-
Android OS Privacy Under the Loupe -- A Tale from the East
Authors:
Haoyu Liu,
Douglas J. Leith,
Paul Patras
Abstract:
China is currently the country with the largest number of Android smartphone users. We use a combination of static and dynamic code analysis techniques to study the data transmitted by the preinstalled system apps on Android smartphones from three of the most popular vendors in China. We find that an alarming number of preinstalled system, vendor and third-party apps are granted dangerous privileg…
▽ More
China is currently the country with the largest number of Android smartphone users. We use a combination of static and dynamic code analysis techniques to study the data transmitted by the preinstalled system apps on Android smartphones from three of the most popular vendors in China. We find that an alarming number of preinstalled system, vendor and third-party apps are granted dangerous privileges. Through traffic analysis, we find these packages transmit to many third-party domains privacy sensitive information related to the user's device (persistent identifiers), geolocation (GPS coordinates, network-related identifiers), user profile (phone number, app usage) and social relationships (e.g., call history), without consent or even notification. This poses serious deanonymization and tracking risks that extend outside China when the user leaves the country, and calls for a more rigorous enforcement of the recently adopted data privacy legislation.
△ Less
Submitted 3 February, 2023;
originally announced February 2023.
-
Penalised FTRL With Time-Varying Constraints
Authors:
Douglas J. Leith,
George Iosifidis
Abstract:
In this paper we extend the classical Follow-The-Regularized-Leader (FTRL) algorithm to encompass time-varying constraints, through adaptive penalization. We establish sufficient conditions for the proposed Penalized FTRL algorithm to achieve $O(\sqrt{t})$ regret and violation with respect to strong benchmark $\hat{X}^{max}_t$. Lacking prior knowledge of the constraints, this is probably the large…
▽ More
In this paper we extend the classical Follow-The-Regularized-Leader (FTRL) algorithm to encompass time-varying constraints, through adaptive penalization. We establish sufficient conditions for the proposed Penalized FTRL algorithm to achieve $O(\sqrt{t})$ regret and violation with respect to strong benchmark $\hat{X}^{max}_t$. Lacking prior knowledge of the constraints, this is probably the largest benchmark set that we can reasonably hope for. Our sufficient conditions are necessary in the sense that when they are violated there exist examples where $O(\sqrt{t})$ regret and violation is not achieved. Compared to the best existing primal-dual algorithms, Penalized FTRL substantially extends the class of problems for which $O(\sqrt{t})$ regret and violation performance is achievable.
△ Less
Submitted 6 April, 2022; v1 submitted 5 April, 2022;
originally announced April 2022.
-
Lazy Lagrangians with Predictions for Online Learning
Authors:
Daron Anderson,
George Iosifidis,
Douglas J. Leith
Abstract:
We consider the general problem of online convex optimization with time-varying additive constraints in the presence of predictions for the next cost and constraint functions. A novel primal-dual algorithm is designed by combining a Follow-The-Regularized-Leader iteration with prediction-adaptive dynamic steps. The algorithm achieves $\mathcal O(T^{\frac{3-β}{4}})$ regret and…
▽ More
We consider the general problem of online convex optimization with time-varying additive constraints in the presence of predictions for the next cost and constraint functions. A novel primal-dual algorithm is designed by combining a Follow-The-Regularized-Leader iteration with prediction-adaptive dynamic steps. The algorithm achieves $\mathcal O(T^{\frac{3-β}{4}})$ regret and $\mathcal O(T^{\frac{1+β}{2}})$ constraint violation bounds that are tunable via parameter $β\!\in\![1/2,1)$ and have constant factors that shrink with the predictions quality, achieving eventually $\mathcal O(1)$ regret for perfect predictions. Our work extends the FTRL framework for this constrained OCO setting and outperforms the respective state-of-the-art greedy-based solutions, without imposing conditions on the quality of predictions, the cost functions or the geometry of constraints, beyond convexity.
△ Less
Submitted 8 January, 2022;
originally announced January 2022.
-
Selective Edge Computing for Mobile Analytics
Authors:
Apostolos Galanopoulos,
George Iosifidis,
Theodoros Salonidis,
Douglas J. Leith
Abstract:
An increasing number of mobile applications rely on Machine Learning (ML) routines for analyzing data. Executing such tasks at the user devices saves the energy spent on transmitting and processing large data volumes at distant cloud-deployed servers. However, due to memory and computing limitations, the devices often cannot support the required resource-intensive routines and fail to accurately e…
▽ More
An increasing number of mobile applications rely on Machine Learning (ML) routines for analyzing data. Executing such tasks at the user devices saves the energy spent on transmitting and processing large data volumes at distant cloud-deployed servers. However, due to memory and computing limitations, the devices often cannot support the required resource-intensive routines and fail to accurately execute the tasks. In this work, we address the problem of edge-assisted analytics in resource-constrained systems by proposing and evaluating a rigorous selective offloading framework. The devices execute their tasks locally and outsource them to cloudlet servers only when they predict a significant performance improvement. We consider the practical scenario where the offloading gain and resource costs are time-varying; and propose an online optimization algorithm that maximizes the service performance without requiring to know this information. Our approach relies on an approximate dual subgradient method combined with a primal-averaging scheme, and works under minimal assumptions about the system stochasticity. We fully implement the proposed algorithm in a wireless testbed and evaluate its performance using a state-of-the-art image recognition application, finding significant performance gains and cost savings.
△ Less
Submitted 8 January, 2022;
originally announced January 2022.
-
Modelling Downlink Packet Aggregation in Paced 802.11ac WLANs
Authors:
Francesco Gringoli,
Douglas J. Leith
Abstract:
We derive an analytic model of packet aggregation on the the downlink of an 802.11ac WLAN when packet arrivals are paced. The model is closed-form and so suitable for both analysis and design of next generation edge architectures that aim to achieve high rate and low delay. The model is validated against both simulations and experimental measurements and found to be remarkably accurate despite its…
▽ More
We derive an analytic model of packet aggregation on the the downlink of an 802.11ac WLAN when packet arrivals are paced. The model is closed-form and so suitable for both analysis and design of next generation edge architectures that aim to achieve high rate and low delay. The model is validated against both simulations and experimental measurements and found to be remarkably accurate despite its simplicity.
△ Less
Submitted 19 January, 2021;
originally announced January 2021.
-
Measurement-Based Evaluation Of Google/Apple Exposure Notification API For Proximity Detection in a Commuter Bus
Authors:
Douglas J. Leith,
Stephen Farrell
Abstract:
We report on the results of a measurement study carried out on a commuter bus in Dublin, Ireland using the Google/Apple Exposure Notification (GAEN) API. This API is likely to be widely used by Covid-19 contact tracing apps. Measurements were collected between 60 pairs of handset locations and are publicly available. We find that the attenuation level reported by the GAEN API need not increase wit…
▽ More
We report on the results of a measurement study carried out on a commuter bus in Dublin, Ireland using the Google/Apple Exposure Notification (GAEN) API. This API is likely to be widely used by Covid-19 contact tracing apps. Measurements were collected between 60 pairs of handset locations and are publicly available. We find that the attenuation level reported by the GAEN API need not increase with distance between handsets, consistent with there being a complex radio environment inside a bus caused by the metal-rich environment. Changing the people holding a pair of handsets, with the location of the handsets otherwise remaining unchanged, can cause variations of +/-10dB in the attenuation level reported by the GAEN API. Applying the rule used by the Swiss Covid-19 contact tracing app to trigger an exposure notification to our bus measurements we find that no exposure notifications would have been triggered despite the fact that all pairs of handsets were within 2m of one another for at least 15 mins. Applying an alternative threshold-based exposure notification rule can somewhat improve performance to a detection rate of 5% when an exposure duration threshold of 15 minutes is used, increasing to 8% when the exposure duration threshold is reduced to 10 mins. Stratifying the data by distance between pairs of handsets indicates that there is only a weak dependence of detection rate on distance.
△ Less
Submitted 15 June, 2020;
originally announced June 2020.
-
Coronavirus Contact Tracing: Evaluating The Potential Of Using Bluetooth Received Signal Strength For Proximity Detection
Authors:
Douglas J. Leith,
Stephen Farrell
Abstract:
We report on measurements of Bluetooth Low Energy (LE) received signal strength taken on mobile handsets in a variety of common, real-world settings. We note that a key difficulty is obtaining the ground truth as to when people are in close proximity to one another. Knowledge of this ground truth is important for accurately evaluating the accuracy with which contact events are detected by Bluetoot…
▽ More
We report on measurements of Bluetooth Low Energy (LE) received signal strength taken on mobile handsets in a variety of common, real-world settings. We note that a key difficulty is obtaining the ground truth as to when people are in close proximity to one another. Knowledge of this ground truth is important for accurately evaluating the accuracy with which contact events are detected by Bluetooth LE. We approach this by adopting a scenario-based approach. In summary, we find that the Bluetooth LE received signal strength can vary substantially depending on the relative orientation of handsets, on absorption by the human body, reflection/absorption of radio signals in buildings and trains. Indeed we observe that the received signal strength need not decrease with increasing distance. This suggests that the development of accurate methods for proximity detection based on Bluetooth LE received signal strength is likely to be challenging. Our measurements also suggest that combining use of Bluetooth LE contact tracing apps with adoption of new social protocols may yield benefits but this requires further investigation. For example, placing phones on the table during meetings is likely to simplify proximity detection using received signal strength. Similarly, carrying handbags with phones placed close to the outside surface. In locations where the complexity of signal propagation makes proximity detection using received signal strength problematic entry/exit from the location might instead be logged in an app by e.g. scanning a time-varying QR code or the like.
△ Less
Submitted 19 May, 2020;
originally announced June 2020.
-
Improving IoT Analytics through Selective Edge Execution
Authors:
A. Galanopoulos,
A. G. Tasiopoulos,
G. Iosifidis,
T. Salonidis,
D. J. Leith
Abstract:
A large number of emerging IoT applications rely on machine learning routines for analyzing data. Executing such tasks at the user devices improves response time and economizes network resources. However, due to power and computing limitations, the devices often cannot support such resource-intensive routines and fail to accurately execute the analytics. In this work, we propose to improve the per…
▽ More
A large number of emerging IoT applications rely on machine learning routines for analyzing data. Executing such tasks at the user devices improves response time and economizes network resources. However, due to power and computing limitations, the devices often cannot support such resource-intensive routines and fail to accurately execute the analytics. In this work, we propose to improve the performance of analytics by leveraging edge infrastructure. We devise an algorithm that enables the IoT devices to execute their routines locally; and then outsource them to cloudlet servers, only if they predict they will gain a significant performance improvement. It uses an approximate dual subgradient method, making minimal assumptions about the statistical properties of the system's parameters. Our analysis demonstrates that our proposed algorithm can intelligently leverage the cloudlet, adapting to the service requirements.
△ Less
Submitted 7 March, 2020;
originally announced March 2020.
-
Measurement-driven Analysis of an Edge-Assisted Object Recognition System
Authors:
A. Galanopoulos,
V. Valls,
G. Iosifidis,
D. J. Leith
Abstract:
We develop an edge-assisted object recognition system with the aim of studying the system-level trade-offs between end-to-end latency and object recognition accuracy. We focus on develo** techniques that optimize the transmission delay of the system and demonstrate the effect of image encoding rate and neural network size on these two performance metrics. We explore optimal trade-offs between th…
▽ More
We develop an edge-assisted object recognition system with the aim of studying the system-level trade-offs between end-to-end latency and object recognition accuracy. We focus on develo** techniques that optimize the transmission delay of the system and demonstrate the effect of image encoding rate and neural network size on these two performance metrics. We explore optimal trade-offs between these metrics by measuring the performance of our real time object recognition application. Our measurements reveal hitherto unknown parameter effects and sharp trade-offs, hence paving the road for optimizing this key service. Finally, we formulate two optimization problems using our measurement-based models and following a Pareto analysis we find that careful tuning of the system operation yields at least 33% better performance for real time conditions, over the standard transmission method.
△ Less
Submitted 7 March, 2020;
originally announced March 2020.
-
Learning The Best Expert Efficiently
Authors:
Daron Anderson,
Douglas J. Leith
Abstract:
We consider online learning problems where the aim is to achieve regret which is efficient in the sense that it is the same order as the lowest regret amongst K experts. This is a substantially stronger requirement that achieving $O(\sqrt{n})$ or $O(\log n)$ regret with respect to the best expert and standard algorithms are insufficient, even in easy cases where the regrets of the available action…
▽ More
We consider online learning problems where the aim is to achieve regret which is efficient in the sense that it is the same order as the lowest regret amongst K experts. This is a substantially stronger requirement that achieving $O(\sqrt{n})$ or $O(\log n)$ regret with respect to the best expert and standard algorithms are insufficient, even in easy cases where the regrets of the available actions are very different from one another. We show that a particular lazy form of the online subgradient algorithm can be used to achieve minimal regret in a number of "easy" regimes while retaining an $O(\sqrt{n})$ worst-case regret guarantee. We also show that for certain classes of problem minimal regret strategies exist for some of the remaining "hard" regimes.
