G-related applications of pinching antennas, including integrated sensing and communication and next-generation multiple access, are presented. Finally, important directions for future research, such as waveguide deployment and channel estimation, are highlighted.
△ Less
Submitted 18 January, 2025;
originally announced January 2025.
-
Analysis Methodology for Age of Information under Sequence Based Scheduling
Authors:
Fang Liu,
Wing Shing Wong,
Yuan-Hsun Lo,
Yijin Zhang,
Chung Shue Chen
Abstract:
We focus on the Age of Information (AoI) performance in a system where each user generates packets periodically to send to a common access point (AP) for status updating. To avoid heavy overhead, we assume that channel sensing, feedback information from the AP, and time synchronization are not available in the system. We adopt a multi-access scheme called the sequence scheme, where each user is as…
▽ More
We focus on the Age of Information (AoI) performance in a system where each user generates packets periodically to send to a common access point (AP) for status updating. To avoid heavy overhead, we assume that channel sensing, feedback information from the AP, and time synchronization are not available in the system. We adopt a multi-access scheme called the sequence scheme, where each user is assigned a periodic binary sequence to schedule their transmissions. In our previous work [18], we have thoroughly studied the AoI performance under sequence scheme when the period of schedule sequences, $L$, is equal to the status generating period, $T$. The results can be extended to the case where $T>L$. However, the case of $T<L$ is not covered by [18]. Therefore, in this paper, we concentrate on analyzing the AoI performance in the case of $T<L$, which is more challenging and requires different approaches. We conduct in-depth analysis on this case and develop a mathematical tool based on integer partitions to facilitate the analysis. We derive low-complexity closed-form expressions for two scenarios under $T<L$. Based on the obtained analytical results, we propose an algorithm to optimize the construction parameters of the sequence scheme. Finally, we compare our proposed sequence scheme with two commonly used baselines, and show that our proposed scheme outperforms the baselines in terms of AoI performance while consuming less energy.
△ Less
Submitted 14 November, 2024;
originally announced November 2024.
-
Multiset Combinatorial Gray Codes with Application to Proximity Sensor Networks
Authors:
Chung Shue Chen,
Wing Shing Wong,
Yuan-Hsun Lo,
Tsai-Lien Wong
Abstract:
We investigate coding schemes that map source symbols into multisets of an alphabet set. Such a formulation of source coding is an alternative approach to the traditional framework and is inspired by an object tracking problem over proximity sensor networks. We define a \textit{multiset combinatorial Gray code} as a mulitset code with fixed multiset cardinality that possesses combinatorial Gray co…
▽ More
We investigate coding schemes that map source symbols into multisets of an alphabet set. Such a formulation of source coding is an alternative approach to the traditional framework and is inspired by an object tracking problem over proximity sensor networks. We define a \textit{multiset combinatorial Gray code} as a mulitset code with fixed multiset cardinality that possesses combinatorial Gray code characteristic. For source codes that are organized as a grid, namely an integer lattice, we propose a solution by first constructing a mapping from the grid to the alphabet set, the codes are then defined as the images of rectangular blocks in the grid of fixed dimensions. We refer to the mapping as a \textit{color mapping} and the code as a \textit{color multiset code}. We propose the idea of product multiset code that enables us to construct codes for high dimensional grids based on 1-dimensional (1D) grids. We provide a detailed analysis of color multiset codes on 1D grids, focusing on codes that require the minimal number of colors. To illustrate the application of such a coding scheme, we consider an object tracking problem on 2D grids and show its efficiency, which comes from exploiting transmission parallelism. Some numerical results are presented to conclude the paper.
△ Less
Submitted 20 October, 2024;
originally announced October 2024.
-
Multiple Access Techniques for Intelligent and Multi-Functional 6G: Tutorial, Survey, and Outlook
Authors:
Bruno Clerckx,
Yijie Mao,
Zhaohui Yang,
Mingzhe Chen,
Ahmed Alkhateeb,
Liang Liu,
Min Qiu,
Jinhong Yuan,
Vincent W. S. Wong,
Juan Montojo
Abstract:
Multiple access (MA) is a crucial part of any wireless system and refers to techniques that make use of the resource dimensions to serve multiple users/devices/machines/services, ideally in the most efficient way. Given the needs of multi-functional wireless networks for integrated communications, sensing, localization, computing, coupled with the surge of machine learning / artificial intelligenc…
▽ More
Multiple access (MA) is a crucial part of any wireless system and refers to techniques that make use of the resource dimensions to serve multiple users/devices/machines/services, ideally in the most efficient way. Given the needs of multi-functional wireless networks for integrated communications, sensing, localization, computing, coupled with the surge of machine learning / artificial intelligence (AI) in wireless networks, MA techniques are expected to experience a paradigm shift in 6G and beyond. In this paper, we provide a tutorial, survey and outlook of past, emerging and future MA techniques and pay a particular attention to how wireless network intelligence and multi-functionality will lead to a re-thinking of those techniques. The paper starts with an overview of orthogonal, physical layer multicasting, space domain, power domain, ratesplitting, code domain MAs, and other domains, and highlight the importance of researching universal multiple access to shrink instead of grow the knowledge tree of MA schemes by providing a unified understanding of MA schemes across all resource dimensions. It then jumps into rethinking MA schemes in the era of wireless network intelligence, covering AI for MA such as AI-empowered resource allocation, optimization, channel estimation, receiver designs, user behavior predictions, and MA for AI such as federated learning/edge intelligence and over the air computation. We then discuss MA for network multi-functionality and the interplay between MA and integrated sensing, localization, and communications. We finish with studying MA for emerging intelligent applications before presenting a roadmap toward 6G standardization. We also point out numerous directions that are promising for future research.
△ Less
Submitted 2 January, 2024;
originally announced January 2024.
-
An Uncertainty Aided Framework for Learning based Liver $T_1ρ$ Mapping and Analysis
Authors:
Chaoxing Huang,
Vincent Wai Sun Wong,
Queenie Chan,
Winnie Chiu Wing Chu,
Weitian Chen
Abstract:
Objective: Quantitative $T_1ρ$ imaging has potential for assessment of biochemical alterations of liver pathologies. Deep learning methods have been employed to accelerate quantitative $T_1ρ$ imaging. To employ artificial intelligence-based quantitative imaging methods in complicated clinical environment, it is valuable to estimate the uncertainty of the predicated $T_1ρ$ values to provide the con…
▽ More
Objective: Quantitative $T_1ρ$ imaging has potential for assessment of biochemical alterations of liver pathologies. Deep learning methods have been employed to accelerate quantitative $T_1ρ$ imaging. To employ artificial intelligence-based quantitative imaging methods in complicated clinical environment, it is valuable to estimate the uncertainty of the predicated $T_1ρ$ values to provide the confidence level of the quantification results. The uncertainty should also be utilized to aid the post-hoc quantitative analysis and model learning tasks. Approach: To address this need, we propose a parametric map refinement approach for learning-based $T_1ρ$ mapping and train the model in a probabilistic way to model the uncertainty. We also propose to utilize the uncertainty map to spatially weight the training of an improved $T_1ρ$ mapping network to further improve the mapping performance and to remove pixels with unreliable $T_1ρ$ values in the region of interest. The framework was tested on a dataset of 51 patients with different liver fibrosis stages. Main results: Our results indicate that the learning-based map refinement method leads to a relative mapping error of less than 3% and provides uncertainty estimation simultaneously. The estimated uncertainty reflects the actual error level, and it can be used to further reduce relative $T_1ρ$ mapping error to 2.60% as well as removing unreliable pixels in the region of interest effectively. Significance: Our studies demonstrate the proposed approach has potential to provide a learning-based quantitative MRI system for trustworthy $T_1ρ$ mapping of the liver.
