computing functions over wireless networks

Upload: rajapst

Post on 07-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/6/2019 Computing Functions Over Wireless Networks

    1/37

  • 8/6/2019 Computing Functions Over Wireless Networks

    2/37

  • 8/6/2019 Computing Functions Over Wireless Networks

    3/37

    3/37

    June 26, 2009 , P. R. Kumar

    Outline

    Difference between sensor networks and data networks 4

    Model of problem: Protocol model, Non-information theoretic model 5

    Sample of results: Average vs. Max 9

    More details of results 12 Some information theoretic results for sensor networks 27

    References 34

  • 8/6/2019 Computing Functions Over Wireless Networks

    4/37

    4/37

    June 26, 2009 , P. R. Kumar

    Examples of Tasks Environment monitoring

    Determine the Average temperature: (x1 +x2 + +xn)/n

    Alarm networks Determine the Max temperature: Maxxi

    Sensor networks are not just data networks with sensor measurementsreplacing files They are application specific

    Nodes need not just relay packets They can discard, combine, process packets

    Combination of computing and communication

    More generally: Consider a symmetric function F(x1,x2, ,xn) E.g., Average, Mode, Median, Percentile, Max

    Determined by Histogram or Types

    How should information be processed in the networkto compute suchfunctions?

    This can also be regarded as network coding for sensor networks

    Sensor networks

  • 8/6/2019 Computing Functions Over Wireless Networks

    5/37

    5/37

    June 26, 2009 , P. R. Kumar

    Model of problem:Protocol model,

    Non-information theoretic

    (Giridhar & K 05)

  • 8/6/2019 Computing Functions Over Wireless Networks

    6/37

    6/37

    June 26, 2009 , P. R. Kumar

    Model of problem

    Multi-hop model for wireless communication (Giridhar & K 05)

    Collocated network All nodes within range of all

    Multi-hop random network (Penrose 1997, Gupta & K 98)

    Critical common range for connectivity of random graph

    where

    At time t, sensor i takes a measurementxi(t) {1, 2,,D}

    Fusion node needs to calculate F(x1,,xn) exactly

    Non-information theoretic formulation

    cn +. (Take r(n) =

    2logn

    n

    )

  • 8/6/2019 Computing Functions Over Wireless Networks

    7/37

    7/37

    June 26, 2009 , P. R. Kumar

    Model of problem

    Protocol Model for wirelesscommunication

    Receiver should be outside othertransmitters interference footprints

    Communicate at rate Wbits/sec (TakeW=1 bit/sec wlog)

    At time t, sensor i takes a measurementxi(t) {1, 2,,D}

    No probability distribution onxi(t) s

    Fusion node needs to calculateF(x1,,xn) exactly

    Non-information theoretic formulation

    r2r1(1+) r1

    (1+)r2

    Two types of networks

    Collocated network

    Large range so all nodes

    can hear each other

    Random network

    n nodes randomly distributed

    Need range at no less than

    for network to be connected

  • 8/6/2019 Computing Functions Over Wireless Networks

    8/37

    8/37

    June 26, 2009 , P. R. Kumar

    Block coding allowed

    Definition of Computational RateRmax

    (n)

    Nmeasurements of node 1:x1

    Nmeasurements of node 2 :x2

    Nmeasurements of node n :xn

    If allNfunctions computed in time T

    Then Computational Rate

    Best Rate over all Strategies Sand block lengthsN:

    (Giridhar & K 05)

  • 8/6/2019 Computing Functions Over Wireless Networks

    9/37

    9/37

    June 26, 2009 , P. R. Kumar

    Sample of results: Average vs. Max

  • 8/6/2019 Computing Functions Over Wireless Networks

    10/37

    10/37

    June 26, 2009 , P. R. Kumar

    The Averageversus Max

    Theorem (Giridhar & K 05): The rate at whichthe Averagecan be harvested is

    Strategy

    Tessellate

    Fuse locally

    Compute along a rooted tree of cells

    Strategy: Take advantage of Block Coding

    Theorem (Giridhar & K 05): The rate at which

    the Maxcan be harvested is

    1

    loglogn

    First node announces times of max values: ( 1 1 1 )