△ Less
Submitted 11 November, 2019;
originally announced November 2019.
-
Low-Delay High-Rate Operation of 802.11ac WLAN Downlink: Nonlinear Controller Analysis & Design
Authors:
Francesco Gringoli,
Douglas J. Leith
Abstract:
In this paper we consider a next generation edge architecture where traffic is routed via a proxy located close to the network edge (e.g. within a cloudlet). This creates freedom to implement new transport layer behaviour over the wireless path between proxy and clients. We use this freedom to develop a novel traffic sha** controller for the downlink in 802.11ac WLANs that adjusts the send rate…
▽ More
In this paper we consider a next generation edge architecture where traffic is routed via a proxy located close to the network edge (e.g. within a cloudlet). This creates freedom to implement new transport layer behaviour over the wireless path between proxy and clients. We use this freedom to develop a novel traffic sha** controller for the downlink in 802.11ac WLANs that adjusts the send rate to each WLAN client so as to maintain a target number of packets aggregated in each transmitted frame. In this way robust low-delay operation at high data rates becomes genuinely feasible across a wide range of network conditions. Key to achieving robust operation is the design of an appropriate feedback controller, and it is this which is our focus. We develop a novel nonlinear control design inspired by the solution to an associated proportional fair optimisation problem. The controller compensates for system nonlinearities and so can be used for the full envelope of operation. The robust stability of the closed-loop system is analysed and the selection of control design parameters discussed. We develop an implementation of the nonlinear control design and use this to present a performance evaluation using both simulations and experimental measurements.
△ Less
Submitted 19 January, 2021; v1 submitted 21 October, 2019;
originally announced October 2019.
-
Quick and Plenty: Achieving Low Delay and High Rate in 802.11ac Edge Networks
Authors:
Hamid Hassani,
Franceso Gringoli,
Douglas J. Leith
Abstract:
We consider transport layer approaches for achieving high rate, low delay communication over edge paths where the bottleneck is an 802.11ac WLAN. We first show that by regulating send rate so as to maintain a target aggregation level it is possible to realise high rate, low delay communication over 802.11ac WLANs. We then address two important practical issues arising in production networks, namel…
▽ More
We consider transport layer approaches for achieving high rate, low delay communication over edge paths where the bottleneck is an 802.11ac WLAN. We first show that by regulating send rate so as to maintain a target aggregation level it is possible to realise high rate, low delay communication over 802.11ac WLANs. We then address two important practical issues arising in production networks, namely that (i) many client devices are non-rooted mobile handsets/tablets and (ii) the bottleneck may lie in the backhaul rather than the WLAN, or indeed vary between the two over time. We show that both these issues can be resolved by use of simple and robust machine learning techniques. We present a prototype transport layer implementation of our low delay rate allocation approach and use this to evaluate performance under real radio conditions.
△ Less
Submitted 13 October, 2019; v1 submitted 20 June, 2018;
originally announced June 2018.
-
ORLA/OLAA: Orthogonal Coexistence of LAA and WiFi in Unlicensed Spectrum
Authors:
Andres Garcia-Saavedra,
Paul Patras,
Victor Valls,
Xavier Costa-Perez,
Douglas J. Leith
Abstract:
Future mobile networks will exploit unlicensed spectrum to boost capacity and meet growing user demands cost-effectively. The 3GPP has recently defined a Licensed-Assisted Access (LAA) scheme to enable global Unlicensed LTE (U-LTE) deployment, aiming at ($i$) ensuring fair coexistence with incumbent WiFi networks, i.e., impacting on their performance no more than another WiFi device, and ($ii$) ac…
▽ More
Future mobile networks will exploit unlicensed spectrum to boost capacity and meet growing user demands cost-effectively. The 3GPP has recently defined a Licensed-Assisted Access (LAA) scheme to enable global Unlicensed LTE (U-LTE) deployment, aiming at ($i$) ensuring fair coexistence with incumbent WiFi networks, i.e., impacting on their performance no more than another WiFi device, and ($ii$) achieving superior airtime efficiency as compared to WiFi. In this paper we show the standardized LAA fails to simultaneously fulfill these objectives, and design an alternative orthogonal (collision-free) listen-before-talk coexistence paradigm that provides a substantial improvement in performance, yet imposes no penalty on existing WiFi networks. We derive two LAA optimal transmission policies, ORLA and OLAA, that maximize LAA throughput in both asynchronous and synchronous (i.e., with alignment to licensed anchor frame boundaries) modes of operation, respectively. We present a comprehensive performance evaluation through which we demonstrate that, when aggregating packets, IEEE 802.11ac WiFi can be more efficient than 3GPP LAA, whereas our proposals can attain 100% higher throughput, without harming WiFi. We further show that long U-LTE frames incur up to 92% throughput losses on WiFi when using 3GPP LAA, whilst ORLA/OLAA sustain $>$200% gains at no cost, even in the presence of non-saturated WiFi and/or in multi-rate scenarios.
△ Less
Submitted 5 February, 2018;
originally announced February 2018.
-
Plausible Deniability in Web Search -- From Detection to Assessment
Authors:
Pol Mac Aonghusa,
Douglas J. Leith
Abstract:
We ask how to defend user ability to plausibly deny their interest in topics deemed sensitive in the face of search engine learning. We develop a practical and scalable tool called \PDE{} allowing a user to detect and assess threats to plausible deniability. We show that threats to plausible deniability of interest are readily detectable for all topics tested in an extensive testing program. Of pa…
▽ More
We ask how to defend user ability to plausibly deny their interest in topics deemed sensitive in the face of search engine learning. We develop a practical and scalable tool called \PDE{} allowing a user to detect and assess threats to plausible deniability. We show that threats to plausible deniability of interest are readily detectable for all topics tested in an extensive testing program. Of particular concern is observation of threats to deniability of interest in topics related to health and sexual preferences. We show this remains the case when attempting to disrupt search engine learning through noise query injection and click obfuscation. We design a defence technique exploiting uninteresting, proxy topics and show that it provides a more effective defence of plausible deniability in our experiments.
△ Less
Submitted 23 June, 2017; v1 submitted 9 March, 2017;
originally announced March 2017.
