-
Spectrum Sharing For Information Freshness: A Repeated Games Perspective
Authors:
Shreya Tyagi,
Sneihil Gopal,
Rakesh Chaturvedi,
Sanjit K. Kaul
Abstract:
We consider selfish sources that send updates to a monitor over a shared wireless access. The sources would like to minimize the age of their information at the monitor. Our goal is to devise strategies that incentivize such sources to use the shared spectrum cooperatively. Earlier work has modeled such a setting using a non-cooperative one-shot game, played over a single access slot, and has show…
▽ More
We consider selfish sources that send updates to a monitor over a shared wireless access. The sources would like to minimize the age of their information at the monitor. Our goal is to devise strategies that incentivize such sources to use the shared spectrum cooperatively. Earlier work has modeled such a setting using a non-cooperative one-shot game, played over a single access slot, and has shown that under certain access settings the dominant strategy of each source is to transmit in any slot, resulting in packet collisions between the sources' transmissions and causing all of them to be decoded in error at the monitor.
We capture the interaction of the sources over an infinitely many medium access slots using infinitely repeated games. We investigate strategies that enable cooperation resulting in an efficient use of the wireless access, while disincentivizing any source from unilaterally deviating from the strategy. Formally, we are interested in strategies that are a subgame perfect Nash equilibrium (SPNE). We begin by investigating the properties of the one-stage (slot) optimal and access-fair correlated strategies. We then consider their many-slot variants, the age-fair and access-fair strategies, in the infinitely repeated game model. We prove that the access-fair and age-fair strategies are SPNEs for when collision slots are longer than successful transmission slots. Otherwise, neither is a SPNE. We end with simulations that shed light on a possible SPNE for the latter case.
△ Less
Submitted 25 August, 2023;
originally announced September 2023.
-
ACP+: An Age Control Protocol for the Internet
Authors:
Tanya Shreedhar,
Sanjit K. Kaul,
Roy D. Yates
Abstract:
We present ACP+, an age control protocol, which is a transport layer protocol that regulates the rate at which update packets from a source are sent over the Internet to a monitor. The source would like to keep the average age of sensed information at the monitor to a minimum, given the network conditions. Extensive experimentation helps us shed light on age control over the current Internet and i…
▽ More
We present ACP+, an age control protocol, which is a transport layer protocol that regulates the rate at which update packets from a source are sent over the Internet to a monitor. The source would like to keep the average age of sensed information at the monitor to a minimum, given the network conditions. Extensive experimentation helps us shed light on age control over the current Internet and its implications for sources sending updates over a shared wireless access to monitors in the cloud. We also show that many congestion control algorithms proposed over the years for the Transmission Control Protocol (TCP), including hybrid approaches that achieve higher throughputs at lower delays than traditional loss-based congestion control, are unsuitable for age control.
△ Less
Submitted 22 October, 2022;
originally announced October 2022.
-
Coexistence of Age Sensitive Traffic and High Throughput Flows: Does Prioritization Help?
Authors:
Tanya Shreedhar,
Sanjit K. Kaul,
Roy D. Yates
Abstract:
We study the coexistence of high throughput traffic flows with status update flows that require timely delivery of updates. A mix of these flows share an end-to-end path that includes a WiFi access network followed by paths over the Internet to a server in the cloud. Using real-world experiments, we show that commonly used methods of prioritization (DSCP at the IP layer and EDCA at the 802.11 MAC…
▽ More
We study the coexistence of high throughput traffic flows with status update flows that require timely delivery of updates. A mix of these flows share an end-to-end path that includes a WiFi access network followed by paths over the Internet to a server in the cloud. Using real-world experiments, we show that commonly used methods of prioritization (DSCP at the IP layer and EDCA at the 802.11 MAC layer) in networks are highly effective in isolating status update flows from the impact of high throughput flows in the absence of WiFi access contention, say when all flows originate from the same WiFi client. Prioritization, however, isn't as effective in the presence of contention that results from the throughput and status update flows sharing WiFi. This results in prioritized status update flows suffering from a time-average age of information at the destination server that is about the same as when all flows have the same priority.
△ Less
Submitted 1 March, 2022;
originally announced March 2022.
-
A Deep Learning Approach To Estimation Using Measurements Received Over a Network
Authors:
Shivangi Agarwal,
Sanjit K. Kaul,
Saket Anand,
P. B. Sujit
Abstract:
We propose a novel deep neural network (DNN) based approximation architecture to learn estimates of measurements. We detail an algorithm that enables training of the DNN. The DNN estimator only uses measurements, if and when they are received over a communication network. The measurements are communicated over a network as packets, at a rate unknown to the estimator. Packets may suffer drops and n…
▽ More
We propose a novel deep neural network (DNN) based approximation architecture to learn estimates of measurements. We detail an algorithm that enables training of the DNN. The DNN estimator only uses measurements, if and when they are received over a communication network. The measurements are communicated over a network as packets, at a rate unknown to the estimator. Packets may suffer drops and need retransmission. They may suffer waiting delays as they traverse a network path.
Works on estimation often assume knowledge of the dynamic model of the measured system, which may not be available in practice. The DNN estimator doesn't assume knowledge of the dynamic system model or the communication network. It doesn't require a history of measurements, often used by other works.
