Lecture 9. Unconstrained Optimization Need to maximize a function f(x), where x is a scalar or a vector x = (x 1, x 2 ) f(x) = -x 1 2 - x 2 2 f(x) = -(x-a)

Slides:



Advertisements
Similar presentations
Lecture 7. Network Flows We consider a network with directed edges. Every edge has a capacity. If there is an edge from i to j, there is an edge from.
Advertisements

Price Of Anarchy: Routing
1 EP2210 Fairness Lecture material: –Bertsekas, Gallager, Data networks, 6.5 –L. Massoulie, J. Roberts, "Bandwidth sharing: objectives and algorithms,“
Introduction to Algorithms
Resource Allocation in Wireless Networks: Dynamics and Complexity R. Srikant Department of ECE and CSL University of Illinois at Urbana-Champaign.
DYNAMIC POWER ALLOCATION AND ROUTING FOR TIME-VARYING WIRELESS NETWORKS Michael J. Neely, Eytan Modiano and Charles E.Rohrs Presented by Ruogu Li Department.
Optimization Introduction & 1-D Unconstrained Optimization
Mathematical models of the Internet Frank Kelly Hood Fellowship Public Lecture University of Auckland 3 April 2012.
Lecture 8 – Nonlinear Programming Models Topics General formulations Local vs. global solutions Solution characteristics Convexity and convex programming.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
Thursday, April 25 Nonlinear Programming Theory Separable programming Handouts: Lecture Notes.
Easy Optimization Problems, Relaxation, Local Processing for a small subset of variables.
Basic Feasible Solutions: Recap MS&E 211. WILL FOLLOW A CELEBRATED INTELLECTUAL TEACHING TRADITION.
Chapter 4: Network Layer
Decomposable Optimisation Methods LCA Reading Group, 12/04/2011 Dan-Cristian Tomozei.
Ion Stoica, Scott Shenker, and Hui Zhang SIGCOMM’98, Vancouver, August 1998 subsequently IEEE/ACM Transactions on Networking 11(1), 2003, pp Presented.
TCP Stability and Resource Allocation: Part II. Issues with TCP Round-trip bias Instability under large bandwidth-delay product Transient performance.
Visual Recognition Tutorial
5/4/2006EE228A – Communication Networks 1 Congestion Control to Reduce Latency in Sensor Networks for Real-Time Applications Presented by Phoebus Chen.
MIT and James Orlin © Nonlinear Programming Theory.
Totally Unimodular Matrices Lecture 11: Feb 23 Simplex Algorithm Elliposid Algorithm.
1 Introduction to Linear and Integer Programming Lecture 9: Feb 14.
Charge-Sensitive TCP and Rate Control Richard J. La Department of EECS UC Berkeley November 22, 1999.
TCP Stability and Resource Allocation: Part I. References The Mathematics of Internet Congestion Control, Birkhauser, The web pages of –Kelly, Vinnicombe,
Network Bandwidth Allocation (and Stability) In Three Acts.
A Scalable Network Resource Allocation Mechanism With Bounded Efficiency Loss IEEE Journal on Selected Areas in Communications, 2006 Johari, R., Tsitsiklis,
Optimization Methods One-Dimensional Unconstrained Optimization
CISS Princeton, March Optimization via Communication Networks Matthew Andrews Alcatel-Lucent Bell Labs.
Lecture 11. Matching A set of edges which do not share a vertex is a matching. Application: Wireless Networks may consist of nodes with single radios,
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
Lecture 10. TCP flow Control Used for data transfer Every successful packet is acknowledged One can not have more than W unacknowledged packets, where.
Optimality Conditions for Nonlinear Optimization Ashish Goel Department of Management Science and Engineering Stanford University Stanford, CA 94305, U.S.A.
