MURI ADCN Workshop John Doyle, Steven Low EAS, Caltech OSU, Columbus September 9, 2009 Post-docs Lijun Chen Krister Jacobsson Chee-Wei Tan Grad students.

Slides:



Advertisements
Similar presentations
Cross-layer Design in Wireless Mesh Networks Hu Wenjie Computer Network and Protocol Testing Laboratory, Dept. of Computer Science & Technology, Tsinghua.
Advertisements

Distributed Rate Assignments for Broadband CDMA Networks Tara Javidi Electrical & Computer Engineering University of California, San Diego.
Equilibrium of Heterogeneous Protocols Steven Low CS, EE netlab.CALTECH.edu with A. Tang, J. Wang, Clatech M. Chiang, Princeton.
All hat, no answers Some issues related to the evaluation of architecture John Wroclawski USC/ISI NSF FIA Meeting March 19, 2013.
1 Integrity Service Excellence Complex Information Systems 19 Mar 13 Robert J. Bonneau, Ph.D. AFOSR/RTC.
Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
Energy-Efficient Congestion Control Opportunistically reduce link capacity to save energy Lingwen Gan 1, Anwar Walid 2, Steven Low 1 1 Caltech, 2 Bell.
Internet Protocols Steven Low CS/EE netlab.CALTECH.edu October 2004 with J. Doyle, L. Li, A. Tang, J. Wang.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Dynamic Data Compression in Multi-hop Wireless Networks Abhishek B. Sharma (USC) Collaborators: Leana Golubchik Ramesh Govindan Michael J. Neely.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Stochastic Network Optimization with Non-Convex Utilities and Costs Michael J. Neely University of Southern California
Javad Lavaei Department of Electrical Engineering Columbia University Various Techniques for Nonlinear Energy-Related Optimizations.
Javad Lavaei Department of Electrical Engineering Columbia University Graph-Theoretic Algorithm for Nonlinear Power Optimization Problems.
Distributed Algorithms for Secure Multipath Routing
Can Congestion Control and Traffic Engineering be at Odds? Jiayue He, Mung Chiang, Jennifer Rexford Princeton University November 30 th, 2006.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Dynamic Spectrum Management: Optimization, game and equilibrium Tom Luo (Yinyu Ye) December 18, WINE 2008.
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
Rethinking Traffic Management: Using Optimization Decomposition to Derive New Architectures Jennifer Rexford Princeton University Jiayue He, Ma’ayan Bresler,
Cross Layer Design in Wireless Networks Andrea Goldsmith Stanford University Crosslayer Design Panel ICC May 14, 2003.
ADCN MURI Tools for the Analysis and Design of Complex Multi-Scale Networks Review September 9, 2009 Protocols for Wireless Networks Libin Jiang, Jiwoong.
Heterogeneous Congestion Control Protocols Steven Low CS, EE netlab.CALTECH.edu with A. Tang, J. Wang, D. Wei, Caltech M. Chiang, Princeton.
1 Introduction to Load Balancing: l Definition of Distributed systems. Collection of independent loosely coupled computing resources. l Load Balancing.
CS541 Advanced Networking 1 Cognitive Radio Networks Neil Tang 1/28/2009.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
Rethinking Internet Traffic Management: From Multiple Decompositions to a Practical Protocol Jiayue He Princeton University Joint work with Martin Suchara,
Combining Multipath Routing and Congestion Control for Robustness Peter Key.
Design and Stability of Load-side Frequency Control
1 Optimization and Stochastic Control of MANETs Asu Ozdaglar Electrical Engineering and Computer Science Massachusetts Institute of Technology CBMANET.
Multipath Protocol for Delay-Sensitive Traffic Jennifer Rexford Princeton University Joint work with Umar Javed, Martin Suchara, and Jiayue He