The DNN estimator results in significantly smaller average estimation error than the commonly used Time-varying Kalman Filter and the Unscented Kalman Filter, in simulations of linear and nonlinear dynamic systems. The DNN need not be trained separately for different communications network settings. It is robust to errors in estimation of network delays that occur due to imperfect time synchronization between the measurement source and the estimator. Last but not the least, our simulations shed light on the rate of updates that result in low estimation error.
△ Less
Submitted 12 September, 2022; v1 submitted 20 January, 2022;
originally announced January 2022.
-
An Empirical Study of Ageing in the Cloud
Authors:
Tanya Shreedhar,
Sanjit K. Kaul,
Roy D. Yates
Abstract:
We quantify, over inter-continental paths, the ageing of TCP packets, throughput and delay for different TCP congestion control algorithms containing a mix of loss-based, delay-based and hybrid congestion control algorithms. In comparing these TCP variants to ACP+, an improvement over ACP, we shed better light on the ability of ACP+ to deliver timely updates over fat pipes and long paths. ACP+ est…
▽ More
We quantify, over inter-continental paths, the ageing of TCP packets, throughput and delay for different TCP congestion control algorithms containing a mix of loss-based, delay-based and hybrid congestion control algorithms. In comparing these TCP variants to ACP+, an improvement over ACP, we shed better light on the ability of ACP+ to deliver timely updates over fat pipes and long paths. ACP+ estimates the network conditions on the end-to-end path and adapts the rate of status updates to minimize age. It achieves similar average age as the best (age wise) performing TCP algorithm but at end-to-end throughputs that are two orders of magnitude smaller. We also quantify the significant improvements that ACP+ brings to age control over a shared multiaccess channel.
△ Less
Submitted 13 March, 2021;
originally announced March 2021.
-
Age of Information: An Introduction and Survey
Authors:
Roy D. Yates,
Yin Sun,
D. Richard Brown III,
Sanjit K. Kaul,
Eytan Modiano,
Sennur Ulukus
Abstract:
We summarize recent contributions in the broad area of age of information (AoI). In particular, we describe the current state of the art in the design and optimization of low-latency cyberphysical systems and applications in which sources send time-stamped status updates to interested recipients. These applications desire status updates at the recipients to be as timely as possible; however, this…
▽ More
We summarize recent contributions in the broad area of age of information (AoI). In particular, we describe the current state of the art in the design and optimization of low-latency cyberphysical systems and applications in which sources send time-stamped status updates to interested recipients. These applications desire status updates at the recipients to be as timely as possible; however, this is typically constrained by limited system resources. We describe AoI timeliness metrics and present general methods of AoI evaluation analysis that are applicable to a wide variety of sources and systems. Starting from elementary single-server queues, we apply these AoI methods to a range of increasingly complex systems, including energy harvesting sensors transmitting over noisy channels, parallel server systems, queueing networks, and various single-hop and multi-hop wireless networks. We also explore how update age is related to MMSE methods of sampling, estimation and control of stochastic processes. The paper concludes with a review of efforts to employ age optimization in cyberphysical applications.
△ Less
Submitted 16 July, 2020;
originally announced July 2020.
-
Intelligent Querying for Target Tracking in Camera Networks using Deep Q-Learning with n-Step Bootstrapping
Authors:
Anil Sharma,
Saket Anand,
Sanjit K. Kaul
Abstract:
Surveillance camera networks are a useful infrastructure for various visual analytics applications, where high-level inferences and predictions could be made based on target tracking across the network. Most multi-camera tracking works focus on target re-identification and trajectory association problems to track the target. However, since camera networks can generate enormous amount of video data…
▽ More
Surveillance camera networks are a useful infrastructure for various visual analytics applications, where high-level inferences and predictions could be made based on target tracking across the network. Most multi-camera tracking works focus on target re-identification and trajectory association problems to track the target. However, since camera networks can generate enormous amount of video data, inefficient schemes for making re-identification or trajectory association queries can incur prohibitively large computational requirements. In this paper, we address the problem of intelligent scheduling of re-identification queries in a multi-camera tracking setting. To this end, we formulate the target tracking problem in a camera network as an MDP and learn a reinforcement learning based policy that selects a camera for making a re-identification query. The proposed approach to camera selection does not assume the knowledge of the camera network topology but the resulting policy implicitly learns it. We have also shown that such a policy can be learnt directly from data. Using the NLPR MCT and the Duke MTMC multi-camera multi-target tracking benchmarks, we empirically show that the proposed approach substantially reduces the number of frames queried.
△ Less
Submitted 20 April, 2020;
originally announced April 2020.
-
Timely Updates By Multiple Sources: The M/M/1 Queue Revisited
Authors:
Sanjit K. Kaul,
Roy D. Yates
Abstract:
Multiple sources submit updates to a monitor through an M/M/1 queue. A stochastic hybrid system (SHS) approach is used to derive the average age of information (AoI) for an individual source as a function of the offered load of that source and the competing update traffic offered by other sources. This work corrects an error in a prior analysis. By numerical evaluation, this error is observed to b…
▽ More
Multiple sources submit updates to a monitor through an M/M/1 queue. A stochastic hybrid system (SHS) approach is used to derive the average age of information (AoI) for an individual source as a function of the offered load of that source and the competing update traffic offered by other sources. This work corrects an error in a prior analysis. By numerical evaluation, this error is observed to be small and qualitatively insignificant.
