Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ali ParandehGheibi is active.

Publication


Featured researches published by Ali ParandehGheibi.


IEEE Journal on Selected Areas in Communications | 2011

Avoiding Interruptions — A QoE Reliability Function for Streaming Media Applications

Ali ParandehGheibi; Muriel Médard; Asuman E. Ozdaglar; Srinivas Shakkottai

We take an analytical approach to study fundamental rate-delay-reliability trade-offs in the context of media streaming. We consider the probability of interruption in media playback (buffer underflow) as well as the number of initially buffered packets (initial waiting time) as the Quality of user Experience (QoE) metrics. We characterize the optimal trade-off between these metrics as a function of system parameters such as the packet arrival rate and file size, for different channel models. In the first model, we assume packets arrive according to independent Poisson processes from multiple servers or peers. We use random linear network coding to simplify the packet requests at the network layer and avoid duplicate packet reception. This allows us to model the receivers buffer as a queue with Poisson arrivals and deterministic departures. For this model, we show that for arrival rates slightly larger than the play rate, the minimum initial buffering required to achieve certain level of interruption probability remains bounded as the file size grows. This is not the case when the arrival rate and the play rate match. In the second model, we consider channels with memory, which can be modeled using Markovian arrival processes. We characterize the optimal trade-off curves for the infinite file size case, in such Markovian environments.


foundations of mobile computing | 2011

MAC design for analog network coding

Majid Khabbazian; Fabian Kuhn; Nancy A. Lynch; Muriel Médard; Ali ParandehGheibi

Most medium access control (MAC) mechanisms discard collided packets and consider interference harmful. Recent work on Analog Network Coding (ANC) suggests a different approach, in which multiple interfering transmissions are strategically scheduled. Receiving nodes collect the results of collisions and then use a decoding process, such as ZigZag decoding, to extract the packets involved in the collisions. In this paper, we present an algebraic representation of collisions and describe a general approach to recovering collisions using ANC. To study the effects of using ANC on the performance of MAC layers, we develop an ANC-based MAC algorithm, CMAC, and analyze its performance in terms of probabilistic latency guarantees for local packet delivery. Specifically, we prove that CMAC implements an abstract MAC layer service, as defined in [14, 13]. This study shows that ANC can significantly improve the performance of the abstract MAC layer service compared to conventional probabilistic transmission approaches. We illustrate how this improvement in the MAC layer can translate into faster higher-level algorithms, by analyzing the time complexity of a multi-message network-wide broadcast algorithm that uses CMAC.


arXiv: Information Theory | 2010

Collision Helps - Algebraic Collision Recovery for Wireless Erasure Networks

Ali ParandehGheibi; Jay Kumar Sundararajan; Muriel Médard

Current medium access control mechanisms are based on collision avoidance and collided packets are discarded. The recent work on ZigZag decoding departs from this approach by recovering the original packets from multiple collisions. In this paper, we present an algebraic representation of collisions which allows us to view each collision as a linear combination of the original packets. The transmitted, colliding packets may themselves be a coded version of the original packets. We propose a new acknowledgment (ACK) mechanism for collisions based on the idea that if a set of packets collide, the receiver can afford to ACK exactly one of them and still decode all the packets eventually. We analytically compare delay performance of such collision recovery schemes with other collision avoidance approaches in the context of a single hop wireless erasure network. From the delay perspective, our scheme, without any coordination, outperforms not only ALOHA-type random access mechanisms, but also centralized scheduling.


international symposium on information theory | 2010

Avoiding interruptions - QoE trade-offs in block-coded streaming media applications

Ali ParandehGheibi; Muriel Médard; Srinivas Shakkottai; Asuman E. Ozdaglar

We take an analytical approach to study Quality of user Experience (QoE) for media streaming applications. We use the fact that random linear network coding applied to blocks of video frames can significantly simplify the packet requests at the network layer and avoid duplicate packet reception. We model the receivers buffer as a queue with Poisson arrivals and deterministic departures. We consider the probability of interruption in video playback (buffer underflow) as well as the number of initially buffered packets (initial waiting time) as the QoE metrics. We explicitly characterize the optimal trade-off between these metrics by providing upper and lower bounds on the minimum initial buffering required to achieve certain level of interruption probability for different regimes of the system parameters. Our bounds are asymptotically tight as the file size goes to infinity. Further, we show that for arrival rates slightly larger than the play rate, the minimum initial buffering remains bounded as the file size grows. This is not the case when the arrival rate and the play rate match.


international conference on communications | 2014

Congestion control for coded transport layers

MinJi Kim; Jason Cloud; Ali ParandehGheibi; Leonardo Urbina; Kerim Fouli; Douglas J. Leith; Muriel Médard

The application of congestion control can have a significant detriment to the quality of service experienced at higher layers, especially under high packet loss rates. The effects of throughput loss due to the congestion control misinterpreting packet losses in poor channels is further compounded for applications such as HTTP and video leading to a significant decrease in the users quality of service. Therefore, we consider the application of congestion control to transport layer packet streams that use error-correction coding in order to recover from packet losses. We introduce a modified AIMD approach, develop an approximate mathematic model suited to performance analysis, and present extensive experimental measurements in both the lab and the “wild” to evaluate performance. Our measurements highlight the potential for remarkable performance gains, in terms of throughput and upper layer quality of service, when using coded transports.


