EE 685 presentation Optimal Control of Wireless Networks with Finite Buffers By Long Bao Le, Eytan Modiano and Ness B. Shroff.

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks Gagan Raj Gupta Post-Doctoral Research Associate with the Parallel.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
How Bad is Selfish Routing? By Tim Roughgarden Eva Tardos Presented by Alex Kogan.
Short-Term Fairness and Long- Term QoS Lei Ying ECE dept, Iowa State University, Joint work with Bo Tan, UIUC and R. Srikant, UIUC.
Resource Allocation in Wireless Networks: Dynamics and Complexity R. Srikant Department of ECE and CSL University of Illinois at Urbana-Champaign.
DYNAMIC POWER ALLOCATION AND ROUTING FOR TIME-VARYING WIRELESS NETWORKS Michael J. Neely, Eytan Modiano and Charles E.Rohrs Presented by Ruogu Li Department.
Intelligent Packet Dropping for Optimal Energy-Delay Tradeoffs for Wireless Michael J. Neely University of Southern California
Chapter 4: Network Layer
Universal Scheduling for Networks with Arbitrary Traffic, Channels, and Mobility Michael J. Neely, University of Southern California Proc. IEEE Conf. on.
Worst-case Fair Weighted Fair Queueing (WF²Q) by Jon C.R. Bennett & Hui Zhang Presented by Vitali Greenberg.
CS541 Advanced Networking 1 Spectrum Sharing in Cognitive Radio Networks Neil Tang 3/23/2009.
1 Ecole Polytechnque, Nov 7, 2007 Scheduling Unit Jobs to Maximize Throughput Jobs:  all have processing time (length) = 1  release time r j  deadline.
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
ADCN MURI Tools for the Analysis and Design of Complex Multi-Scale Networks Review September 9, 2009 Protocols for Wireless Networks Libin Jiang, Jiwoong.
Cross Layer Adaptive Control for Wireless Mesh Networks (and a theory of instantaneous capacity regions) Michael J. Neely, Rahul Urgaonkar University of.
CISS Princeton, March Optimization via Communication Networks Matthew Andrews Alcatel-Lucent Bell Labs.
Lecture 11. Matching A set of edges which do not share a vertex is a matching. Application: Wireless Networks may consist of nodes with single radios,
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
Little’s Theorem Examples Courtesy of: Dr. Abdul Waheed (previous instructor at COE)
A Fair Scheduling Policy for Wireless Channels with Intermittent Connectivity Saswati Sarkar Department of Electrical and Systems Engineering University.
1 40 th Annual CISS 2006 Conference on Information Sciences and Systems Some Optimization Trade-offs in Wireless Network Coding Yalin E. Sagduyu Anthony.
Maximizing the Lifetime of Wireless Sensor Networks through Optimal Single-Session Flow Routing Y.Thomas Hou, Yi Shi, Jianping Pan, Scott F.Midkiff Mobile.
1 Optimization and Stochastic Control of MANETs Asu Ozdaglar Electrical Engineering and Computer Science Massachusetts Institute of Technology CBMANET.
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid, et. al. IEEE INFOCOM 2001.
Queuing Networks. Input source Queue Service mechanism arriving customers exiting customers Structure of Single Queuing Systems Note: 1.Customers need.
Optimal Energy and Delay Tradeoffs for Multi-User Wireless Downlinks Michael J. Neely University of Southern California
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Distributed resource allocation in wireless data networks: Performance and design Alexandre Proutière Orange-FT / ENS Paris.
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
1 IEEE Trans. on Smart Grid, 3(1), pp , Optimal Power Allocation Under Communication Network Externalities --M.G. Kallitsis, G. Michailidis.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
Decentralised load balancing in closed and open systems A. J. Ganesh University of Bristol Joint work with S. Lilienthal, D. Manjunath, A. Proutiere and.
EE 685 presentation Distributed Cross-layer Algorithms for the Optimal Control of Multi-hop Wireless Networks By Atilla Eryılmaz, Asuman Özdağlar, Devavrat.
EE360 PRESENTATION On “Mobility Increases the Capacity of Ad-hoc Wireless Networks” By Matthias Grossglauser, David Tse IEEE INFOCOM 2001 Chris Lee 02/07/2014.
By Avinash Sridrahan, Scott Moeller and Bhaskar Krishnamachari.
CS774. Markov Random Field : Theory and Application Lecture 21 Kyomin Jung KAIST Nov
Michael J. Neely, University of Southern California CISS, Princeton University, March 2012 Wireless Peer-to-Peer Scheduling.
1 A Simple Asymptotically Optimal Energy Allocation and Routing Scheme in Rechargeable Sensor Networks Shengbo Chen, Prasun Sinha, Ness Shroff, Changhee.
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Yingzhe Li, Xinbing Wang, Xiaohua Tian Department of Electronic Engineering.
EE 685 presentation Utility-Optimal Random-Access Control By Jang-Won Lee, Mung Chiang and A. Robert Calderbank.
Competitive Queue Policies for Differentiated Services Seminar in Packet Networks1 Competitive Queue Policies for Differentiated Services William.
Delay-Based Back-Pressure Scheduling in Multi-Hop Wireless Networks 1 Bo Ji, 2 Changhee Joo and 1 Ness B. Shroff 1 Department of ECE, The Ohio State University.
Super-Fast Delay Tradeoffs for Utility Optimal Scheduling in Wireless Networks Michael J. Neely University of Southern California
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Fairness and Optimal Stochastic Control for Heterogeneous Networks Time-Varying Channels     U n (c) (t) R n (c) (t) n (c) sensor.
CS 103 Discrete Structures Lecture 13 Induction and Recursion (1)
Content caching and scheduling in wireless networks with elastic and inelastic traffic Group-VI 09CS CS CS30020 Performance Modelling in Computer.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
1 11 Distributed Channel Assignment in Multi-Radio Mesh Networks Bong-Jun Ko, Vishal Misra, Jitendra Padhye and Dan Rubenstein Columbia University.
1 Fair Queuing Hamed Khanmirza Principles of Network University of Tehran.
2/14/2016  A. Orda, A. Segall, 1 Queueing Networks M nodes external arrival rate (Poisson) service rate in each node (exponential) upon service completion.
Key insight.  With drop-when-decoded, the busy period of the virtual queue contributes to the physical queue size calculation  Responding to ACK of the.
Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California
1 TCOM 5143 Lecture 10 Centralized Networks: Time Delay and Cost Tradeoffs.
D. AriflerCMPE 548 Fall CMPE 548 Routing and Congestion Control.
Wireless Packet Scheduling With Soft Deadlines Aditya Dua and Nicholas Bambos Department of Electrical Engineering Stanford University ICC 2007.
Joint Routing and Scheduling Optimization in Wireless Mesh Networks with Directional Antennas A. Capone, I. Filippini, F. Martignon IEEE international.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Presented by Tae-Seok Kim
Dynamic Graph Partitioning Algorithm
IEEE Student Paper Contest
Throughput-Optimal Broadcast in Dynamic Wireless Networks
The Impact of Multihop Wireless Channel on TCP Performance
Javad Ghaderi, Tianxiong Ji and R. Srikant
CSE 550 Computer Network Design
Optimal Control for Generalized Network-Flow Problems
Presentation transcript:

EE 685 presentation Optimal Control of Wireless Networks with Finite Buffers By Long Bao Le, Eytan Modiano and Ness B. Shroff

Objective of the paper  Considers network control for wireless networks with finite buffers.  Joint flow control, routing, and scheduling algorithm proposed  Aims to achieve high network utility and deterministically bounded backlogs  The tradeoff between buffer size and network utility is analyzed  Scheduling/routing component of the algorithm requires ingress queue length information (IQI) at all network nodes.  The algorithm can achieve the same utility performance with delayed ingress queue length information.  Numerical results reveal nearly optimal network utility with a significant reduction inqueue backlog compared to the existing algorithm in the literature.

Motivation and basic approach  Flow controllers to deterministically bound the queue backlogs inside the network have been used.  Specifically, Lyapunov optimization and the scheduling mechanism proposed by Giaccone et al (2007) are combined to construct joint flow control, routing and scheduling algorithms for wireless networks with finite buffers.  The paper considers the general setting where traffic arrival rates can be either inside or outside the throughput region, internal buffers in the network are finite, and dynamic routing is used to achieve the largest possible network

Contributions  A control algorithm that achieve high network utility and deterministically bounded backlogs for all buffers inside the network. Moreover, these algorithms ensure that internal buffers never overflow.  Demonstration and modelling of tradeoff between buffer sizes and achievable network utility.  It has been shown that delayed ingress queue information does not affect the utility of the control algorithms even though there is some cost of added queue backlogs.  Via simulation based experiments, it has been demonstrated that the considered control algorithms perform very well in both the under and overloaded traffic regimes. Specifically, they achieve nearly optimal utility performance with very low and bounded backlogs

Problem Framework The problem is formulated for  A wireless network which is modeled as a graph G = (V;E) where V is the set of nodes and E is the set of links. Let N and L be the number of nodes and links in the network, respectively.  A time-slotted system where packet arrivals and transmissions occur at the beginning of time slots of unit length.  There are multiple network flows in the network each of which corresponds a particular source-destination pair.  Arrival traffic is stored in input reservoirs and flow controllers are employed at source nodes to inject data from input reservoirs into the network in each time slot.