△ Less
Submitted 7 February, 2020;
originally announced February 2020.
-
Age of Information in Uncoordinated Unslotted Updating
Authors:
Roy D. Yates,
Sanjit K. Kaul
Abstract:
Sensor sources submit updates to a monitor through an unslotted, uncoordinated, unreliable multiple access collision channel. The channel is unreliable; a collision-free transmission is received successfully at the monitor with some transmission success probability. For an infinite-user model in which the sensors collectively transmit updates as a Poisson process and each update has an independent…
▽ More
Sensor sources submit updates to a monitor through an unslotted, uncoordinated, unreliable multiple access collision channel. The channel is unreliable; a collision-free transmission is received successfully at the monitor with some transmission success probability. For an infinite-user model in which the sensors collectively transmit updates as a Poisson process and each update has an independent exponential transmission time, a stochastic hybrid system (SHS) approach is used to derive the average age of information (AoI) as a function of the offered load and the transmission success probability. The analysis is then extended to evaluate the individual age of a selected source. When the number of sources and update transmission rate grow large in fixed proportion, the limiting asymptotic individual age is shown to provide an accurate individual age approximation for a small number of sources.
△ Less
Submitted 5 February, 2020;
originally announced February 2020.
-
A Non-Cooperative Multiple Access Game for Timely Updates
Authors:
Sneihil Gopal,
Sanjit K. Kaul,
Rakesh Chaturvedi,
Sumit Roy
Abstract:
We consider a network of selfish nodes that would like to minimize the age of their updates at the other nodes. The nodes send their updates over a shared spectrum using a CSMA/CA based access mechanism. We model the resulting competition as a non-cooperative one-shot multiple access game and investigate equilibrium strategies for two distinct medium access settings (a) collisions are shorter than…
▽ More
We consider a network of selfish nodes that would like to minimize the age of their updates at the other nodes. The nodes send their updates over a shared spectrum using a CSMA/CA based access mechanism. We model the resulting competition as a non-cooperative one-shot multiple access game and investigate equilibrium strategies for two distinct medium access settings (a) collisions are shorter than successful transmissions and (b) collisions are longer. We investigate competition in a CSMA/CA slot, where a node may choose to transmit or stay idle. We find that medium access settings exert strong incentive effects on the nodes. We show that when collisions are shorter, transmit is a weakly dominant strategy. This leads to all nodes transmitting in the CSMA/CA slot, therefore guaranteeing a collision. In contrast, when collisions are longer, no weakly dominant strategy exists and under certain conditions on the ages at the beginning of the slot, we derive the mixed strategy Nash equilibrium.
△ Less
Submitted 23 January, 2020;
originally announced January 2020.
-
Coexistence of Age and Throughput Optimizing Networks: A Spectrum Sharing Game
Authors:
Sneihil Gopal,
Sanjit K. Kaul,
Rakesh Chaturvedi,
Sumit Roy
Abstract:
We investigate the coexistence of an age optimizing network (AON) and a throughput optimizing network (TON) that share a common spectrum band. We consider two modes of long run coexistence: (a) networks compete with each other for spectrum access, causing them to interfere and (b) networks cooperate to achieve non-interfering access.
To model competition, we define a non-cooperative stage game p…
▽ More
We investigate the coexistence of an age optimizing network (AON) and a throughput optimizing network (TON) that share a common spectrum band. We consider two modes of long run coexistence: (a) networks compete with each other for spectrum access, causing them to interfere and (b) networks cooperate to achieve non-interfering access.
To model competition, we define a non-cooperative stage game parameterized by the average age of the AON at the beginning of the stage, derive its mixed strategy Nash equilibrium (MSNE), and analyze the evolution of age and throughput over an infinitely repeated game in which each network plays the MSNE at every stage. Cooperation uses a coordination device that performs a coin toss during each stage to select the network that must access the medium. Networks use the grim trigger punishment strategy, reverting to playing the MSNE every stage forever if the other disobeys the device. We determine if there exists a subgame perfect equilibrium, i.e., the networks obey the device forever as they find cooperation beneficial. We show that networks choose to cooperate only when they consist of a sufficiently small number of nodes, otherwise they prefer to disobey the device and compete.
△ Less
Submitted 13 March, 2021; v1 submitted 4 September, 2019;
originally announced September 2019.
-
Is two greater than one?: Analyzing Multipath TCP over Dual-LTE in the Wild
Authors:
Nitinder Mohan,
Tanya Shreedhar,
Aleksandr Zavodovski,
Jussi Kangasharju,
Sanjit K. Kaul
Abstract:
Multipath TCP (MPTCP) is a standardized TCP extension which allows end-hosts to simultaneously exploit all of their network interfaces. The recent proliferation of dual-SIM mobile phones makes multi-LTE MPTCP setup an attractive option. We perform extensive measurements of MPTCP over two LTE connections in low and high-speed mobility scenarios over five months, both in controlled and in-the-wild e…
▽ More
Multipath TCP (MPTCP) is a standardized TCP extension which allows end-hosts to simultaneously exploit all of their network interfaces. The recent proliferation of dual-SIM mobile phones makes multi-LTE MPTCP setup an attractive option. We perform extensive measurements of MPTCP over two LTE connections in low and high-speed mobility scenarios over five months, both in controlled and in-the-wild environments. Our findings indicate that MPTCP performance decreases at high speeds due to increased frequency of signal strength drops and handovers. Both LTE paths experience frequent changes which result in a sub-optimal subflow utilization. We also find that while path changes are unpredictable, their impact on MPTCP follows a deterministic trend. Finally, we show that both application traffic patterns and congestion control variants impact MPTCP adaptability at high speeds.
△ Less
Submitted 5 September, 2019;
originally announced September 2019.
-
Minimizing Age in Gateway Based Update Systems
Authors:
Sandeep Banik,
Sanjit K. Kaul,
P. B. Sujit
Abstract:
We consider a network of status updating sensors whose updates are collected and sent to a monitor by a gateway. The monitor desires as fresh as possible updates from the network of sensors. The gateway may either poll a sensor for its status update or it may transmit collected sensor updates to the monitor. We derive the average age at the monitor for such a setting. We observe that increasing th…
▽ More
We consider a network of status updating sensors whose updates are collected and sent to a monitor by a gateway. The monitor desires as fresh as possible updates from the network of sensors. The gateway may either poll a sensor for its status update or it may transmit collected sensor updates to the monitor. We derive the average age at the monitor for such a setting. We observe that increasing the frequency of transmissions to the monitor has the upside of resetting sensor age at the monitor to smaller values. However, it increases the length of time that elapses before a sensor is polled again. This motivates our investigation of policies that fix the number of sensors s the gateway polls before transmitting to the monitor.
For any s, we show that when sensor transmission times to the gateway are independent and identically distributed (iid), for independent but possibly non-identical transmission times to the monitor, it is optimal to poll a sensor with the maximum age at the gateway first. Also, under simplifying assumptions, the optimal value of s increases as the square root of the number of sensors. For non-identical sensor transmission times, we consider a policy that polls a sensor such that the resulting average change in age is minimized. We compare our policy proposals with other policies, over a wide selection of transmission time distributions.
△ Less
Submitted 17 June, 2019; v1 submitted 19 March, 2019;
originally announced March 2019.
-
Coexistence of Age and Throughput Optimizing Networks: A Game Theoretic Approach
Authors:
Sneihil Gopal,
Sanjit K. Kaul,
Rakesh Chaturvedi
Abstract:
Real-time monitoring applications have Internet-of-Things (IoT) devices sense and communicate information (status updates) to a monitoring facility. Such applications desire the status updates available at the monitor to be fresh and would like to minimize the age of delivered updates. Networks of such devices may share wireless spectrum with WiFi networks. Often, they use a CSMA/CA based medium a…
▽ More
Real-time monitoring applications have Internet-of-Things (IoT) devices sense and communicate information (status updates) to a monitoring facility. Such applications desire the status updates available at the monitor to be fresh and would like to minimize the age of delivered updates. Networks of such devices may share wireless spectrum with WiFi networks. Often, they use a CSMA/CA based medium access similar to WiFi. However, unlike them, a WiFi network would like to provide high throughputs for its users. We model the coexistence of such networks as a repeated game with two players, an age optimizing network (AON) and a throughput optimizing network (TON), where an AON aims to minimize the age of updates and a TON seeks to maximize throughput. We define the stage game, parameterized by the average age of the AON at the beginning of the stage, and derive its mixed strategy Nash equilibrium (MSNE). We study the evolution of the equilibrium strategies over time, when players play the MSNE in each stage, and the resulting average discounted payoffs of the networks. It turns out that it is more favorable for a TON to share spectrum with an AON in comparison to sharing with another TON. The key to this lies in the MSNE strategy of the AON that occasionally refrains all its nodes from transmitting during a stage. Such stages allow the TON competition free access to the medium.
△ Less
Submitted 5 June, 2019; v1 submitted 22 January, 2019;
originally announced January 2019.
-
Welfare Analysis of Network Neutrality Regulation
Authors:
Rakesh Chaturvedi,
Sneihil Gopal,
Sanjit Krishnan Kaul
Abstract:
Consumers of Internet content typically pay an Internet Service Provider (ISP) to connect to the Internet. A content provider (CP) may charge consumers for its content or may earn via advertising revenue. In such settings, a matter of continuing debate, under the umbrella of net neutrality regulations, is whether an ISP serving a consumer may in addition charge the CPs not directly connected to th…
▽ More
Consumers of Internet content typically pay an Internet Service Provider (ISP) to connect to the Internet. A content provider (CP) may charge consumers for its content or may earn via advertising revenue. In such settings, a matter of continuing debate, under the umbrella of net neutrality regulations, is whether an ISP serving a consumer may in addition charge the CPs not directly connected to the ISP for delivering their content to consumers connected to the ISP. We attempt an answer by looking at the problem through the lens of a regulator whose mandate is to maximize the cumulative welfare of ISPs, CPs, and consumers.
Specifically, we consider a two-sided market model, in which a local monopoly ISP prices Internet access to consumers and possibly to CPs as well. The CPs then decide whether to enter a competitive but differentiated market and the consumers decide whether to connect to the ISP. Unlike prior works, we model competition between the CPs together with consumer valuation of content and quality-of-service provided by the ISP. We do so by using a novel fusion of classical spatial differentiation models, namely the Hotelling and the Salop models, in addition to simple queue theoretic delay modeling. Via extensive simulations, we show that the equilibrium in the non-neutral setting that allows an ISP to charge a CP welfare-dominates the neutral equilibrium.
△ Less
Submitted 25 November, 2018;
originally announced November 2018.
-
ACP: An End-to-End Transport Protocol for Delivering Fresh Updates in the Internet-of-Things
Authors:
Tanya Shreedhar,
Sanjit K. Kaul,
Roy D. Yates
Abstract:
The next generation of networks must support billions of connected devices in the Internet-of-Things (IoT). To support IoT applications, sources sense and send their measurement updates over the Internet to a monitor (control station) for real-time monitoring and actuation. Ideally, these updates would be delivered at a high rate, only constrained by the sensing rate supported by the sources. Howe…
▽ More
The next generation of networks must support billions of connected devices in the Internet-of-Things (IoT). To support IoT applications, sources sense and send their measurement updates over the Internet to a monitor (control station) for real-time monitoring and actuation. Ideally, these updates would be delivered at a high rate, only constrained by the sensing rate supported by the sources. However, given network constraints, such a rate may lead to delays in delivery of updates at the monitor that make the freshest update at the monitor unacceptably old for the application.
We propose a novel transport layer protocol, namely the Age Control Protocol (ACP), that enables timely delivery of such updates to monitors, in a network-transparent manner. ACP allows the source to adapt its rate of updates to dynamic network conditions such that the average age of the sensed information at the monitor is minimized. We detail the protocol and the proposed control algorithm. We demonstrate its efficacy using extensive simulations and real-world experiments, which have a source send its updates over the Internet to a monitor on another continent.
△ Less
Submitted 4 May, 2019; v1 submitted 8 November, 2018;
originally announced November 2018.
-
QAware: A Cross-Layer Approach to MPTCP Scheduling
Authors:
Tanya Shreedhar,
Nitinder Mohan,
Sanjit K. Kaul,
Jussi Kangasharju
Abstract:
Multipath TCP (MPTCP) allows applications to transparently use all available network interfaces by creating a TCP subflow per interface. One critical component of MPTCP is the scheduler that decides which subflow to use for each packet. Existing schedulers typically use estimates of end-to-end path properties, such as delay and bandwidth, for making the scheduling decisions. In this paper, we show…
▽ More
Multipath TCP (MPTCP) allows applications to transparently use all available network interfaces by creating a TCP subflow per interface. One critical component of MPTCP is the scheduler that decides which subflow to use for each packet. Existing schedulers typically use estimates of end-to-end path properties, such as delay and bandwidth, for making the scheduling decisions. In this paper, we show that these scheduling decisions can be significantly improved by incorporating readily available local information from the device driver queues in the decision-making process. We propose QAware, a novel cross-layer approach for MPTCP scheduling. QAware combines end-to-end delay estimates with local queue buffer occupancy information and allows for a better and faster adaptation to the network conditions. This results in more efficient use of the available resources and considerable gains in aggregate throughput. We present the design of QAware and evaluate its performance through simulations, and also through real experiments, comparing it to existing schedulers. Our results show that QAware performs significantly better than other available approaches for various use-cases and applications.
△ Less
Submitted 13 August, 2018;
originally announced August 2018.
-
A Reinforcement Learning Approach to Target Tracking in a Camera Network
Authors:
Anil Sharma,
Prabhat Kumar,
Saket Anand,
Sanjit K. Kaul
Abstract:
Target tracking in a camera network is an important task for surveillance and scene understanding. The task is challenging due to disjoint views and illumination variation in different cameras. In this direction, many graph-based methods were proposed using appearance-based features. However, the appearance information fades with high illumination variation in the different camera FOVs. We, in thi…
▽ More
Target tracking in a camera network is an important task for surveillance and scene understanding. The task is challenging due to disjoint views and illumination variation in different cameras. In this direction, many graph-based methods were proposed using appearance-based features. However, the appearance information fades with high illumination variation in the different camera FOVs. We, in this paper, use spatial and temporal information as the state of the target to learn a policy that predicts the next camera given the current state. The policy is trained using Q-learning and it does not assume any information about the topology of the camera network. We will show that the policy learns the camera network topology. We demonstrate the performance of the proposed method on the NLPR MCT dataset.
△ Less
Submitted 3 December, 2018; v1 submitted 26 July, 2018;
originally announced July 2018.
-
Improving the Performance of WLANs by Reducing Unnecessary Active Scans
Authors:
Dheryta Jaisinghani,
Vinayak Naik,
Sanjit K. Kaul,
Rajesh Balan,
Sumit Roy
Abstract:
We consider the problem of excessive and unnecessary active scans in heavily utilized WLANs during which low rate probe requests and responses are broadcast. These management frames severely impact the goodput. Our analysis of two production WLANs reveals that lesser number of non-overlapping channels in $2.4$ GHz makes it more prone to the effects of increased probe frames than $5$ GHz. We find t…
▽ More
We consider the problem of excessive and unnecessary active scans in heavily utilized WLANs during which low rate probe requests and responses are broadcast. These management frames severely impact the goodput. Our analysis of two production WLANs reveals that lesser number of non-overlapping channels in $2.4$ GHz makes it more prone to the effects of increased probe frames than $5$ GHz. We find that not only up to $90$% of probe responses carry redundant information but the probe traffic can be as high as $60$\% of the management traffic. Furthermore, active scanning severely impacts real-time applications at a client as it increases the latency by $91$ times.
We present a detailed analysis of the impact of active scans on an individual client and the whole network. We discuss three ways to control the probe traffic in production WLANs -- access point configurations, network planning, and client modification. Our proposals for access point configuration are in line with current WLAN deployments, better network planning is device agnostic in nature, and client modification reduces the average number of probe requests per client by up to $50$% without hampering the ongoing WiFi connection.
△ Less
Submitted 15 July, 2018;
originally announced July 2018.
-
A Reinforcement Learning Approach to Jointly Adapt Vehicular Communications and Planning for Optimized Driving
Authors:
Mayank K. Pal,
Rupali Bhati,
Anil Sharma,
Sanjit K. Kaul,
Saket Anand,
P. B. Sujit
Abstract:
Our premise is that autonomous vehicles must optimize communications and motion planning jointly. Specifically, a vehicle must adapt its motion plan staying cognizant of communications rate related constraints and adapt the use of communications while being cognizant of motion planning related restrictions that may be imposed by the on-road environment. To this end, we formulate a reinforcement le…
▽ More
Our premise is that autonomous vehicles must optimize communications and motion planning jointly. Specifically, a vehicle must adapt its motion plan staying cognizant of communications rate related constraints and adapt the use of communications while being cognizant of motion planning related restrictions that may be imposed by the on-road environment. To this end, we formulate a reinforcement learning problem wherein an autonomous vehicle jointly chooses (a) a motion planning action that executes on-road and (b) a communications action of querying sensed information from the infrastructure. The goal is to optimize the driving utility of the autonomous vehicle. We apply the Q-learning algorithm to make the vehicle learn the optimal policy, which makes the optimal choice of planning and communications actions at any given time. We demonstrate the ability of the optimal policy to smartly adapt communications and planning actions, while achieving large driving utilities, using simulations.
△ Less
Submitted 10 July, 2018;
originally announced July 2018.
-
Optimizing City-Wide White-Fi Networks in TV White Spaces
Authors:
Sneihil Gopal,
Sanjit K. Kaul,
Sumit Roy
Abstract:
White-Fi refers to WiFi deployed in the TV white spaces. Unlike its ISM band counterparts, White-Fi must obey requirements that protect TV reception. As a result, optimization of citywide White-Fi networks faces the challenges of heterogeneous channel availability and link quality, over location. The former is because, at any location, channels in use by TV networks are not available for use by Wh…
▽ More
White-Fi refers to WiFi deployed in the TV white spaces. Unlike its ISM band counterparts, White-Fi must obey requirements that protect TV reception. As a result, optimization of citywide White-Fi networks faces the challenges of heterogeneous channel availability and link quality, over location. The former is because, at any location, channels in use by TV networks are not available for use by White-Fi. The latter is because the link quality achievable at a White-Fi receiver is determined by not only its link gain to its transmitter but also by its link gains to TV transmitters and its transmitter's link gains to TV receivers.
In this work, we model the medium access control (MAC) throughput of a White-Fi network. We propose heuristic algorithms to optimize the throughput, given the described heterogeneity. The algorithms assign power, access probability, and channels to nodes in the network, under the constraint that reception at TV receivers is not compromised. We evaluate the efficacy of our approach over example city-wide White-Fi networks deployed over Denver and Columbus (respectively, low and high channel availability) in the USA, and compare with assignments cognizant of heterogeneity to a lesser degree, for example, akin to FCC regulations.
△ Less
Submitted 18 September, 2018; v1 submitted 15 March, 2018;
originally announced March 2018.
-
A Game Theoretic Approach to DSRC and WiFi Coexistence
Authors:
Sneihil Gopal,
Sanjit K. Kaul
Abstract:
We model the coexistence of DSRC and WiFi networks as a strategic form game with the networks as the players. Nodes in a DSRC network must support messaging of status updates that are time sensitive. Such nodes would like to achieve a small age of information of status updates. In contrast, nodes in a WiFi network would like to achieve large throughputs. Each network chooses a medium access probab…
▽ More
We model the coexistence of DSRC and WiFi networks as a strategic form game with the networks as the players. Nodes in a DSRC network must support messaging of status updates that are time sensitive. Such nodes would like to achieve a small age of information of status updates. In contrast, nodes in a WiFi network would like to achieve large throughputs. Each network chooses a medium access probability to be used by all its nodes. We investigate Nash and Stackelberg equilibrium strategies.
△ Less
Submitted 23 April, 2018; v1 submitted 1 March, 2018;
originally announced March 2018.
-
More Than The Sum Of Its Parts: Exploiting Cross-Layer and Joint-Flow Information in MPTCP
Authors:
Tanya Shreedhar,
Nitinder Mohan,
Sanjit K. Kaul,
Jussi Kangasharju
Abstract:
Multipath TCP (MPTCP) is an extension to TCP which aggregates multiple parallel connections over available network interfaces. MPTCP bases its scheduling decisions on the individual RTT values observed at the subflows, but does not attempt to perform any kind of joint optimization over the subflows. Using the MPTCP scheduler as an example, in this paper we demonstrate that exploiting cross-layer i…
▽ More
Multipath TCP (MPTCP) is an extension to TCP which aggregates multiple parallel connections over available network interfaces. MPTCP bases its scheduling decisions on the individual RTT values observed at the subflows, but does not attempt to perform any kind of joint optimization over the subflows. Using the MPTCP scheduler as an example, in this paper we demonstrate that exploiting cross-layer information and optimizing scheduling decisions jointly over the multiple flows, can lead to significant performance gains. While our results only represent a single data point, they illustrate the need to look at MPTCP from a more holistic point of view and not treat the connections separately, as is currently being done. We call for new approaches and research into how multiple parallel connections offered by MPTCP should be used in an efficient and fair manner.
