-
Scheduling Out-of-Coverage Vehicular Communications Using Reinforcement Learning
Authors:
Taylan Şahin,
Ramin Khalili,
Mate Boban,
Adam Wolisz
Abstract:
Performance of vehicle-to-vehicle (V2V) communications depends highly on the employed scheduling approach. While centralized network schedulers offer high V2V communication reliability, their operation is conventionally restricted to areas with full cellular network coverage. In contrast, in out-of-cellular-coverage areas, comparatively inefficient distributed radio resource management is used. To…
▽ More
Performance of vehicle-to-vehicle (V2V) communications depends highly on the employed scheduling approach. While centralized network schedulers offer high V2V communication reliability, their operation is conventionally restricted to areas with full cellular network coverage. In contrast, in out-of-cellular-coverage areas, comparatively inefficient distributed radio resource management is used. To exploit the benefits of the centralized approach for enhancing the reliability of V2V communications on roads lacking cellular coverage, we propose VRLS (Vehicular Reinforcement Learning Scheduler), a centralized scheduler that proactively assigns resources for out-of-coverage V2V communications \textit{before} vehicles leave the cellular network coverage. By training in simulated vehicular environments, VRLS can learn a scheduling policy that is robust and adaptable to environmental changes, thus eliminating the need for targeted (re-)training in complex real-life environments. We evaluate the performance of VRLS under varying mobility, network load, wireless channel, and resource configurations. VRLS outperforms the state-of-the-art distributed scheduling algorithm in zones without cellular network coverage by reducing the packet error rate by half in highly loaded conditions and achieving near-maximum reliability in low-load scenarios.
△ Less
Submitted 13 July, 2022;
originally announced July 2022.
-
Towards Grassroots Peering at the Edge
Authors:
David Bermbach,
Sergio Lucia,
Vlado Handziski,
Adam Wolisz
Abstract:
Fog Computing allows applications to address their latency and privacy requirements while co** with bandwidth limitations of Internet service providers (ISPs). Existing research on fog systems has so far mostly taken a very high-level view on the actual fog infrastructure. In this position paper, we identify and discuss the problem of having multiple ISPs in edge-to-edge communication. As a poss…
▽ More
Fog Computing allows applications to address their latency and privacy requirements while co** with bandwidth limitations of Internet service providers (ISPs). Existing research on fog systems has so far mostly taken a very high-level view on the actual fog infrastructure. In this position paper, we identify and discuss the problem of having multiple ISPs in edge-to-edge communication. As a possible solution we propose that edge operators create direct edge-to-edge links in a grassroots fashion and discuss different implementation options. Based on this, we highlight some important open research challenges that result from this.
△ Less
Submitted 20 October, 2021;
originally announced January 2022.
-
Generation of Realistic Cloud Access Times for Mobile Application Testing using Transfer Learning
Authors:
Manoj R. Rege,
Vlado Handziski,
Adam Wolisz
Abstract:
The network Quality of Service (QoS) metrics such as the access time, the bandwidth, and the packet loss play an important role in determining the Quality of Experience (QoE) of mobile applications. Various factors like the Radio Resource Control (RRC) states, the Mobile Network Operator (MNO) specific retransmission configurations, handovers triggered by the user mobility, the network load, etc.…
▽ More
The network Quality of Service (QoS) metrics such as the access time, the bandwidth, and the packet loss play an important role in determining the Quality of Experience (QoE) of mobile applications. Various factors like the Radio Resource Control (RRC) states, the Mobile Network Operator (MNO) specific retransmission configurations, handovers triggered by the user mobility, the network load, etc. can cause high variability in these QoS metrics on 4G/LTE, and WiFi networks, which can be detrimental to the application QoE. Therefore, exposing the mobile application to realistic network QoS metrics is critical for a tester attempting to predict its QoE. A viable approach is testing using synthetic traces. The main challenge in the generation of realistic synthetic traces is the diversity of environments and the lack of wide scope of real traces to calibrate the generators. In this paper, we describe a measurement-driven methodology based on transfer learning with Long Short Term Memory (LSTM) neural nets to solve this problem. The methodology requires a relatively short sample of the targeted environment to adapt the presented basic model to new environments, thus simplifying synthetic traces generation. We present this feature for realistic WiFi and LTE cloud access time models adapted for diverse target environments with a trace size of just 6000 samples measured over a few tens of minutes. We demonstrate that synthetic traces generated from these models are capable of accurately reproducing application QoE metric distributions including their outlier values.
△ Less
Submitted 21 April, 2021; v1 submitted 16 March, 2021;
originally announced March 2021.