-
Optimal Differentially Private Mechanisms for Randomised Response
Authors:
Naoise Holohan,
Douglas J. Leith,
Oliver Mason
Abstract:
We examine a generalised Randomised Response (RR) technique in the context of differential privacy and examine the optimality of such mechanisms. Strict and relaxed differential privacy are considered for binary outputs. By examining the error of a statistical estimator, we present closed solutions for the optimal mechanism(s) in both cases. The optimal mechanism is also given for the specific cas…
▽ More
We examine a generalised Randomised Response (RR) technique in the context of differential privacy and examine the optimality of such mechanisms. Strict and relaxed differential privacy are considered for binary outputs. By examining the error of a statistical estimator, we present closed solutions for the optimal mechanism(s) in both cases. The optimal mechanism is also given for the specific case of the original RR technique as introduced by Warner in 1965.
△ Less
Submitted 16 December, 2016;
originally announced December 2016.
-
An Efficient Web Traffic Defence Against Timing-Analysis Attacks
Authors:
Saman Feghhi,
Douglas J. Leith
Abstract:
We introduce a new class of lower overhead tunnel that is resistant to traffic analysis. The tunnel opportunistically reduces the number of dummy packets transmitted during busy times when many flows are simultaneously active while maintaining well-defined privacy properties. We find that the dummy packet overhead is typically less than 20% on lightly loaded links and falls to zero as the traffic…
▽ More
We introduce a new class of lower overhead tunnel that is resistant to traffic analysis. The tunnel opportunistically reduces the number of dummy packets transmitted during busy times when many flows are simultaneously active while maintaining well-defined privacy properties. We find that the dummy packet overhead is typically less than 20% on lightly loaded links and falls to zero as the traffic load increases i.e. the tunnel is capacity-achieving. The additional latency incurred is less than 100ms. We build an experimental prototype of the tunnel and carry out an extensive performance evaluation that demonstrates its effectiveness under a range of network conditions and real web page fetches.
△ Less
Submitted 2 June, 2018; v1 submitted 23 October, 2016;
originally announced October 2016.
-
It wasn't me! Plausible Deniability in Web Search
Authors:
Pól Mac Aonghusa,
Douglas J. Leith
Abstract:
Our ability to control the flow of sensitive personal information to online systems is key to trust in personal privacy on the internet. We ask how to detect, assess and defend user privacy in the face of search engine personalisation? We develop practical and scalable tools allowing a user to detect, assess and defend against threats to plausible deniability. We show that threats to plausible den…
▽ More
Our ability to control the flow of sensitive personal information to online systems is key to trust in personal privacy on the internet. We ask how to detect, assess and defend user privacy in the face of search engine personalisation? We develop practical and scalable tools allowing a user to detect, assess and defend against threats to plausible deniability. We show that threats to plausible deniability of interest are readily detectable for all topics tested in an extensive testing program. We show this remains the case when attempting to disrupt search engine learning through noise query injection and click obfuscation are used. We use our model we design a defence technique exploiting uninteresting, proxy topics and show that it provides amore effective defence of plausible deniability in our experiments.
△ Less
Submitted 26 September, 2016;
originally announced September 2016.
-
Fair Coexistence of Scheduled and Random Access Wireless Networks: Unlicensed LTE/WiFi
Authors:
Cristina Cano,
Douglas J. Leith,
Andres Garcia-Saavedra,
Pablo Serrano
Abstract:
We study the fair coexistence of scheduled and random access transmitters sharing the same frequency channel. Interest in coexistence is topical due to the need for emerging unlicensed LTE technologies to coexist fairly with WiFi. However, this interest is not confined to LTE/WiFi as coexistence is likely to become increasingly commonplace in IoT networks and beyond 5G. In this article we show tha…
▽ More
We study the fair coexistence of scheduled and random access transmitters sharing the same frequency channel. Interest in coexistence is topical due to the need for emerging unlicensed LTE technologies to coexist fairly with WiFi. However, this interest is not confined to LTE/WiFi as coexistence is likely to become increasingly commonplace in IoT networks and beyond 5G. In this article we show that mixing scheduled and random access incurs and inherent throughput/delay cost, the cost of heterogeneity. We derive the joint proportional fair rate allocation, which casts useful light on current LTE/WiFi discussions. We present experimental results on inter-technology detection and consider the impact of imperfect carrier sensing.
△ Less
Submitted 2 May, 2016;
originally announced May 2016.
-
Proportional Fair Rate Allocation for Private Shared Networks
Authors:
Saman Feghhi,
Douglas J. Leith,
Mohammad Karzand
Abstract:
In this paper, we consider fair privacy in a shared network subject to traffic analysis attacks by an eavesdropper. We initiate the study of the joint trade-off between privacy, throughput and delay in such a shared network as a utility fairness problem and derive the proportional fair rate allocation for networks of flows subject to privacy constraints and delay deadlines.
In this paper, we consider fair privacy in a shared network subject to traffic analysis attacks by an eavesdropper. We initiate the study of the joint trade-off between privacy, throughput and delay in such a shared network as a utility fairness problem and derive the proportional fair rate allocation for networks of flows subject to privacy constraints and delay deadlines.
△ Less
Submitted 4 March, 2016;
originally announced March 2016.
-
srsLTE: An Open-Source Platform for LTE Evolution and Experimentation
Authors:
Ismael Gomez-Miguelez,
Andres Garcia-Saavedra,
Paul D. Sutton,
Pablo Serrano,
Cristina Cano,
Douglas J. Leith
Abstract:
Testbeds are essential for experimental evaluation as well as for product development. In the context of LTE networks, existing testbed platforms are limited either in functionality and/or extensibility or are too complex to modify and customise. In this work we present srsLTE, an open-source platform for LTE experimentation designed for maximum modularity and code reuse and fully compliant with L…
▽ More
Testbeds are essential for experimental evaluation as well as for product development. In the context of LTE networks, existing testbed platforms are limited either in functionality and/or extensibility or are too complex to modify and customise. In this work we present srsLTE, an open-source platform for LTE experimentation designed for maximum modularity and code reuse and fully compliant with LTE Release 8. We show the potential of the srsLTE library by extending the baseline code to allow LTE transmissions in the unlicensed bands and coexistence with WiFi. We also expand previous results on this emerging research area by showing how different vendor-specific mechanisms in WiFi cards might affect coexistence.
△ Less
Submitted 15 February, 2016;
originally announced February 2016.
-
Unlicensed LTE/WiFi Coexistence: Is LBT Inherently Fairer Than CSAT?