△ Less
Submitted 9 October, 2023; v1 submitted 5 July, 2023;
originally announced July 2023.
-
Multichannel Conflict-Avoiding Codes of Weights Three and Four
Authors:
Yuan-Hsun Lo,
Kenneth W. Shum,
Wing Shing Wong,
Yijin Zhang
Abstract:
Conflict-avoiding codes (CACs) were introduced by Levenshtein as a single-channel transmission scheme for a multiple-access collision channel without feedback. When the number of simultaneously active source nodes is less than or equal to the weight of a CAC, it is able to provide a hard guarantee that each active source node transmits at least one packet successfully within a fixed time duration,…
▽ More
Conflict-avoiding codes (CACs) were introduced by Levenshtein as a single-channel transmission scheme for a multiple-access collision channel without feedback. When the number of simultaneously active source nodes is less than or equal to the weight of a CAC, it is able to provide a hard guarantee that each active source node transmits at least one packet successfully within a fixed time duration, no matter what the relative time offsets between the source nodes are. In this paper, we extend CACs to multichannel CACs for providing such a hard guarantee over multiple orthogonal channels. Upper bounds on the number of codewords for multichannel CACs of weights three and four are derived, and constructions that are optimal with respect to these bounds are presented.
△ Less
Submitted 20 April, 2021; v1 submitted 24 September, 2020;
originally announced September 2020.
-
Schedule Sequence Design for Broadcast in Multi-channel Ad Hoc Networks
Authors:
Fang Liu,
Kenneth W. Shum,
Yijin Zhang,
Wing Shing Wong
Abstract:
We consider a single-hop ad hoc network in which each node aims to broadcast packets to its neighboring nodes by using multiple slotted, TDD collision channels. There is no cooperation among the nodes. To ensure successful broadcast, we propose to pre-assign each node a periodic sequence to schedule transmissions and receptions at each time slot. These sequences are referred to as schedule sequenc…
▽ More
We consider a single-hop ad hoc network in which each node aims to broadcast packets to its neighboring nodes by using multiple slotted, TDD collision channels. There is no cooperation among the nodes. To ensure successful broadcast, we propose to pre-assign each node a periodic sequence to schedule transmissions and receptions at each time slot. These sequences are referred to as schedule sequences. Since each node starts its transmission schedule independently, there exist relative time offsets among the schedule sequences they use. Our objective is to design schedule sequences such that each node can transmit at least one packet to each of its neighbors successfully within a common period, no matter what the time offsets are. The sequence period should be designed as short as possible. In this paper, we analyze the lower bound on sequence period, and propose a sequence construction method by which the period can achieve the same order as the lower bound.
We also consider the random scheme in which each node transmits or receives on a channel at each time slot with a pre-determined probability. The frame length and broadcast completion time under different schemes are compared by numerical studies.
△ Less
Submitted 19 September, 2020;
originally announced September 2020.
-
Delay-Constrained Topology-Transparent Distributed Scheduling for MANETs
Authors:
Lei Deng,
Fang Liu,
Yijin Zhang,
Wing Shing Wong
Abstract:
Transparent topology is common in many mobile ad hoc networks (MANETs) such as vehicle ad hoc networks (VANETs), unmanned aerial vehicle (UAV) ad hoc networks, and wireless sensor networks due to their decentralization and mobility nature. There are many existing works on distributed scheduling scheme design for topology-transparent MANETs. Most of them focus on delay-unconstrained settings. Howev…
▽ More
Transparent topology is common in many mobile ad hoc networks (MANETs) such as vehicle ad hoc networks (VANETs), unmanned aerial vehicle (UAV) ad hoc networks, and wireless sensor networks due to their decentralization and mobility nature. There are many existing works on distributed scheduling scheme design for topology-transparent MANETs. Most of them focus on delay-unconstrained settings. However, with the proliferation of real-time applications over wireless communications, it becomes more and more important to support delay-constrained traffic in MANETs. In such applications, each packet has a given hard deadline: if it is not delivered before its deadline, its validity will expire and it will be removed from the system. This feature is fundamentally different from the traditional delay-unconstrained one. In this paper, we for the first time investigate distributed scheduling schemes for a topology-transparent MANET to support delay-constrained traffic. We analyze and compare probabilistic ALOHA scheme and deterministic sequence schemes, including the conventional time division multiple access (TDMA), the Galois field (GF) sequence scheme proposed in \cite{chlamtac1994making}, and the combination sequence scheme that we propose for a special type of sparse network topology.We use both theoretical analysis and empirical simulations to compare all these schemes and summarize the conditions under which different individual schemes perform best.
△ Less
Submitted 25 December, 2020; v1 submitted 13 June, 2020;
originally announced June 2020.
-
Online Bitrate Selection for Viewport Adaptive 360-Degree Video Streaming
Authors:
Ming Tang,
Vincent W. S. Wong
Abstract:
360-degree video streaming provides users with immersive experience by letting users determine their field-of-views (FoVs) in real time. To enhance the users' quality of experience (QoE) given their limited bandwidth, recent works have proposed a viewport adaptive 360-degree video streaming model by exploiting the bitrate adaptation in spatial and temporal domains. Under this video streaming model…
▽ More
360-degree video streaming provides users with immersive experience by letting users determine their field-of-views (FoVs) in real time. To enhance the users' quality of experience (QoE) given their limited bandwidth, recent works have proposed a viewport adaptive 360-degree video streaming model by exploiting the bitrate adaptation in spatial and temporal domains. Under this video streaming model, in this paper, we consider a scenario with a newly generated 360-degree video without viewing history from other users. To maximize the user's QoE, we propose an online bitrate selection algorithm, called OBS360. The proposed online algorithm can adapt to the unknown and heterogeneous users' FoVs and downloading capacities. We prove that the proposed algorithm achieves sublinear dynamic regret under a convex decision set. This suggests that as the number of video segments increases, the performance of the online algorithm approaches the performance of the offline algorithm, where the users' FoVs and downloading capacities are known. We perform simulations with real-world dataset to evaluate the performance of the proposed algorithm. Results show that compared with several existing methods, our proposed algorithm can enhance the users' QoE significantly by improving the viewing bitrate and reducing the inter-segment and intra-segment degradation losses of the users.
△ Less
Submitted 10 April, 2020;
originally announced May 2020.
-
Deep Reinforcement Learning for Task Offloading in Mobile Edge Computing Systems
Authors:
Ming Tang,
Vincent W. S. Wong
Abstract:
In mobile edge computing systems, an edge node may have a high load when a large number of mobile devices offload their tasks to it. Those offloaded tasks may experience large processing delay or even be dropped when their deadlines expire. Due to the uncertain load dynamics at the edge nodes, it is challenging for each device to determine its offloading decision (i.e., whether to offload or not,…
▽ More
In mobile edge computing systems, an edge node may have a high load when a large number of mobile devices offload their tasks to it. Those offloaded tasks may experience large processing delay or even be dropped when their deadlines expire. Due to the uncertain load dynamics at the edge nodes, it is challenging for each device to determine its offloading decision (i.e., whether to offload or not, and which edge node it should offload its task to) in a decentralized manner. In this work, we consider non-divisible and delay-sensitive tasks as well as edge load dynamics, and formulate a task offloading problem to minimize the expected long-term cost. We propose a model-free deep reinforcement learning-based distributed algorithm, where each device can determine its offloading decision without knowing the task models and offloading decision of other devices. To improve the estimation of the long-term cost in the algorithm, we incorporate the long short-term memory (LSTM), dueling deep Q-network (DQN), and double-DQN techniques. Simulation results with 50 mobile devices and five edge nodes show that the proposed algorithm can reduce the ratio of dropped tasks and average task delay by 86.4%-95.4% and 18.0%-30.1%, respectively, when compared with several existing algorithms.