IEEE Transactions on Information Theory | 2010

On Resource Allocation in Fading Multiple-Access Channels–An Efficient Approximate Projection Approach

Ali ParandehGheibi; Atilla Eryilmaz; Asuman E. Ozdaglar; Muriel Médard

In this paper, we consider the problem of rate and power allocation in a multiple-access channel (MAC). Our objective is to obtain rate and power allocation policies that maximize a general concave utility function of average transmission rates on the information-theoretic capacity region of the MAC without using queue-length information. First, we address the utility maximization problem in a nonfading channel and present a gradient projection algorithm with approximate projections. By exploiting the polymatroid structure of the capacity region, we show that the approximate projection can be implemented in time polynomial in the number of users. Second, we present optimal rate and power allocation policies in a fading channel where channel statistics are known. For the case that channel statistics are unknown and the transmission power is fixed, we propose a greedy rate allocation policy and characterize the performance difference of this policy and the optimal policy in terms of channel variations and structure of the utility function. The numerical results demonstrate superior convergence rate performance for the greedy policy compared to queue-length-based policies. In order to reduce the computational complexity of the greedy policy, we present approximate rate allocation policies which track the greedy policy within a certain neighborhood.


personal, indoor and mobile radio communications | 2008

Information theory vs. queueing theory for resource allocation in multiple access channels

Ali ParandehGheibi; Muriel Médard; Asuman E. Ozdaglar; Atilla Eryilmaz

We consider the problem of rate allocation in a fading Gaussian multiple-access channel with fixed transmission powers. The goal is to maximize a general concave utility function of the expected achieved rates of the users. There are different approaches to this problem in the literature. From an information theoretic point of view, rates are allocated only by using the channel state information. The queueing theory approach utilizes the global queue-length information for rate allocation to guarantee throughput optimality as well as maximizing a utility function of the rates. In this work, we make a connection between these two approaches by showing that the information theoretic capacity region of a multiple-access channel and its stability region are equivalent. Moreover, our numerical results show that a simple greedy policy which does not use the queue-length information can outperform queue-length based policies in terms of convergence rate and fairness.


information theory and applications | 2008

Dynamic rate allocation in fading multiple access channels

Ali ParandehGheibi; Atilla Eryilmaz; Asuman E. Ozdaglar; Muriel Médard

We consider the problem of rate allocation in a fading Gaussian multiple-access channel (MAC) with fixed transmission powers. Our goal is to maximize a general concave utility function of transmission rates over the throughput capacity region. In contrast to earlier works in this context that propose solutions where a potentially complex optimization problem must be solved in every decision instant, we propose a low-complexity approximate rate allocation policy and analyze the effect of temporal channel variations on its utility performance. To the best of our knowledge, this is the first work that studies the tracking capabilities of an approximate rate allocation scheme under fading channel conditions. We build on an earlier work to present a new rate allocation policy for a fading MAC that implements a low-complexity approximate gradient projection iteration for each channel measurement, and explicitly characterize the effect of the speed of temporal channel variations on the tracking neighborhood of our policy. We further improve our results by proposing an alternative rate allocation policy for which tighter bounds on the size of the tracking neighborhood are derived. These proposed rate allocation policies are computationally efficient in our setting since they implement a single gradient projection iteration per channel measurement and each such iteration relies on approximate projections which has polynomial-complexity in the number of users.


asilomar conference on signals, systems and computers | 2007

Resource Allocation in Multiple Access Channels

Ali ParandehGheibi; Atilla Eryilmaz; Asuman E. Ozdaglar; Muriel Médard

We consider the problem of rate allocation in a Gaussian multiple-access channel, with the goal of maximizing a utility function over transmission rates. In contrast to the literature which focuses on linear utility functions, we study general concave utility functions. We present a gradient projection algorithm for this problem. Since the constraint set of the problem is described by exponentially many constraints, methods that use exact projections are computationally intractable. Therefore, we develop a new method that uses approximate projections. We use the polymatroid structure of the capacity region to show that the approximate projection can be implemented by a recursive algorithm in time polynomial in the number of users. We further propose another algorithm for implementing the approximate projections using rate-splitting and show improved bounds on its convergence time.


advances in computing and communications | 2012

The reliability value of storage in a volatile environment

Ali ParandehGheibi; Mardavij Roozbehani; Asuman E. Ozdaglar; Munther A. Dahleh

This paper examines the value of storage in securing reliability of a system with uncertain supply and demand, and supply friction. The storage is frictionless as a supply source, but it cannot be filled up instantaneously. The focus is on application to an energy network in which the nominal supply and demand are assumed to match perfectly, while deviations from the nominal values are modeled as random shocks with stochastic arrivals. Due to friction, the random shocks cannot be tracked by the main supply sources. Storage, when available, can be used to compensate, fully or partially, for the surge in demand or sudden drop in supply. The problem of optimal utilization of storage with the objective of maximizing system reliability is formulated as minimization of the expected discounted cost of blackouts over an infinite horizon. It is shown that when the stage cost is linear in the size of the blackout, the optimal policy is myopic in the sense that all shocks will be compensated by storage up to the available level of storage. However, when the stage cost is strictly convex, it may be optimal to curtail some of the demand and allow a small blackout in the interest of maintaining a higher level of reserve, which may help avoid a large blackout in the future. The value of storage capacity in improving reliability, as well as the effects of the associated optimal policies under different stage costs on the probability distribution of blackouts are examined.

Collaboration


Dive into the Ali ParandehGheibi's collaboration.

Top Co-Authors

Avatar

Muriel Médard

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Asuman E. Ozdaglar

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

MinJi Kim

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kerim Fouli

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Leonardo Urbina

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Daron Acemoglu

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Jason Cloud

Massachusetts Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge