On Delay Performance Gains From Network Coding
On Delay Performance Gains From Network Coding
(Invited Paper)
Atilla Eryilmaz Asuman Ozdaglar and Muriel Médard
Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Department
Massachusetts Institute of Technology Massachusetts Institute of Technology
Cambridge, MA, 02139 Cambridge, MA, 02139
Email: [email protected] Email: {asuman, medard}@mit.edu
Abstract— This paper analyzes the gains in delay performance Side Information (CSI) about the state of receiver channels is
resulting from network coding. We consider a model of file available to the base station and when transmission must be
transmission to multiple receivers from a single base station. carried without such information.
Using this model, we show that gains in delay performance from
network coding with or without channel side information can Our analysis shows that, as well as the already well-
be substantial compared to conventional scheduling methods for understood capacity gains, network coding leads to significant
downlink transmission. improvement in delay performance both with and without CSI.
This is potentially important, since depending on the applica-
I. I NTRODUCTION tion, delay performance may be critical to the satisfaction of
With the introduction of third-generation cellular systems the users. Equivalently, with network coding more users can
over the last decade, there has been both a significant increase be supported with the same delay performance of scheduling.
in the capacity of wireless networks and a growing use of wire- Our paper differs from existing work in this area by ex-
less communication for data transmission. An essential feature plicitly modeling delay performance in file downloads and
of the newly emerging wireless networks is the transmission allowing for transmission without CSI, and to the best of our
of files to multiple (potentially heterogeneous) receivers, as knowledge, presents the first quantification of gains in delay
exemplified by transmission of video or music files. performance resulting from network coding. Previous research
While the most common approach to data transmission has instead focused on either optimal scheduling with time-
builds on the scheduling approach, where information is varying channel conditions (see [13, 14]), or on the capacity
transmitted to one of multiple receivers as a function of gains from network coding (see [11, 5, 6, 12, 10, 15]) under
their channel conditions, it has also been recognized that various different scenarios.
broadcasting to multiple receivers using network coding may The rest of the paper is organized as follows: Section II
be more efficient for utilizing the capacity of the network (c.f. describes the model for downloading (multiple) files to mul-
[1, 8, 7, 9]). Although these throughput gains may appear to tiple receivers and introduces different transmission strategies
imply gains in delay through Little’s law, this is not the case considered. Section III focuses on broadcasting a single file
since coding is performed over large blocks and each packet in and investigates the performance of network coding compared
the block must await the completion of the whole block before to the performance of delay optimal scheduling strategies. We
it can be decoded. Despite considerable practical interest in the show analytically and through simulations that using network
use of network coding in wireless communication systems, coding results in significant gains in delay performance relative
gains in delay performance resulting from network coding to delay optimal scheduling strategies both with or without
relative to traditional scheduling have not been analyzed or CSI. In Section IV, we focus on the multiple unicast scenario.
quantified. The best setting to investigate such gains is the We show that in the presence of CSI, network coding achieves
rateless transmission scenario, where data of fixed length is optimal performance when no coding is allowed across sep-
to be communicated over the channel. In this context, the arate files. Moreover, it provides considerable delay gains
comparison in delay performance between traditional schemes compared to scheduling when CSI is not available. This last
and network coding is performed through the completion times point of significant delay gains is particularly interesting given
of the whole data. that network coding does not provide any capacity gains for the
The objective of this paper is to develop a model to study single hop unicast scenario. We complete with final remarks
delays in file downloads with network coding and quantify the and ideas for future work in Section V.