System Model  Let n c be the source node and d c be the destination node of flow c.  The buffer at the source node n c of flow c is called as an ingress buffer. All other buffers storing packets of flow c inside the network are called internal buffers.  R (c) nc (t) : the amount of traffic of flow c injected from the input reservoir into the network at node n c in time slot t.  Let C n be the set of flows whose source node is n.  It is assumed that ∑ cCn R (c) n ≤ R max n where R max n can be used to control the burstiness of admitted traffic from node n into the network.  Rmax = max {n} {R max n }  Let C denote the total number of flows in the network.

Wireless Network Model  Each internal node maintains multiple finite buffers (one per flow) while ingress buffers at all source nodes are assumed to be unlimited.  This assumption is justified by the fact that in many wireless networks buffer space is limited in contrast to buffers in ingress routers or devices that are relatively large.

Network/Queuing parameters  l c : the internal buffer size used to store packet of flow at each network node.  Q (c) n (t) : The queue length of flow c at node n at the beginning of time slot t  Q (c) dc (t) = 0 since data packets of any flow are delivered to the higher layer upon reaching the destination node.  The capacity of any link is one packet per time slot.  µ (c) nm (t) : the number of packets of flow c transmitted over link (n;m) in time slot t. µ (c) nm (t) = 1 if packet is transmitted for flow c on (n;m), µ (c) nm (t) = 0 otherwise  µ (c) l (t) is also used instead when link (m;n) is represented as link l  Ω in n and Ω out n : The set of incoming and outgoing links at node n.  It has been assumed that there is a loop-free route between every source- destination pairs and no traffic can be routed back  Node n will not transmit data of flow c along any link (n;m) whenever Q (c) n < 1

Queue evolution dynamics  The queue evolutions for any network node n can be written as : where R (c) n (t) = 0, for all t and n ≠ n c.  Let r (c) n (t) be the time average rate of admitted traffic for flow c at the corresponding source node n c up to time t :

Queue evolution dynamics  The long-term time-average admitted rate for flow c is defined as  A queue for a particular flow c at node n is called strongly stable if

Throughput region with finite buffers  The maximum throughput region Λ of a wireless network with unlimited ingress and internal buffers is the set of all traffic arrival rate vectors such that there exists a network control algorithm to stabilize all individual queues in the network.  Note that when internal buffers are finite, stability corresponds to maintaining bounded backlogs in ingress buffers (since internal buffers are finite, the issue of stability does not arise there).  In this context, it is necessary to devise a control algorithm that can achieve high throughput (utility) with finite buffers.

Throughput region with finite buffers  First, let us define the � -stripped throughput region as follows: where � (r nc ) =(r n1 1,r n2 2,...,r nC C ).  (r nc ∗ (c) ()) is the optimal solution of the following optimization problem  (λ nc ) =(λ n1 1, λ n2 2,..., λ nC C ) T is the average traffic arrival rate vector, (.) T denotes vector transposition,g (c) (.) are increasing and concave utility functions.  We will quantify the performance of the considered control algorithms in terms of (r nc ∗ (c) ()) which tends to (r nc ∗ (c) ) as → 0

Network optimization In heavy traffic regime  This is the case where all sources are constantly backlogged  Proposed method seek a balance between optimizing the total network utility and bounding total queue backlog  Following optimization problem is pursued specifically :  where r nc (c) is the time average admitted rate for flow c at node n c, ( r nc (c) ) =( r n1 1,r n2 2,...,r nC C ) is the time average admitted rate vector, and l c is the buffer size.  The last inequality constraint ensures that the backlogs in internal buffers are finite and bounded by lc at all times.