    Second node announces times of additional max values: ( 1 1 )

    Third node announces of yet more max values: ( 1 )

  • 8/6/2019 Computing Functions Over Wireless Networks

    11/37

    11/37

    June 26, 2009 , P. R. Kumar

    Summary: Order of difficulty ofcomputations

    Random Multi-hopnetwork

    Max

    (1/loglog n)

    Collocated network:Max

    Random Multi-hopnetwork:

    Average, Mode, Type

    (1/log n)

    Collocated network:Average, Mode, Type(1/n) Datadownloading

    (Giridhar & K 05)

  • 8/6/2019 Computing Functions Over Wireless Networks

    12/37

    12/37

    June 26, 2009 , P. R. Kumar

    More details of results(Giridhar & K 05)

  • 8/6/2019 Computing Functions Over Wireless Networks

    13/37

    13/37

    June 26, 2009 , P. R. Kumar

    Results: A classification of functions

    Divisible functions

    Amenable to divide and conquer

    if deg(Gn) = O(log |(Fn)|)

    Symmetric functions

    Data centric paradigm: Identity of node is not important, only its value

    Type-sensitive functions

    Hard to compute

    in collocated case, and random case

    Type-threshold functions

    collocated case, and random case

    (Giridhar & K 05)

  • 8/6/2019 Computing Functions Over Wireless Networks

    14/37

    14/37

    June 26, 2009 , P. R. Kumar

    Examples (Giridhar & K 05)

    Data download problem: Fn(x1,,xn) = (x1,,xn):

    In collocated or random networks:

    Histogram of frequencies or Type: Fn(x1,,xn) = (z1,z2,,zD)

    Collocated case: Random networks:

    Special case: Any symmetric function

    Mean, Mode, Median, Majority:

    Collocated case: Random case:

    Max, Min, Range, Occurrence of a value:

    Collocated case: Random case:

  • 8/6/2019 Computing Functions Over Wireless Networks

    15/37

    15/37

    June 26, 2009 , P. R. Kumar

    Block coding allowed

    Compute allNfunctions

    If computed in time T

    Then Rate

    Best Rate over all Strategies Sand block lengthsN:

    Bound onRmax:

    Definition of RateRmax

    (n)

    Nmeasurements of node 1:x1 Nmeasurements of node 2 :x2

    Nmeasurements of node n :xn

    (Giridhar & K 05)

  • 8/6/2019 Computing Functions Over Wireless Networks

    16/37

    16/37

    June 26, 2009 , P. R. Kumar

    Divisible functions:

    There exists FS(xi: iS) for every subset S{1,2,,n}

    With |(FS)| |(Fn)|

    for partition {S1,, Sm} of S

    Theorem: if deg(Gn) = O(log |(Fn)|)

    Special cases

    Data Downloading: deg(Gn)O(log |

    (Fn)|) = O(logD

    n

    ) = O(n)

    So

    Histogram:

    So for Random networks

    Hence for Random networks

    Divisible functions

    FSFS1FS2

    FS5FS3

    FS4FS6

    (Giridhar& K 05)

    (Giridhar & K 05)

  • 8/6/2019 Computing Functions Over Wireless Networks

    17/37

    17/37

    June 26, 2009 , P. R. Kumar

    Tessellate into square cells of area r2/2

    Neighboring occupied cells can communicatewith each other

    Form a tree rooted at fusion center out

    of occupied connected cells Choose a relay node in each occupied cell and a

    parent in the next cell towards the root

    Locally compute and pass on along tree to root

    Collect data from deg(Gn) nodes within cell

    Collect functional value of log|(Fn)| bits from

    bounded number of child cells Pass on functional value of log|(Fn)| bits to

    parent cell

    All operations can be performed in time

    So

    Constructive strategy

    Proof of forDivisible Functions

  • 8/6/2019 Computing Functions Over Wireless Networks

    18/37

    18/37

    June 26, 2009 , P. R. Kumar

    Symmetric functions

    Symmetric functions depend only on type

    where

    Type-sensitive functions

    There is a 0 < c < 1 such that a fraction c of valuesis never enough to pin down the value of the function Fn

    Examples: Mean, Median, Mode, Majority

    Type-threshold functions

    Only want to know whether eachzi exceeds a thresholdzi*

    There is a threshold vector such that

    Examples: Max, Min, Range, Occurrence of value (Giridhar & K 05)

  • 8/6/2019 Computing Functions Over Wireless Networks

    19/37

    19/37

    June 26, 2009 , P. R. Kumar

    Collision-free strategies in collocatedcase

    Every node knows when to transmit based on what it hears on channel

    The content of the packet it transmits depends on what it heard, as well as its owninformation

    Node g1 transmits packet P1(xg1)

    Node g2(P1(xg1)) transmits packet P2(P1(xg1),xg2)

    Node g3(P1(xg1), P2(P1(xg1),xg2)) transmits packet P3(P1(xg1), P2 (xg2),xg3)

    Note: We are not allowing information transmission to occur through collisions

    (Giridhar & K 05)

  • 8/6/2019 Computing Functions Over Wireless Networks

    20/37

    20/37

    June 26, 2009 , P. R. Kumar

    for Type-sensitivefunctions in collocated case

    Wlog supposeD=2

    Initially,xg1 is in the set S0

    g1 with cardinality |S0

    g1| = 2N

    After first transmission,xg1 can be in one of two sets depending on whether ittransmits 0 or 1

    Let the transmission correspond to the larger set, call it be S1g1 |S1g1| 1/2 |S

    0g1|

    After t-th transmission of node k, letxk lie in Stkwith | S

    tk| 1/2 | S

    t-1k|

    So at the end, uncertainty set is:

    Thus at least nN-Tplaces in the nNvalues (x1,x2 ,,xn) are undetermined

    However to compute Fn(x(1),x(2),,x(N)), at least cnNvalues are needed

    So nN-T (1-c)nN

    So TcnN

    Hence

    Thus for collocated case (Giridhar & K 05)

  • 8/6/2019 Computing Functions Over Wireless Networks

    21/37

    21/37

    June 26, 2009 , P. R. Kumar

    for Type-thresholdfunctions in collocated case

    Consider Max function (argument can be generalized)

    Threshold vector = (1,1,,1)

    Lower Bound

    Take block length

    Node 1 transmits its locations of theN1 1s in

    Node 2 transmits theN2 new 1s in its list

    Node 3 transmits theN3 new 1s in its list

    To describeNi takes logNbits

    To describe the locations ofNi 1s requires So

    Maximized whenNi =N/n. Use

    Thus:

    (Giridhar & K 05)

  • 8/6/2019 Computing Functions Over Wireless Networks

    22/37

    22/37

    June 26, 2009 , P. R. Kumar

    Upper boundin collocated case .

    TakeN> 2n. Consider

    Claim: Each suchx produces a unique set of transmissions P1,P2,,PT Suppose not. Then there are two:x andy which produce same transmissions They differ in somexkyk

    Then also produces same transmissionssince node khears the same under xkorykand so reacts the same

    But this has different Max values fromx

    Thus Max functions are not determined from transmissions

    ExactlyN/2n 1s inx1 ExactlyN/2n 1s inx2

    ExactlyN/2n 1s inxn

    At most one 1 ...At most one 1

    (Giridhar & K 05)

  • 8/6/2019 Computing Functions Over Wireless Networks

    23/37

    23/37

    June 26, 2009 , P. R. Kumar

    Finishing the proof for the Maxfunction

    Number of such vectorsx =

    So 2T>

    So T> Nlog(n-1)

    So

    Hence

    This proves (Giridhar & K 05)

