In a wireless, multichannel network of half-duplex nodes, the nodes cannot simultaneously transmit and receive. Thus, if a particular node is the source of one message and a recipient of another message, in order for both messages to be successfully received those two messages could not overlap in time. This restriction limits throughput. There exists a need for a better way to communicate in a wireless, multichannel network of half-duplex nodes.
Disclosed herein is a communications method comprising the following steps. The first step provides for establishing a single-hop, multi-channel wireless network comprising a plurality of half-duplex nodes in which each node can simultaneously receive on multiple channels but within which an individual node cannot simultaneously transmit and receive. The next step provides for using linear programming to establish a rapid-throughput transmission schedule for data transmissions between the half-duplex nodes. The next step provides for multicasting all the data transmissions in the network in multicast sessions according to the transmission schedule. The next step provides for using erasure coding to reconstruct data transmitted in a particular multicast session in instances where the entirety of the particular multicast session is not received at a given node because the given node was transmitting during part of the particular multicast session.
The communications method disclosed herein may be implemented on a single-hop, multi-channel wireless network comprising a plurality of half-duplex nodes and a processor/controller. The plurality of half-duplex nodes are all positioned within wireless communication range of each other. The nodes are positioned and connected such that they can simultaneously receive multicast sessions on multiple channels. The nodes cannot simultaneously transmit on multiple channels. The processor is operatively coupled to the nodes and configured to use linear programming to establish a rapid-throughput transmission schedule for data transmissions between the half-duplex nodes such that all data transmissions between the nodes are conducted according to the transmission schedule. Each node is configured to use erasure coding to reconstruct data transmitted in a particular multicast session in instances where the entirety of the particular multicast session is not received at a given node because the given node was transmitting during the particular multicast session.
Throughout the several views, like elements are referenced using like references. The elements in the figures are not drawn to scale and some dimensions are exaggerated for clarity.
The disclosed methods and systems below may be described generally, as well as in terms of specific examples and/or specific embodiments. For instances where references are made to detailed examples and/or embodiments, it should be appreciated that any of the underlying principles described are not to be limited to a single embodiment, but may be expanded for use with any of the other methods and systems described herein as will be understood by one of ordinary skill in the art unless otherwise stated specifically.
A single-hop wireless network that was originally designed to use a single channel, may be later modified to use multiple statistically independent channels. Each node 14 is half-duplex, i.e. it cannot simultaneously transmit and receive. Each node 14 can only transmit on one channel at a time, but when not transmitting it can simultaneously receive all channels. Such nodes behave similarly to nodes with F-multi-packet reception (MPR), where F is the number of channels. All traffic in the network is multicast.
Instead of scheduling transmissions so that all recipients of a multicast are listening at the same time for the duration of the transmission, method 10 uses erasure coding, which eliminates the requirement that all recipients listen at the same time. Method 10 also uses linear programming (LP) to increase the throughput for any given set of multicast sessions subject to a fairness constraint.
In a specific, example embodiment of method 10, the nodes 14 are enhanced Link-16 network platforms that are programmed by the controller 16 ahead of an operational task. The nodes 14 do not need to be connected to the controller 16 during performance of the operational task. During the operational task the nodes 14 perform their communication tasks and in addition, erasure coding and erasure decoding. In this embodiment, the Linear Programming part of method 10 is completed by the controller 16 before the nodes 14 begin their operational task and the erasure coding schemes are loaded into the software of the Link-16 units before the operational task begins. Then, during the task, each node 14 (in this case a Link-16 Mission Computer) performs erasure encoding on its outgoing messages and erasure decoding on it incoming messages. All the coding and decoding works because all participating nodes 14 received the transmission schedule from the controller 16 before the operational task began. The nodes 14 may have a synchronized start time for each run of a message exchange sequence and they need not be connected to the controller 16 at all times. In this embodiment, the controller 16 lives offline and works up the transmission schedule and chooses n and k to implement the right erasure code to process a given set of messages, where each message consists of a number of bits and the identities of the message recipients. Once each node 14 knows the schedule and the parameters of the erasure code for each message, then each node 14 can run its coding and decoding steps without additional information from the controller 16 until it finishes its operational task and is then reconnected to the controller 16.