Network Optimization Algorithm 1 : Constantly Backlogged Sources FLOW CONTROL  Each node n injects an amount of traffic into the network which is equal to R (c) nc (t) = x (c) nc where x (c) nc is the solution of the following optimization problem

Network Optimization Algorithm 1 : Constantly Backlogged Sources ROUTING/SCHEDULING  Each link (n;m) calculates the differential backlog for flow c as follows:  Then, link (n;m) calculates the maximum differential backlog as follows:

Network Optimization Algorithm 1 : Constantly Backlogged Sources ROUTING/SCHEDULING  Let S be the schedule where its l-th component S l = 1 if link l is scheduled and S l = 0 otherwise.  The schedule S is chosen in each time slot t as follows:.  Where Φ is the set of all feasible schedules as determined by the underlying wireless interference model. Any link l with W l ≤ 0 will not be scheduled¤  For each scheduled link, one packet of the flow that achieves the maximum differential backlog is transmitted if the corresponding buffer has at least one packet waiting for transmission.

Algorithm 1 working principles Constantly Backlogged Sources  The flow controller of this algorithm admits less traffic of flow c if the corresponding ingress buffer is more congested (i.e., large Q (c) nc ).  A larger value V results in higher achievable utility albeit at the cost of larger queue backlogs.  The routing component of this algorithm is an adaptation of the differential backlog routing of Tassiulas and Ephremides to the case of finite buffers.  The scheduling rule is the well-known max-weight scheduling algorithm.

Algorithm 1 working principles Constantly Backlogged Sources  The differential backlog ensures that internal buffers never overflow.  The differential backlog of any source link (n c ;m), given by (Q (c) nc / l c ) (l c - Q (c) m ) bounds the backlogs of all internal buffers by l c.  The differential backlogs of all other links (n;m), given by (Q (c) nc / l c ) (Q (c) n -Q (c) m ) is essentially the multiplication of the standard differential backlog with the normalized ingress queue backlog Q (c) nc / l c.  Incorporating ingress queue backlog into the differential backlog prioritizes the flow whose ingress queue is more congested. This helps stabilize ingress queues because the scheduling component of algorithm 1 still has the “max-weight” structure.

Theorem 1 :  Given > 0, if the internal buffer size satisfies.  Then, we have the following bounds for utility and ingress queue backlog.  where D 1 =C(R 2 max +2)+C(N-1)R max l c is a finite number,  C is the number of flows in the network,  R max is the maximum amount of traffic injected into the network from any node  V is a design parameter which controls the utility and backlog bound tradeoff  λ max is the largest number such that λ max Λ with λ = (λ, λ,..., λ) T is a column vector with all element s equal to λ.

Theorem 1 : Definition of other parameters for algorithm 1 are provided as :.

Theorem 1 : Proof

 Taking the expectations over the distribution of Q and summing over t {1,2,...,M}, we have.

Theorem 1 : Proof

 To prove the backlog bound, we arrange the inequality (46) appropriately and divide both sides by M, we have.

Network Optimization Algorithm 2 : Sources with Arbitrary Arrival Rates FLOW CONTROL  Each node n injects an amount of traffic into the network which is equal to R (c) nc (t) as the solution of the following optimization problem  Where L (c) nc (t) is the backlog of the input reservoir, A (c) nc (t) is the number of arriving packets in time slot t, and Y (c) nc (t) represents “backlog” in the virtual queue which has the following queue-like evolution

FLOW CONTROL  Virtual queue evolution has the following form  Where z (c) nc (t) are auxiliary variables which are calculated from the following optimization problem Network Optimization Algorithm 2 : Sources with Arbitrary Arrival Rates  The virtual queue variables Y (c) nc are updated according to above queue evolution mechanism in every time slot.

Network Optimization Algorithm 2 : Sources with Arbitrary Arrival Rates ROUTING/SCHEDULING  Performed according to algorithm 1 principles.

Algorithm 2 working principles  The flow controller operation can be interpreted intuitively as follows.  The auxiliary variables z (c) nc (t) plays the role of R (c) nc (t) in algorithm 1 for the heavy traffic regime.  In fact, the optimization problem from which we calculate z (c) nc (t) is similar to the one in (12) where Q (c) nc is replaced by Y (c) nc.  Hence, z (c) nc (t) represents the potential rate that would have been admitted if sources were backlogged.,  The virtual queue Y (c) nc (t) captures the difference between the potential admitted rate z (c) nc (t) and the actual admitted rate R (c) nc (t) based on which the flow controller determines the amount of admitted traffic R (c) nc (t) from (27).  Here, the “virtual differential backlogs [ Y (c) nc -Q (c) nc ] determines from which flow to inject data to the network

Theorem 2 :