△ Less
Submitted 20 November, 2017;
originally announced November 2017.
-
Optimizing Networks for Internet Access Using Tethering
Authors:
Vandana Mittal,
Sanjit K. Kaul,
Sumit Roy
Abstract:
We investigate scenarios where Internet access to a user device (node) is available only via the cellular network. However, not every node may connect directly to it. Instead, some may use tethering to connect over WiFi to a node sharing its Internet connection. In effect, nodes split into hotspots and clients. Hotspots are nodes that connect directly to the cellular network and can provide Intern…
▽ More
We investigate scenarios where Internet access to a user device (node) is available only via the cellular network. However, not every node may connect directly to it. Instead, some may use tethering to connect over WiFi to a node sharing its Internet connection. In effect, nodes split into hotspots and clients. Hotspots are nodes that connect directly to the cellular network and can provide Internet connectivity to other nodes to whom they are connected over WiFi. Clients connect to the cellular network only via hotspots. In this work, we consider the problem of determining the split of hotspots and clients, and the association between them, which maximizes the sum of the rates of all nodes, subject to the constraint that any node gets at least the rate it gets when all nodes are directly connected to the cellular network. Via tractable networks, we provide insights into the interplay between WiFi connectivity amongst nodes and rates of their links to the cellular tower, the splits that maximize sum rate, with provably optimal splits for a few cases. We propose a novel heuristic approach to split any network and provide a detailed exposition of gains available from tethering, via simulations.
△ Less
Submitted 4 September, 2017;
originally announced September 2017.
-
Status Updates Over Unreliable Multiaccess Channels
Authors:
Sanjit K. Kaul,
Roy D. Yates
Abstract:
Applications like environmental sensing, and health and activity sensing, are supported by networks of devices (nodes) that send periodic packet transmissions over the wireless channel to a sink node. We look at simple abstractions that capture the following commonalities of such networks (a) the nodes send periodically sensed information that is temporal and must be delivered in a timely manner,…
▽ More
Applications like environmental sensing, and health and activity sensing, are supported by networks of devices (nodes) that send periodic packet transmissions over the wireless channel to a sink node. We look at simple abstractions that capture the following commonalities of such networks (a) the nodes send periodically sensed information that is temporal and must be delivered in a timely manner, (b) they share a multiple access channel and (c) channels between the nodes and the sink are unreliable (packets may be received in error) and differ in quality.
We consider scheduled access and slotted ALOHA-like random access. Under scheduled access, nodes take turns and get feedback on whether a transmitted packet was received successfully by the sink. During its turn, a node may transmit more than once to counter channel uncertainty. For slotted ALOHA-like access, each node attempts transmission in every slot with a certain probability. For these access mechanisms we derive the age of information (AoI), which is a timeliness metric, and arrive at conditions that optimize AoI at the sink. We also analyze the case of symmetric updating, in which updates from different nodes must have the same AoI. We show that ALOHA-like access, while simple, leads to AoI that is worse by a factor of about 2e, in comparison to scheduled access.
△ Less
Submitted 6 May, 2017;
originally announced May 2017.
-
The Age of Information: Real-Time Status Updating by Multiple Sources
Authors:
Roy D. Yates,
Sanjit K. Kaul
Abstract:
We examine multiple independent sources providing status updates to a monitor through simple queues. We formulate an Age of Information (AoI) timeliness metric and derive a general result for the AoI that is applicable to a wide variety of multiple source service systems. For first-come first-served and two types of last-come first-served systems with Poisson arrivals and exponential service times…
▽ More
We examine multiple independent sources providing status updates to a monitor through simple queues. We formulate an Age of Information (AoI) timeliness metric and derive a general result for the AoI that is applicable to a wide variety of multiple source service systems. For first-come first-served and two types of last-come first-served systems with Poisson arrivals and exponential service times, we find the region of feasible average status ages for multiple updating sources. We then use these results to characterize how a service facility can be shared among multiple updating sources. A new simplified technique for evaluating the AoI in finite-state continuous-time queueing systems is also derived. Based on stochastic hybrid systems, this method makes AoI evaluation to be comparable in complexity to finding the stationary distribution of a finite-state Markov chain.
△ Less
Submitted 11 December, 2017; v1 submitted 30 August, 2016;
originally announced August 2016.