△ Less
Submitted 10 April, 2020;
originally announced May 2020.
-
A Deep Reinforcement Learning Approach for Dynamic Contents Caching in HetNets
Authors:
Manyou Ma,
Vincent W. S. Wong
Abstract:
The recent development in Internet of Things necessitates caching of dynamic contents, where new versions of contents become available around-the-clock and thus timely update is required to ensure their relevance. The age of information (AoI) is a performance metric that evaluates the freshness of contents. Existing works on AoI-optimization of cache content update algorithms focus on minimizing t…
▽ More
The recent development in Internet of Things necessitates caching of dynamic contents, where new versions of contents become available around-the-clock and thus timely update is required to ensure their relevance. The age of information (AoI) is a performance metric that evaluates the freshness of contents. Existing works on AoI-optimization of cache content update algorithms focus on minimizing the long-term average AoI of all cached contents. Sometimes user requests that need to be served in the future are known in advance and can be stored in user request queues. In this paper, we propose dynamic cache content update scheduling algorithms that exploit the user request queues. We consider a special use case where the trained neural networks (NNs) from deep learning models are being cached in a heterogeneous network. A queue-aware cache content update scheduling algorithm based on Markov decision process (MDP) is developed to minimize the average AoI of the NNs delivered to the users plus the cost related to content updating. By using deep reinforcement learning (DRL), we propose a low complexity suboptimal scheduling algorithm. Simulation results show that, under the same update frequency, our proposed algorithms outperform the periodic cache content update scheme and reduce the average AoI by up to 35%.
△ Less
Submitted 16 April, 2020;
originally announced April 2020.
-
Joint User Pairing and Association for Multicell NOMA: A Pointer Network-based Approach
Authors:
Manyou Ma,
Vincent W. S. Wong
Abstract:
In this paper, we investigate the joint user pairing and association problem for multicell non-orthogonal multiple access (NOMA) systems. We consider a scenario where the user equipments (UEs) are located in a multicell network equipped with multiple base stations. Each base station has multiple orthogonal physical resource blocks (PRBs). Each PRB can be allocated to a pair of UEs using NOMA. Each…
▽ More
In this paper, we investigate the joint user pairing and association problem for multicell non-orthogonal multiple access (NOMA) systems. We consider a scenario where the user equipments (UEs) are located in a multicell network equipped with multiple base stations. Each base station has multiple orthogonal physical resource blocks (PRBs). Each PRB can be allocated to a pair of UEs using NOMA. Each UE has the additional freedom to be served by any one of the base stations, which further increases the complexity of the joint user pairing and association algorithm design. Leveraging the recent success on using machine learning to solve numerical optimization problems, we formulate the joint user pairing and association problem as a combinatorial optimization problem. The solution is found using an emerging deep learning architecture called Pointer Network (PtrNet), which has a lower computational complexity compared to solutions based on iterative algorithms and has been proven to achieve near-optimal performance. The training phase of the PtrNet is based on deep reinforcement learning (DRL), and does not require the use of the optimal solution of the formulated problem as training labels. Simulation results show that the proposed joint user pairing and association scheme achieves near-optimal performance in terms of the aggregate data rate, and outperforms the random user pairing and association heuristic by up to 30%.
△ Less
Submitted 15 April, 2020;
originally announced April 2020.
-
Online Inventory Management with Application to Energy Procurement in Data Centers
Authors:
Lin Yang,
Mohammad H. Hajiesmaili,
Ramesh Sitaraman,
Enrique Mallada,
Wing S. Wong,
Adam Wierman
Abstract:
Motivated by the application of energy storage management in electricity markets, this paper considers the problem of online linear programming with inventory management constraints. Specifically, a decision maker should satisfy some units of an asset as her demand, either form a market with time-varying price or from her own inventory. The decision maker is presented a price in slot-by-slot manne…
▽ More
Motivated by the application of energy storage management in electricity markets, this paper considers the problem of online linear programming with inventory management constraints. Specifically, a decision maker should satisfy some units of an asset as her demand, either form a market with time-varying price or from her own inventory. The decision maker is presented a price in slot-by-slot manner, and must immediately decide the purchased amount with the current price to cover the demand or to store in inventory for covering the future demand. The inventory has a limited capacity and its critical role is to buy and store assets at low price and use the stored assets to cover the demand at high price. The ultimate goal of the decision maker is to cover the demands while minimizing the cost of buying assets from the market. We propose BatMan, an online algorithm for simple inventory models, and BatManRate, an extended version for the case with rate constraints. Both BatMan and BatManRate achieve optimal competitive ratios, meaning that no other online algorithm can achieve a better theoretical guarantee. To illustrate the results, we use the proposed algorithms to design and evaluate energy procurement and storage management strategies for data centers with a portfolio of energy sources including the electric grid, local renewable generation, and energy storage systems.
△ Less
Submitted 14 January, 2019;
originally announced January 2019.
-
On Stability Condition of Wireless Networked Control Systems under Joint Design of Control Policy and Network Scheduling Policy
Authors:
Lei Deng,
Cheng Tan,
Wing Shing Wong
Abstract:
In this paper, we study a wireless networked control system (WNCS) with $N \ge 2$ sub-systems sharing a common wireless channel. Each sub-system consists of a plant and a controller and the control message must be delivered from the controller to the plant through the shared wireless channel. The wireless channel is unreliable due to interference and fading. As a result, a packet can be successful…
▽ More
In this paper, we study a wireless networked control system (WNCS) with $N \ge 2$ sub-systems sharing a common wireless channel. Each sub-system consists of a plant and a controller and the control message must be delivered from the controller to the plant through the shared wireless channel. The wireless channel is unreliable due to interference and fading. As a result, a packet can be successfully delivered in a slot with a certain probability. A network scheduling policy determines how to transmit those control messages generated by such $N$ sub-systems and directly influences the transmission delay of control messages. We first consider the case that all sub-systems have the same sampling period. We characterize the stability condition of such a WNCS under the joint design of the control policy and the network scheduling policy by means of $2^N$ linear inequalities. We further simplify the stability condition into only one linear inequality for two special cases: the perfect-channel case where the wireless channel can successfully deliver a control message with certainty in each slot, and the symmetric-structure case where all sub-systems have identical system parameters. We then consider the case that different sub-systems can have different sampling periods, where we characterize a sufficient condition for stability.
△ Less
Submitted 10 November, 2018;
originally announced November 2018.
-
Delay-Constrained Input-Queued Switch
Authors:
Lei Deng,
Wing Shing Wong,
Po-Ning Chen,
Yunghsiang S. Han,
Hanxu Hou
Abstract:
In this paper, we study the delay-constrained input-queued switch where each packet has a deadline and it will expire if it is not delivered before its deadline. Such new scenario is motivated by the proliferation of real-time applications in multimedia communication systems, tactile Internet, networked controlled systems, and cyber-physical systems. The delay-constrained input-queued switch is co…
▽ More
In this paper, we study the delay-constrained input-queued switch where each packet has a deadline and it will expire if it is not delivered before its deadline. Such new scenario is motivated by the proliferation of real-time applications in multimedia communication systems, tactile Internet, networked controlled systems, and cyber-physical systems. The delay-constrained input-queued switch is completely different from the well-understood delay-unconstrained one and thus poses new challenges. We focus on three fundamental problems centering around the performance metric of timely throughput: (i) how to characterize the capacity region? (ii) how to design a feasibility/throughput-optimal scheduling policy? and (iii) how to design a network-utility-maximization scheduling policy? We use three different approaches to solve these three fundamental problems. The first approach is based on Markov Decision Process (MDP) theory, which can solve all three problems. However, it suffers from the curse of dimensionality. The second approach breaks the curse of dimensionality by exploiting the combinatorial features of the problem. It gives a new capacity region characterization with only a polynomial number of linear constraints. The third approach is based on the framework of Lyapunov optimization, where we design a polynomial-time maximum-weight T-disjoint-matching scheduling policy which is proved to be feasibility/throughput-optimal. Our three approaches apply to the frame-synchronized traffic pattern but our MDP-based approach can be extended to more general traffic patterns.
