Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Efficient error estimating coding: feasibility and applications

Published: 01 February 2012 Publication History

Abstract

Motivated by recent emerging systems that can leverage partially correct packets in wireless networks, this paper proposes the novel concept of error estimating coding (EEC). Without correcting the errors in the packet, EEC enables the receiver of the packet to estimate the packet's bit error rate, which is perhaps the most important meta-information of a partially correct packet. Our EEC design provides provable estimation quality with rather low redundancy and computational overhead. To demonstrate the utility of EEC, we exploit and implement EEC in two wireless network applications, Wi-Fi rate adaptation and real-time video streaming. Our real-world experiments show that these applications can significantly benefit from EEC.

References

[1]
D. Aguayo, J. Bicket, S. Biswas, G. Judd, and R. Morris, "Link-level measurements from an 802.11b mesh network," in Proc. ACM SIGCOMM, 2004, pp. 121-132.
[2]
J. Bicket, "Bit-rate selection in wireless networks," Master's thesis, MIT, Cambridge, MA, 2005.
[3]
J. Byers, M. Luby, M. Mitzenmacher, and A. Rege, "A digital fountain approach to reliable distribution of bulk data," in Proc. ACM SIGCOMM, 1998, pp. 56-67.
[4]
J. Camp and E. Knightly, "Modulation rate adaptation in urban and vehicular environments: Cross-layer implementation and experimental evaluation," in Proc. ACM MobiCom, 2008, pp. 315-326.
[5]
K. Chebrolu, B. Raman, and S. Sen, "Long-distance 802.11b links: Performance measurements and experience," in Proc. ACM MobiCom, 2006, pp. 74-85.
[6]
B. Chen, Z. Zhou, Y. Zhao, and H. Yu, "Efficient error estimating coding: Feasibility and applications," National University of Singapore, Singapore, Tech. rep., 2010 {Online}. Available: http://www.comp.nus.edu.sg/~yuhf/eec-tr.pdf
[7]
G. Cormode, M. Datar, P. Indyk, and S. Muthukrishnan, "Comparing data streams using hamming norms (how to zero in)," IEEE Trans. Knowl. Data Eng., vol. 15, no. 3, pp. 529-540, May-Jun. 2003.
[8]
G. Cormode, M. Paterson, S. Sahinalp, and U. Vishkin, "Communication complexity of document exchange," in Proc. ACM-SIAM SODA, 2000, pp. 197-206.
[9]
P. Dagum, R. Karp, M. Luby, and S. Ross, "An optimal algorithm for Monte Carlo estimation," SIAM J. Comput., vol. 29, no. 5, pp. 1484-1496, 2000.
[10]
D. D. Couto, D. Aguayo, J. Bicket, and R. Morris, "A high-throughput path metric for multi-hop wireless routing," in Proc. ACM MobiCom, 2003, pp. 134-146.
[11]
H. Dubois-Ferriere, D. Estrin, and M. Vetterli, "Packet combining in sensor networks," in Proc. SenSys, 2005, pp. 102-115.
[12]
M. Elaoud and P. Ramanathan, "Adaptive use of error-correcting codes for real-time communication in wireless networks," in Proc. IEEE INFOCOM, 1998, vol. 2, pp. 548-555.
[13]
J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. Strauss, and R. Wright, "Secure multiparty computation of approximations," in Proc. ICALP, 2001, pp. 927-938.
[14]
J. Feigenbaum, S. Kannan, and M. S. Viswanathan, "An approximate L1-difference algorithm for massive data streams," SIAM J. Comput., vol. 32, no. 1, pp. 131-151, 2002.
[15]
R. Gallager, Low Density Parity Check Codes. Cambridge, MA: MIT Press, 1963.
[16]
D. Halperin, W. Hu, A. Shethy, and D. Wetherall, "Predictable 802.11 packet delivery from wireless channel measurements," in Proc. ACM SIGCOMM, 2010, pp. 159-170.
[17]
G. Holland, N. Vaidya, and P. Bahl, "A rate-adaptive MAC protocol for multi-hop wireless networks," in Proc. ACM MobiCom, 2001, pp. 236-251.
[18]
P. Indyk, "Nearest neighbors in high-dimensional spaces," in Handbook of Discrete and Computational Geometry. Boca Raton, FL: Chapman & Hall/CRC, 2003.
[19]
K. Jamieson and H. Balakrishnan, "PPR: Partial packet recovery for wireless networks," in Proc. ACM SIGCOMM, 2007, pp. 409-420.
[20]
G. Judd, X. Wang, and P. Steenkiste, "Efficient channel-aware rate adaptation in dynamic environments," in Proc. ACM MobiSys, 2008, pp. 118-131.
[21]
A. Kamra, V. Misra, J. Feldman, and D. Rubenstein, "Growth codes: Maximizing sensor network data persistence," in Proc. ACM SIGCOMM, 2006, pp. 255-266.
[22]
