The present disclosure relates generally to adapting model on the basis of link quality indicators.
Recent years have seen an increased deployment of 802.11b based wireless LANs (WLAN) in, home and office setups. Concurrent with this trend has been an increased demand for multimedia applications. The above two synergistic growths have in turn led to an increased demand for seamless availability of multimedia content over wireless media. However, often in practical deployments of 802.11b WLANs, it has been observed that the number of packet drops due to bit corruption of the MAC frames can be significant. This decrease in throughput can adversely affect the performance of network applications and especially multimedia applications over the wireless network. As a result, some of the recent studies have advocated a cross-layer error-control strategy that can recover data even from the corrupted packets and improve throughput.
Utility/feasibility of data recovery from corrupted MAC frames is a function of the “residue error” patterns observed at the link-level. Here, residue error represents bit errors that are not corrected by the physical layer, and consequently they appear within (corrupted) packets at the link-layer and possibly at other higher layers. In this document we analyze and model the behavior of the actual residue error patterns observed at the 802.11b link-level based on crucial parameters and side information that can be collected at the physical layer. The proposed work thus has important implications for design of future error control protocol and deduction of performance bounds.
Previous attempts at modeling 802.11b (WLAN) residual errors have typically not taken into consideration packet boundaries and attempt to characterize the entire residue error traces on the basis of a single set of model parameters. In addition, previous modeling techniques employed at the link-level do not incorporate any channel state information (CSI) that can be associated with a residue error trace during the data collection step of the experimentation. In this work, we show that modeling techniques such as the above are inherently attempting to model a non-stationary process and thus can often lead to conclusions that are not broadly applicable. In particular, we show that the observations about long-range dependence of the residue error process can vary from one experimental setup to another.
The behavior of a residue error process and in fact the wireless channel can be influenced by many factors, such as presence of interfering sources, receiver mobility and terrain (which in the context of the home/office setup considered in this document corresponds to presence of walls etc). It's natural to expect the behavior of the error process to vary from one environment to another and correspondingly also with time if the surroundings are even slightly dynamic. Thus it is hard to characterize the channel behavior in a manner that would be independent of the above mentioned environmental/infrastructural biases. Signal to Silence Ratios (SSR) can be used as a representation of the overall Signal to Interference/Noise Ratio and thus the error process when “conditioned” on a SSR can be expected to behave similarly across different environments. Thus the SSR indications, that typical 802.11b radio hardware is capable of providing, can be used very practically for link-layer model adaptation. Nonetheless, other indicators as to the errors contained in a given data packet are also contemplated by this disclosure.
When expressed as a function of SSR, the average bit error rate in a corrupted MAC frame indeed has a constant relationship across different environments. The invariance of this first-order relationship is essential for invariance in higher order relationships to exist. Invariance in higher order relationships is essential for a single Markov model associated with a particular SSR to characterize all residue errors in packets with that particular SSR. Thus the above result is used as a motivation for the remainder of the work. We also quantify, on the basis of mutual information, the variations in the temporal correlation of the residue error process with respect to the SSR range. It is observed that the amount of temporal correlation can vary as a function of SSR, thus providing further motivation for the proposed work.
The statements in this section merely provide background information related to the present disclosure and may not constitute prior art.
A method is provided for adapting models on the basis of link quality indicators. A plurality of statistical models which predict whether a given data bit in a stream of data bits is in error are first defined, where each model includes an indicator of bit errors in the bit stream used to train the model. The method then includes: receiving a data packet at a receiver in a wireless network; determining an indicator of bit errors for the received data packet; and processing the data packet at the receiver using a model from the plurality of models which correlates to the bit error indicator for the data packet.
Further areas of applicability will become apparent from the description provided herein. It should be understood that the description and specific examples are intended for purposes of illustration only and are not intended to limit the scope of the present disclosure.
The drawings described herein are for illustration purposes only and are not intended to limit the scope of the present disclosure in any way.
An improved technique is provided for processing data packets at a receiver in a wireless network as shown in
Upon receiving a data packet 14 at a receiver, an indicator of the bit errors contained therein is determined 16 for the data packet. The data packet in then processed at 18 using the model which correlates to the bit error indicator for the data packet. For subsequent data packets, the statistical model is further adapted using the applicable bit error indicator for the data packet.
For the trace collection, the AP transmits packets over the wireless medium to the LoS client at 11 Mbps and the “sniffer” sniffs these transmissions from various locations with different link quality. The source code of the “sniffer” device driver was modified to dump all the corrupted/uncorrupted frames from the kernel buffer space. The Prism 2.5 device also measures received signal strength indication (RSSI) value and “silence” value at the antenna of the radio hardware. The RSSI is measured for 10 μs while receiving the frame and provides total power observed, including signal, interference and background noise. The “silence” value measures total power before the start of the frame. Both these values are collected per-frame basis and reported as Signal-to-Silence ratio of that particular frame. In this document all references to Signal-to-Noise Ratio (SNR) also imply the RSSI to silence value ratio. Packets that correspond to the LoS Client were recovered from the packet dump at a later stage and the XOR images of the LoS Client and the sniffer are used as error traces.
The work environments where traces were collected have been broadly classified into two groups as shown in
Let {zi} be a random process defined on the error trace, such that zi represents the total number of packet errors in the ith data packet. The data process {zi} can be aggregated at a scale m by defining a random process
such that, the sequence length of {zi(m)} is 1/m time's length of {zi}).
The variance of zi(m), derived from the actual wireless trace data can be used to deduce whether the process {zi} is long range dependent. On the basis of the slope of the curve defining the relationship between log2 (var(z(m))) and log2 (m) it had been deduced that the process {zi} is long range dependent. We conduct a similar analysis, with the traces collected in this work.
Next, the relationship of SSR and the average bit error rate in a corrupted packet received with the corresponding SSR indication is evaluated. The value of
To quantify the amount of memory in the residue errors of corrupted packets, the sample mutual information is calculated as a function of lagη. The sample mutual information can be calculated by considering the sequence of errors in a packet {xi} and then evaluating the mean frequency f{xi,xi+η} of each possible combination of {xi,xi+η}. The frequency f(xi) is nothing but the average probability of error
It can be seen that the mutual information decays faster as function of lag when the SSR values are low. As the SSR values increase, the memory increases. Thus, naturally implying the need for different models at different SSR ranges.
Ideally, the length of the channel model should be varied as a function of SSR. However in order to simplify the analysis and make a more fluent presentation in this document we focus on models that have equal memory length for all SSR values. Thus unlike a traditional approach of modeling, where the memory length of a process is identified before choosing a model, we choose a specific model order and then try to evaluate the utility of the model. The utility of the model should thus be expected to vary as a function of SSR.
In an exemplary embodiment, a Markov model is used to model the bit patterns. A full state Markov model is defined by a set of state transition probabilities: p(Si|Sj) for every i, j, where Si and Sj are the different states. In this work, the states are defined by bit patterns: [x1, x2, L, xk]. Thus a bit string of length k leads to 2k states. Thus a bit sequence can be converted into a sequence of states. An example is further described below. Let's say we have four states, S0,0, S0,1, S1,0, S11. Thus the following bit-string: 0010110101 can be represented by the following state sequence (by shifting 1 bit at a time) S00S01S10S01S11S10S01S10S01. From state sequence such as the one given above, we can empirically calculate the state transition probabilities e.g. lets say we want to calculate p(S10|S01). Ignoring, the state at the left boundary, the state S01 occurs in the sequence 3 times. Of these 3 occurrences, S01 is followed by state S10 twice. Thus we can empirically evaluate p(S10|S01)=⅔. We also define probabilities:
which represent the probability of occurrence of a specific state. In the above example
π(S01)= 4/9, π(S00)= 1/9, π(S11)= 1/9, π(S10)= 4/9
For a memory length k, the bit errors
Let us say that that the training data that we have can be classified into different categories. Let the data be classified into two categories which are labeled as Z=1 and Z=0, where the class of data labeled as Z=1 can be further sub-categorized depending on the SSR associated with the packets. Thus associate a label (Z,SSR) with each subclass. A distinct Markov model is trained for each class to get a PA FSM and the following set of conditional state-transition probabilities: p(Si|Sj,Z)=p([x2, x3, L, xk+1]|[x1, x2, L, xk], Z) or we train a distinct FSM for each sub-class to get a SAPA FSM and the following set of conditional state-transition probabilities:
p(Si|Sj,Z,SSR)=p([x2,x3,L,xk+1,]|[x1,x2,L,xk],Z,SSR).
Two exemplary models are further considered below. Both models are obtained by evaluating the transition probabilities only over the corrupted packets. Let z be an indicator random variable (obtained from the Frame Check Sequence) that can indicate whether a packet is corrupted (Z=1) or uncorrupted (Z=0). Thus, an SSR_Unaware model is obtained by evaluating the transition probability p([x2, . . . xk, xk+1]/([x1, x2 . . . xk], Z=1) for each possible pattern; whereas, a SSR_aware model is obtained by evaluating the transition probability p([x2, . . . xk, xk+1]/([x1, x2 . . . xk], Z=1, SSR) for each possible pattern.
With reference to
Thus the conditional entropy measures the uncertainty associated with the error process if the SSR value is known and the previous k values are known. It can be seen that increasing the memory length of the model is beneficial at all SSR values, however at very low SSR values the entropy of the error process may be too high to provide any useful information even when a high order Markov model is used. As against that in a transition region the benefits of increasing the order of the model starts diminishing as the size of the order starts equaling the memory length of the process. For high SSR values, increased memory can provide significant performance benefits. Thus it can be clearly observed that different strategies may have to be adopted to model residue error processes in different SSR ranges.
The performance of the full-state Markov chains (FSM) is measured in terms of the ability of the synthesized data to replicate the features of the actual error process. The features are defined in terms of random variables such as inter-arrival rate I and the frequency of errors per packet p. The performance of the model is quantified in terms of Entropy Normalized Kullback-Leibler Divergence between the probability distributions of the various random variables. Further details regarding this technique may be found in S. A. Khayam and H. Radha, “Markov-based Modeling of Wireless Local Area Networks,” ACM MSWiM, September 2003 which is incorporated herein by reference.
The Kullback-Leibler distance gives approximately the difference in bits required to code a single symbol for the two probability distributions. If the probability distributions are close to each other the distance should be close to zero. However the Kullback-Leibler distance does not portray the complete picture, e.g., a distance of 1 bit represents a smaller distance from the original distribution if the number of bits required to represent a symbol is 10 compared to case when the original distribution required 1 bit. The measure can be improved by normalizing the Kullback-Leibler distance with entropy. Thus the expression for ENK is given by
where p(
The training set for the Markov models was formed by randomly choosing 70% of the corrupted packets from the Home_Data. The remaining 30% was used as test data. The transition probabilities for the Markov models were determined based on this training data. Once the training was done, the transition matrix was used to synthesize the data. To synthesize data, choose the first state according to the distribution π(Si). Choose the next state in accordance to the first choice. So let say we choose the first state to be S01, then choose the next state according to the distribution p(Si|S01). The state sequence obtained in the above manner can now be converted into a bit-sequence. The relative entropy of the synthesized data with the test data was compared with the relative entropy of the training data with the test data. This allows us to compare the performance of the model vis-à-vis the ability of the source to model itself.
To further test the utility of an SSR aware modeling approach, we consider test data that was drawn from a completely different environment. For this purpose we consider the Office_data. The synthesized data was still generated on the basis of the transition matrix obtained by training on Home_data.
Till this point our analysis has been completely based on analyzing the residue error traces in a piece-wise manner. In the collected traces, corrupted packets do not necessarily occur continuously and similarly consecutive packets do not necessarily have identical SSR indications associated with them. Thus to test our belief that the work presented in the previous sections may be useful for development of future predictive tools in dynamic environments, in this section we consider the 802.11b residue error traces as a continuous process. We use various models to synthesize data.
For some models, the FCS and SSR traces associated with the actual residue error trace is provided as side-information. We evaluate the ability of the various models to replicate the features of the actual residue error traces. For the purpose of data synthesis, we consider:
(i) FSM model: This modeling approach is further described by Khayam et al in “S. A. Khayam and H. Radha, “Markov-based Modeling of Wireless Local Area Networks,” ACM MSWiM, September 2003. This approach is packet boundary unaware and SSR unaware, thus the model parameters are obtained by training the model on the entire residue error trace.
(ii) PA-FSM: This corresponds to a modeling scheme that is SSR_unaware but is packet boundary aware. Thus we leave the decision of whether a packet is uncorrupted or not to the frame check sequence. If the frame check sequence indicates that a packet is corrupted then the data in that location is synthesized on the basis of the SSR_unaware Markov model.
(iii) SAPA-FSM: This corresponds to a modeling scheme that is SSR_aware and packet boundary aware. Thus we leave the decision of whether a packet is uncorrupted or not to the frame check sequence. If the frame check sequence indicates that a packet is corrupted then the data in that location is synthesized on the basis of the SSR_aware Markov model. For the data synthesized using each of the above models, we calculated the log-variance plots (similar to
One application for this work is for performing error recovery of corrupt data packets in a wireless communication system. Briefly, an indicator of bit errors is determined for each individual data packet received at a receiver. The bit error indicator for each data packet is then passed to an application layer of the receiver and an error recovery operation is performed in relation to a corrupt data packet using the bit indicator associated with the corrupt data packet. More specifically, the bit error indicator is translated to a probability that a given bit in the data packet is in error and this probability is in turn used to decode each bit within the corrupt data packet. Details regarding how the bit error indicator is captured and then used to perform an error recovery operation may be found in U.S. patent application Ser. No. ______ entitled “Method to Utilize Physical Layer Channel State Information to Improve Video Quality” which is filed concurrently herewith and incorporated herein by reference.
In this disclosure it has been shown that the ability of Markov models to characterize the residue errors in 802.11b can be greatly enhanced by making them SSR aware. The overall behavior of link-level residue errors is shown to be a function of the environment in which the wireless traces are collected. SSR indications can be useful in unbiasing the environmental and infrastructural biases. SSR_aware Markov models were shown to provide excellent performance in foreign environments also; and thus should prove useful for developing future error control, simulation/emulation applications.
Further areas of applicability will become apparent from the description provided herein. It should be understood that the description and specific examples are intended for purposes of illustration only and are not intended to limit the scope of the present disclosure.
This application claims the benefit of U.S. Provisional Application No. 60/784,109 filed on Mar. 17, 2006. The disclosure of the above application is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60784109 | Mar 2006 | US |