△ Less
Submitted 27 September, 2018; v1 submitted 8 September, 2018;
originally announced September 2018.
-
Forwarding and Optical Indices in an All-Optical BCube Network
Authors:
Suzhen Wang,
Jingjing Luo,
Yuan-Hsun Lo,
Wing Shing Wong
Abstract:
BCube is a highly scalable and cost-effective networking topology, which has been widely applied to modular datacenters. Optical technologies based on Wavelength Division Multiplexing (WDM) are gaining popularity for Data Center Networks (DCNs) due to their technological strengths such as low communication latency, low power consumption, and high link bandwidth. Therefore, it is worth investigatin…
▽ More
BCube is a highly scalable and cost-effective networking topology, which has been widely applied to modular datacenters. Optical technologies based on Wavelength Division Multiplexing (WDM) are gaining popularity for Data Center Networks (DCNs) due to their technological strengths such as low communication latency, low power consumption, and high link bandwidth. Therefore, it is worth investigating optical techniques into the BCube architecture for future DCNs. For this purpose, we study the forwarding and optical indices in an all-optical BCube network. Consider an all-optical BCube network in which every host sets up a connection with every other host. The optical index is the minimum number of wavelengths required by the network to support such a host-to-host traffic, under the restriction that each connection is assigned a wavelength that remains constant in the network. A routing is a set of directed paths specified for all host pairs. By defining the maximum link load of a routing as the maximum number of paths passing through any link, the forwarding index is measured to be the minimum of maximum link load over all possible routings. The forwarding index turns out to be a natural lower bound of the optical index. In this paper, we first compute the forwarding index of an all-optical BCube network. Then, we derive an upper bound of the optical index by providing an oblivious routing and wavelength assignment (RWA) schemes, which attains the lower bound given by the forwarding index in some small cases. Finally, a tighter upper bound is obtained by means of the chromatic numbers in Graph Theory.
△ Less
Submitted 15 April, 2018;
originally announced April 2018.
-
Cache-Aided Non-Orthogonal Multiple Access: The Two-User Case
Authors:
Lin Xiang,
Derrick Wing Kwan Ng,
Xiaohu Ge,
Zhiguo Ding,
Vincent W. S. Wong,
Robert Schober
Abstract:
In this paper, we propose a cache-aided non-orthogonal multiple access (NOMA) scheme for spectrally efficient downlink transmission. The proposed scheme not only reaps the benefits associated with NOMA and caching, but also exploits the data cached at the users for interference cancellation. As a consequence, caching can help to reduce the residual interference power, making multiple decoding orde…
▽ More
In this paper, we propose a cache-aided non-orthogonal multiple access (NOMA) scheme for spectrally efficient downlink transmission. The proposed scheme not only reaps the benefits associated with NOMA and caching, but also exploits the data cached at the users for interference cancellation. As a consequence, caching can help to reduce the residual interference power, making multiple decoding orders at the users feasible. The resulting flexibility in decoding can be exploited for improved NOMA detection. We characterize the achievable rate region of cache-aided NOMA and derive the Pareto optimal rate tuples forming the boundary of the rate region. Moreover, we optimize cache-aided NOMA for minimization of the time required for completing file delivery. The optimal decoding order and the optimal transmit power and rate allocation are derived as functions of the cache status, the file sizes, and the channel conditions. Simulation results confirm that, compared to several baseline schemes, the proposed cache-aided NOMA scheme significantly expands the achievable rate region and increases the sum rate for downlink transmission, which translates into substantially reduced file delivery times.
△ Less
Submitted 19 March, 2019; v1 submitted 29 January, 2018;
originally announced January 2018.
-
Cache-Aided Non-Orthogonal Multiple Access
Authors:
Lin Xiang,
Derrick Wing Kwan Ng,
Xiaohu Ge,
Zhiguo Ding,
Vincent W. S. Wong,
Robert Schober
Abstract:
In this paper, we propose a novel joint caching and non-orthogonal multiple access (NOMA) scheme to facilitate advanced downlink transmission for next generation cellular networks. In addition to reaping the conventional advantages of caching and NOMA transmission, the proposed cache-aided NOMA scheme also exploits cached data for interference cancellation which is not possible with separate cachi…
▽ More
In this paper, we propose a novel joint caching and non-orthogonal multiple access (NOMA) scheme to facilitate advanced downlink transmission for next generation cellular networks. In addition to reaping the conventional advantages of caching and NOMA transmission, the proposed cache-aided NOMA scheme also exploits cached data for interference cancellation which is not possible with separate caching and NOMA transmission designs. Furthermore, as caching can help to reduce the residual interference power, several decoding orders are feasible at the receivers, and these decoding orders can be flexibly selected for performance optimization. We characterize the achievable rate region of cache-aided NOMA and investigate its benefits for minimizing the time required to complete video file delivery. Our simulation results reveal that, compared to several baseline schemes, the proposed cache-aided NOMA scheme significantly expands the achievable rate region for downlink transmission, which translates into substantially reduced file delivery times.
△ Less
Submitted 29 January, 2018; v1 submitted 27 December, 2017;
originally announced December 2017.
-
Cache-Enabled Physical Layer Security for Video Streaming in Backhaul-Limited Cellular Networks
Authors:
Lin Xiang,
Derrick Wing Kwan Ng,
Robert Schober,
Vincent W. S. Wong
Abstract:
In this paper, we propose a novel wireless caching scheme to enhance the physical layer security of video streaming in cellular networks with limited backhaul capacity. By proactively sharing video data across a subset of base stations (BSs) through both caching and backhaul loading, secure cooperative joint transmission of several BSs can be dynamically enabled in accordance with the cache status…
▽ More
In this paper, we propose a novel wireless caching scheme to enhance the physical layer security of video streaming in cellular networks with limited backhaul capacity. By proactively sharing video data across a subset of base stations (BSs) through both caching and backhaul loading, secure cooperative joint transmission of several BSs can be dynamically enabled in accordance with the cache status, the channel conditions, and the backhaul capacity. Assuming imperfect channel state information (CSI) at the transmitters, we formulate a two-stage non-convex mixed-integer robust optimization problem for minimizing the total transmit power while providing quality of service (QoS) and guaranteeing communication secrecy during video delivery, where the caching and the cooperative transmission policy are optimized in an offline video caching stage and an online video delivery stage, respectively. Although the formulated optimization problem turns out to be NP-hard, low-complexity polynomial-time algorithms, whose solutions are globally optimal under certain conditions, are proposed for cache training and video delivery control. Caching is shown to be beneficial as it reduces the data sharing overhead imposed on the capacity-constrained backhaul links, introduces additional secure degrees of freedom, and enables a power-efficient communication system design. Simulation results confirm that the proposed caching scheme achieves simultaneously a low secrecy outage probability and a high power efficiency. Furthermore, due to the proposed robust optimization, the performance loss caused by imperfect CSI knowledge can be significantly reduced when the cache capacity becomes large.
△ Less
Submitted 7 November, 2017;
originally announced November 2017.
-
On Identification of Distribution Grids
Authors:
Omid Ardakanian,
Vincent W. S. Wong,
Roel Dobbe,
Steven H. Low,
Alexandra von Meier,
Claire Tomlin,
Ye Yuan
Abstract:
Large-scale integration of distributed energy resources into residential distribution feeders necessitates careful control of their operation through power flow analysis. While the knowledge of the distribution system model is crucial for this type of analysis, it is often unavailable or outdated. The recent introduction of synchrophasor technology in low-voltage distribution grids has created an…
▽ More
Large-scale integration of distributed energy resources into residential distribution feeders necessitates careful control of their operation through power flow analysis. While the knowledge of the distribution system model is crucial for this type of analysis, it is often unavailable or outdated. The recent introduction of synchrophasor technology in low-voltage distribution grids has created an unprecedented opportunity to learn this model from high-precision, time-synchronized measurements of voltage and current phasors at various locations. This paper focuses on joint estimation of model parameters (admittance values) and operational structure of a poly-phase distribution network from the available telemetry data via the lasso, a method for regression shrinkage and selection. We propose tractable convex programs capable of tackling the low rank structure of the distribution system and develop an online algorithm for early detection and localization of critical events that induce a change in the admittance matrix. The efficacy of these techniques is corroborated through power flow studies on four three-phase radial distribution systems serving real household demands.
△ Less
Submitted 4 November, 2017;
originally announced November 2017.
-
Hierarchical Fog-Cloud Computing for IoT Systems: A Computation Offloading Game
Authors:
Hamed Shah-Mansouri,
Vincent W. S. Wong
Abstract:
Fog computing, which provides low-latency computing services at the network edge, is an enabler for the emerging Internet of Things (IoT) systems. In this paper, we study the allocation of fog computing resources to the IoT users in a hierarchical computing paradigm including fog and remote cloud computing services. We formulate a computation offloading game to model the competition between IoT us…
▽ More
Fog computing, which provides low-latency computing services at the network edge, is an enabler for the emerging Internet of Things (IoT) systems. In this paper, we study the allocation of fog computing resources to the IoT users in a hierarchical computing paradigm including fog and remote cloud computing services. We formulate a computation offloading game to model the competition between IoT users and allocate the limited processing power of fog nodes efficiently. Each user aims to maximize its own quality of experience (QoE), which reflects its satisfaction of using computing services in terms of the reduction in computation energy and delay. Utilizing a potential game approach, we prove the existence of a pure Nash equilibrium and provide an upper bound for the price of anarchy. Since the time complexity to reach the equilibrium increases exponentially in the number of users, we further propose a near-optimal resource allocation mechanism and prove that in a system with $N$ IoT users, it can achieve an $ε$-Nash equilibrium in $O(N/ε)$ time. Through numerical studies, we evaluate the users' QoE as well as the equilibrium efficiency. Our results reveal that by utilizing the proposed mechanism, more users benefit from computing services in comparison to an existing offloading mechanism. We further show that our proposed mechanism significantly reduces the computation delay and enables low-latency fog computing services for delay-sensitive IoT applications.
△ Less
Submitted 17 October, 2017;
originally announced October 2017.
-
Recursive Exponential Weighting for Online Non-convex Optimization
Authors:
Lin Yang,
Cheng Tan,
Wing Shing Wong
Abstract:
In this paper, we investigate the online non-convex optimization problem which generalizes the classic {online convex optimization problem by relaxing the convexity assumption on the cost function.
For this type of problem, the classic exponential weighting online algorithm has recently been shown to attain a sub-linear regret of $O(\sqrt{T\log T})$.
In this paper, we introduce a novel recursi…
▽ More
In this paper, we investigate the online non-convex optimization problem which generalizes the classic {online convex optimization problem by relaxing the convexity assumption on the cost function.
For this type of problem, the classic exponential weighting online algorithm has recently been shown to attain a sub-linear regret of $O(\sqrt{T\log T})$.
In this paper, we introduce a novel recursive structure to the online algorithm to define a recursive exponential weighting algorithm that attains a regret of $O(\sqrt{T})$, matching the well-known regret lower bound.
To the best of our knowledge, this is the first online algorithm with provable $O(\sqrt{T})$ regret for the online non-convex optimization problem.
△ Less
Submitted 13 September, 2017;
originally announced September 2017.
-
Randomized Load-balanced Routing for Fat-tree Networks
Authors:
Suzhen Wang,
Jingjing Luo,
Bruce Kwong-Bun Tong,
Wing S. Wong
Abstract:
Fat-tree networks have been widely adopted to High Performance Computing (HPC) clusters and to Data Center Networks (DCN). These parallel systems usually have a large number of servers and hosts, which generate large volumes of highly-volatile traffic. Thus, distributed load-balancing routing design becomes critical to achieve high bandwidth utilization, and low-latency packet delivery. Existing d…
▽ More
Fat-tree networks have been widely adopted to High Performance Computing (HPC) clusters and to Data Center Networks (DCN). These parallel systems usually have a large number of servers and hosts, which generate large volumes of highly-volatile traffic. Thus, distributed load-balancing routing design becomes critical to achieve high bandwidth utilization, and low-latency packet delivery. Existing distributed designs rely on remote congestion feedbacks to address congestion, which add overheads to collect and react to network-wide congestion information. In contrast, we propose a simple but effective load-balancing scheme, called Dynamic Randomized load-Balancing (DRB), to achieve network-wide low levels of path collisions through local-link adjustment which is free of communications and cooperations between switches. First, we use D-mod-k path selection scheme to allocate default paths to all source-destination (S-D) pairs in a fat-tree network, guaranteeing low levels of path collision over downlinks for any set of active S-D pairs. Then, we propose Threshold-based Two-Choice (TTC) randomized technique to balance uplink traffic through local uplink adjustment at each switch. We theoretically show that the proposed TTC for the uplink-load balancing in a fat-tree network have a similar performance as the two-choice technique in the area of randomized load balancing. Simulation results show that DRB with TTC technique achieves a significant improvement over many randomized routing schemes for fat-tree networks.
△ Less
Submitted 30 August, 2017;
originally announced August 2017.
-
Secure Video Streaming in Heterogeneous Small Cell Networks with Untrusted Cache Helpers
Authors:
Lin Xiang,
Derrick Wing Kwan Ng,
Robert Schober,
Vincent W. S. Wong
Abstract:
This paper studies secure video streaming in cache-enabled small cell networks, where some of the cache-enabled small cell base stations (BSs) helping in video delivery are untrusted. Unfavorably, caching improves the eavesdropping capability of these untrusted helpers as they may intercept both the cached and the delivered video files. To address this issue, we propose joint caching and scalable…
▽ More
This paper studies secure video streaming in cache-enabled small cell networks, where some of the cache-enabled small cell base stations (BSs) helping in video delivery are untrusted. Unfavorably, caching improves the eavesdropping capability of these untrusted helpers as they may intercept both the cached and the delivered video files. To address this issue, we propose joint caching and scalable video coding (SVC) of video files to enable secure cooperative multiple-input multiple-output (MIMO) transmission and, at the same time, exploit the cache memory of both the trusted and untrusted BSs for improving the system performance. Considering imperfect channel state information (CSI) at the transmitters, we formulate a two-timescale non-convex mixed-integer robust optimization problem to minimize the total transmit power required for guaranteeing the quality of service (QoS) and secrecy during video streaming. We develop an iterative algorithm based on a modified generalized Benders decomposition (GBD) to solve the problem optimally, where the caching and the cooperative transmission policies are determined via offline (long-timescale) and online (short-timescale) optimization, respectively. Furthermore, inspired by the optimal algorithm, a low-complexity suboptimal algorithm based on a greedy heuristic is proposed. Simulation results show that the proposed schemes achieve significant gains in power efficiency and secrecy performance compared to several baseline schemes.
△ Less
Submitted 29 January, 2018; v1 submitted 25 July, 2017;
originally announced July 2017.
-
Cache-Enabled Physical-Layer Security for Video Streaming in Wireless Networks with Limited Backhaul
Authors:
Lin Xiang,
Derrick Wing Kwan Ng,
Robert Schober,
Vincent W. S. Wong
Abstract:
In this paper, we investigate for the first time the benefits of wireless caching for the physical layer security (PLS) of wireless networks. In particular, a caching scheme enabling power-efficient PLS is proposed for cellular video streaming with constrained backhaul capacity. By sharing video data across a subset of base stations (BSs) through both caching and backhaul loading, secure cooperati…
▽ More
In this paper, we investigate for the first time the benefits of wireless caching for the physical layer security (PLS) of wireless networks. In particular, a caching scheme enabling power-efficient PLS is proposed for cellular video streaming with constrained backhaul capacity. By sharing video data across a subset of base stations (BSs) through both caching and backhaul loading, secure cooperative transmission of several BSs is dynamically enabled in accordance with the cache status, the channel conditions, and the backhaul capacity. Thereby, caching reduces the data sharing overhead over the capacity-constrained backhaul links. More importantly, caching introduces additional secure degrees of freedom and enables a power-efficient design. We investigate the optimal caching and transmission policies for minimizing the total transmit power while providing quality of service (QoS) and guaranteeing secrecy during video delivery. A two-stage non-convex mixed-integer optimization problem is formulated, which optimizes the caching policy in an offline video caching stage and the cooperative transmission policy in an online video delivery stage. As the problem is NP-hard, suboptimal polynomial-time algorithms are proposed for low-complexity cache training and delivery control, respectively. Sufficient optimality conditions, under which the proposed schemes attain global optimal solutions, are also provided. Simulation results show that the proposed schemes achieve low secrecy outage probability and high power efficiency simultaneously.
△ Less
Submitted 4 December, 2016;
originally announced December 2016.
-
New CRT sequence sets for a collision channel without feedback
Authors:
Yijin Zhang,
Yuan-Hsun Lo,
Kenneth W. Shum,
Wing Shing Wong
Abstract:
Protocol sequences are binary and periodic sequences used for deterministic multiple access in a collision channel without feedback. In this paper, we focus on user-irrepressible (UI) protocol sequences that can guarantee a positive individual throughput per sequence period with probability one for a slot-synchronous channel, regardless of the delay offsets among the users. As the sequence period…
▽ More
Protocol sequences are binary and periodic sequences used for deterministic multiple access in a collision channel without feedback. In this paper, we focus on user-irrepressible (UI) protocol sequences that can guarantee a positive individual throughput per sequence period with probability one for a slot-synchronous channel, regardless of the delay offsets among the users. As the sequence period has a fundamental impact on the worst-case channel access delay, a common objective of designing UI sequences is to make the sequence period as short as possible. Consider a communication channel that is shared by $M$ active users, and assume that each protocol sequence has a constant Hamming weight $w$. To attain a better delay performance than previously known UI sequences, this paper presents a CRTm construction of UI sequences with $w=M+1$, which is a variation of the previously known CRT construction. For all non-prime $M\geq 8$, our construction produces the shortest known sequence period and the shortest known worst-case delay of UI sequences. Numerical results show that the new construction enjoys a better average delay performance than the optimal random access scheme and other constructions with the same sequence period, in a variety of traffic conditions. In addition, we derive an asymptotic lower bound on the minimum sequence period for $w=M+1$ if the sequence structure satisfies some technical conditions, called equi-difference, and prove the tightness of this lower bound by using the CRTm construction.
△ Less
Submitted 4 July, 2017; v1 submitted 9 November, 2016;
originally announced November 2016.
-
Achieving Zero-Error Capacity 1 for a Collision Channel Without Feedback
Authors:
Yijin Zhang,
Yi Chen,
Yuan-Hsun Lo,
Wing Shing Wong
Abstract:
The collision channel without feedback (CCw/oFB) model introduced by Massey and Mathys, depicts a scenario in which M users share a thermal noise-free communication channel with random relative time offsets among their clocks. This paper considers an extension of this model, which allows the receiver to use successive interference cancellation (SIC) to iteratively cancel the interference caused by…
▽ More
The collision channel without feedback (CCw/oFB) model introduced by Massey and Mathys, depicts a scenario in which M users share a thermal noise-free communication channel with random relative time offsets among their clocks. This paper considers an extension of this model, which allows the receiver to use successive interference cancellation (SIC) to iteratively cancel the interference caused by those collided packets that have been decoded by the receiver. As the main result of this paper, we derive the zero-error capacity region of this channel in the slot-synchronous case, and present a zero-error capacity achieving scheme by joint protocol sequences and channel coding design. It is shown that the negative impact on the zero-error capacity due to a lack of time synchronization can be removed by the help of SIC. Moreover, we characterize the protocol sequences that can be used to achieve zero-error capacity 1 [packets/slot] by proving new results on shift-invariant sequences and throughput-invariant sequences; these sequences have been known to achieve zero-error capacity for the basic CCw/oFB model without SIC. This characterization sheds light on the minimum sequence period required in order to attain zero-error capacity 1.
△ Less
Submitted 21 February, 2019; v1 submitted 18 September, 2016;
originally announced September 2016.
-
Channel Hopping Sequences for Maximizing Rendezvous Diversity in Cognitive Radio Networks
Authors:
Yijin Zhang,
Yuan-Hsun Lo,
Wing Shing Wong
Abstract:
In cognitive radio networks (CRNs), establishing a communication link between a pair of secondary users (SUs) requires them to rendezvous on a common channel which is not occupied by primary users (PUs). Under time-varying PU traffic, asynchronous sequence-based channel hopping (CH) with the maximal rendezvous diversity is a representative technique to guarantee an upper bounded time-torendezvous…
▽ More
In cognitive radio networks (CRNs), establishing a communication link between a pair of secondary users (SUs) requires them to rendezvous on a common channel which is not occupied by primary users (PUs). Under time-varying PU traffic, asynchronous sequence-based channel hopping (CH) with the maximal rendezvous diversity is a representative technique to guarantee an upper bounded time-torendezvous (TTR) for delay-sensitive services in CRNs, without requiring global clock synchronization. Maximum TTR (MTTR) and maximum conditional TTR (MCTTR) are two commonly considered metrics for evaluating such CH sequences, and minimizing these two metrics is the primary goal in the sequence design of various paper reported in the literature. In this paper, to investigate the fundamental limits of these two metrics, we first derive lower bounds on the MCTTR and MTTR, and then propose an asymmetric design which has the minimum MCTTR and an improvement on MTTR than other previously known algorithms. Moreover, when the number of licensed channels is odd, our proposed design achieves the minimum MTTR. We also present the TTR performance of the proposed design via simulation.
△ Less
Submitted 15 April, 2016; v1 submitted 27 March, 2016;
originally announced March 2016.