-
Distributed Learning for Proportional-Fair Resource Allocation in Coexisting WiFi Networks
Authors:
Piotr Gawłowicz,
Jean Walrand,
Adam Wolisz
Abstract:
In this paper, we revisit the widely known performance anomaly that results in severe network utility degradation in WiFi networks when nodes use diverse modulation and coding schemes. The proportional-fair allocation was shown to mitigate this anomaly and provide a good throughput to the stations. It can be achieved through the selection of contention window values based on the explicit solution…
▽ More
In this paper, we revisit the widely known performance anomaly that results in severe network utility degradation in WiFi networks when nodes use diverse modulation and coding schemes. The proportional-fair allocation was shown to mitigate this anomaly and provide a good throughput to the stations. It can be achieved through the selection of contention window values based on the explicit solution of an optimization problem or, as proposed recently, by following a learning-based approach that uses a centralized gradient descent algorithm. In this paper, we leverage our recent theoretical work on asynchronous distributed optimization and propose a simple algorithm that allows WiFi nodes to independently tune their contention window to achieve proportional fairness. We compare the throughputs and air-time allocation that this algorithm achieves to those of the standard WiFi binary exponential back-off and show the improvements.
△ Less
Submitted 9 February, 2021;
originally announced February 2021.
-
A Fully Distributed, Privacy Respecting Approach for Back-tracking of Potentially Infectious Contacts
Authors:
Adam Wolisz
Abstract:
In limiting the rapid spread of highly infectious diseases like Covid-19 means to immediately identify individuals who had been in contact with a newly diagnosed infected person have proven to be important. Such potential victims can go into quarantine until tested thus constraining further spread. This note describes a concept of mobile device (e.g. Smart phones) based approach for tracking inter…
▽ More
In limiting the rapid spread of highly infectious diseases like Covid-19 means to immediately identify individuals who had been in contact with a newly diagnosed infected person have proven to be important. Such potential victims can go into quarantine until tested thus constraining further spread. This note describes a concept of mobile device (e.g. Smart phones) based approach for tracking interpersonal contacts which might have led to infection and alerting the potential victims. The approach assures means for defense against malicious usage while assuring a high level of privacy for all people involved.
△ Less
Submitted 31 March, 2020;
originally announced March 2020.
-
OfdmFi: Enabling Cross-Technology Communication Between LTE-U/LAA and WiFi
Authors:
Piotr Gawłowicz,
Anatolij Zubow,
Suzan Bayhan,
Adam Wolisz
Abstract:
Despite exhibiting very high theoretical data rates, in practice, the performance of LTE-U/LAA and WiFi networks is severely limited under cross-technology coexistence scenarios in the unlicensed 5GHz band. As a remedy, recent research shows the need for collaboration and coordination among co-located networks. However, enabling such collaboration requires an information exchange that is hard to r…
▽ More
Despite exhibiting very high theoretical data rates, in practice, the performance of LTE-U/LAA and WiFi networks is severely limited under cross-technology coexistence scenarios in the unlicensed 5GHz band. As a remedy, recent research shows the need for collaboration and coordination among co-located networks. However, enabling such collaboration requires an information exchange that is hard to realize due to completely incompatible network protocol stacks. We propose OfdmFi, the first cross-technology communication scheme that enables direct bidirectional over-the-air communication between LTE-U/LAA and WiFi with minimal overhead to their legacy transmissions. Requiring neither hardware nor firmware changes in commodity technologies, OfdmFi leverages the standard-compliant possibility of generating message-bearing power patterns, similar to punched cards from the early days of computers, in the time-frequency resource grid of an OFDM transmitter which can be cross-observed and decoded by a heterogeneous OFDM receiver. As a proof-of-concept, we have designed and implemented a prototype using commodity devices and SDR platforms. Our comprehensive evaluation reveals that OfdmFi achieves robust bidirectional CTC between both systems with a data rate of up to 84kbps, which is more than 125x faster than state-of-the-art.
△ Less
Submitted 9 December, 2019;
originally announced December 2019.