Rethinking Internet Traffic Management Using Optimization Theory Jennifer Rexford Princeton University Joint work with Jiayue He, Martin Suchara, Ma’ayan.
Javad Lavaei Department of Electrical Engineering Columbia University Optimization over Graph with Application to Power Systems.
EE360: Lecture 17 Outline Cross-Layer Design
By: Gang Zhou Computer Science Department University of Virginia 1 A Game-Theoretic Framework for Congestion Control in General Topology Networks SYS793.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
NSF Workshop on Bridging the Gap between Networking and Physical Layer Research Breakout Group #2 Reston, VA Aug 27-28, 2007.
Jason Ernst and Mieso Denko
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
A Distributed Framework for Correlated Data Gathering in Sensor Networks Kevin Yuen, Ben Liang, Baochun Li IEEE Transactions on Vehicular Technology 2008.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Congestion Control in CSMA-Based Networks with Inconsistent Channel State V. Gambiroza and E. Knightly Rice Networks Group
Covilhã, 30 June Atílio Gameiro Page 1 The information in this document is provided as is and no guarantee or warranty is given that the information is.
EE 685 presentation Utility-Optimal Random-Access Control By Jang-Won Lee, Mung Chiang and A. Robert Calderbank.
Acknowledgments S. Athuraliya, D. Lapsley, V. Li, Q. Yin (UMelb) S. Adlakha (UCLA), J. Doyle (Caltech), K. Kim (SNU/Caltech), F. Paganini (UCLA), J. Wang.
Michael J. Neely, University of Southern California CISS, Princeton University, March 2012 Asynchronous Scheduling for.
Javad Lavaei Department of Electrical Engineering Columbia University Joint work with Somayeh Sojoudi and Ramtin Madani An Efficient Computational Method.
Javad Lavaei Department of Electrical Engineering Columbia University Convex Relaxation for Polynomial Optimization: Application to Power Systems and Decentralized.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, and Mung.
Super-Fast Delay Tradeoffs for Utility Optimal Scheduling in Wireless Networks Michael J. Neely University of Southern California
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
MAIN RESULT: Depending on path loss and the scaling of area relative to number of nodes, a novel hybrid scheme is required to achieve capacity, where multihop.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Fairness and Optimal Stochastic Control for Heterogeneous Networks Time-Varying Channels     U n (c) (t) R n (c) (t) n (c) sensor.
Illinois Center for Wireless Systems Wireless Networks: Algorithms and Optimization R. Srikant ECE/CSL.
Scalable Laws for Stable Network Congestion Control Fernando Paganini UCLA Electrical Engineering IPAM Workshop, March Collaborators: Steven Low,
Stochastic Optimization for Markov Modulated Networks with Application to Delay Constrained Wireless Scheduling Michael J. Neely University of Southern.
Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California
NSF Workshop on Bridging Gap Between Wireless Networking Technologies and Advances in Physical Layer Breakout Session 3.
Optimization-based Cross-Layer Design in Networked Control Systems Jia Bai, Emeka P. Eyisi Yuan Xue and Xenofon D. Koutsoukos.
Delay Efficient Wireless Networking
Cross layer design is wireless multi-hop network
Distributed Network Utility Maximization in Multi-hop Wireless Networks: Noisy Feedback, Lossy Channel and Stability Junshan Zhang Department of Electrical.
論文進度報告 蔡永斌 Tsai, Yung-Pin
Yiannis Andreopoulos et al. IEEE JSAC’06 November 2006
Hemant Kr Rath1, Anirudha Sahoo2, Abhay Karandikar1
Javad Ghaderi, Tianxiong Ji and R. Srikant
ACHIEVEMENT DESCRIPTION
Presentation transcript:

MURI ADCN Workshop John Doyle, Steven Low EAS, Caltech OSU, Columbus September 9, 2009 Post-docs Lijun Chen Krister Jacobsson Chee-Wei Tan Grad students Javad Lavaei JK Nair Somayeh Sojoudi Undergrad/Staff Martin Andreasson Tom Quetchenbach

Outline  File fragmentation to mitigate heavy- tailed delay (Low)  Network arch theory (Doyle)  Nonconvex power control in ad hoc wireless networks (Tan)

File fragmentation: summary  Motivation: how to mitigate heavy tail? Recent work showed file transfer time can be heavy-tailed even if file size is light-tailed (Fiorini, Sheahan, & Lipsky, 2005; Jelenkovic & Tan 2007; etc.)  Model  Results Independent or bounded fragmentation preserves light-tailedness Constant fragmentation min expected delay Asymptotically optimal design: blind fragmentation Optimal or blind fragmentation preserves tail index

Model  Given file of random size L  L is fragmented into K packets for transmission at unit rate  n -th transmission of size  n -th transmission is successful if where are iid with distribution F file fragment constant overhead

Model remaining file size at time n+1 fragment size at n per-packet overhead iid random var of distr F

Model per-stage cost: total cost:

Prior work Theorem [ Fiorini, Sheahan, & Lipsky, 2005; Jelenkovic & Tan 2007] Without fragmentation T(L) has heavy tail even when L is light-tailed, provided F has unbounded support

Prior work Theorem [ Fiorini, Sheahan, & Lipsky, 2005; Jelenkovic & Tan 2007] Without fragmentation T(L) has heavy tail even when L is light-tailed, provided F has unbounded support Implication: Heavy tail can originate from protocol interaction alone! Motivation: How to mitigate?

Prior work Theorem [ Jelenkovic & Tan 2008] If fragment size = largest of k previous T(L) still has (lighter) heavy tail with first k moments

Prior work Intuition: HT is created by repeated comparison of a sequence of iid rv’s with the same rv L with unbounded support Avoid such fragmentation policies

Two fragmentation policies independent fragmentation: bounded fragmentation:

Result: LT-preserving frag independent fragmentation: bounded fragmentation: Theorem With independent frag or bounded frag: T(L) is light-tailed provided L is light-tailed Then, heavy-tailed delay originates only from heavy-tailed files

What is optimal fragmentation? Dynamic programming formulation optimal fragmentation:

Per-bit cost per-bit cost: x g(x) a Key assumption : is non-decreasing Intuition: a minimizes per-bit cost; Optimal fragment size close to a ?

Result: optimal fragmentation Theorem Constant fragmentation is uniquely optimal Optimal #fragments: K*(L) = Optimal fragment size: x*(L) = L/K*(L) per-bit cost:

Simpler fragmentation Optimal fragmentation requires knowledge of L, in addition to failure distr F Want: blind fragmentation that only requires F optimal frag:

Result: blind fragmentation Theorem for all L Blind fragmentation is asymptotically optimal blind fragmentation: expected total cost:

Result: robustness Theorem What happen if the optimal or blind policy is designed wrt failure distribution G when the actual distribution is F ? Optimal cost under F : Optimal cost under G : Blind cost under G :

Result: tail distribution of T(L) Definition G is regularly varying(RV) with index >0 if where is a slowly varying function

Result: tail distribution of T(L) Theorem If L light-tailed, so is T(L) If L RV() (heavy-tailed), so is T(L) optimal frag: blind frag:

Result: tail distribution of T(L) Theorem If L light-tailed, so is T(L) If L RV() (heavy-tailed), so is T(L) Optimal or blind policy preserves the index of tail distribution

Summary  Independent or bounded fragmentation preserves light-tailedness  Under IFR, optimal fragmentation is unique and constant  Blind fragmentation is asymptotically optimal  Optimal or blind fragmentation preserves tail index

Outline  File fragmentation to mitigate heavy- tailed delay (Low)  Network arch theory (Doyle)  Nonconvex power control in ad hoc wireless networks (Tan)

Network arch theory  Key elements of network architecture Robust yet fragile Layering as optimization decomposition/distributed IPC Constraints that deconstrain (Gerhart & Kirschner) Resources Deconstrained Applications Deconstrained Constraints that deconstrain

Status: very early stage  To better understand layering From familiar: congestion control optimization To: optimal dynamics, wireless, network coding Layering as recursive control: physical layer antenna design  To better understand constraints Energy constraint Constraints from optimal tradeoffs  Still working on component problems, but optimistic they will point to a general theory

Each layer is abstracted as an optimization problem Operation of a layer is a distributed solution Results of one problem (layer) are parameters of others Operate at different timescales Layering as optimization decomposition Application: utility IP: routing Link: scheduling Phy: power IP TCP/AQM Physical Application Link/MAC