Authors:
Cristina Cano,
Douglas J. Leith
Abstract:
Ensuring fair co-existence between unlicensed LTE and WiFi networks is currently of major concern to both cellular operators and WiFi providers. Two main unlicensed LTE approaches currently being discussed, namely Carrier Sense Adaptive Transmission (CSAT) and Listen Before Talk (LBT). While these mechanisms differ in their compatibility with existing LTE specifications and regulatory compliance i…
▽ More
Ensuring fair co-existence between unlicensed LTE and WiFi networks is currently of major concern to both cellular operators and WiFi providers. Two main unlicensed LTE approaches currently being discussed, namely Carrier Sense Adaptive Transmission (CSAT) and Listen Before Talk (LBT). While these mechanisms differ in their compatibility with existing LTE specifications and regulatory compliance in different countries, they also use fundamentally different approaches to access the channel. Nevertheless, we show in this article that when optimally configured both approaches are capable of providing the same level of fairness to WiFi and that the choice between CSAT and LBT is solely driven by the LTE operator's interests.
△ Less
Submitted 19 November, 2015;
originally announced November 2015.
-
FEC for Lower In-Order Delivery Delay in Packet Networks
Authors:
Mohammad Karzand,
Douglas J. Leith,
Jason Cloud,
Muriel Medard
Abstract:
We consider use of FEC to reduce in-order delivery delay over packet erasure channels. We propose a class of streaming codes that is capacity achieving and provides a superior throughput-delay trade-off compared to block codes by introducing flexibility in where and when redundancy is placed. This flexibility results in significantly lower in-order delay for a given throughput for a wide range of…
▽ More
We consider use of FEC to reduce in-order delivery delay over packet erasure channels. We propose a class of streaming codes that is capacity achieving and provides a superior throughput-delay trade-off compared to block codes by introducing flexibility in where and when redundancy is placed. This flexibility results in significantly lower in-order delay for a given throughput for a wide range of network scenarios. Furthermore, a major contribution of this paper is the combination of queuing and coding theory to analyze the code's performance. Finally, we present simulation and experimental results illustrating the code's benefits.
△ Less
Submitted 2 September, 2016; v1 submitted 1 September, 2015;
originally announced September 2015.
-
Low Delay Random Linear Coding and Scheduling Over Multiple Interfaces
Authors:
Andres Garcia-Saavedra,
Mohammad Karzand,
Douglas J. Leith
Abstract:
Multipath transport protocols like MPTCP transfer data across multiple routes in parallel and deliver it in order at the receiver. When the delay on one or more of the paths is variable, as is commonly the case, out of order arrivals are frequent and head of line blocking leads to high latency. This is exacerbated when packet loss, which is also common with wireless links, is tackled using ARQ. Th…
▽ More
Multipath transport protocols like MPTCP transfer data across multiple routes in parallel and deliver it in order at the receiver. When the delay on one or more of the paths is variable, as is commonly the case, out of order arrivals are frequent and head of line blocking leads to high latency. This is exacerbated when packet loss, which is also common with wireless links, is tackled using ARQ. This paper introduces Stochastic Earliest Delivery Path First (S-EDPF), a resilient low delay packet scheduler for multipath transport protocols. S-EDPF takes explicit account of the stochastic nature of paths and uses this to minimise in-order delivery delay. S-EDPF also takes account of FEC, jointly scheduling transmission of information and coded packets and in this way allows lossy links to reduce delay and improve resiliency, rather than degrading performance as usually occurs with existing multipath systems. We implement S-EDPF as a multi-platform application that does not require administration privileges nor modifications to the operating system and has negligible impact on energy consumption. We present a thorough experimental evaluation in both controlled environments and into the wild, revealing dramatic gains in delay performance compared to existing approaches.
△ Less
Submitted 30 July, 2015;
originally announced July 2015.
-
Measurement-Based Modelling of LTE Performance in Dublin City
Authors:
Miguel Báguena Albaladejo,
Douglas J. Leith,
Pietro Manzoni
Abstract:
LTE/4G is the next generation of cellular network which specifically aims to improve the network performance for data traffic and is currently being rolled out by many network operators. We present results from an extensive LTE measurement campaign in Dublin, Ireland using a custom performance measurement tool. Performance data was measured at a variety of locations within the city (including cell…
▽ More
LTE/4G is the next generation of cellular network which specifically aims to improve the network performance for data traffic and is currently being rolled out by many network operators. We present results from an extensive LTE measurement campaign in Dublin, Ireland using a custom performance measurement tool. Performance data was measured at a variety of locations within the city (including cell edge locations, indoors, outdoors etc) as well as for mobile users on public transport within the city. Using this data we derive a model of the characteristics of link layer RTT and bandwidth vs link signal strength. This model is suited to use for performance evaluation of applications and services, and since it is based on real measurements it allows realistic evaluation of performance.
△ Less
Submitted 9 June, 2015;
originally announced June 2015.
-
Utility Fair Rate Allocation in LTE/802.11 Networks
Authors:
Bahar Partov,
Douglas J. Leith
Abstract:
We consider proportional fair rate allocation in a heterogeneous network with a mix of LTE and 802.11 cells which supports multipath and multihomed operation (simultaneous connection of a user device to multiple LTE BSs and 802.11 APs). We show that the utility fair optimisation problem is non-convex but that a global optimum can be found by solving a sequence of convex optimisations in a distribu…
▽ More
We consider proportional fair rate allocation in a heterogeneous network with a mix of LTE and 802.11 cells which supports multipath and multihomed operation (simultaneous connection of a user device to multiple LTE BSs and 802.11 APs). We show that the utility fair optimisation problem is non-convex but that a global optimum can be found by solving a sequence of convex optimisations in a distributed fashion. The result is a principled approach to offload from LTE to 802.11 and for exploiting LTE/802.11 path diversity to meet user traffic demands.
△ Less
Submitted 2 June, 2015;
originally announced June 2015.
-
Don't let Google know I'm lonely!
Authors:
Pól Mac Aonghusa,
Douglas J. Leith
Abstract:
From buying books to finding the perfect partner, we share our most intimate wants and needs with our favourite online systems. But how far should we accept promises of privacy in the face of personal profiling? In particular we ask how can we improve detection of sensitive topic profiling by online systems? We propose a definition of privacy disclosure we call ε-indistinguishability from which we…
▽ More
From buying books to finding the perfect partner, we share our most intimate wants and needs with our favourite online systems. But how far should we accept promises of privacy in the face of personal profiling? In particular we ask how can we improve detection of sensitive topic profiling by online systems? We propose a definition of privacy disclosure we call ε-indistinguishability from which we construct scalable, practical tools to assess an adversaries learning potential. We demonstrate our results using openly available resources, detecting a learning rate in excess of 98% for a range of sensitive topics during our experiments.
△ Less
Submitted 19 August, 2016; v1 submitted 29 April, 2015;
originally announced April 2015.