-
VRLS: A Unified Reinforcement Learning Scheduler for Vehicle-to-Vehicle Communications
Authors:
Taylan Şahin,
Ramin Khalili,
Mate Boban,
Adam Wolisz
Abstract:
Vehicle-to-vehicle (V2V) communications have distinct challenges that need to be taken into account when scheduling the radio resources. Although centralized schedulers (e.g., located on base stations) could be utilized to deliver high scheduling performance, they cannot be employed in case of coverage gaps. To address the issue of reliable scheduling of V2V transmissions out of coverage, we propo…
▽ More
Vehicle-to-vehicle (V2V) communications have distinct challenges that need to be taken into account when scheduling the radio resources. Although centralized schedulers (e.g., located on base stations) could be utilized to deliver high scheduling performance, they cannot be employed in case of coverage gaps. To address the issue of reliable scheduling of V2V transmissions out of coverage, we propose Vehicular Reinforcement Learning Scheduler (VRLS), a centralized scheduler that predictively assigns the resources for V2V communication while the vehicle is still in cellular network coverage. VRLS is a unified reinforcement learning (RL) solution, wherein the learning agent, the state representation, and the reward provided to the agent are applicable to different vehicular environments of interest (in terms of vehicular density, resource configuration, and wireless channel conditions). Such a unified solution eliminates the necessity of redesigning the RL components for a different environment, and facilitates transfer learning from one to another similar environment. We evaluate the performance of VRLS and show its ability to avoid collisions and half-duplex errors, and to reuse the resources better than the state of the art scheduling algorithms. We also show that pre-trained VRLS agent can adapt to different V2V environments with limited retraining, thus enabling real-world deployment in different scenarios.
△ Less
Submitted 22 July, 2019;
originally announced July 2019.
-
Reinforcement Learning Scheduler for Vehicle-to-Vehicle Communications Outside Coverage
Authors:
Taylan Şahin,
Ramin Khalili,
Mate Boban,
Adam Wolisz
Abstract:
Radio resources in vehicle-to-vehicle (V2V) communication can be scheduled either by a centralized scheduler residing in the network (e.g., a base station in case of cellular systems) or a distributed scheduler, where the resources are autonomously selected by the vehicles. The former approach yields a considerably higher resource utilization in case the network coverage is uninterrupted. However,…
▽ More
Radio resources in vehicle-to-vehicle (V2V) communication can be scheduled either by a centralized scheduler residing in the network (e.g., a base station in case of cellular systems) or a distributed scheduler, where the resources are autonomously selected by the vehicles. The former approach yields a considerably higher resource utilization in case the network coverage is uninterrupted. However, in case of intermittent or out-of-coverage, due to not having input from centralized scheduler, vehicles need to revert to distributed scheduling. Motivated by recent advances in reinforcement learning (RL), we investigate whether a centralized learning scheduler can be taught to efficiently pre-assign the resources to vehicles for out-of-coverage V2V communication. Specifically, we use the actor-critic RL algorithm to train the centralized scheduler to provide non-interfering resources to vehicles before they enter the out-of-coverage area. Our initial results show that a RL-based scheduler can achieve performance as good as or better than the state-of-art distributed scheduler, often outperforming it. Furthermore, the learning process completes within a reasonable time (ranging from a few hundred to a few thousand epochs), thus making the RL-based scheduler a promising solution for V2V communications with intermittent network coverage.
△ Less
Submitted 29 April, 2019;
originally announced April 2019.
-
Greedy Multi-Channel Neighbor Discovery
Authors:
Niels Karowski,
Konstantin Miller,
Adam Wolisz
Abstract:
The accelerating penetration of physical environments by objects with information processing and wireless communication capabilities requires approaches to find potential communication partners and discover services. In the present work, we focus on passive discovery approaches in multi-channel wireless networks based on overhearing periodic beacon transmissions of neighboring devices which are ot…
▽ More
The accelerating penetration of physical environments by objects with information processing and wireless communication capabilities requires approaches to find potential communication partners and discover services. In the present work, we focus on passive discovery approaches in multi-channel wireless networks based on overhearing periodic beacon transmissions of neighboring devices which are otherwise agnostic to the discovery process. We propose a family of low-complexity algorithms that generate listening schedules guaranteed to discover all neighbors. The presented approaches simultaneously depending on the beacon periods optimize the worst case discovery time, the mean discovery time, and the mean number of neighbors discovered until any arbitrary in time. The presented algorithms are fully compatible with technologies such as IEEE 802.11 and IEEE 802.15.4. Complementing the proposed low-complexity algorithms, we formulate the problem of computing discovery schedules that minimize the mean discovery time for arbitrary beacon periods as an integer linear problem. We study the performance of the proposed approaches analytically, by means of numerical experiments, and by extensively simulating them under realistic conditions. We observe that the generated listening schedules significantly - by up to factor 4 for the mean discovery time, and by up to 300% for the mean number of neighbors discovered until each point in time - outperform the Passive Scan, a discovery approach defined in the IEEE 802.15.4 standard. Based on the gained insights, we discuss how the selection of the beacon periods influences the efficiency of the discovery process, and provide recommendations for the design of systems and protocols.
△ Less
Submitted 13 July, 2018;
originally announced July 2018.