A node 14 generally has multiple interfaces, enabling it to simultaneously receive on multiple channels, but the nodes 14 used in method 10 have an asymmetrical constraint that the nodes cannot simultaneously transmit on multiple channels. Nodes with MPR are the best approximation to this constraint. In an embodiment of method 10, retransmission of a multicast session is not allowed and the transmission schedule is built with the assumption that each transmitter node has a reliable channel to all of its recipient nodes, and erasure coding is only used in instances where given nodes could not receive the entire transmission because the given nodes were transmitting on another channel at the time of the transmission.
The following is a description of an example embodiment of the method 10 where the network 12 has the following characteristics:
The transmission schedule may be built according to the following considerations. Let the network nodes be numbered from 1 to N, and let the multicast sessions be numbered from 1 to K. For 1≦k≦K let sk be the source node of session k, and let Rk ⊂{1, . . . , N}\sk be the set of destination nodes. The goal is to maximize throughput subject to a fairness constraint. In this embodiment of method 10, the fairness constraint can be expressed most easily by assuming that each session has a finite number dk of bits to be transmitted. The controller 16 uses linear programming to find a transmission schedule to satisfy these demands in the minimum amount of time. This is equivalent to assuming that each session has a desired rate of dk bits per second, and we wish to find the largest λ such that, for each session k, at least λdk bits per second can be sent. A linear programming algorithm may realize the target maximization, but its solution, while guaranteeing that each receiving node is allocated λdk bits per second, can easily be allocated a longer session. But erasure coding may be used so that each destination node can receive a segment of its allocated transmission and recover the message from that segment.
A set of sessions that can be active at the same time will be called an operating mode. The controller 16 may build the transmission schedule by assigning a duration to each possible operating mode. We will represent an operating mode with a set S⊂{1, . . . , K} such that |S|≦F and all sessions in S have different source nodes. Strictly speaking, an operating mode should also assign each of these sessions to a channel; this information is needed to execute the schedule. However, there is no advantage to using different channel assignments for the same set of sessions, so we will assume there is a convention that determines the channel assignment for each operating mode. The convention is not needed while building the schedule. Let the operating modes be numbered from 1 to M. A schedule will be an M-by-1 vector T whose ith component is Ti, the time spent in the ith operating mode. A schedule is feasible if for each session, every destination node can receive the whole message.
For any pair (k,j) such that k E {1, . . . , K} and jεRk, let Lkj the amount of time that node j listens to session k. This will occur during all operating modes such that node sk is transmitting session k and node j is not transmitting. Let J=Σk=1K|Rk|; then there are J such pairs (k,j), and we number them from 1 to J. If (k,j) is the ith pair, then Lkj will also be called Li. Let A be the J-by-M matrix such that entry (i, m) is 1 if node j listens to session k during operating mode m, and 0 otherwise. Let B be the K-by-M matrix such that entry (k, m) is 1 if session k is included in operating mode m, and 0 otherwise. Let L=AT; then L is a J-by-1 vector whose ith component is Li. The number of bits that node j receives during time Lkj is cLkj, which must be at least dk to satisfy the demand, so let d be a J-by-1 vector whose ith component is dk. Therefore, any feasible schedule must satisfy the following constraint:
AT≧d/c (1)
Constraint (1) is necessary for a schedule to satisfy the demands; now we will show that it is sufficient. Let X=BT; then X is a K-by-1 vector; let Xk be its kth entry. Xk is the total transmission time of session k, because it is the sum of Ti over all modes that include session k. So the number of bits transmitted is for session k is cXk. Note that cXk is not necessarily an integer. Theoretically this is not a problem, because information is not necessarily sent in the form of bits. For example, it could be sent as ternary symbols, each of which carries log 3/log 2 bits of information. In practice, cTi will probably have to be an integer for each operating mode i. Furthermore, Ti may have to be a multiple of some pre-determined time slot width. So the optimum that we will compute is an approximation of the true optimum, and the relative error approaches 0 for large values of the dk's. For any jεRk, by definition Xk≧Lkj. If node j sometimes transmits at the same time that node sk transmits session k, then Lkj will be less than Xk, which implies cXk>cLkj≧dk. So the number of bits transmitted for session k is more than the length of the message.
To resolve this discrepancy, the controller 16 uses erasure code such as that disclosed in the 1960 paper Polynomial codes Over Certain Finite Fields, J. Soc. Indust. Appl. Math, Vol. 8, pp. 300-304 by I. S. Reed and G. Solomon, which is incorporated by reference herein. For any positive integers a, b, and m with a<b<2m, there is a (b, a) erasure code using 2m-ary symbols (i.e. each symbol is formed from m bits.) This code maps a information symbols to a b-symbol codeword, and this code can correct b-a erasures. This means that if the b symbols are sent through the channel, then any receiver that receives at least a of them can decode the original information symbols. Since our channel rate is c bits per second, the transmitter sends am bits of information in bm/c seconds, but the receiver only needs to listen for am/c seconds to decode the am bits. In effect, the transmitter sends information at ca/b bits per second, and the receiver receives it c bits per second. Thus, for any t>0 and any 0<r<1, a transmitter node may send crt bits of information in t seconds, encoded in such a way that a listener node may receive the information by listening during any rt seconds of the transmission.
Accordingly, constraint (1) may be sufficient to satisfy the demands, provided that session k is transmitted at code rate:
So, in this embodiment, the time needed to send all sessions is the minimum of Σi=1M Ti subject to Ti≧0 and constraint (1). This is an LP problem: let c be the M-by-1 vector consisting of ones; then our problem may be stated as
The number of variables is O(KF) and the number of constraints is O(KN), so for fixed F the problem can be solved in polynomial time. Let T* be the minimum value of cTT.
The following is an example embodiment of method 10 implemented on a network of 12 nodes N and three channels F, and each node has a demand to send d bits to all other nodes. There are 10·9·8/6=120 operating modes that use all three frequencies. The optimal schedule assigns equal time T to each of these 120 modes. For any nodes j and k, there are 8·7/2=28 operating modes in which node j listens to node k. So 28T=Lkj=d/c;
and the total time needed is
Each node transmits in 9·8/2=36 operating modes, so the code rate is 28/36=7/9. In contrast, suppose we did not use erasure coding. Then if two nodes transmit at the same time, each would miss part of the other's message, and the demand would not be satisfied. So the time needed to satisfy the demands without erase coding is
An embodiment of method 10 includes the requirement that each transmission contains an integral number of bits, and comprises the step of converting the LP solution to an explicit schedule. In this embodiment, after the controller 16 solves the LP problem, the controller 16 then decides when to use each operating mode, and chooses an encoding method that will allow each destination node to decode the messages. The total duration of the implemented schedule should be close to T*, with the relative error approaching 0 for large values of the dk's. We will describe an algorithm to do this. Part of the algorithm must be executed before communication begins, and the results must be available to all nodes. The rest of the algorithm must be executed at all nodes, and we will make this part deterministic so all nodes agree on a schedule. We will use an erasure code for each session. All codes will use m bits per symbol for some m to be determined. We would like to place a bound on m in order to limit the complexity of encoding and decoding. However, achieving near-optimal throughput with a bound on m is difficult, and may not be possible in all cases. We will prove the following: Theorem 1: Suppose the following data is specified: N, K, F, and for 1≦k≦K, sk and Rk (but not dk). Then for any ε>0 there is a Δ0 such that for any d1, . . . , dK with Σk=1K dk≧Δ0 there is an m such that the algorithm below yields a schedule with total duration<(1+ε)T* where T* is the optimal value of the LP problem.
Let d′=┌d/m┐; then if (j, k) is the ith pair, the ith component d′i; is the number of symbols in session k. For 1≦i≦M let Ti be the optimal time computed for the ith operating mode, and let
The ith operating mode will be used for Qi symbols. Let Q be the M-by-1 vector with components Qi, and let L′=AQ. If (j, k) is the ith pair, recall that the ith row of A indicates during which modes node j receives session k; therefore the ith component of L′ is the number of symbols that node j receives of session k. Call this component L′kj or L′i. Then
So L′kj≧d′k as required.
Let X′k be the sum of Qi over all operating modes that include session k; then X′k is the kth element of BQ and is the number of symbols transmitted for session k. For each k we need to choose a (b, a) erasure code such that a≦b≦2m−1. (The case a=b represents uncoded transmission.) We must ensure that each destination node receives at least a symbols of every codeword. The simplest solution is to choose a=d′k and b=X′k, making the entire message a single codeword. This requires choosing m so that 2m>X′k, which is possible because X′k is a non-increasing function of m.
The data needed to execute the schedule consists of m, Qi for 1≦i≦M, and d′k and X′k for 1≦k≦K. For each session, the source node encodes the d′k-symbol message to X′k symbols. The transmission then proceeds in M steps; during step i, Qi symbols are transmitted for each of the sessions included in operating mode i. For each session k, each destination node jεRk keeps track of the number of symbols transmitted for session k; if node j transmits during a mode that includes session k, then node j records erasures in place of the missed symbols. After all modes have been executed, each message can be decoded by all of its destination nodes. Theorem 1 is a special case of Theorem 1a below.
In the following example embodiment of method 10, the controller 16 modifies the transmission schedule to reduce latency and to accommodate time slots of a pre-determined duration. Suppose that our schedule is required to use time slots of a fixed duration β0/c that can each accommodate β0 channel bits. We want an algorithm to construct a schedule so that Theorem 1 is still satisfied. In general β0 will not be a multiple of m, which means a time slot cannot be filled by complete symbols. Recall that m is a number to be chosen. We can try to find a suitable m that is a divisor of b0, but to prove Theorem 1 we need to allow m to be larger than N. After packing └β0/m┘ symbols into a time slot, we can either leave the rest of the slot unused, or split the next symbol across two slots (or more than two, if m>2β0). The first option is not acceptable because it wastes a fraction of the capacity, and this fraction does not decrease as the dk's increase, so Theorem 1 is not satisfied. So we can split symbols. Also, it is not useful to change operating modes in mid-symbol, because erasure decoding cannot make use of a partial symbol. So in effect we are constrained to use time slots of size 1 cm(β0, m). It is difficult to prove inequalities involving 1 cm(β0, m) due to its non-monotonic nature, so we will allow the use of even larger time slots. The algorithm will choose a β and an m such that β is a multiple of 1 cm(β0, m), and m satisfies an additional constraint that will be described later. Let a=β/m. The algorithm will use m-bit symbols grouped into time slots of a symbols each, and will only change operating modes at time slot boundaries. In the description of the algorithm, “time slot” will always mean a duration β/c, not β0/c.
Let γ be an integer>1. To reduce latency, we will divide each message k into γ submessages of dk/γ bits each, and we will construct the algorithm so that the each destination node can decode the ith submessage after a fraction i/γ of the schedule duration. We will prove the following:
Theorem 1a: Suppose the following data is specified: N, K, F, β0, γ, and for 1≦k≦K, sk and Rk (but not dk). Then for any ε>0 there is a Δ0 such that for any d1, . . . , dK with Σk=1K dk≧Δ0 there is an m and α such that mα is a multiple of β0 and the algorithm below yields a schedule with total duration<(1+ε)T* where T* is the optimal value of the LP problem.
Let d′=┌d/m┐; then if (j, k) is the ith pair, the ith component d′i is the number of symbols in session k. Let β=mα. For 1≦k≦K let d″k=┌dk(βγ)┐. For 1≦i≦M let Ti be the optimal time computed for the ith operating mode, and let
The ith operating mode will be used for γQi time slots. Let Q be the M-by-1 vector with components Qi, and let L′=AQ. If (j, k) is the ith pair, recall that the ith row of A indicates during which modes node j receives session k. Let the ith component of L′ be called L′kj or L′i. Then γL′kj is the number of time slots that node j receives of message k. The number of symbols received in γL′kj time slots is the ith component of
indicating that node j receives enough symbols to decode session k. Also
The ith component of
is d″k, so d″k≦L′i=L′kj.
For each k, let X′k be the kth component of BQ, which is the sum of Qi over all operating modes that include session k; then γX′k is the number of time slots transmitted for message k, and αγX′k is the number of symbols transmitted for message k. For each k we need to choose a (b, a) erasure code such that a≦b≦2m−1. We may ensure that each destination node receives at least a symbols of every codeword. We will choose a=d″k and b=X′k. This requires choosing m so that 2m>X′k. Note that X′k is a nonincreasing function of mα, and that both m and α can be chosen so that ma is a multiple of β0. One possibility is to choose α=β0; then 2m>X′k will be satisfied for sufficiently large m. The choice of α=β0 is not necessarily the best choice, and is presented only to make it easier to prove Theorem 1 a. The scheduling algorithm will work for any m and α such that mα is a multiple of β0 and 2m>X′k.