Lecture 8. Why do we need residual networks? Residual networks allow one to reverse flows if necessary. If we have taken a bad path then residual networks.
Optimization Methods One-Dimensional Unconstrained Optimization
Flow Models and Optimal Routing. How can we evaluate the performance of a routing algorithm –quantify how well they do –use arrival rates at nodes and.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Efficiency Loss in a Network Resource Allocation Game Paper by: Ramesh Johari, John N. Tsitsiklis [ Informs] Presented by: Gayatree Ganu.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
A Fair and Dynamic Load Balancing Mechanism F. Larroca and J.L. Rougier International Workshop on Traffic Management and Traffic Engineering for the Future.
Mazumdar Ne X tworking’03 June 23-25,2003, Chania, Crete, Greece The First COST-IST(EU)-NSF(USA) Workshop on EXCHANGES & TRENDS IN N ETWORKING 1 Non-convex.
Link Scheduling & Queuing COS 461: Computer Networks
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Korea Advanced Institute of Science and Technology Network Systems Lab. 1 Dual-resource TCP/AQM for processing-constrained networks INFOCOM 2006, Barcelona,
Optimization Flow Control—I: Basic Algorithm and Convergence Present : Li-der.
Congestion Control in CSMA-Based Networks with Inconsistent Channel State V. Gambiroza and E. Knightly Rice Networks Group
EE 685 presentation Utility-Optimal Random-Access Control By Jang-Won Lee, Mung Chiang and A. Robert Calderbank.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, and Mung.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
June 4, 2003EE384Y1 Demand Based Rate Allocation Arpita Ghosh and James Mammen {arpitag, EE 384Y Project 4 th June, 2003.
Linear Program Set Cover. Given a universe U of n elements, a collection of subsets of U, S = {S 1,…, S k }, and a cost function c: S → Q +. Find a minimum.
1 Time-scale Decomposition and Equivalent Rate Based Marking Yung Yi, Sanjay Shakkottai ECE Dept., UT Austin Supratim Deb.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
Fair Allocation and Network Ressources Pricing Fair Allocation and Network Ressources Pricing A simplified bi-level model Work sponsored by France Télécom.
Chapter 4 Sensitivity Analysis, Duality and Interior Point Methods.
Scalable Laws for Stable Network Congestion Control Fernando Paganini UCLA Electrical Engineering IPAM Workshop, March Collaborators: Steven Low,
1 Slides by Yong Liu 1, Deep Medhi 2, and Michał Pióro 3 1 Polytechnic University, New York, USA 2 University of Missouri-Kansas City, USA 3 Warsaw University.
Linear Programming Chapter 9. Interior Point Methods  Three major variants  Affine scaling algorithm - easy concept, good performance  Potential.
Analysis and Design of an Adaptive Virtual Queue (AVQ) Algorithm for AQM By Srisankar Kunniyur & R. Srikant Presented by Hareesh Pattipati.
D. AriflerCMPE 548 Fall CMPE 548 Routing and Congestion Control.
Approximation Algorithms based on linear programming.
D Nagesh Kumar, IISc Water Resources Systems Planning and Management: M2L2 Introduction to Optimization (ii) Constrained and Unconstrained Optimization.
1 Transport Bandwidth Allocation 3/29/2012. Admin. r Exam 1 m Max: 65 m Avg: 52 r Any questions on programming assignment 2 2.
TCP Congestion Control
TCP Congestion Control
Howard Huang, Sivarama Venkatesan, and Harish Viswanathan
Chap 3. The simplex method
Outline Unconstrained Optimization Functions of One Variable
TCP Congestion Control
Derivatives in Action Chapter 7.
Understanding Congestion Control Mohammad Alizadeh Fall 2018
Presentation transcript:

Lecture 9

Unconstrained Optimization Need to maximize a function f(x), where x is a scalar or a vector x = (x 1, x 2 ) f(x) = -x x 2 2 f(x) = -(x-a) 2 f(x) = x

Gradient Search Techniques Suppose f(x) is differentiable, i.e.,  f(x) exists. Then the series of updates x k+1 = x k +   f(x k ) reaches a local maxima starting from any initial value x 0, for all sufficiently small values of . A function f(x) has a local maxima at x k if f(x k ) is less than or equal to f(y) for all y in some small neighborhood of x k

Concave Function Let C be a convex subset of R n A function f: C  R is called concave if f(  x + (1-  )y)   f(x) + (1-  )f(y) for all  [0, 1] and x, y  C x f(x)  f(x) + (1-  )f(y) f(  x + (1-  )y) xy  x + (1-  )y

Strict Concave Function Let C be a convex subset of R n A function f: C  R is called strictly concave if f(  x + (1-  )y)  f(x) + (1-  )f(y) for all  [0, 1] and x, y  C A straight line is concave, but not strictly concave. Any local maxima is a global maxima for a concave function. A strictly concave function has a unique global maxima

Constrained Optimization Maximize a function f(x), where x must be in a given set S Suppose, f(x) is linear in x. Set S is specified by liner inequalities Then this is a linear program

Network Flow  v: (v, s)  E x vs -  v: (s, v)  E x sv = -d  v: (v, t)  E x vt -  v: (t, v)  E x tv = d  v: (v, u)  E x vu =  v: (u, v)  E x uv 0  x uv  C uv Maximize the total output flow from the source s, d such that for every link (u, v)

Network Flow as a Linear Program Here, x is a flow allocation. f(x) is the net flow out of the source under flow allocation x f(x) =  v: (s, v)  E x sv -  v: (v, s)  E x vs Set S is the set of feasible flows. Feasibility conditions are 0  x uv  C uv  v: (v, u)  E x vu =  v: (u, v)  E x uv

Linear ProgramTechniques Simplex Exponential Complexity in the worst case However, LP is polynomial complexity computable. If a problem can be modeled as LP, then this shows that the problem is polynomial complexity and not NP-hard.

Convex Optimization Maximize a function f(x), where x must be in a given set S Function f(x) is concave Set S is convex Get rid of the constraints! Consider a function g(x) such that g(x) is small if x is not in S and large otherwise. Now try to maximize f(x) + g(x) without any constraints Now f(x) + g(x) can be maximized by gradient search techniques if f(x) + g(x) is differentiable.

Let us be more specific about set S. A vector x belongs to set S if g i (x)  0, i=1,…M We would like to maximize f(x) -   i g i (x) q(  ) = max x (f(x) -   i g i (x)) min  0 q(  ) What should be the value of  ? The output of the above minimization is the maximum value of f(x) subject to x  S

Primal-Dual Approach Primal Maximize f(x) subject to g i (x)  0, i=1,…M Dual q(  ) = max x (f(x) -   i g i (x)) min  0 q(  )

Advantages of Dual Approach If the dual is differentiable, then it can be solved by gradient search techniques. For the convex programming we are considering, primal = dual (may not hold if the feasible set is nonconvex). Dual is always convex and hence has a unique global minima. The dual is differentiable if the objective function f(x) is strictly concave.

Flow Control Sessions are normally greedy. Would like to send as much traffic as possible However, this would congest the network. Need to regulate the flow of the sessions. Flow of a session must depend on the bandwidth requirements and the revenues paid by the sessions.

Every session has a utility function. Utility is a function of the bandwidth. It reflects the value attached to the bandwidth by a session. The objective of the network is to allocate bandwidths to maximize the sum of the utilities of the sessions. The underlying assumption is that the network charges the users in accordance of the declared utility functions.

Utility Maximization Utility of session i is U i (x) Let there be N sessions. Every session has a predetermined path. Maximize  U i (r i ) subject to  i:session i traverses link l r i  C l

This has been studied by several researchers: F. Kelly, ``Charging and Rate Control for Elastic Traffic’’,European Transactions on Telecommunications, vol. 8, No. 1, 1997, pp F. Kelly, A. Maulloo, D. Tan, ``Rate Control for Communications Networks: Shadow Prices, Proportional Fairness and Stability’’, Journal of Operations Research Society, vol. 49, No. 3, 1998, pp S. Low and D. Lapsley, ``Optimization Flow Control I: Basic Algorithm and Convergence,’’ IEEE/ACM Transactions on Networking, vol. 7, No. 6, Dec. 1999

R. La, V. Anantharam, ``Charge Sensitive TCP and Rate Control in the Internet,’’Proceedings of INFOCOM 2000, March 2000 S. Kunniyur, R. Srikant, ``End-to-End Congestion Control Schemes: Utility Functions, Random Losses and ECN Marks’’, Proceedings of INFOCOM 2000, March 2000 K. Kar, S. Sarkar, L. Tassiulas, ``A Simple Rate Control Algorithm for Maximizing Total User Utility,'' Proceedings of INFOCOM 2001, Alaska``A Simple Rate Control Algorithm for Maximizing Total User Utility,''

Dual based Approach Maximize  U i (r i ) subject to  i:session i traverses link l r i  C l Primal Dual L(r, p) =  i U i (r i ) -  l p l (  i:session i traverses link l r i - C l ) =  i (U i (r i ) - r i  l is on session i path p l ) +  l p l C l

D( p) = max r L (r, p) = max r  i (U i (r i ) - r i  l is on session i path p l ) +  l p l C l =  i (U i (r i (p)) - r i (p)  l is on session i path p l ) +  l p l C l U i ’(r i (p)) =  l is on session i path p l The optimum is attained at min p  0 D( p) Then it turns out that the objective function  U i (r i ) is strictly concave. It follows that the dual D(p) is differentiable. Assumption: Utility functions are strictly concave.