-
Towards efficient coexistence of IEEE 802.15.4e TSCH and IEEE 802.11
Authors:
Mikołaj Chwalisz,
Adam Wolisz
Abstract:
A major challenge in wide deployment of smart wireless devices, using different technologies and sharing the same 2.4 GHz spectrum, is to achieve coexistence across multiple technologies. The IEEE~802.11 (WLAN) and the IEEE 802.15.4e TSCH (WSN) where designed with different goals in mind and both play important roles for respective applications. However, they cause mutual interference and degraded…
▽ More
A major challenge in wide deployment of smart wireless devices, using different technologies and sharing the same 2.4 GHz spectrum, is to achieve coexistence across multiple technologies. The IEEE~802.11 (WLAN) and the IEEE 802.15.4e TSCH (WSN) where designed with different goals in mind and both play important roles for respective applications. However, they cause mutual interference and degraded performance while operating in the same space. To improve this situation we propose an approach to enable a cooperative control which type of network is transmitting at given time, frequency and place.
We recognize that TSCH based sensor network is expected to occupy only small share of time, and that the nodes are by design tightly synchronized. We develop mechanism enabling over-the-air synchronization of the Wi-Fi network to the TSCH based sensor network. Finally, we show that Wi-Fi network can avoid transmitting in the "collision periods". We provide full design and show prototype implementation based on the Commercial off-the-shelf (COTS) devices. Our solution does not require changes in any of the standards.
△ Less
Submitted 27 October, 2017;
originally announced October 2017.
-
Coexistence Gaps in Space: Cross-Technology Interference-Nulling for Improving LTE-U/WiFi Coexistence
Authors:
Suzan Bayhan,
Anatolij Zubow,
Adam Wolisz
Abstract:
To avoid the foreseeable spectrum crunch, LTE operators have started to explore the option to directly use 5 GHz unlicensed spectrum band being used by IEEE 802.11 (WiFi). However, as LTE is not designed with shared spectrum access in mind, there is a major issue of coexistence with WiFi networks. Current coexistence schemes to be deployed at the LTE-U BS create coexistence gaps only in one domain…
▽ More
To avoid the foreseeable spectrum crunch, LTE operators have started to explore the option to directly use 5 GHz unlicensed spectrum band being used by IEEE 802.11 (WiFi). However, as LTE is not designed with shared spectrum access in mind, there is a major issue of coexistence with WiFi networks. Current coexistence schemes to be deployed at the LTE-U BS create coexistence gaps only in one domain (e.g., time, frequency, or space) and can provide only incremental gains due to the lack of coordination among the coexisting WiFi and LTE-U networks. Therefore, we propose a coordinated coexistence scheme which relies on cooperation between neighboring LTE-U and WiFi networks. Our proposal suggests that LTE-U BSs equipped with multiple antennas can create coexistence gaps in space domain in addition to the time domain gaps by means of cross-technology interference nulling towards WiFi nodes in the interference range. In return, LTE-U can increase its own airtime utilization while trading off slightly its antenna diversity. The cooperation offers benefits to both LTE-U and WiFi in terms of improved throughput and decreased channel access delay. More specifically, system-level simulations reveal a throughput gain up to 221% for LTE-U network and 44% for WiFi network depending on the setting, e.g., the distance between the two cell, number of LTE antennas, and WiFi users in the LTE-U BS neighborhood. Our proposal provides significant benefits especially for moderate separation distances between LTE-U/WiFi cells where interference from a neighboring network might be severe due to the hidden network problem.
△ Less
Submitted 22 October, 2017;
originally announced October 2017.
-
LtFi: Cross-technology Communication for RRM between LTE-U and IEEE 802.11
Authors:
Piotr Gawłowicz,
Anatolij Zubow,
Adam Wolisz
Abstract:
Cross-technology communication (CTC) was proposed in recent literature as a way to exploit the opportunities of collaboration between heterogeneous wireless technologies. This paper presents LtFi, a system which enables to set-up a CTC between nodes of co-located LTE-U and WiFi networks. LtFi follows a two-step approach: using the air-interface LTE-U BSs are broadcasting connection and identificat…
▽ More
Cross-technology communication (CTC) was proposed in recent literature as a way to exploit the opportunities of collaboration between heterogeneous wireless technologies. This paper presents LtFi, a system which enables to set-up a CTC between nodes of co-located LTE-U and WiFi networks. LtFi follows a two-step approach: using the air-interface LTE-U BSs are broadcasting connection and identification data to adjacent WiFi nodes, which is used to create a bi-directional control channel over the wired Internet. This way LtFi enables the development of advanced cross-technology interference and radio resource management schemes between heterogeneous WiFi and LTE-U networks.
LtFi is of low complexity and fully compliant with LTE-U technology and works on WiFi side with COTS hardware. It was prototypically implemented and evaluated. Experimental results reveal that LtFi is able to reliably decoded the data transmitted over the LtFi air-interface in a crowded wireless environment at even very low LTE-U receive power levels of -92dBm. Moreover, results from system-level simulations show that LtFi is able to accurately estimate the set of interfering LTE-U BSs in a typical LTE-U multi-cell environment.
△ Less
Submitted 21 July, 2017;
originally announced July 2017.
-
Towards LTE-U Interference Detection, Assessment and Mitigation in 802.11 Networks using Commodity Hardware
Authors:
Michael Olbrich,
Anatolij Zubow,
Sven Zehl,
Adam Wolisz
Abstract:
We propose WiPLUS -- a system that enables WiFi to deal with the stealthy invasion of LTE-U into the frequency bands used by WiFi. Using solely MAC layer information extracted passively, during runtime, out of the hardware registers of the WiFi NIC at the WiFi access point, WiPLUS is able to: i) detect interfering LTE-U signals, ii) compute their duty-cycles, and iii) derive the effective medium a…
▽ More
We propose WiPLUS -- a system that enables WiFi to deal with the stealthy invasion of LTE-U into the frequency bands used by WiFi. Using solely MAC layer information extracted passively, during runtime, out of the hardware registers of the WiFi NIC at the WiFi access point, WiPLUS is able to: i) detect interfering LTE-U signals, ii) compute their duty-cycles, and iii) derive the effective medium airtime available for each WiFi link in a WiFi Basic Service Set (BSS). Moreover WiPLUS provides accurate timing information about the detected LTE-U ON and OFF phases enabling advanced interference mitigation strategies such as interference-aware scheduling of packet transmissions, rate adaptation and adaptive channel bonding.
WiPLUS does not require any modifications to the WiFi client stations and works with commodity WiFi APs where it has a simple software installation process.
We present the design, the implementation details and the evaluation of the WiPLUS approach. Evaluation results reveal that it is able to accurately estimate the effective available medium airtime for each link in a WiFi BSS under a wide range of LTE-U signal strengths with a root-mean-square error of less than 3% for the downlink and less 10% for the uplink.
△ Less
Submitted 13 February, 2017;
originally announced February 2017.
-
ViFi: Virtual Fingerprinting WiFi-based Indoor Positioning via Multi-Wall Multi-Floor Propagation Model
Authors:
Giuseppe Caso,
Luca De Nardis,
Filip Lemic,
Vlado Handziski,
Adam Wolisz,
Maria-Gabriella Di Benedetto
Abstract:
Widespread adoption of indoor positioning systems based on WiFi fingerprinting is at present hindered by the large efforts required for measurements collection during the offline phase. Two approaches were recently proposed to address such issue: crowdsourcing and RSS radiomap prediction, based on either interpolation or propagation channel model fitting from a small set of measurements. RSS predi…
▽ More
Widespread adoption of indoor positioning systems based on WiFi fingerprinting is at present hindered by the large efforts required for measurements collection during the offline phase. Two approaches were recently proposed to address such issue: crowdsourcing and RSS radiomap prediction, based on either interpolation or propagation channel model fitting from a small set of measurements. RSS prediction promises better positioning accuracy when compared to crowdsourcing, but no systematic analysis of the impact of system parameters on positioning accuracy is available. This paper fills this gap by introducing ViFi, an indoor positioning system that relies on RSS prediction based on Multi-Wall Multi-Floor (MWMF) propagation model to generate a discrete RSS radiomap (virtual fingerprints). Extensive experimental results, obtained in multiple independent testbeds, show that ViFi outperforms virtual fingerprinting systems adopting simpler propagation models in terms of accuracy, and allows a sevenfold reduction in the number of measurements to be collected, while achieving the same accuracy of a traditional fingerprinting system deployed in the same environment. Finally, a set of guidelines for the implementation of ViFi in a generic environment, that saves the effort of collecting additional measurements for system testing and fine tuning, is proposed.
△ Less
Submitted 2 April, 2019; v1 submitted 18 November, 2016;
originally announced November 2016.