gains resulting from network coding relative to the traditional
scheduling methods. We consider downlink transmission of II. S YSTEM MODEL
(multiple) files from a single base station to multiple receivers
with varying channel conditions. The varying channel con- In this work, we consider the cellular downlink scenario
ditions are modeled as stochastic changes in ON/OFF state where the base station holds a set of files, F. The set of
of the channel. We analyze the model both when Channel receivers is denoted by N . File f ∈ F is demanded by the
set Nf ⊆ N of receivers1 . We are interested in the minimum where af,k [t] ∈ Fq for each f ∈ F and k ∈ {1, · · · , Kf }. The
average time required to complete the download of all the files transmitter chooses the coefficients {af,k [t]} at every time slot
by all the interested receivers, where the transmissions have t. This mode of transmission will be referred to as the Coding
to be done over a time varying channel. We seek an answer Mode (or simply Coding) henceforth.
to this problem with and without the availability of CSI at Given the above model, we are interested in minimizing the
the base station and with and without the possibility of linear amount of time necessary for all the files to be transmitted to
coding in the manner we will describe. all the interested receivers. We will refer to this metric as the
A given file f ∈ F is composed of Kf packets, where completion time. In particular, we would like to find answers
Packet-k of file f is referred to as Pf,k , which is a vector2 of to the following questions:
length m over a finite field Fq . It is assumed that transmissions • If we restrict ourselves to scheduling policies, then what
occur in time slots, each of which is of duration just long is the policy that minimizes the average completion time?
enough to accommodate a single packet transmission. The • If coding is allowed, then what is the best policy and
channel between the base station and the ith receiver is a what is its delay performance?
randomly varying ON/OFF channel. We let Ci [t] ∈ {0, 1} • How do these two policies’ performances compare?
denote the state of user i’s channel in slot t. We assume that We seek answers to these questions under various scenarios.
Receiver-i successfully receives the packet transmitted at slot In Section III, we focus on the case of a single file demanded
t if Ci [t] = 1, and it cannot receive anything if Ci [t] = 0. by all the receivers (broadcast scenario). Then, in Section IV,
We will take each Ci [t] to be a Bernoulli random variable we will consider the other extreme of each receiver demanding
with mean ci that are independent across time and across a unique file (multiple unicasts scenario). We will discuss
receivers. The channels of different receivers can in general be extensions in Section V.
asymmetric. However, in parts of the subsequent analysis we III. B ROADCASTING A S INGLE F ILE
will restrict our attention to symmetric cases in order to have
In this section, we are concerned with the transmission of
tractable formulations. The presence of CSI implies that the
a single file to all the receivers. Since |F| = 1, we will drop
channel state vector, C[t], is known at the transmitter at the
the subscript f in our notation, and denote Packet-k as Pk
beginning of slot t. The system model is depicted in Figure 1.
and the size of the file as K. We will study the minimum
mean completion time of the file using coding in Section III-
A, where we will observe the asymptotic optimality of coding
P1,K
1
...P 1,2 P1,1
Receiver 1
over all possible strategies. Then, we will characterize the opti-
.. C1 [t]
mal scheduling strategy with and without CSI in Section III-B.
.
Comparison of the findings will be presented in Section III-C
Pf,K ...P f,2 Pf,1 Base C2 [t]
Receiver 2 along with a discussion on the strengths and weaknesses.
f
Station ..
File f (Kf packets) . A. Coding with and without CSI
.. C [t]
. N Receiver N It has been shown in the literature that linear coding is
PF,K
F
. . .P F,2
PF,1 sufficient to achieve the maximum achievable rate for multicast
networks [8]. Noticing that the broadcast scenario is a special
instance of a multicast transmission, we consider the set of
Fig. 1. System model policies where the transmitted packet in slot t is given by
XK
P[t] = ak [t]Pk , with ak [t] ∈ Fq for each k ∈ {1, · · · , K}.
