Reliability Benefit of Network Coding

Similar documents
On the Scaling Law of Network Coding Gains in Wireless Networks

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 12, DECEMBER

A Connection between Network Coding and. Convolutional Codes

CHARACTERIZING the capacity region of wireless

FUTURE communication networks are expected to support

Draft Notes 1 : Scaling in Ad hoc Routing Protocols

MULTICAST broadcast services (MBS) have become essential

Solutions. (a) Claim: A d-ary tree of height h has at most 1 + d +...

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

A Joint Network-Channel Coding Technique for Single-Hop Wireless Networks

On the Scalability of Reliable Data Transfer in High Speed Networks

On The Complexity of Virtual Topology Design for Multicasting in WDM Trees with Tap-and-Continue and Multicast-Capable Switches

The divide-and-conquer paradigm involves three steps at each level of the recursion: Divide the problem into a number of subproblems.

ARELAY network consists of a pair of source and destination

arxiv: v3 [cs.ds] 18 Apr 2011

The Encoding Complexity of Network Coding

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph.

TREES AND ORDERS OF GROWTH 7

Online network coding for optimal throughput and delay the three-receiver case. Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard

Section 5.5. Left subtree The left subtree of a vertex V on a binary tree is the graph formed by the left child L of V, the descendents

Distribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers

Technical University of Denmark

ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS

Hierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach

CSE 4500 (228) Fall 2010 Selected Notes Set 2

1 Minimum Cut Problem

Quake Heaps: A Simple Alternative to Fibonacci Heaps

Lecture 3. Recurrences / Heapsort

Network Coding for Joint Storage and Transmission with Minimum Cost

Disjoint Sets. The obvious data structure for disjoint sets looks like this.

Wireless Broadcast Using Network Coding

Data Caching under Number Constraint

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks

Solutions. Suppose we insert all elements of U into the table, and let n(b) be the number of elements of U that hash to bucket b. Then.

Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service

Lossless Compression Algorithms

Lower bound for comparison-based sorting

Distribution of tree parameters

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding

Reliable Communication using Packet Coding for Underwater Acoustic Channels

Organizing Spatial Data

Rank-Pairing Heaps. Bernard Haeupler Siddhartha Sen Robert E. Tarjan. SIAM JOURNAL ON COMPUTING Vol. 40, No. 6 (2011), pp.

Noncrossing Trees and Noncrossing Graphs

Algorithm Analysis. (Algorithm Analysis ) Data Structures and Programming Spring / 48

Trees. Q: Why study trees? A: Many advance ADTs are implemented using tree-based data structures.

Red-Black-Trees and Heaps in Timestamp-Adjusting Sweepline Based Algorithms

MOST attention in the literature of network codes has

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Priority Queues / Heaps Date: 9/27/17

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks

7 Distributed Data Management II Caching

Generalized Interlinked Cycle Cover for Index Coding

Near Optimal Broadcast with Network Coding in Large Sensor Networks

Writing Parallel Programs; Cost Model.

Algorithm Theory, Winter Term 2015/16 Problem Set 5 - Sample Solution

Quiz 1 Solutions. (a) f(n) = n g(n) = log n Circle all that apply: f = O(g) f = Θ(g) f = Ω(g)

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Treewidth and graph minors

1 The range query problem

Distributed Systems. Basic Algorithms. Rik Sarkar. University of Edinburgh 2015/2016

9 Distributed Data Management II Caching

Lecture Notes for Advanced Algorithms

Distributed Systems. Basic Algorithms. Rik Sarkar. University of Edinburgh 2016/2017

Application Layer Multicast Algorithm

An analysis of retransmission strategies for reliable multicast protocols

Partitioning Trees with Supply, Demand and Edge-Capacity

RANK-PAIRING HEAPS BERNHARD HAEUPLER 1, SIDDHARTHA SEN 2,4, AND ROBERT E. TARJAN 3,4

Data Caching in Networks with Reading, Writing and Storage Costs

In this lecture, we ll look at applications of duality to three problems:

Chapter 6 Heapsort 1

Course Review. Cpt S 223 Fall 2009

Online Service with Delay

A Feedback-based Adaptive Broadcast Coding Scheme for Reducing In-order Delivery Delay

Introduction to Analysis of Algorithms

Outline. Definition. 2 Height-Balance. 3 Searches. 4 Rotations. 5 Insertion. 6 Deletions. 7 Reference. 1 Every node is either red or black.

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Module 6 STILL IMAGE COMPRESSION STANDARDS

Triangulation by Ear Clipping

Outline. Computer Science 331. Insertion: An Example. A Recursive Insertion Algorithm. Binary Search Trees Insertion and Deletion.

Diversity Coded 5G Fronthaul Wireless Networks

Multicast Topology Inference From Measured End-to-End Loss

4608 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 10, OCTOBER 2009

On the Achievable Diversity-Multiplexing Tradeoff in Half Duplex Cooperative Channels

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Impact of intra-flow network coding on the relay channel performance: an analytical study

Handling Link Failure Dependencies in Micro Mobility Network Reliability Modeling

Topic: Heaps and priority queues

A New Combinatorial Design of Coded Distributed Computing

Random Linear Network Coding For Time Division Duplexing: When To Stop Talking And Start Listening

INTERLEAVING codewords is an important method for

Midterm solutions. n f 3 (n) = 3

Energy-Latency Tradeoff for In-Network Function Computation in Random Networks

A SCALABLE SPIHT-BASED MULTISPECTRAL IMAGE COMPRESSION TECHNIQUE. Fouad Khelifi, Ahmed Bouridane, and Fatih Kurugollu

FEC Performance in Large File Transfer over Bursty Channels

Trees (Part 1, Theoretical) CSE 2320 Algorithms and Data Structures University of Texas at Arlington

A Game-Theoretic Framework for Congestion Control in General Topology Networks

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Computing optimal total vertex covers for trees

CSE 5311 Notes 4a: Priority Queues

Transcription:

Reliability Benefit of Majid Ghaderi, Don Towsley and Jim Kurose Department of Computer Science University of Massachusetts Amherst {mghaderi,towsley,kurose}@cs.umass.edu Abstract The capacity benefit of network coding has been extensively studied in wired and wireless networks. Moreover, it has been shown that network coding improves network reliability by reducing the number of packet retransmissions in lossy networks. However, the extent of the reliability benefit of network coding is not known. In this work, we characterize the reliability benefit of network coding for reliable multicasting. In particular, we show that the expected number of transmissions using link-by-link ARQ compared to network coding to send a packet from the multicast source to K receivers scales as Θ( log K log log K. Index Terms Network coding, multicast, reliability, ARQ, asymptotic analysis.

1 Reliability Benefit of I. INTRODUCTION We study the performance of different error control techniques in tree-based reliable multicasting. We make the following simplifying assumptions although it is straightforward to extend our results to more general cases: 1 Each node has exactly K children, 2 The loss probability over all links is independent and equal to p, 3 There is reliable and instantaneous feedback. In the following subsections, we study the performance of end-to-end and link-by-link error control techniques based on ARQ and FEC 1. As the measure of performance, we compute the expected number of transmissions of a packet until the packet is received by all nodes of the multicast tree. The rest of the paper is organized as follows. In sections II and III, we analyze end-toend and link-by-link error control techniques, respectively, and derive exact expressions for the expected number of transmissions at source and in multicast tree. While these expressions can be numerically evaluated, they do not provide any particular insight about the scaling behavior of different error control techniques. Hence, section IV is devoted to the asymptotic analysis of error control techniques based on order statistics. In section V, we provide numerical examples to show the exact behavior of different error control techniques by evaluating the expressions we derive in sections II and III. Our conclusions as well as future work are discussed in section VI. II. END-TO-END ERROR CONTROL A. Probability Distribution of the Number of Transmissions Let N r denote the number of transmissions of a packet to the root of a subtree of height r (from its parent until the packet is received by all nodes of the subtree. For the source of a multicast tree of height h, we interpret N h as the number of packet transmissions at the source until the packet is received by all the multicast receivers (see Figure 1. 1 We refer to the case of link-by-link FEC as network coding.

2 p S p 1 K K nodes h 1 h Fig. 1. Tree topology for reliable multicast. Define F r (i as follows: where, F r (0 = 0 according to the definition. F r (i = P {N r i}, 0 r h, i 0 (1 Similar to [1], we develop recursive equations to compute F r (i in the case of ARQ and FEC error control. First, consider the case of r > 0 and denote the root of the subtree by s. The probability that j packets out of i packets that have been transmitted to node s are received by node s is given by a binomial distribution expressed as ( i P {j i} = (1 p j p i j, j 0 j i. (2 Note that for the root of the multicast tree the error probability is zero, i.e., p = 0, and hence P {j i} = 1, if j = i, and P {j i} = 0, otherwise. If node s receives j packets, it will broadcast the j received packets to its children. For each child, the probability that all nodes of the subtree rooted at that child receive a packet is given by F r 1 (j. Since the children of a node have independent packet losses, the probability that all the nodes of the subtrees rooted at children of node s receive a packet is given by {F r 1 (j} K, which we denote by F K r 1(j for notational simplicity. Therefore, by summing over all possible values of j, it is obtained that i ( i F r (i = (1 p j p i j F K j r 1(j, 0 < r < h. (3 j=0 Hence, we have a recursive equation for computing F r (i for r > 0. Interestingly, computing F r (j for r > 0 is independent of the end-to-end error control technique.

3 Next, we compute F 0 (i for the leaves of the multicast tree as follows: 1 End-to-End ARQ: The probability that a (leaf node does not receive any packet out of i transmitted packets is given by p i. Therefore, with probability 1 p i the node receives at least a copy of the packet. Therefore, 2 End-to-End FEC: F 0 (i = 1 p i. (4 We assume that block size for coding is B. Clearly, F 0 (i = 0 for i < B. Hence, we consider i B in the following. The probability that a node receives at least B coded packets out of i transmitted packets is given by a binomial distribution. Therefore, i ( i F 0 (i = (1 p j p i j, i B. (5 j j=b So far, we have determined F r (i for all subtrees of height r. As mentioned before, for the source of the multicast we have P {i i} = 1. Hence, the expression F h (i can be simplified as follows where, F h 1 (i is given by (3. F h (i = F K h 1(i. (6 B. Expected Number of Transmissions For the source of the multicast, the expected number of transmissions until a packet is received by all receivers is expressed as follows. 1 End-to-End ARQ: 2 End-to-End FEC: E [N h ] = (1 F h (i = 1 + i=0 (1 F h (i. (7 i=1 E [N h ] = 1 B (1 F h (i = 1 + 1 B i=0 (1 F h (i. (8 Next, we compute the expected number of transmissions in the multicast tree (not just at the source until a packet is received by all receivers. Let T h denote the total number of transmissions i=b

4 in the multicast tree until a packet is received by all receivers. First, we compute the expected number of transmissions in the tree per each transmission at the source of the muticast. Let X r denote the number of transmissions in a subtree of height r per each transmission at the root of the subtree. Then, X r = 1 + K j=0 ( K (1 p j p (jx K j r 1 j = 1 + K(1 px r 1, (9 where, X 0 = 0. (10 It is therefore obtained that X r = (Kqr 1 Kq 1. (11 where q = 1 p. Therefore, the expected number of transmissions per packet in the multicast tree is given by E [T h ] = X h E [N h ] = (Kqh 1 Kq 1 E [N h]. Note that if Kq = 1 then it is simply obtained that (12 E [T h ] = he [N h ]. (13 III. LINK-BY-LINK ERROR CONTROL For link-by-link error control, we consider a simple topology as depicted in Figure 2 in which a source s broadcasts a packet to all its K children. Let N denote the number of transmissions of a packet by the source until the packet is received by all K children. Define F (i as follows: F (i = P {N i}, (14 where F (0 = 0.

5 p S p 1 K K nodes Fig. 2. Model for link-by-link error control. A. Probability Distribution of the Number of Transmissions Interestingly, F 0 (i from previous section can be used to compute the expected number of transmissions in the case of link-by-link error control. In particular, we obtain the following expressions. 1 Link-by-Link ARQ: The probability that a child does not receive any packet out of i transmitted packets is given by p i. Therefore, with probability 1 p i the child receives at least a copy of the packet. All K children of a node are independent, therefore, the probability that all children receive at least a packet is given by 2 : F (i = (1 p i K. (15 We assume that block size for coding is B and i B. Clearly, F (i = 0 for i < B. The probability that a child receives at least B coded packets out of i transmitted packets is given by a binomial distribution. Therefore, the probability that every child receives B packets is given by F (i = B. Expected Number of Transmissions { i j=b ( } K i (1 p j p i j. (16 j Similar to the previous section, the expected number of transmissions at the source of the multicast is simply given by

6 1 Link-by-Link ARQ: 2 : E [N] = (1 F (i = 1 + i=0 (1 F (i. (17 i=1 E [N] = 1 B (1 F (i = 1 + 1 B i=0 (1 F (i. (18 Next, consider a multicast tree of height h. At height r, there are K h r nodes. For each of them, the expected number of transmissions is given by E [N] because of the link-by-link error control mechanism. Let T h denote the total number of transmissions in the tree. It is obtained that Note that for K = 1, we have E [T h ] = E [N] h r=1 i=b K h r = Kh 1 E [N]. (19 K 1 E [T h ] = he [N]. (20 IV. ASYMPTOTIC ANALYSIS In previous sections, we derived expressions for the expected number of transmissions for reliable multicasting. However, the exact expressions do not provide insight about the scaling of the number of transmissions with respect to K, B and h. In this section, using order statistics, we derive asymptotic expressions for the expected number of transmissions at the source and in the multicast tree. A. Link-by-Link Error Control Consider node s of the tree with K children as depicted in Figure 2. We note that link-by-link ARQ is a special case of network coding in which B = 1. We use asymptotic results from order statistics to compute bounds on the expected number of transmissions for both ARQ and coding techniques. 1 Link-by-Link ARQ: Consider child k of node s and let X k denote the number of transmissions to child k until it receives the packet. Clearly, X k has a geometric distribution, that is P {X k = i} = (1 pp i 1. (21

7 We are interested in finding [ ] E max X k. (22 1 k K Define Q = 1 p ln x and log x =, where ln denotes the natural logarithm. Using the ln Q asymptotic analysis of the maximum statistics of geometric variables [2], we have [ ] X ARQ = E max X k = Θ(log K. (23 1 k K 2 : In this case, X k has a negative binomial distribution, that is ( i 1 P {X k = i} = (1 p B p i B. (24 B 1 This meas that B 1 packets have been received until packet i 1, and packet i is received too. Using the asymptotic analysis of the maximum statistics of negative binomial random variables [3], we have [ ] E max X k = Θ(log K + (B 1 log log K. (25 1 k K By dividing both sides of the equation by B, we obtain the expected number of transmissions per packet: X Coding = 1 [ ] B E max X k 1 k K For B = ω(log K, the above asymptotic expression reduces to: = Θ( 1 log K + log log K. (26 B X Coding = Θ(log log K. (27 Using (19 and the above asymptotics, we get the following bounds for the number of transmissions in the tree. 1 Link-by-Link ARQ: 2 : T ARQ = Θ(K h 1 log K. (28 T Coding = Θ(K h 1 log log K. (29

8 B. End-to-End Error Control Let N r denote the number of transmissions at the root of a subtree of height r until each receiver in the subtree receives the packet. From the asymptotic analysis of negative binomial distribution we have N r = Θ(log K + N r 1 log log K, (30 where, N 1 = Θ(log K +B log log K. This simply states that each child of the root of the subtree needs to receive N r 1 packets. Therefore, the root has to transmit Θ(log K + N r 1 log log K packets until every child has received N r 1 packets. By expanding the recursive equation (30, it is obtained that N r log K (1 + + (log log K r 2 + N 1 (log log K r 1 = log K (log log Kr 1 + B(log log Kr log log K 1 ( = Θ log K(log log K r 1 + B(log log K r. Therefore, for B = ω(log K, the expected number of transmissions at the source is given by 1 End-to-End ARQ: 2 End-to-End FEC: (31 ( N ARQ = Θ log K(log log K h 1. (32 N FEC = Θ ((log log K h. (33 Using (12 and the above asymptotics, we can derive the following bounds for the number of transmissions in the tree. 1 End-to-End ARQ: 2 End-to-End FEC: T ARQ = Θ (K h 1 log K(log log K h 1. (34 T FEC = Θ (K h 1 (log log K h. (35

9 C. Convolutional Coding In previous sections, we assumed the use of block codes for network coding. We showed that as K for B = Ω(log K, the expected number of transmissions scales as Θ(log log K. Intuitively, for a block code with block length B, every packet is useful to all the receivers until one of the receivers receives B packets. From that time until the time the last receiver receives B packets, each transmitted packet is only useful to a subset of the receivers and not all of them. In particular, at the beginning, each transmitted packet is useful to K receivers; after one of the receivers receives B packets, each transmitted packet is only useful to K 1 receivers; and so on. However, if assume the use of convolutional codes that operate on streams of packets instead of blocks of packets, then every transmitted packet is useful to all the receivers. Hence, for each receiver, the expected number of transmissions per packet is simply given by 1. In this 1 p case, the reliability gain of network coding compared to link-by-link ARQ scales as Θ(log K as K. V. NUMERICAL EXAMPLES We have numerically evaluated the exact expressions for the expected number of transmissions at the source and in the multicast tree for different tree heights and error probabilities. A summary of our numerical results are presented in this section. For FEC-based error control techniques, i.e., end-to-end FEC and network coding, we have assumed the use of block codes with block length B = 16. We have also generated results for larger values of B which show the same behavior in the number of transmissions, and hence are not presented here. As a base for comparison, in Figure 3, we have plotted the expected number of transmissions for h = 1. This is the case of having a source transmitting packets to K receivers in its transmission range. Since feedback overhead is ignored, ARQ is indeed the optimal error control technique in a non-coded case. Nevertheless, network coding outperforms ARQ in both low-loss and high-loss regimes as shown in Figures 3(a and 3(b, respectively. Next, we look at multicast trees with h {2, 4}. In both cases network coding outperforms all the other techniques. Interestingly, link-by-link ARQ and end-to-end FEC show different behavior with different tree heights. Figures 4 and 5 depict the expected number of transmissions for a tree of height h = 2 and error probabilities p {0.05, 0.5}. It can be seen from the figures

10 2 1.9 1.8 1.7 1.6 1.5 1.4 1.3 1.2 1.1 ARQ 1 7 6 5 4 3 2 ARQ 1 (a p = 0.05 (b p = 0.5 Fig. 3. No. of transmissions at source for h = 1. 4 3.5 3 2.5 2 1.5 1 10 3 10 2 10 1 10 0 (a No. of transmissions at source (b No. of transmissions in tree Fig. 4. P = 0.05 and h = 2. 30 25 20 15 10 5 0 10 3 10 2 10 1 10 0 (a No. of transmissions at source (b No. of transmissions in tree Fig. 5. P = 0.5 and h = 2.

11 9 8 7 6 5 4 3 2 1 10 6 10 5 10 4 10 3 10 2 10 1 10 0 (a No. of transmissions at source (b No. of transmissions in tree Fig. 6. P = 0.05 and h = 4. that, in some cases, end-to-end FEC has better performance than link-by-link ARQ although the difference is not significant. Interestingly, there is a significant difference between end-to-end ARQ (dominant error control technique in Internet and network coding. In particular, in p = 0.5 representing a high-loss regime, the difference in the number of transmissions at source is huge. Figures 6 and 7 show the number of transmissions for a tree of height h = 4. Interestingly, link-by-link error control techniques always outperform end-to-end techniques. Moreover, the difference between end-to-end ARQ and network coding is significant even for small values of K. Again, in high-loss regimes, there is a huge difference between end-to-end ARQ and Network coding. VI. CONCLUSION In this paper, we studied the reliability benefit of network coding for tree-based reliable multicasting. Four types of error control techniques, namely, end-to-end ARQ, end-to-end FEC, link-by-link ARQ and network coding were considered. We analyzed the expected number of transmissions at source and in multicast tree as the measure of the performance of different error control techniques. We derived exact expressions for the expected number of transmissions. Furthermore, using results from order statistics, asymptotic bounds for the performance of difference error control techniques were derived. In particular, it was shown that the reliability benefit of network coding compared to link-by-link ARQ is Θ( log K where K is the fan- log log K out degree of the nodes of the tree. Our results can be readily utilized to compute exact and

12 250 200 150 100 50 0 10 6 10 5 10 4 10 3 10 2 10 1 10 0 (a No. of transmissions at source (b No. of transmissions in tree Fig. 7. P = 0.5 and h = 4. asymptotic delay benefit of network coding as studied in [4]. In the future, we would like to extend our analysis to more complicated multicast topologies such as a grid with significant amount of path diversity. VII. ACKNOWLEDGEMENTS This research was supported by DARPA CBMANET program. REFERENCES [1] P. Bhagwat, P. P. Mishra, and S. K. Tripathi, Effect of topology on performance of reliable multicast communications, in Proc. IEEE INFOCOM, Toronto, Canada, June 1994, pp. 602 609. [2] P. Kirschenhofer and H. Prodinger, A result in order statistics related to probabilistic counting, Computing, vol. 51, no. 1, pp. 15 27, 1993. [3] P. J. Grabner and H. Prodinger, Maximum statistics of n random variables distributed by the negative binomial distribution, Combinatorics, Probability and Computing, vol. 6, no. 2, pp. 179 183, 1997. [4] A. Eryilmaz, A. Ozdaglar, and M. Medard, On delay performance gains from network coding, in Proc. CISS, Princeton, USA, March 2006, pp. 864 870.