-
hMAC: Enabling Hybrid TDMA/CSMA on IEEE 802.11 Hardware
Authors:
Sven Zehl,
Anatolij Zubow,
Adam Wolisz
Abstract:
We present our current work-in-progress on the design and implementation of a hybrid TDMA/CSMA medium access architecture, hereafter referred to as hMAC, which can be used on top of commercial IEEE 802.11 off-the-shelf hardware. The software only solution is based on the popular Linux ATH9K softMAC driver and hence can be used with standard Linux systems using Atheros based wireless network device…
▽ More
We present our current work-in-progress on the design and implementation of a hybrid TDMA/CSMA medium access architecture, hereafter referred to as hMAC, which can be used on top of commercial IEEE 802.11 off-the-shelf hardware. The software only solution is based on the popular Linux ATH9K softMAC driver and hence can be used with standard Linux systems using Atheros based wireless network devices. The proposed hMAC exploits the standard 802.11 power saving functionality present in the ATH9K device driver to enable control of the software packet queues. This allows the assignment of TDMA time slots on wireless link and traffic class basis. While the solution is placed only in the device driver, the CSMA/CA functionality on hardware level is still active. This enables inter-working with standard unmodified 802.11 devices. We tested our prototypical hMAC implementation in a small test-bed. Therefore, we implemented a centralized interference management scheme in which pairs of links suffering from a hidden node problem are assigned to TDMA time slots on a per-link basis. To show the benefits of the proposed hMAC approach we compared the results with standard 802.11 DCF and classical, i.e. per-node, TDMA. Finally, to enable collaboration with the research community, the hMAC source code is provided as open-source.
△ Less
Submitted 17 November, 2016; v1 submitted 16 November, 2016;
originally announced November 2016.
-
UniFlex: Accelerating Networking Research and Experimentation through Software-Defined Wireless Networking
Authors:
Piotr Gawłowicz,
Anatolij Zubow,
Mikolaj Chwalisz,
Adam Wolisz
Abstract:
Classical control and management plane for computer networks is addressing individual parameters of protocol layers within an individual wireless network device. We argue that this is not sufficient in phase of increasing deployment of highly re-configurable systems, as well as heterogeneous wireless systems co-existing in the same radio spectrum which demand harmonized, frequently even coordinate…
▽ More
Classical control and management plane for computer networks is addressing individual parameters of protocol layers within an individual wireless network device. We argue that this is not sufficient in phase of increasing deployment of highly re-configurable systems, as well as heterogeneous wireless systems co-existing in the same radio spectrum which demand harmonized, frequently even coordinated adaptation of multiple parameters in different protocol layers (cross-layer) in multiple network devices (cross-node).
We propose UniFlex, a framework enabling unified and flexible radio and network control. It provides an API enabling coordinated cross-layer control and management operation over multiple network nodes. The controller logic may be implemented either in a centralized or distributed manner. This allows to place time-sensitive control functions close to the controlled device (i.e., local control application), off-load more resource hungry network application to compute servers and make them work together to control entire network.
The UniFlex framework was prototypically implemented and provided to the research community as open-source. We evaluated the the framework in a number of use-cases, what proved its usability.
△ Less
Submitted 10 November, 2016; v1 submitted 8 November, 2016;
originally announced November 2016.
-
A Mathematical Model for Fingerprinting-based Localization Algorithms
Authors:
Arash Behboodi,
Filip Lemic,
Adam Wolisz
Abstract:
A general theoretical framework for Fingerprinting Localization Algorithms (FPS), given their popularity, can be utilized for their performance studies. In this work, after setting up an abstract model for FPS, it is shown that fingerprinting-based localization problem can be cast as a hypothesis testing (HT) problem and therefore various results in HT literature can be used to provide insights, g…
▽ More
A general theoretical framework for Fingerprinting Localization Algorithms (FPS), given their popularity, can be utilized for their performance studies. In this work, after setting up an abstract model for FPS, it is shown that fingerprinting-based localization problem can be cast as a hypothesis testing (HT) problem and therefore various results in HT literature can be used to provide insights, guidelines and performance bounds for general FPS. This framework results in characterization of scaling limits of localization reliability in terms of number of measurements and other environmental parameters. It is suggested that Kullback-Leibler (KL) divergence between probability distributions of selected feature for fingerprinting at different locations encapsulates information about both accuracy and latency and can be used as a central performance metric for studying FPS. Although developed for an arbitrary fingerprint, the framework is particularly used for studying simple Received Signal Strength (RSS)- based algorithm. The effect of various parameters on the performance of fingerprinting algorithms is discussed, which includes path loss and fading characteristics, number of measurements at each point, number of anchors and their position, and placement of training points. Representative simulations and experimentation are used to verify validity of the theoretical frameworks in realistic setups.
△ Less
Submitted 15 February, 2017; v1 submitted 24 October, 2016;
originally announced October 2016.
-
NxWLAN: Neighborhood eXtensible WLAN
Authors:
Piotr Gawłowicz,
Sven Zehl,
Anatolij Zubow,
Adam Wolisz
Abstract:
The increased usage of IEEE 802.11 Wireless LAN (WLAN) in residential environments by unexperienced users leads to dense, unplanned and chaotic residential WLAN deployments. Often WLAN Access Points (APs) are deployed unprofitable in terms of radio coverage and interference conditions. In many cases the usage of the neighbor's AP would be beneficial as it would provide better radio coverage in som…
▽ More
The increased usage of IEEE 802.11 Wireless LAN (WLAN) in residential environments by unexperienced users leads to dense, unplanned and chaotic residential WLAN deployments. Often WLAN Access Points (APs) are deployed unprofitable in terms of radio coverage and interference conditions. In many cases the usage of the neighbor's AP would be beneficial as it would provide better radio coverage in some parts of the residential user's apartment. Moreover, the network performance can be dramatically improved by balancing the network load over spatially co-located APs.
We address this problem by presenting Neighborhood extensible WLAN (NxWLAN) which enables the secure extension of user's home WLANs through usage of neighboring APs in residential environments with zero configuration efforts and without revealing WPA2 encryption keys to untrusted neighbor APs. NxWLAN makes use of virtualization techniques utilizing neighboring AP by deploying on-demand a Wireless Termination Point (WTP) on the neighboring AP and by tunneling encrypted 802.11 traffic to the Virtual Access Point (VAP) residing on the home AP. This allows the client devices to always authenticate against the home AP using the WPA2-PSK passphrase already stored in the device without any additional registration process.
We implemented NxWLAN prototypically using off-the-shelf hardware and open source software. As the OpenFlow is not suited for forwarding native 802.11 frames, we built software switch using P4 language. The performance evaluation in a small 802.11 indoor testbed showed the feasibility of our approach. NxWLAN is provided to the community as open source.
△ Less
Submitted 12 July, 2016;
originally announced July 2016.
-
QoE-Based Low-Delay Live Streaming Using Throughput Predictions
Authors:
Konstantin Miller,
Abdel-Karim Al-Tamimi,
Adam Wolisz
Abstract:
Recently, HTTP-based adaptive streaming has become the de facto standard for video streaming over the Internet. It allows clients to dynamically adapt media characteristics to network conditions in order to ensure a high quality of experience, that is, minimize playback interruptions, while maximizing video quality at a reasonable level of quality changes. In the case of live streaming, this task…
▽ More
Recently, HTTP-based adaptive streaming has become the de facto standard for video streaming over the Internet. It allows clients to dynamically adapt media characteristics to network conditions in order to ensure a high quality of experience, that is, minimize playback interruptions, while maximizing video quality at a reasonable level of quality changes. In the case of live streaming, this task becomes particularly challenging due to the latency constraints. The challenge further increases if a client uses a wireless network, where the throughput is subject to considerable fluctuations. Consequently, live streams often exhibit latencies of up to 30 seconds. In the present work, we introduce an adaptation algorithm for HTTP-based live streaming called LOLYPOP (Low-Latency Prediction-Based Adaptation) that is designed to operate with a transport latency of few seconds. To reach this goal, LOLYPOP leverages TCP throughput predictions on multiple time scales, from 1 to 10 seconds, along with an estimate of the prediction error distribution. In addition to satisfying the latency constraint, the algorithm heuristically maximizes the quality of experience by maximizing the average video quality as a function of the number of skipped segments and quality transitions. In order to select an efficient prediction method, we studied the performance of several time series prediction methods in IEEE 802.11 wireless access networks. We evaluated LOLYPOP under a large set of experimental conditions limiting the transport latency to 3 seconds, against a state-of-the-art adaptation algorithm from the literature, called FESTIVE. We observed that the average video quality is by up to a factor of 3 higher than with FESTIVE. We also observed that LOLYPOP is able to reach a broader region in the quality of experience space, and thus it is better adjustable to the user profile or service provider requirements.
△ Less
Submitted 4 March, 2016; v1 submitted 2 March, 2016;
originally announced March 2016.