  • 8/6/2019 Computing Functions Over Wireless Networks

    24/37

    24/37

    June 26, 2009 , P. R. Kumar

    Generalizing to any Type-thresholdfunction for collocated case

    Feasibility of

    Node i sends only list of 1s for values which threshold has notbeen attained

    Upper bound of

    There exist a threshold vector such that

    Now consider anx which has z1-1 vectors of the form (1,1,,1)

    z2 vectors of the form (2,2,,2)

    z3 vectors of the form (2,2,,2)

    Remaining have 1s or 2s only

    Now problem is reduced to a Max (Giridhar & K 05)

  • 8/6/2019 Computing Functions Over Wireless Networks

    25/37

    25/37

    June 26, 2009 , P. R. Kumar

    Theorem (Giridhar & K 05)

    Type-sensitive functions:

    Proof

    Tessellate unit area domain into squares of areaA = (r)2/2

    Transmissions are local within square

    Assume Genie communicates all messages instantaneously to all nodes

    We know at least cnNtransmissions are needed

    At least one square has greater than cnNA receptions

    However only one node can receive at a time in a square

    So TcnNA = cnN(r)2/2

    But for connectivity

    So TcNlog n

    Random networks: Type sensitivenetworks

  • 8/6/2019 Computing Functions Over Wireless Networks

    26/37

    26/37

    June 26, 2009 , P. R. Kumar

    Type-threshold functions

    Theorem (Giridhar & K 05)

    Type-threshold functions:

    Proof

    Consider Max for simplicity

    Tessellate unit area domain into squares of areaA = (r)2/2 Some square has greater than nA nodes

    Suppose all nodes outside this square have value 0

    Then we need to compute Max of nA nodes

    We need cNlog (nA) transmissions

    Only one node can receive at any given time

    So TcNlog (nA) But is needed for connectivity

    So

    So TN(log log n)

    So

    Achievability can be proved by using tree gathering

  • 8/6/2019 Computing Functions Over Wireless Networks

    27/37

    27/37

    June 26, 2009 , P. R. Kumar

    Some information theoretic resultsfor sensor networks

  • 8/6/2019 Computing Functions Over Wireless Networks

    28/37

    28/37

    June 26, 2009 , P. R. Kumar

    Complexities of function computationover wireless networks

    Slepian-Wolf Theorem (73) Total information fusion over wires from correlated sources

    X

    Y

    R1=H(X)

    R2=H(Y|X) Several other complexities in sensor networks

    Wireless nodes There are no independent links: Sources share channel

    Multiple access problem

    Little is known in a pure information theoretic setting

    Also, sensors can communicate with each other and thuscooperate

    Source-channel separation does not hold

    Only a function needs to be computed, not all information

  • 8/6/2019 Computing Functions Over Wireless Networks

    29/37

    29/37

    June 26, 2009 , P. R. Kumar

    Multiple relay network (Xie and K 05)

    Consider a network

    Generalization of Cover and El Gamal 79

    A feasible rate

    p(y2 (t),y3(t),...,yn (t) | x1(t),x2 (t),...,xn1(t))

  • 8/6/2019 Computing Functions Over Wireless Networks

    30/37

    30/37

    June 26, 2009 , P. R. Kumar

    Multiple access channel(Ahlswede 71, Liao 72)

    The capacity region

    for anyp(x1)p(x2)

    Consider the multiple access channel

  • 8/6/2019 Computing Functions Over Wireless Networks

    31/37

    31/37

    June 26, 2009 , P. R. Kumar

    A multiple source multiple relaynetwork (Xie and K 07)

    A feasible rate vector is

    Consider the network

  • 8/6/2019 Computing Functions Over Wireless Networks

    32/37

    32/37

    June 26, 2009 , P. R. Kumar

    A feasible rate for a sensor networkwith a sink

    Feasible rate region for acyclic choice of routes

    Maximize over

    Based on combination of backward decoding for relay channel

    and multiple access channel

    Consider the network

    (Xie and K 07)

  • 8/6/2019 Computing Functions Over Wireless Networks

    33/37

    33/37

    June 26, 2009 , P. R. Kumar

    Exact capacity region for some Gaussiansensor networks with phase fading

    Kramer, Gastpar and Gupta 03have determined exact capacityregion for relay channel withphase fading for some geometries

    Theorem (Xie and Kumar 07)

    Phase fading unknown totransmitter

    Node 5 far away from other nodes

    The capacity region is

  • 8/6/2019 Computing Functions Over Wireless Networks

    34/37

    34/37

    June 26, 2009 , P. R. Kumar

    References-1 M.D. Penrose, The longest edge of the random minimal spanning

    tree, The Annals of Probability, vol. 7, no. 2, pp. 340-361, 1997.