S. Katti, D. Katabi, H. Balakrishnan, and M. Medard, "Symbol-level network coding for wireless mesh networks," in Proc. ACM SIGCOMM, 2008, pp. 401-412.
[23]
V. Kawadia and P. Kumar, "Principles and protocols for power control in wireless ad hoc networks," IEEE J. Sel. Areas Commun., vol. 23, no. 1, pp. 76-88, Jan. 2005.
[24]
J. Klaue, B. Rathke, and A.Wolisz, "Evalvid--A framework for video transmission and quality evaluation," in Proc. Perform. TOOLS, 2003, pp. 255-272.
[25]
E. Kushilevitz, R. Ostrovsky, and Y. Rabani, "Efficient search for approximate nearest neighbor in high dimensional spaces," SIAM J. Comput., vol. 30, no. 2, pp. 614-623, 2000.
[26]
J. Laneman, D. Tse, and G.Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
[27]
L. Larzon, M. Degermark, and S. Pink, "UDP lite for real time multi-media applications," presented at the IEEE ICC, 1999.
[28]
Y. Li and B. Vucetic, "On the performance of a simple adaptive relaying protocol for wireless relay networks," in Proc. IEEE VTC-Spring, 2008, pp. 2400-2405.
[29]
K. Lin, N. Kushman, and D.Katabi, "ZipTx:Harnessing partial packets in 802.11 networks," in Proc. ACM MobiCom, 2008, pp. 351-362.
[30]
S. Lin and D. Costello, Error Control Coding: Fundamentals and Applications. Upper Saddle River, NJ: Prentice-Hall, 2004.
[31]
X. Liu, A. Sheth, M. Kaminsky, K. Papagiannaki, S. Seshan, and P. Steenkiste, "DIRC: Increasing indoor wireless capacity using directional antennas," in Proc. ACM SIGCOMM, 2009, pp. 171-182.
[32]
M. Luby, "LT codes," in Proc. FOCS, 2002, p. 271.
[33]
M. Ma and D. Tsang, "Joint design of spectrum sharing and routing with channel heterogeneity in cognitive radio networks," Phys. Commun., vol. 2, pp. 127-137, 2009.
[34]
M. Martínez-Rach, O. López, P. Pinol, M. Malumbres, J. Oliver, and C. Calafate, "Quality assessment metrics vs. PSNR under packet loss scenarios in MANET wireless networks," in Proc. ACM MV, 2007, pp. 31-36.
[35]
P. Maymounkov, "Online codes," New York University, New York, NY, 2002.
[36]
M. Mitzenmacher, "On the theory and practice of data recovery with multiple versions," in Proc. IEEE ISIT, 2006, pp. 982-986.
[37]
E. Newcombe and S. Pasupathy, "Error rate monitoring for digital communications," Proc. IEEE, vol. 70, no. 8, pp. 805-828, Aug. 1982.
[38]
B. Raman and K. Chebrolu, "Experiences in using WiFi for rural Internet in India," IEEE Commun. Magazine, vol. 45, no. 1, pp. 104-110, Jan. 2007.
[39]
P. Roshan and J. Leary, 802.11 Wireless LAN Fundamentals. San Jose, CA: Cisco Press, 2003.
[40]
D. Salomon, Data Compression: The Complete Reference. New York: Springer, 2007.
[41]
Y. Shan, S. Yi, S. Kalyanaraman, and J. Woods, "Two-stage FEC scheme for scalable video transmission over wireless networks," presented at the SPIE Multimedia Syst. Appl. VIII, 2005.
[42]
A. Shokrollahi, "Raptor codes," IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2551-2567, Jun. 2006.
[43]
A. Singh, A. Konrad, and A. Joseph, "Performance evaluation of UDP lite for cellular video," in Proc. NOSSDAV, 2001, pp. 117-124.
[44]
S. Takamura, "LDPC code implementation v0.2," Feb. 2008 {Online}. Available: http://ivms.stanford.edu/~varodayan/multilevel/index.html
[45]
K. Tan, J. Zhang, J. Fang, H. Liu, Y. Ye, S. Wang, Y. Zhang, H. Wu, W. Wang, and G. M. Voelker, "Sora: High performance software radio using general purpose multi-core processors," in Proc. NSDI, 2009, pp. 75-90.
[46]
M. Vutukuru, H. Balakrishnan, and K. Jamieson, "Cross-layer wireless bit rate adaptation," in Proc. ACM SIGCOMM, 2009, pp. 3-14.
[47]
M. Vutukuru, K. Jamieson, and H. Balakrishnan, "Harnessing exposed terminals in wireless networks," in Proc. NSDI, 2008, pp. 59-72.
[48]
Y. Wang and Q. Zhu, "Error control and concealment for video communication: A review," Proc. IEEE, vol. 86, no. 5, pp. 974-997, May 1998.
[49]
S. Wong, H. Yang, S. Lu, and V. Bharghavan, "Robust rate adaptation for 802.11 wireless networks," in Proc. ACM MobiCom, 2006, pp. 146-157.
[50]
H. Yu, "Secure and highly-available aggregation queries in large-scale sensor networks via set sampling," in Proc. IPSN, 2009, pp. 1-12.
[51]
J. Zhang, K. Tan, J. Zhao, H. Wu, and Y. Zhang, "A practical SNR-guided rate adaptation," in Proc. IEEE INFOCOM, 2008, pp. 2083-2091.