Hence, we can use gradient search to attain min p  0 D( p) p k+1 = (p k -  D( p) ) +, where  is sufficiently small D( p) =  i (U i (r i (p)) - r i (p)  l is on session i path p l ) +  l p l C l  D( p) /  p l =  i  r i (p) /  p l ( U i ’(r i (p)) -  l is on session i path p l ) + C l -  i: session i traverses link l r i (p)  D( p)/  p l = C l -  i: session i traverses link l r i (p)

Hence, p k+1 l = ( p k l -  ( C l -  i: session i traverses link l r i (p) ) ) + Also, U i ’(r i (p)) =  l is on session i path p l That is, r i (p) = U i ’ -1 (  l is on session i path p l ) Initially, choose p 0 l = 0 for all links l. Update session rates as r i (0) = U i ’ -1 ( 0 ), for all sessions i Update link prices as p 1 l =  ( C l -  i: session i traverses link l r i (p) ) + Update session rates again and subsequently link rates etc.

Finally, the dual minimum is attained, and the rates converge to those which attain the maximum utilities.

Intuitive Explanation p l is the link price. Link price update: p k+1 l = ( p k l -  ( C l -  i: session i traverses link l r i (p) ) ) + New link price = Old link price -  ( Link Capacity – Sum of rates of sessions traversing the link) Link price increases if there is congestion, and decreases if the link bandwidth is underutilized.

Session rate update: Session rate = U i ’ -1 (path price for session i) Since utility functions are strictly concave, derivatives of utility functions are decreasing. It follows that rate of a session increases if path price decreases for the session and decreases if session price increases. Path price increases if there is congestion in the path, and decreases if there is underutilization. So session rate increases if resources are under-utilized in its path, and decreases if there is congestion in its path

Distributed Implementation Link price update requires only the sum of the session rates in the link. Session rate update requires only the sum of the link prices in its path. So, a session source sends a control packet with 0 price value. Every link increments this value by its link price By the time the control packet reaches the receiver, the price value in the packet equals the path price for the session.

Session rate is updated based on the price in the control packet. Receiver communicates the rate to the session source. Links can learn the session rate from the control packet traversing towards the source from the receiver, And subsequently use these rates to update the link price. Alternatively, source sends at the rate directed by the source. Links measure the session rates from the number of incoming packets. Scheduling may play a role in the convergence for the latter!

Random Early Marking A heuristic implementation of the previous optimization algorithm with one bit marking. Athuraliya, Low and Lapsley, GLOBECOM 1999 In current internet, there is a proposition to include one bit in the header of every packet for congestion notification (ECN: explicit congestion notification) If a router is congested, then it marks the bit for every packet traversing the router.

When the marked packet reaches the receiver, it knows that the path is congested and asks the source to reduce the transmission rate. REM suggests that a link l mark a packet of any session with probability 1-exp(-p l ), where p l is the link price. Probability that a packet is marked is 1 -  l ( 1 – ( 1-exp(-p l ) ) ) (assuming that packet markings in different links are independent events) Probability that a packet is marked for a session i is 1 - exp (-  l is on session i path p l )

This probability can be estimated from the fraction of marked packets reaching the receiver. Clearly, path price for a session can be estimated from this probability. Path price of a session = -ln(1 – fraction of marked packets) Links estimate session rates from the packet arrival rates, Links compute the link prices from these session rates Use the link prices to probabilistically mark packets

Receiver estimates the path price from fraction of marked packets Update session rates on the basis of the estimated path price Communicate session rates to the source. Source sends packets accordingly. Estimation error possible. However, simulation results indicate that the actual rates oscillate in a neighborhood of the optimum rates. No convergence proof.