In this embodiment, the data needed to execute the schedule consists of m, α, γ, Qi for 1≦i≦M′, and d″k and X′k for 1≦k≦K. Each source node must pad message k to the length γαmd″k bits. The schedule consists of γ phases. We describe the first phase: For each session, the source node divides the first αd″k symbols of message k into a groups of d″k each. It then encodes each group to form an X′k-symbol codeword. The controller then allows the transmission to proceed for Σi=1M Qi time slots, with each operating mode i used for Qi of these time slots. In each time slot, the current operating mode determines which messages are transmitted. For each such message, the source node transmits the next symbol from each of its α codewords. For each session k, each destination node jεRk keeps track of the number of symbols transmitted for session k; if node j transmits during a mode that includes session k, then node j records erasures in place of the missed symbols. After all Σi=1M Qi time slots, each source node has sent X′k symbols of each codeword of message k (i.e. all of them), and each destination node jεRk has received L′kj symbols from each codeword in message k. Since L′kj≧d″k, the destination node decodes all α codewords. Each remaining phase transmits the next αd″k symbols of message k in the same way. After all γ phases, γαmd″k bits of each message have been encoded, sent, and decoded by all destination nodes. Since γαmd″k≧dk, we are done.
The following is a proof of Theorem 1a.
Given N, K, F, β0, γ, sk and Rk for 1≦k≦K, and ε>0, let M be the number of possible operating modes. It is well known that an increasing exponential function eventually dominates a polynomial function, so we can find a z such that
Choose Δ0=┌z┐. Then for any d1, . . . , dK with Σk=1K dk≧Δ0, let Δ=Σk=1K dk, choose
and choose α=b0. Recall that m is required to satisfy 2m>X′k for 1≦k≦K, and each X′k depends on m. We will prove that these constraints are satisfied. We now compute some inequalities.
This is immediate from the definition of m.
Recall that by definition
proving Assertion 2.
Recall that Δ is the total number of bits to be sent. They could be sent in time
by sending them uncoded sequentially on a single channel, so the optimal duration can be no larger.
is the total capacity of the F channels, so the time needed to send Δ bits is at least
Assertion 5: For 1≦k≦K, 2m>X′k. Recall that by definition γX′k is the number of time slots transmitted for message k, and γQi is the number of time slots for spent in the ith operating mode. So αγΣi=1M Qi is the number of symbol durations in the schedule. Therefore
proving Assertion 5.
Since Δ≧z, we have
Taking base-2 logarithms of both sides, we get
proving Assertion 6.
Now we can complete the proof. The total schedule duration is
as required.
In the description above, we see that by increasing α or γ, we can reduce both m, the number of bits per symbol, and b, the number of symbols per codeword, but this reduction is limited: the algorithm specifies bk=X′k, and X′k must be at least the number of operating modes used in message k. The reason for the choice bk=X′k is that it allows each codeword to be spread across all operating modes used in the message, and this is a convenient way to ensure that each destination node receives enough symbols of every codeword.
In some cases this can be accomplished with shorter codewords. For example, recall the example embodiment described above where N=10, F=3, and each node has d bits to send to all other nodes. 36 operating modes are used for each message, for equal numbers of bits, and each destination node listens to 28 of these 36. If we can split these 36 into four subsets of nine each, so that each destination node listens to seven from each subset, then we can use codewords of length nine, each spread across the operating modes of one subset. Such a splitting is possible. For 1≦q≦4, let Sq={(i,j,10)ε{1, . . . , 9}×{1, . . . , 9}×{10}|j−i=q mod 9}. These are four disjoint sets of nine modes each, and their union is the set of modes used in the tenth message. By permuting {1, . . . , 10} we get splittings for the other messages.
In the general case, different destination nodes will listen to different numbers of operating modes, and these operating modes will be used for different lengths of time. X′k could be a prime number for some choices of m, α, and γ. Therefore we cannot describe a splitting method that works in the general case. It is possible to use codewords of different lengths and rates for the same message. However, recall that the optimal code rate for each message is determined by the optimal solution to the LP problem, so in order to keep the schedule duration close to T*, the code rates must stay close to the optimal rates. Also, if we are required to use an m≦mmax, then all of our code rates must have a denominator<2m
From the above description of the Method for Increasing Multicast Throughput in a Single-Hop Multi-Channel Wireless Network, it is manifest that various techniques may be used for implementing the concepts of method 10 without departing from the scope of the claims. The described embodiments are to be considered in all respects as illustrative and not restrictive. The method/apparatus disclosed herein may be practiced in the absence of any element that is not specifically claimed and/or disclosed herein. It should also be understood that method 10 is not limited to the particular embodiments described herein, but is capable of many embodiments without departing from the scope of the claims.
The United States Government has ownership rights in this invention. Licensing and technical inquiries may be directed to the Office of Research and Technical Applications, Space and Naval Warfare Systems Center, Pacific, Code 72120, San Diego, Calif., 92152; voice (619) 553-5118; ssc_pac_t2@navy.mil. Reference Navy Case Number 102743.