Layering as optimization decomposition r Networkgeneralized NUM r Layerssub-problems r Interfacefunctions of primal/dual variables r Layeringdecomposition methods Vertical decomposition: into functional modules of different layers Horizontal decomposition: into distributed computation and control IP TCP/AQM Physical Application Link/MAC

Examples application transport network link physical Optimal web layer: Zhu, Yu, Doyle ’01 HTTP/TCP: Chang, Liu ’04 TCP: Kelly, Maulloo, Tan ’98, …… TCP/IP: Wang et al ’05, …… TCP/power control: Xiao et al ’01, Chiang ’04, …… TCP/MAC: Chen et al ’05, …… Rate control/routing/scheduling: Eryilmax et al ’05, Lin et al ’05, Neely, et al ’05, Stolyar ’05, Chen et al ‘06 detailed survey in Proc. of IEEE, 2006

Example: Cross-layer congestion/routing/scheduling design Rate controlScheduling Routing Rate constraint Schedulability constraint

Cross-layer implementation  Rate control:  Routing: solved with rate control or scheduling  Scheduling: Network Transport Physical Application Link/MAC A Wi-Fi implementation by Warrier, Le and Rhee shows significantly better performance than the current system. Rate controlScheduling Routing

Recent generalizations r Optimal control  Lavaei, Doyle and Low, CDC, 2009 r Robust control  Jacobsson, Andrew and Tang, CDC, 2009  Jacobsson, Andrew, Tang, Low and Hjalmarsson, TAC, March 2009 r Game theory  Chen, Cui and Low. JSAC, September  Chen, Low and Doyle, ToN, submitted r Network coding  Chen, Ho, Chiang, Low and Doyle. T-IT, submitted

Recent generalizations r Optimal control  Lavaei, Doyle and Low, CDC, 2009 r Robust control  Jacobsson, Andrew and Tang, CDC, 2009  Jacobsson, Andrew, Tang, Low and Hjalmarsson, TAC, March 2009 r Game theory  Chen, Cui and Low. JSAC, September  Chen, Low and Doyle, ToN, submitted r Network coding  Chen, Ho, Chiang, Low and Doyle. T-IT, submitted

Resources Deconstrained Applications Deconstrained From optimization to optimal control

router TCPAQM my PC source algorithm (TCP) iterates on rates link algorithm (AQM) iterates on prices Primal: Dual horizontal decomposition Static optimization: dual algorithm

Controller is fully decentralized Globally stable to optimal equilibrium Generalizations to delays, other controllers

Implications Views TCP as solving an optimization problem Clarifies tradeoff at equilibrium Generalizes to other strategies, other layers Framework for cross layering But are the dynamics optimal?

State weight Control weight dynamics IQ penalty on deviation from equilibrium Balance state versus control penalty What is this controller optimal for?

Other implications Elegant proofs of stability Clarifies the tradeoff in dynamics Insights about joint congestion control and routing Can derive more general control laws

Where we are going

Layering: Rethinking fundamentals Distributed IPC (Inter-process comms/controls) –Book: John Day, Patterns in network architecture –Generalizes OS as IPC to networks –Natural fit with optimization framework –Layering/Control recurses, with changes in scope Compatible with “platform-based design” (A. S-V) –Recursive design from applications to silicon? –Optimization/decomposition –Illustrate with wireless circuit design Emphasis continues on central challenges –Wireless –Mobility –Real time

application Physical From layering as DIPC to platform-based design Recursive design process From applications to silicon Optimization/decomposition Illustrate with antennae design Recursion Scope Physical Circuit Logical Instructions Next steps

Transistors operating at wavelengths << chip dimensions Forcing (facilitating) integrated E&M, circuits, and systems. Design difficult but also truly novel systems/capabilities New and elegant solution for the large-scale radiating circuit problems where the conventional circuit assumptions are no longer valid (Lavaie, Babakhani, Hajimiri, Doyle) Application to diverse wireless communication problems Unifying theme: Layering as optimization Duality and convexity