-
Cross-Layer Optimization of Fast Video Delivery in Cache-Enabled Relaying Networks
Authors:
Lin Xiang,
Derrick Wing Kwan Ng,
Toufiqul Islam,
Robert Schober,
Vincent W. S. Wong
Abstract:
This paper investigates the cross-layer optimization of fast video delivery and caching for minimization of the overall video delivery time in a two-hop relaying network. The half-duplex relay nodes are equipped with both a cache and a buffer which facilitate joint scheduling of fetching and delivery to exploit the channel diversity for improving the overall delivery performance. The fast delivery…
▽ More
This paper investigates the cross-layer optimization of fast video delivery and caching for minimization of the overall video delivery time in a two-hop relaying network. The half-duplex relay nodes are equipped with both a cache and a buffer which facilitate joint scheduling of fetching and delivery to exploit the channel diversity for improving the overall delivery performance. The fast delivery control is formulated as a two-stage functional non-convex optimization problem. By exploiting the underlying convex and quasi-convex structures, the problem can be solved exactly and efficiently by the developed algorithm. Simulation results show that significant caching and buffering gains can be achieved with the proposed framework, which translates into a reduction of the overall video delivery time. Besides, a trade-off between caching and buffering gains is unveiled.
△ Less
Submitted 17 November, 2015;
originally announced November 2015.
-
The Global Packing Number for an Optical Network
Authors:
Yuan-Hsun Lo,
Yijin Zhang,
Wing Shing Wong,
Hung-Lin Fu
Abstract:
The global packing number problem arises from the investigation of optimal wavelength allocation in an optical network that employs Wavelength Division Multiplexing (WDM). Consider an optical network that is represented by a connected, simple graph $G$. We assume all communication channels are bidirectional, so that all links and paths are undirected. It follows that there are ${|G|\choose 2}$ dis…
▽ More
The global packing number problem arises from the investigation of optimal wavelength allocation in an optical network that employs Wavelength Division Multiplexing (WDM). Consider an optical network that is represented by a connected, simple graph $G$. We assume all communication channels are bidirectional, so that all links and paths are undirected. It follows that there are ${|G|\choose 2}$ distinct node pairs associated with $G$, where $|G|$ is the number of nodes in $G$. A path system $\mathcal{P}$ of $G$ consists of ${|G|\choose 2}$ paths, one path to connect each of the node pairs. The global packing number of a path system $\mathcal{P}$, denoted by $Φ(G,\mathcal{P})$, is the minimum integer $k$ to guarantee the existence of a mapping $ω:\mathcal{P}\to\{1,2,\ldots,k\}$, such that $ω(P)\neqω(P')$ if $P$ and $P'$ have common edge(s). The global packing number of $G$, denoted by $Φ(G)$, is defined to be the minimum $Φ(G,\mathcal{P})$ among all possible path systems $\mathcal{P}$. If there is no wavelength conversion along any optical transmission path for any node pair in the network, the global packing number signifies the minimum number of wavelengths required to support simultaneous communication for all pairs in the network.
In this paper, the focus is on ring networks, so that $G$ is a cycle. Explicit formulas for the global packing number of a cycle is derived. The investigation is further extended to chain networks. A path system, $\mathcal{P}$, that enjoys $Φ(G,\mathcal{P})=Φ(G)$ is called ideal. A characterization of ideal path systems is also presented. We also describe an efficient heuristic algorithm to assign wavelengths that can be applied to a general network with more complicated traffic load.
△ Less
Submitted 23 September, 2015;
originally announced September 2015.
-
Sparsest Error Detection via Sparsity Invariant Transformation based $\ell_1$ Minimization
Authors:
Suzhen Wang,
Sheng Han,
Zhiguo Zhang,
Wing Shing Wong
Abstract:
This paper presents a new method, referred to here as the sparsity invariant transformation based $\ell_1$ minimization, to solve the $\ell_0$ minimization problem for an over-determined linear system corrupted by additive sparse errors with arbitrary intensity. Many previous works have shown that $\ell_1$ minimization can be applied to realize sparse error detection in many over-determined linear…
▽ More
This paper presents a new method, referred to here as the sparsity invariant transformation based $\ell_1$ minimization, to solve the $\ell_0$ minimization problem for an over-determined linear system corrupted by additive sparse errors with arbitrary intensity. Many previous works have shown that $\ell_1$ minimization can be applied to realize sparse error detection in many over-determined linear systems. However, performance of this approach is strongly dependent on the structure of the measurement matrix, which limits application possibility in practical problems. Here, we present a new approach based on transforming the $\ell_0$ minimization problem by a linear transformation that keeps sparsest solutions invariant. We call such a property a sparsity invariant property (SIP), and a linear transformation with SIP is referred to as a sparsity invariant transformation (SIT). We propose the SIT-based $\ell_1$ minimization method by using an SIT in conjunction with $\ell_1$ relaxation on the $\ell_0$ minimization problem. We prove that for any over-determined linear system, there always exists a specific class of SIT's that guarantees a solution to the SIT-based $\ell_1$ minimization is a sparsest-errors solution. Besides, a randomized algorithm based on Monte Carlo simulation is proposed to search for a feasible SIT.
△ Less
Submitted 20 May, 2015;
originally announced May 2015.
-
Partially user-irrepressible sequence sets and conflict-avoiding codes
Authors:
Yuan-Hsun Lo,
Wing Shing Wong,
Hung-Lin Fu
Abstract:
In this paper we give a partial shift version of user-irrepressible sequence sets and conflict-avoiding codes. By means of disjoint difference sets, we obtain an infinite number of such user-irrepressible sequence sets whose lengths are shorter than known results in general. Subsequently, the newly defined partially conflict-avoiding codes are discussed.
In this paper we give a partial shift version of user-irrepressible sequence sets and conflict-avoiding codes. By means of disjoint difference sets, we obtain an infinite number of such user-irrepressible sequence sets whose lengths are shorter than known results in general. Subsequently, the newly defined partially conflict-avoiding codes are discussed.
△ Less
Submitted 15 May, 2016; v1 submitted 10 November, 2014;
originally announced December 2014.
-
Optimal strongly conflict-avoiding codes of even length and weight three
Authors:
Yijin Zhang,
Yuan-Hsun Lo,
Wing Shing Wong
Abstract:
Strongly conflict-avoiding codes (SCACs) are employed in a slot-asynchronous multiple-access collision channel without feedback to guarantee that each active user can send at least one packet successfully in the worst case within a fixed period of time. Assume all users are assigned distinct codewords, the number of codewords in an SCAC is equal to the number of potential users that can be support…
▽ More
Strongly conflict-avoiding codes (SCACs) are employed in a slot-asynchronous multiple-access collision channel without feedback to guarantee that each active user can send at least one packet successfully in the worst case within a fixed period of time. Assume all users are assigned distinct codewords, the number of codewords in an SCAC is equal to the number of potential users that can be supported. SCACs have different combinatorial structure compared with conflict-avoiding codes (CACs) due to additional collisions incurred by partially overlapped transmissions. In this paper, we establish upper bounds on the size of SCACs of even length and weight three. Furthermore, it is shown that some optimal CACs can be used to construct optimal SCACs of weight three.
△ Less
Submitted 10 November, 2014; v1 submitted 24 June, 2014;
originally announced June 2014.