Cited By

View all
  • (2018)RFID Counting over Time-Varying ChannelsIEEE INFOCOM 2018 - IEEE Conference on Computer Communications10.1109/INFOCOM.2018.8485987(1142-1150)Online publication date: 16-Apr-2018
  • (2017)Embracing Corruption Burstiness: Fast Error Recovery for ZigBee under Wi-Fi InterferenceIEEE Transactions on Mobile Computing10.1109/TMC.2016.263069616:9(2518-2530)Online publication date: 1-Sep-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE/ACM Transactions on Networking
IEEE/ACM Transactions on Networking  Volume 20, Issue 1
February 2012
318 pages

Publisher

IEEE Press

Publication History

Published: 01 February 2012
Accepted: 28 April 2011
Revised: 14 April 2011
Received: 20 October 2010
Published in TON Volume 20, Issue 1

Author Tags

  1. bit error rate (BER)
  2. error correcting coding
  3. error estimating coding (EEC)
  4. forward error correction
  5. partial packet
  6. partially correct packet

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)RFID Counting over Time-Varying ChannelsIEEE INFOCOM 2018 - IEEE Conference on Computer Communications10.1109/INFOCOM.2018.8485987(1142-1150)Online publication date: 16-Apr-2018
  • (2017)Embracing Corruption Burstiness: Fast Error Recovery for ZigBee under Wi-Fi InterferenceIEEE Transactions on Mobile Computing10.1109/TMC.2016.263069616:9(2518-2530)Online publication date: 1-Sep-2017

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media