-
ResFi: A Secure Framework for Self Organized Radio Resource Management in Residential WiFi Networks
Authors:
Sven Zehl,
Anatolij Zubow,
Adam Wolisz,
Michael Doering
Abstract:
In dense deployments of residential WiFi networks individual users suffer performance degradation due to both contention and interference. While Radio Resource Management (RRM) is known to mitigate this effects its application in residential WiFi networks being by nature unplanned and individually managed creates a big challenge. We propose ResFi - a framework supporting creation of RRM functional…
▽ More
In dense deployments of residential WiFi networks individual users suffer performance degradation due to both contention and interference. While Radio Resource Management (RRM) is known to mitigate this effects its application in residential WiFi networks being by nature unplanned and individually managed creates a big challenge. We propose ResFi - a framework supporting creation of RRM functionality in legacy deployments. The radio interfaces are used for efficient discovery of adjacent APs and as a side-channel to establish a secure communication among the individual Access Point Management Applications within a neighborhood over the wired Internet backbone. We have implemented a prototype of ResFi and studied its performance in our testbed. As a showcase we have implemented various RRM applications among others a distributed channel assignment algorithm using ResFi. ResFi is provided to the community as open source.
△ Less
Submitted 4 January, 2016;
originally announced January 2016.
-
Low-Delay Adaptive Video Streaming Based on Short-Term TCP Throughput Prediction
Authors:
Konstantin Miller,
Abdel-Karim Al-Tamimi,
Adam Wolisz
Abstract:
Recently, HTTP-Based Adaptive Streaming has become the de facto standard for video streaming over the Internet. It allows the client to adapt media characteristics to varying network conditions in order to maximize Quality of Experience (QoE). In the case of live streaming this task becomes particularly challenging. An important factor than might help improving performance is the capability to cor…
▽ More
Recently, HTTP-Based Adaptive Streaming has become the de facto standard for video streaming over the Internet. It allows the client to adapt media characteristics to varying network conditions in order to maximize Quality of Experience (QoE). In the case of live streaming this task becomes particularly challenging. An important factor than might help improving performance is the capability to correctly predict network throughput dynamics on short to medium timescales. It becomes notably difficult in wireless networks that are often subject to continuous throughput fluctuations.
In the present work, we develop an adaptation algorithm for HTTP-Based Adaptive Live Streaming that, for each adaptation decision, maximizes a QoE-based utility function depending on the probability of playback interruptions, average video quality, and the amount of video quality fluctuations. To compute the utility function the algorithm leverages throughput predictions, and dynamically estimated prediction accuracy.
We are trying to close the gap created by the lack of studies analyzing TCP throughput on short to medium timescales. We study several time series prediction methods and their error distributions. We observe that Simple Moving Average performs best in most cases. We also observe that the relative underestimation error is best represented by a truncated normal distribution, while the relative overestimation error is best represented by a Lomax distribution. Moreover, underestimations and overestimations exhibit a temporal correlation that we use to further improve prediction accuracy.
We compare the proposed algorithm with a baseline approach that uses a fixed margin between past throughput and selected media bit rate, and an oracle-based approach that has perfect knowledge over future throughput for a certain time horizon.
△ Less
Submitted 3 March, 2016; v1 submitted 10 March, 2015;
originally announced March 2015.
-
A Control-Theoretic Approach to Adaptive Video Streaming in Dense Wireless Networks
Authors:
Konstantin Miller,
Dilip Bethanabhotla,
Giuseppe Caire,
Adam Wolisz
Abstract:
Recently, the way people consume video content has been undergoing a dramatic change. Plain TV sets, that have been the center of home entertainment for a long time, are losing grounds to Hybrid TV's, PC's, game consoles, and, more recently, mobile devices such as tablets and smartphones. The new predominant paradigm is: watch what I want, when I want, and where I want.
The challenges of this sh…
▽ More
Recently, the way people consume video content has been undergoing a dramatic change. Plain TV sets, that have been the center of home entertainment for a long time, are losing grounds to Hybrid TV's, PC's, game consoles, and, more recently, mobile devices such as tablets and smartphones. The new predominant paradigm is: watch what I want, when I want, and where I want.
The challenges of this shift are manifold. On the one hand, broadcast technologies such as DVB-T/C/S need to be extended or replaced by mechanisms supporting asynchronous viewing, such as IPTV and video streaming over best-effort networks, while remaining scalable to millions of users. On the other hand, the dramatic increase of wireless data traffic begins to stretch the capabilities of the existing wireless infrastructure to its limits. Finally, there is a challenge to video streaming technologies to cope with a high heterogeneity of end-user devices and dynamically changing network conditions, in particular in wireless and mobile networks.
In the present work, our goal is to design an efficient system that supports a high number of unicast streaming sessions in a dense wireless access network. We address this goal by jointly considering the two problems of wireless transmission scheduling and video quality adaptation, using techniques inspired by the robustness and simplicity of Proportional-Integral-Derivative (PID) controllers. We show that the control-theoretic approach allows to efficiently utilize available wireless resources, providing high Quality of Experience (QoE) to a large number of users.
△ Less
Submitted 10 February, 2015;
originally announced February 2015.