-
Protocol Sequences for Multiple-Packet Reception
Authors:
Yijin Zhang,
Yuan-Hsun Lo,
Feng Shu,
Wing Shing Wong
Abstract:
Consider a time slotted communication channel shared by $K$ active users and a single receiver. It is assumed that the receiver has the ability of the multiple-packet reception (MPR) to correctly receive at most $γ$ ($1 \leq γ< K$) simultaneously transmitted packets. Each user accesses the channel following a specific periodical binary sequence, called the protocol sequence, and transmits a packet…
▽ More
Consider a time slotted communication channel shared by $K$ active users and a single receiver. It is assumed that the receiver has the ability of the multiple-packet reception (MPR) to correctly receive at most $γ$ ($1 \leq γ< K$) simultaneously transmitted packets. Each user accesses the channel following a specific periodical binary sequence, called the protocol sequence, and transmits a packet within a channel slot if and only if the sequence value is equal to one. The fluctuation in throughput is incurred by inevitable random relative shifts among the users due to the lack of feedback. A set of protocol sequences is said to be throughput-invariant (TI) if it can be employed to produce invariant throughput for any relative shifts, i.e., maximize the worst-case throughput. It was shown in the literature that the TI property without considering MPR (i.e., $γ=1$) can be achieved by using shift-invariant (SI) sequences, whose generalized Hamming cross-correlation is independent of relative shifts. This paper investigates TI sequences for MPR; results obtained include achievable throughput value, a lower bound on the sequence period, an optimal construction of TI sequences that achieves the lower bound on the sequence period, and intrinsic structure of TI sequences. In addition, we present a practical packet decoding mechanism for TI sequences that incorporates packet header, forward error-correcting code, and advanced physical layer blind signal separation techniques.
△ Less
Submitted 26 September, 2014; v1 submitted 24 January, 2014;
originally announced January 2014.
-
Transmission Sequence Design and Allocation for Wide Area Ad Hoc Networks
Authors:
Wing Shing Wong
Abstract:
In this paper we examine the problem of designing and allocating transmission sequences to users in a mobile ad hoc network that has no spatial boundary. A basic tenet of the transmission sequence approach for addressing media access control is that under normal operating conditions, there is no feedback triggered re-transmission. This obviously is a major departure from the Slotted-ALOHA or CSMA…
▽ More
In this paper we examine the problem of designing and allocating transmission sequences to users in a mobile ad hoc network that has no spatial boundary. A basic tenet of the transmission sequence approach for addressing media access control is that under normal operating conditions, there is no feedback triggered re-transmission. This obviously is a major departure from the Slotted-ALOHA or CSMA type approaches. While these solutions enjoy excellent throughput performance, a fundamental drawback is that they are based on feedback information. For systems without naturally defined central controller that can play the role of a base station, the task of providing feedback information could easily become unmanageable. This highlights the advantage of the feedback-free approach. A second advantage is the ability to handle unlimited spatial coverage. We propose in this paper a concept for media access control that is akin to frequency reuse. However, instead of reusing frequency, the new approach allows transmission sequences be reused. A study of the transmission sequence approach against other approaches is conducted by comparing the minimal frame lengths that can guarantee the existence of conflict-free transmissions.
△ Less
Submitted 30 May, 2013; v1 submitted 24 April, 2013;
originally announced April 2013.
-
Construction and Applications of CRT Sequences
Authors:
Kenneth W. Shum,
Wing Shing Wong
Abstract:
Protocol sequences are used for channel access in the collision channel without feedback. Each user accesses the channel according to a deterministic zero-one pattern, called the protocol sequence. In order to minimize fluctuation of throughput due to delay offsets, we want to construct protocol sequences whose pairwise Hamming cross-correlation is as close to a constant as possible. In this paper…
▽ More
Protocol sequences are used for channel access in the collision channel without feedback. Each user accesses the channel according to a deterministic zero-one pattern, called the protocol sequence. In order to minimize fluctuation of throughput due to delay offsets, we want to construct protocol sequences whose pairwise Hamming cross-correlation is as close to a constant as possible. In this paper, we present a construction of protocol sequences which is based on the bijective mapping between one-dimensional sequence and two-dimensional array by the Chinese Remainder Theorem (CRT). In the application to the collision channel without feedback, a worst-case lower bound on system throughput is derived.
△ Less
Submitted 8 November, 2010; v1 submitted 29 June, 2010;
originally announced June 2010.
-
Construction of Short Protocol Sequences with Worst-Case Throughput Guarantee
Authors:
Kenneth W. Shum,
Wing Shing Wong
Abstract:
Protocol sequences are used in channel access for the multiple-access collision channel without feedback. A new construction of protocol sequences with a guarantee of worst-case system throughput is proposed. The construction is based on Chinese remainder theorem. The Hamming crosscorrelation is proved to be concentrated around the mean. The sequence period is much shorter than existing protocol s…
▽ More
Protocol sequences are used in channel access for the multiple-access collision channel without feedback. A new construction of protocol sequences with a guarantee of worst-case system throughput is proposed. The construction is based on Chinese remainder theorem. The Hamming crosscorrelation is proved to be concentrated around the mean. The sequence period is much shorter than existing protocol sequences with the same throughput performance. The new construction reduces the complexity in implementation and also shortens the waiting time until a packet can be sent successfully.
△ Less
Submitted 27 April, 2010;
originally announced April 2010.
-
A General Upper Bound on the Size of Constant-Weight Conflict-Avoiding Codes
Authors:
Kenneth W. Shum,
Wing Shing Wong,
Chung Shue Chen
Abstract:
Conflict-avoiding codes are used in the multiple-access collision channel without feedback. The number of codewords in a conflict-avoiding code is the number of potential users that can be supported in the system. In this paper, a new upper bound on the size of conflict-avoiding codes is proved. This upper bound is general in the sense that it is applicable to all code lengths and all Hamming weig…
▽ More
Conflict-avoiding codes are used in the multiple-access collision channel without feedback. The number of codewords in a conflict-avoiding code is the number of potential users that can be supported in the system. In this paper, a new upper bound on the size of conflict-avoiding codes is proved. This upper bound is general in the sense that it is applicable to all code lengths and all Hamming weights. Several existing constructions for conflict-avoiding codes, which are known to be optimal for Hamming weights equal to four and five, are shown to be optimal for all Hamming weights in general.
△ Less
Submitted 6 November, 2010; v1 submitted 27 October, 2009;
originally announced October 2009.
-
Inter-Session Network Coding with Strategic Users: A Game-Theoretic Analysis of Network Coding
Authors:
Amir-Hamed Mohsenian-Rad,
Jianwei Huang,
Vincent W. S. Wong,
Sidharth Jaggi,
Robert Schober
Abstract:
A common assumption in the existing network coding literature is that the users are cooperative and non-selfish. However, this assumption can be violated in practice. In this paper, we analyze inter-session network coding in a wired network using game theory. We assume selfish users acting strategically to maximize their own utility, leading to a resource allocation game among users. In particul…
▽ More
A common assumption in the existing network coding literature is that the users are cooperative and non-selfish. However, this assumption can be violated in practice. In this paper, we analyze inter-session network coding in a wired network using game theory. We assume selfish users acting strategically to maximize their own utility, leading to a resource allocation game among users. In particular, we study the well-known butterfly network topology where a bottleneck link is shared by several network coding and routing flows. We prove the existence of a Nash equilibrium for a wide range of utility functions. We show that the number of Nash equilibria can be large (even infinite) for certain choices of system parameters. This is in sharp contrast to a similar game setting with traditional packet forwarding where the Nash equilibrium is always unique. We then characterize the worst-case efficiency bounds, i.e., the Price-of-Anarchy (PoA), compared to an optimal and cooperative network design. We show that by using a novel discriminatory pricing scheme which charges encoded and forwarded packets differently, we can improve the PoA. However, regardless of the discriminatory pricing scheme being used, the PoA is still worse than for the case when network coding is not applied. This implies that, although inter-session network coding can improve performance compared to ordinary routing, it is significantly more sensitive to users' strategic behaviour. For example, in a butterfly network where the side links have zero cost, the efficiency can be as low as 25%. If the side links have non-zero cost, then the efficiency can further reduce to only 20%. These results generalize the well-known result of guaranteed 67% worst-case efficiency for traditional packet forwarding networks.
△ Less
Submitted 19 April, 2009;
originally announced April 2009.