Let us use P[t] denote the packet chosen for transmission
k=1
in slot t. If the base station is not allowed to code, then at We will consider the following randomized strategy (c.f. [4]).
any given slot it must transmit a single packet from one of R ANDOMIZED B ROADCAST C ODING (RBC):
{k=1,··· ,K }
the files. Thus, we have P[t] ∈ {Pf,k }{f ∈F } f . This is While (File is incomplete)
the typical mode of transmission considered in literature. We Pick ak [t] uniformly at random from Fq for each k;
P
will refer to this mode as the Scheduling Mode (or simply Transmit P[t] = K k=1 ak [t]Pk ,;
Scheduling). t ← t + 1;
If coding is allowed, then in a slot, say t, any linear Each receiver collects the incoming packets that they could
combination of the packets can be transmitted. Specifically, receive and then decodes all the packets {Pk }{k=1,··· ,K} when
we have K linearly independent combinations of them are received (c.f.
Kf
XX [4] and references therein). Random linear coding arguments
P[t] = af,k [t]Pk,f , imply that the expected number of slots before K linearly
f ∈F k=1 independent combinations can be collected with RBC is given
by
1 We will occasionally use F, N and N to denote the cardinalities of the
XK
f 1
sets F, N and Nf , respectively. .
2 We will consistently use boldface letters to denote vectors. (1 − (1/q)k )
k=1
This expression can be upper-bounded by Kq/(q−1), which in Pk before it is received by Receiver-i. Then,
turn can be made close to K even with reasonably low values © ª
of q. Thus, for all practical purposes, for a large enough field Y i , max KXki + k
k∈{1,··· ,K}
size q, it is sufficient for each receiver to be active K slots
gives the time slot when Receiver-i receives the whole file.
on average before it can decode the whole file. Notice that
Finally, T2 , max Y i gives the completion time of the
information theoretically it is impossible to send the file with i∈{1,··· ,N }
less than K transmissions, and so RBC asymptotically (in q) algorithm. Its mean is described in the next proposition.
achieves the best possible performance over all strategies.
Proposition 2. Under symmetric channel conditions (i.e. ci =
Another important issue is the overhead related with this
c ∈ (0, 1) for all i), we have
mode of transmission. Coding requires dK log2 qe bits of
∞ h
overhead to contain the coefficients of the associated linear E[T2 ] X ¡ ¢KN i
combination, whereas the packet size is dm log2 qe bits. Thus, =γ+ 1 − 1 − (1 − c)t ,
K t=1
for m >> K, the overhead is negligible. Henceforth, we will
consider this scenario, and ignore the overhead. for some γ ∈ (1/2, 1).
Notice that RBC is not only easy to implement, but also Proof: The upper bound of 1 for γ is due to the fact
requires no knowledge of the channel state vector, and as- that k ≤ K. The lower bound of 1/2 follows from stochastic
ymptotically achieves the smallest mean completion time over coupling arguments and heavily relies on the symmetry of
all policies. We will see in Section III-B that the optimal the channel distributions. In particular, consider a sample path
scheduling policy is much more difficult to characterize, even of the channel state process, ω , (C[1], C[2], · · · ). We use
for the symmetric channel conditions. i(ω) to denote the receiver that was the last to complete the
Next, we find the mean completion time expression for file, and k(ω) to denote the index number of the last packet
RBC. Let us define the random variable Yi as the number that Receiver-i(ω) received. With our earlier notation, Y (ω)
of slots before Receiver-i’s channel is ON K times, for gives the completion time of the file at Receiver-i(ω) under
i = 1, · · · , N. Then,
· we can claim
¸ that the mean completion the given sample path. Also, notice that we have Y (ω) =
i(ω) i(ω)
Xk(ω) (ω)K + k, for some integer Xk(ω) that depends on ω.