    Piyush Gupta and P. R. Kumar, Critical Power for AsymptoticConnectivity in Wireless Networks, in Stochastic Analysis, Control,

    Optimization and Applications: A Volume in Honor of W. H. Fleming.

    Edited by W. M. McEneany, G. Yin, and Q. Zhang, Birkhauser, Boston,MA, pp. 547566, 1998. ISBN 0-8176-4078-9

    Arvind Giridhar and P. R. Kumar, Computing and CommunicatingFunctions Over Sensor Networks, IEEE Journal on Selected Areas in

    Communications, pp. 755764, vol. 23, no. 4, April 2005. Arvind Giridhar and P. R. Kumar, Towards a Theory of In-Network

    Computation in Wireless Sensor Networks IEEE CommunicationsMagazine, vol. 44, no. 4, pp. 98107, April 2006. Arvind Giridhar and P. R. Kumar, In-Network Information Processing in

    Wireless Sensor Networks. In Wireless Sensor Networks: SignalProcessing and Communications Perspectives, A. Swami, Q. Zhao, Y.-

    W. Hong and L. Tong, Editors. pp. 4367, John Wiley, Chichester,England, 2007.

  • 8/6/2019 Computing Functions Over Wireless Networks

    35/37

    35/37

    June 26, 2009 , P. R. Kumar

    Slepian D and Wolf J 1973 Noiseless coding of correlated information

    sources. IEEE Transactions on Information Theory, 19(4), 471480.

    T. Cover and A. El Gamal, Capacity theorems for the relay channel,IEEE Trans. Inform. Theory, vol. 25, pp. 572-584, 1979.

    R. Ahlswede, Multi-way communication channels, in Proceedings ofthe 2nd Int. Symp. Inform. Theory (Tsahkadsor, Armenian S.S.R.),(Prague), pp. 23-52, Publishing House of the Hungarian Academy of

    Sciences, 1971.

    H. Liao, Multiple access channels. PhD thesis, Department of ElectricalEngineering, University of Hawaii, Honolulu, HA, 1972.

    G. Kramer, M. Gastpar, and P. Gupta, Cooperative strategies andcapacity theorems for relay networks, IEEE Trans. Inform. Theory, vol.51, pp. 3037-3063, September 2005.

    References-2

  • 8/6/2019 Computing Functions Over Wireless Networks

    36/37

    36/37

    June 26, 2009 , P. R. Kumar

    References-3

    Liang-Liang Xie and P. R. Kumar, An Achievable Rate for the Multiple-

    Level Relay Channel, IEEE Transactions on Information Theory, vol.51, no. 4, pp. 13481358, April 2005.

    Liang-Liang Xie and P. R. Kumar, Multisource, multidestination,

    multirelay wireless networks, IEEE Transactions on InformationTheory, Special issue on Models, Theory and Codes for Relaying and

    Cooperation in Communication Networks, vol. 53, no. 10, pp. 3586

    3595, October 2007. Liang-Liang Xie and P. R. Kumar, Information-Theoretic Studies of

    Wireless Sensor Networks. In Handbook on Array Processing and

    Sensor Networks, Simon Haykin and K. J. Ray Liu, Editors. IEEE-

    Wiley, 2009.

  • 8/6/2019 Computing Functions Over Wireless Networks

    37/37

    37/37

    June 26, 2009 , P. R. Kumar

    http://decision.csl.illinois.edu/~prkumar/html_files/talks.html