-
Artificial Neural Network-based error compensation procedure for low-cost encoders
Authors:
V. K. Dhar,
A. K. Tickoo,
S. K. Kaul,
R. Koul,
B. P. Dubey
Abstract:
An Artificial Neural Network-based error compensation method is proposed for improving the accuracy of resolver-based 16-bit encoders by compensating for their respective systematic error profiles. The error compensation procedure, for a particular encoder, involves obtaining its error profile by calibrating it on a precision rotary table, training the neural network by using a part of this data…
▽ More
An Artificial Neural Network-based error compensation method is proposed for improving the accuracy of resolver-based 16-bit encoders by compensating for their respective systematic error profiles. The error compensation procedure, for a particular encoder, involves obtaining its error profile by calibrating it on a precision rotary table, training the neural network by using a part of this data and then determining the corrected encoder angle by subtracting the ANN-predicted error from the measured value of the encoder angle. Since it is not guaranteed that all the resolvers will have exactly similar error profiles because of the inherent differences in their construction on a micro scale, the ANN has been trained on one error profile at a time and the corresponding weight file is then used only for compensating the systematic error of this particular encoder. The systematic nature of the error profile for each of the encoders has also been validated by repeated calibration of the encoders over a period of time and it was found that the error profiles of a particular encoder recorded at different epochs show near reproducible behavior. The ANN-based error compensation procedure has been implemented for 4 encoders by training the ANN with their respective error profiles and the results indicate that the accuracy of encoders can be improved by nearly an order of magnitude from quoted values of ~6 arc-min to ~0.65 arc-min when their corresponding ANN-generated weight files are used for determining the corrected encoder angle.
△ Less
Submitted 19 November, 2009;
originally announced November 2009.
-
The TACTIC atmospheric Cherenkov Imaging telescope
Authors:
R. Koul,
A. K. Tickoo,
S. K. Kaul,
S. R. Kaul,
N. Kumar,
K. K. Yadav,
N. Bhatt,
K. Venugopal,
H. C. Goyal,
M. Kothari,
P. Chandra,
R. C. Rannot,
V. K. Dhar,
M. K. Koul,
R. K. Kaul,
S. Kotwal,
K. Chanchalani,
S. Thoudam,
N. Chouhan,
M. Sharma,
S. Bhattacharyya,
S. Sahayanathan
Abstract:
The TACTIC $γ$-ray telescope, equipped with a light collector of area $\sim$9.5m$^2$ and a medium resolution imaging camera of 349-pixels, has been in operation at Mt.Abu, India since 2001. This paper describes the main features of its various subsystems and its overall performance with regard to (a) tracking accuracy of its 2-axes drive system, (b) spot size of the light collector, (c) back-end…
▽ More
The TACTIC $γ$-ray telescope, equipped with a light collector of area $\sim$9.5m$^2$ and a medium resolution imaging camera of 349-pixels, has been in operation at Mt.Abu, India since 2001. This paper describes the main features of its various subsystems and its overall performance with regard to (a) tracking accuracy of its 2-axes drive system, (b) spot size of the light collector, (c) back-end signal processing electronics and topological trigger generation scheme, (d) data acquisition and control system and (e) relative and absolute gain calibration methodology. Using a trigger field of view of 11$\times$11 pixels ($\sim$ 3.4$^\circ$$\times3.4^\circ$), the telescope records a cosmic ray event rate of $\sim$2.5 Hz at a typical zenith angle of 15$^\circ$. Monte Carlo simulation results are also presented in the paper for comparing the expected performance of the telescope with actual observational results. The consistent detection of a steady signal from the Crab Nebula above $\sim$1.2 TeV energy, at a sensitivity level of $\sim5.0σ$ in $\sim$25 h, alongwith excellent matching of its energy spectrum with that obtained by other groups, reassures that the performance of the TACTIC telescope is quite stable and reliable. Furthermore, encouraged by the detection of strong $γ$-ray signals from Mrk 501 (during 1997 and 2006 observations) and Mrk 421 (during 2001 and 2005-2006 observations), we believe that there is considerable scope for the TACTIC telescope to monitor similar TeV $γ$-ray emission activity from other active galactic nuclei on a long term basis.
△ Less
Submitted 14 June, 2007;
originally announced June 2007.
-
Observations of the Crab Nebula, Mkn 501 and Mkn 421 using the TACTIC Imaging Element
Authors:
N. Bhatt,
N. K. Agarwal,
C. K. Bhat,
S. Bhattacharyya,
V. K. Dhar,
A. Goyal,
H. C. Goyal,
C. L. Kaul,
D. K. Koul,
I. K. Kaul,
R. K. Kaul,
S. K. Kaul,
S. R. Kaul,
M. K. Koul,
R. Koul,
M. Kothari,
R. C. Rannot,
A. K. Razdan,
S. Sahayanathan,
M. L. Sapru,
N. Satyabhama,
A. K. Tickoo,
N. Venugopal,
K. K. Yadav,
C. L. Bhat
Abstract:
The results of our observational campaigns on the two extragalactic sources Mkn 501 and Mkn 421, carried out with the Imaging Element of the TACTIC array, during March-May, 1998 and April-May, 1999, are presented. The results indicate that the two BL Lac objects (Mkn 501 and Mkn 421) were in a `low' gamma-ray emission state during both epochs of our observations.
The results of our observational campaigns on the two extragalactic sources Mkn 501 and Mkn 421, carried out with the Imaging Element of the TACTIC array, during March-May, 1998 and April-May, 1999, are presented. The results indicate that the two BL Lac objects (Mkn 501 and Mkn 421) were in a `low' gamma-ray emission state during both epochs of our observations.
△ Less
Submitted 8 June, 1999;
originally announced June 1999.