Heterogeneous applications ubiquitous at every scale mobility/wireless real-time/sense/control exploding complexity and diversity Unifying theme: Layering as optimization Duality and convexity

Outline  File fragmentation to mitigate heavy- tailed delay (Low)  Network arch theory (Doyle)  Nonconvex power control in ad hoc wireless networks (Tan)

Nonconvex Power Control in Ad Hoc Wireless Networks Chee Wei Tan Caltech Joint Work with Mung Chiang (Princeton) & R. Srikant (UIUC) 45

Motivation Objective: Performance Optimization in Multi-hop Ad-hoc Wireless Networks Questions: –What are the important performance objectives in wireless network? –Are there fast algorithms that optimize the performance objectives? –How to extend the solution to optimize power and beamformer jointly? 46

Ad Hoc Wireless Networks 47 Data communication, low power constraint, low complexity signal sets, multiuser interference

Wireless Network Model Wireless Ad-hoc Network Model : 48

Throughput Maximization Total power constraint Individual power constraint Vector w as queue length 49

Geometrical Illustration 50 University of Illinois at Urbana-Champaign

Two Related Problems 51 Constraints: Individual or total power

Power Control Algorithms 52 Goal: Fast algorithms under –Weighted Sum Rate maximization –Weighted Max-min SIR –Weighted Sum MSE minimization –Why? Time-varying network conditions, i.e., optimization problem parameters change –Users come and go –Queues of each user change continuously –Due to mobility of users in network –Time-varying fading channel condition

Max-min SIR 53 Interpretation: SIR threshold

Max-min SIR Why? - Can express our iterative algorithm as Result follows from Blondel, Nivone, Van Dooren (2005), a special case of nonlinear Perron- Frobenius theoy 54 Main result: converges geometrically fast to right eigenvector of where where is a nonnegative matrix and is a nonnegative vector.

Weighted Sum MSE 55

Weighted Sum MSE The problem can be written as For a nonnegative matrix where Condition: (either low-medium SNR regime or low interference regime) Derive using Friedland-Karlin inequalities in nonnegative matrix theory 56

Key Ideas Previous approaches: Using geometric programming technique and subgradient technique –Parameter tuning (step-size) –Slow convergence Our approach: –Geometric programming change-of-variable –Show that KKT optimality conditions can be obtained using a fixed-point approach 57

Weighted Sum MSE: Algorithm 58

Weighted Sum MSE Why use this algorithm? –Geometrically fast convergence –No step-size tuning required 59 Proof outline: – z = I (z) –Under conditions on I(.), convergence is geometric, results followed from Yates (1995) –Our MSE algorithm can be shown to satisfy these conditions

Weighted Sum Rate 60

Weighted Sum Rate The problem can be written as For a nonnegative matrix where Same idea as Weighted Sum MSE problem KKT optimality conditions can be obtained using a fixed-point approach 61

Weighted Sum Rate: Algorithm 62

In general, Max-min SIR not the same as Weighted Sum Rate 63 Connection between Weighted Sum Rate & Weighted Max-min SIR User 1 rate User 2 rate Vector w (queue size)

In general, Max-min SIR not the same as Weighted Sum Rate 64 Connection between Weighted Sum Rate & Weighted Max-min SIR Vector w (queue size) User 1 rate User 2 rate

Connection between Weighted Sum Rate & Weighted Max-min SIR 65

Extensions So far work for ad hoc networks or single-antenna power controlled networks For MIMO networks, need to optimize beamformers Initial work: Access-point controlled network 66

Downlink Transmit Beamformer Optimize power and transmit beamformer for all users Goal: Max-min SIR over power and beamformers 67 Transmit beamformer u1u1 u2u2 User 1 User 2 User 1 Receiver User 2 Receiver Power control

Uplink Receive Beamformer 68 Receive beamformer u1u1 u2u2 User 1 User 2 User 1 Transmitter User 2 Transmitter Power control Virtual uplink as auxiliary mechanism Our approach: Iterative solution is easier, reuses existing CDMA power control module and converges geometrically fast time Slot 1 (Downlink) Slot 2 (Uplink) Slot 3 (Downlink) ….