-
Rigorous and Practical Proportional-fair Allocation for Multi-rate Wi-Fi
Authors:
Paul Patras,
Andres Garcia-Saavedra,
David Malone,
Douglas J. Leith
Abstract:
Recent experimental studies confirm the prevalence of the widely known performance anomaly problem in current Wi-Fi networks, and report on the severe network utility degradation caused by this phenomenon. Although a large body of work addressed this issue, we attribute the refusal of prior solutions to their poor implementation feasibility with off-the-shelf hardware and their imprecise modelling…
▽ More
Recent experimental studies confirm the prevalence of the widely known performance anomaly problem in current Wi-Fi networks, and report on the severe network utility degradation caused by this phenomenon. Although a large body of work addressed this issue, we attribute the refusal of prior solutions to their poor implementation feasibility with off-the-shelf hardware and their imprecise modelling of the 802.11 protocol. Their applicability is further challenged today by very high throughput enhancements (802.11n/ac) whereby link speeds can vary by two orders of magnitude. Unlike earlier approaches, in this paper we introduce the first rigorous analytical model of 802.11 stations' throughput and airtime in multi-rate settings, without sacrificing accuracy for tractability. We use the proportional-fair allocation criterion to formulate network utility maximisation as a convex optimisation problem for which we give a closed-form solution. We present a fully functional light-weight implementation of our scheme on commodity access points and evaluate this extensively via experiments in a real deployment, over a broad range of network conditions. Results demonstrate that our proposal achieves up to 100\% utility gains, can double video streaming goodput and reduces TCP download times by 8x.
△ Less
Submitted 19 May, 2015; v1 submitted 24 November, 2014;
originally announced November 2014.
-
A Web Traffic Analysis Attack Using Only Timing Information
Authors:
Saman Feghhi,
Douglas J. Leith
Abstract:
We introduce an attack against encrypted web traffic that makes use only of packet timing information on the uplink. This attack is therefore impervious to existing packet padding defences. In addition, unlike existing approaches this timing-only attack does not require knowledge of the start/end of web fetches and so is effective against traffic streams. We demonstrate the effectiveness of the at…
▽ More
We introduce an attack against encrypted web traffic that makes use only of packet timing information on the uplink. This attack is therefore impervious to existing packet padding defences. In addition, unlike existing approaches this timing-only attack does not require knowledge of the start/end of web fetches and so is effective against traffic streams. We demonstrate the effectiveness of the attack against both wired and wireless traffic, achieving mean success rates in excess of 90%. In addition to being of interest in its own right, this timing-only attack serves to highlight deficiencies in existing defences and so to areas where it would be beneficial for VPN designers to focus further attention.
△ Less
Submitted 9 July, 2016; v1 submitted 8 October, 2014;
originally announced October 2014.
-
Max-Weight Revisited: Sequences of Non-Convex Optimisations Solving Convex Optimisations
Authors:
Víctor Valls,
Douglas J. Leith
Abstract:
We investigate the connections between max-weight approaches and dual subgradient methods for convex optimisation. We find that strong connections exist and we establish a clean, unifying theoretical framework that includes both max-weight and dual subgradient approaches as special cases. Our analysis uses only elementary methods, and is not asymptotic in nature. It also allows us to establish an…
▽ More
We investigate the connections between max-weight approaches and dual subgradient methods for convex optimisation. We find that strong connections exist and we establish a clean, unifying theoretical framework that includes both max-weight and dual subgradient approaches as special cases. Our analysis uses only elementary methods, and is not asymptotic in nature. It also allows us to establish an explicit and direct connection between discrete queue occupancies and Lagrange multipliers.
△ Less
Submitted 26 August, 2015; v1 submitted 3 June, 2014;
originally announced June 2014.
-
Fast, Responsive Decentralised Graph Colouring
Authors:
Alessandro Checco,
Douglas J. Leith
Abstract:
We solve, in a fully decentralised way (\ie with no message passing), the classic problem of colouring a graph. We propose a novel algorithm that is automatically responsive to topology changes, and we prove that it converges quickly to a proper colouring in $O(N\log{N})$ time with high probability for generic graphs (and in $O(\log{N})$ time if $Δ=O(1)$) when the number of available colours is gr…
▽ More
We solve, in a fully decentralised way (\ie with no message passing), the classic problem of colouring a graph. We propose a novel algorithm that is automatically responsive to topology changes, and we prove that it converges quickly to a proper colouring in $O(N\log{N})$ time with high probability for generic graphs (and in $O(\log{N})$ time if $Δ=O(1)$) when the number of available colours is greater than $Δ$, the maximum degree of the graph.
We believe the proof techniques used in this work are of independent interest and provide new insight into the properties required to ensure fast convergence of decentralised algorithms.
△ Less
Submitted 2 September, 2017; v1 submitted 27 May, 2014;
originally announced May 2014.
-
A Fast Minimal Infrequent Itemset Mining Algorithm
Authors:
Kostyantyn Demchuk,
Douglas J. Leith
Abstract:
A novel fast algorithm for finding quasi identifiers in large datasets is presented. Performance measurements on a broad range of datasets demonstrate substantial reductions in run-time relative to the state of the art and the scalability of the algorithm to realistically-sized datasets up to several million records.
A novel fast algorithm for finding quasi identifiers in large datasets is presented. Performance measurements on a broad range of datasets demonstrate substantial reductions in run-time relative to the state of the art and the scalability of the algorithm to realistically-sized datasets up to several million records.
△ Less
Submitted 16 October, 2014; v1 submitted 27 March, 2014;
originally announced March 2014.
-
Updating Neighbour Cell List via Crowdsourced User Reports: a Framework for Measuring Time Performance
Authors:
Alessandro Checco,
Carlo Lancia,
Douglas J. Leith
Abstract:
In this paper we introduce the idea of estimating local topology in wireless networks by means of crowdsourced user reports. In this approach each user periodically reports to the serving basestation information about the set of neighbouring basestations observed by the user. We show that, by map** the local topological structure of the network onto states of increasing knowledge, a crisp mathem…
▽ More
In this paper we introduce the idea of estimating local topology in wireless networks by means of crowdsourced user reports. In this approach each user periodically reports to the serving basestation information about the set of neighbouring basestations observed by the user. We show that, by map** the local topological structure of the network onto states of increasing knowledge, a crisp mathematical framework can be obtained, which allows in turn for the use of a variety of user mobility models. Using a simplified mobility model we show how obtain useful upper bounds on the expected time for a basestation to gain full knowledge of its local neighbourhood, answering the fundamental question about which classes of network deployments can effectively benefit from a crowdsourcing approach.
△ Less
Submitted 20 November, 2019; v1 submitted 7 January, 2014;
originally announced January 2014.
-
Thwarting Selfish Behavior in 802.11 WLANs
Authors:
Albert Banchs,
Jorge Ortin,
Andres Garcia-Saavedra,
Douglas J. Leith,
Pablo Serrano
Abstract:
The 802.11e standard enables user configuration of several MAC parameters, making WLANs vulnerable to users that selfishly configure these parameters to gain throughput. In this paper we propose a novel distributed algorithm to thwart such selfish behavior. The key idea of the algorithm is for honest stations to react, upon detecting a selfish station, by using a more aggressive configuration that…
▽ More
The 802.11e standard enables user configuration of several MAC parameters, making WLANs vulnerable to users that selfishly configure these parameters to gain throughput. In this paper we propose a novel distributed algorithm to thwart such selfish behavior. The key idea of the algorithm is for honest stations to react, upon detecting a selfish station, by using a more aggressive configuration that penalizes this station. We show that the proposed algorithm guarantees global stability while providing good response times. By conducting a game theoretic analysis of the algorithm based on repeated games, we also show its effectiveness against selfish stations. Simulation results confirm that the proposed algorithm optimizes throughput performance while discouraging selfish behavior. We also present an experimental prototype of the proposed algorithm demonstrating that it can be implemented on commodity hardware.
△ Less
Submitted 25 November, 2013;
originally announced November 2013.
-
Policing 802.11 MAC Misbehaviours
Authors:
P. Patras,
H. Feghhi,
D. Malone,
D. J. Leith
Abstract:
With the increasing availability of flexible wireless 802.11 devices, the potential exists for users to selfishly manipulate their channel access parameters and gain a performance advantage. Such practices can have a severe negative impact on compliant stations. To enable access points to counteract these selfish behaviours and preserve fairness in wireless networks, in this paper we propose a pol…
▽ More
With the increasing availability of flexible wireless 802.11 devices, the potential exists for users to selfishly manipulate their channel access parameters and gain a performance advantage. Such practices can have a severe negative impact on compliant stations. To enable access points to counteract these selfish behaviours and preserve fairness in wireless networks, in this paper we propose a policing mechanism that drives misbehaving users into compliant operation without requiring any cooperation from clients. This approach is demonstrably effective against a broad class of misbehaviours, soundly-based, i.e. provably hard to circumvent and amenable to practical implementation on existing commodity hardware.
△ Less
Submitted 13 October, 2014; v1 submitted 20 November, 2013;
originally announced November 2013.
-
Utility Fair Optimisation of Antenna Tilt Angles in LTE Networks
Authors:
Bahar Partov,
Douglas J. Leith,
Rouzbeh Razavi
Abstract:
We formulate adaptation of antenna tilt angle as a utility fair optimisation task. This optimisation problem is non-convex, but in this paper we show that under reasonable conditions it can be reformulated as a convex optimisation. Using this insight, we develop a lightweight method for finding the optimal antenna tilt angles, making use of measurements which are already available at base stations…
▽ More
We formulate adaptation of antenna tilt angle as a utility fair optimisation task. This optimisation problem is non-convex, but in this paper we show that under reasonable conditions it can be reformulated as a convex optimisation. Using this insight, we develop a lightweight method for finding the optimal antenna tilt angles, making use of measurements which are already available at base stations, and suited to distributed implementation.
△ Less
Submitted 3 October, 2013;
originally announced October 2013.
-
Proportional Fair MU-MIMO in 802.11 WLANs
Authors:
Víctor Valls,
Douglas J. Leith
Abstract:
We consider the proportional fair rate allocation in an 802.11 WLAN that supports multi-user MIMO (MU-MIMO) transmission by one or more stations. We characterise, for the first time, the proportional fair allocation of MU-MIMO spatial streams and station transmission opportunities. While a number of features carry over from the case without MU-MIMO, in general neither flows nor stations need to be…
▽ More
We consider the proportional fair rate allocation in an 802.11 WLAN that supports multi-user MIMO (MU-MIMO) transmission by one or more stations. We characterise, for the first time, the proportional fair allocation of MU-MIMO spatial streams and station transmission opportunities. While a number of features carry over from the case without MU-MIMO, in general neither flows nor stations need to be allocated equal airtime when MU-MIMO is available.
△ Less
Submitted 23 April, 2014; v1 submitted 20 May, 2013;
originally announced May 2013.
-
Convexity Conditions for 802.11 WLANs
Authors:
Vijay G. Subramanian,
Douglas J. Leith
Abstract:
In this paper we characterise the maximal convex subsets of the (non-convex) rate region in 802.11 WLANs. In addition to being of intrinsic interest as a fundamental property of 802.11 WLANs, this characterisation can be exploited to allow the wealth of convex optimisation approaches to be applied to 802.11 WLANs.
In this paper we characterise the maximal convex subsets of the (non-convex) rate region in 802.11 WLANs. In addition to being of intrinsic interest as a fundamental property of 802.11 WLANs, this characterisation can be exploited to allow the wealth of convex optimisation approaches to be applied to 802.11 WLANs.
△ Less
Submitted 14 June, 2012;
originally announced June 2012.
-
Measuring Pulsed Interference in 802.11 Links
Authors:
Brad W. Zarikoff,
Douglas J. Leith
Abstract:
Wireless 802.11 links operate in unlicensed spectrum and so must accommodate other unlicensed transmitters which generate pulsed interference. We propose a new approach for detecting the presence of pulsed interference affecting 802.11 links, and for estimating temporal statistics of this interference. This approach builds on recent work on distinguishing collision losses from noise losses in 802.…
▽ More
Wireless 802.11 links operate in unlicensed spectrum and so must accommodate other unlicensed transmitters which generate pulsed interference. We propose a new approach for detecting the presence of pulsed interference affecting 802.11 links, and for estimating temporal statistics of this interference. This approach builds on recent work on distinguishing collision losses from noise losses in 802.11 links. When the intervals between interference pulses are i.i.d., the approach is not confined to estimating the mean and variance of these intervals but can recover the complete probability distribution. The approach is a transmitter-side technique that provides per-link information and is compatible with standard hardware. We demonstrate the effectiveness of the proposed approach using extensive experimental measurements. In addition to applications to monitoring, management and diagnostics, the fundamental information provided by our approach can potentially be used to adapt the frame durations used in a network so as to increase capacity in the presence of pulsed interference.
△ Less
Submitted 27 July, 2011;
originally announced July 2011.
-
Utility Optimal Coding for Packet Transmission over Wireless Networks - Part II: Networks of Packet Erasure Channels
Authors:
Premkumar Karumbu,
Xiaomin Chen,
Douglas J. Leith
Abstract:
We define a class of multi--hop erasure networks that approximates a wireless multi--hop network. The network carries unicast flows for multiple users, and each information packet within a flow is required to be decoded at the flow destination within a specified delay deadline. The allocation of coding rates amongst flows/users is constrained by network capacity. We propose a proportional fair tra…
▽ More
We define a class of multi--hop erasure networks that approximates a wireless multi--hop network. The network carries unicast flows for multiple users, and each information packet within a flow is required to be decoded at the flow destination within a specified delay deadline. The allocation of coding rates amongst flows/users is constrained by network capacity. We propose a proportional fair transmission scheme that maximises the sum utility of flow throughputs. This is achieved by {\em jointly optimising the packet coding rates and the allocation of bits of coded packets across transmission slots.}
△ Less
Submitted 10 July, 2011;
originally announced July 2011.
-
Utility Optimal Coding for Packet Transmission over Wireless Networks - Part I: Networks of Binary Symmetric Channels
Authors:
Premkumar Karumbu,
Xiaomin Chen,
Douglas J. Leith
Abstract:
We consider multi--hop networks comprising Binary Symmetric Channels ($\mathsf{BSC}$s). The network carries unicast flows for multiple users. The utility of the network is the sum of the utilities of the flows, where the utility of each flow is a concave function of its throughput. Given that the network capacity is shared by the flows, there is a contention for network resources like coding rate…
▽ More
We consider multi--hop networks comprising Binary Symmetric Channels ($\mathsf{BSC}$s). The network carries unicast flows for multiple users. The utility of the network is the sum of the utilities of the flows, where the utility of each flow is a concave function of its throughput. Given that the network capacity is shared by the flows, there is a contention for network resources like coding rate (at the physical layer), scheduling time (at the MAC layer), etc., among the flows. We propose a proportional fair transmission scheme that maximises the sum utility of flow throughputs subject to the rate and the scheduling constraints. This is achieved by {\em jointly optimising the packet coding rates of all the flows through the network}.
△ Less
Submitted 10 July, 2011;
originally announced July 2011.
-
Decentralized Constraint Satisfaction
Authors:
K. R. Duffy,
C. Bordenave,
D. J. Leith
Abstract:
We show that several important resource allocation problems in wireless networks fit within the common framework of Constraint Satisfaction Problems (CSPs). Inspired by the requirements of these applications, where variables are located at distinct network devices that may not be able to communicate but may interfere, we define natural criteria that a CSP solver must possess in order to be practic…
▽ More
We show that several important resource allocation problems in wireless networks fit within the common framework of Constraint Satisfaction Problems (CSPs). Inspired by the requirements of these applications, where variables are located at distinct network devices that may not be able to communicate but may interfere, we define natural criteria that a CSP solver must possess in order to be practical. We term these algorithms decentralized CSP solvers. The best known CSP solvers were designed for centralized problems and do not meet these criteria. We introduce a stochastic decentralized CSP solver and prove that it will find a solution in almost surely finite time, should one exist, also showing it has many practically desirable properties. We benchmark the algorithm's performance on a well-studied class of CSPs, random k-SAT, illustrating that the time the algorithm takes to find a satisfying assignment is competitive with stochastic centralized solvers on problems with order a thousand variables despite its decentralized nature. We demonstrate the solver's practical utility for the problems that motivated its introduction by using it to find a non-interfering channel allocation for a network formed from data from downtown Manhattan.
△ Less
Submitted 9 October, 2012; v1 submitted 2 March, 2011;
originally announced March 2011.
-
Log-Convexity of Rate Region in 802.11e WLANs
Authors:
Douglas J. Leith,
Vijay G. Subramanian,
Ken R. Duffy
Abstract:
In this paper we establish the log-convexity of the rate region in 802.11 WLANs. This generalises previous results for Aloha networks and has immediate implications for optimisation based approaches to the analysis and design of 802.11 wireless networks.
In this paper we establish the log-convexity of the rate region in 802.11 WLANs. This generalises previous results for Aloha networks and has immediate implications for optimisation based approaches to the analysis and design of 802.11 wireless networks.
△ Less
Submitted 22 February, 2011;
originally announced February 2011.
-
Decentralised Learning MACs for Collision-free Access in WLANs
Authors:
Minyu Fang,
David Malone,
Ken R. Duffy,
Douglas J. Leith
Abstract:
By combining the features of CSMA and TDMA, fully decentralised WLAN MAC schemes have recently been proposed that converge to collision-free schedules. In this paper we describe a MAC with optimal long-run throughput that is almost decentralised. We then design two \changed{schemes} that are practically realisable, decentralised approximations of this optimal scheme and operate with different amou…
▽ More
By combining the features of CSMA and TDMA, fully decentralised WLAN MAC schemes have recently been proposed that converge to collision-free schedules. In this paper we describe a MAC with optimal long-run throughput that is almost decentralised. We then design two \changed{schemes} that are practically realisable, decentralised approximations of this optimal scheme and operate with different amounts of sensing information. We achieve this by (1) introducing learning algorithms that can substantially speed up convergence to collision free operation; (2) develo** a decentralised schedule length adaptation scheme that provides long-run fair (uniform) access to the medium while maintaining collision-free access for arbitrary numbers of stations.
△ Less
Submitted 2 March, 2011; v1 submitted 22 September, 2010;
originally announced September 2010.
-
Max-min Fairness in 802.11 Mesh Networks
Authors:
Douglas J. Leith,
Qizhi Cao,
Vijay G. Subramanian
Abstract:
In this paper we build upon the recent observation that the 802.11 rate region is log-convex and, for the first time, characterise max-min fair rate allocations for a large class of 802.11 wireless mesh networks. By exploiting features of the 802.11e/n MAC, in particular TXOP packet bursting, we are able to use this characterisation to establish a straightforward, practically implementable appro…
▽ More
In this paper we build upon the recent observation that the 802.11 rate region is log-convex and, for the first time, characterise max-min fair rate allocations for a large class of 802.11 wireless mesh networks. By exploiting features of the 802.11e/n MAC, in particular TXOP packet bursting, we are able to use this characterisation to establish a straightforward, practically implementable approach for achieving max-min throughput fairness. We demonstrate that this approach can be readily extended to encompass time-based fairness in multi-rate 802.11 mesh networks.
△ Less
Submitted 3 March, 2010; v1 submitted 8 February, 2010;
originally announced February 2010.