time is equal to E max Yi , which is given in the next
i∈{1,·,N } Next, for each sample path ω that leads to k(ω) ∈
proposition. {1, · · · , bK/2c}, we will construct another sample path ω̃
Proposition 1. Let T1 denote the completion time of the opti- that has the same probability of occurrence as ω, but leads
i(ω)
mal coding policy given above. Then, we have to Y (ω̃) = Xk(ω) (ω)K + (K − k(ω)). This implies that
" Ã t µ ¶ !#
X ∞ YN X τ −1 (K + 1)
E[T1 ] = K + 1−
(τ −K) K
c̄i ci , E[Y ] ≥ + KE[max Xki ]. (1)
K −1 2 i,k
t=K i=1 τ =K
0 1 The construction of ω̃ = (C̃[1], C̃[2], · · · ) follows the
where BB@ n CCA gives the number of combinations of size m of n following rule:
m i(ω)
elements, and c̄i , (1 − ci ). Cj [rK + (K − l)], if r = Xk(ω) (ω),
Proof: The proof follows from combinatorial arguments
C̃j [rK + l] = j = i(ω),
and is omitted due to space constraints.
l ∈ {k(ω), K − k(ω)},
Cj [rK + l], otherwise.
B. Scheduling Mode
In this mode, unlike in the coding mode, the presence or lack It is easy to see that under symmetric conditions this sample
of CSI affects the performance. Hence, these two cases will path has the properties listed above.
be studied separately. Throughout, we will assume symmetric Next, we would like to find the second term in (1). Due to
channels for tractability. i.i.d. assumptions, Xki are also i.i.d. with distribution P(Xki =
1) Scheduling without CSI: To minimize the load of uplink m) = (1 − c)m−1 c, m = 1, 2, · · · . Since this distribution is
transmission which is typically the bottleneck in cellular independent of i and k, we can compute
∞ h
systems, we assume that the transmitter receives feedback X ¡ ¢KN i
from each receiver only at the time when it has just received E[max Xki ] = 1 − 1 − (1 − c)t . (2)
i,k
the whole file. Notice that in this case, all packets have equal t=1
priority. Also, since the channels are independent and identi- The proof is complete once (2) is substituted into (1).
cally distributed (i.i.d.) over time and users, one of the optimal 2) Scheduling with CSI: Before we characterize the optimal
scheduling policies is Round Robin (RR), where Packet-k is scheduling rule with CSI, we demonstrate the suboptimality
transmitted in time slots (mK + k) for m = 0, 1, · · · until all of scheduling compared to coding with the following simple
the receivers get the file. example.
To compute the mean completion time of the above RR Example 1: Consider the case of K = 3 and N = 3,
scheduler, we define Xki to be the number of transmissions of i.e. three packets are to be broadcasted to three receivers.
Consider the channel realizations C[1] = (0, 1, 1), C[2] = M. Hence, we are interested in J ? ([1]N ×K ) where [a]N ×K
(1, 0, 1), C[3] = (1, 1, 0), and C[4] = (1, 1, 1). Thus, in the denotes the all a matrix of dimensions N × K.
first four slots, each receiver can hear the transmission three Before we write the recursion for J ? (M, C), let us define
times. The optimal scheduling rule would transmit P1 , P2 , P3 the function f (·) where M̂ = f (M, C, k) implies that
in the first three slots, leaving Receiver-i in demand for Packet-
i in the fourth slot. Clearly, no scheduling rule can ever com- M̂i,k = Mi,k − Mi,k Ci ∀i ∈ {1, · · · , N },
plete the file download at all three receivers in the fourth slot. M̂i,j = Mi,j ∀i ∈ {1, · · · , N }, j 6= k.
With coding, on the other hand, the following transmissions
will complete the transmissions: (P1 + P2 ), (P2 + P3 ), (P1 + This function describes the next state of the memory matrix
P3 ), (P1 + P2 + P3 ) (see Table I). It is not difficult to see given that Packet-k is served and the channel matrix is C in
that coding will never require more slots than is necessary for the current slot. Then, we can write the following recursion:
scheduling for all other realizations. Hence, we achieve strictly © ª
J ? (M, C) = arg min J ? (f (M, C, k)) + 1{M6=θ} ,
better completion times with coding. k∈{1,··· ,K}
E [T2] Upper bound In this section, we consider the scenario where N receivers
Mean Completion Time