EE 685 presentation Utility-Optimal Random-Access Control By Jang-Won Lee, Mung Chiang and A. Robert Calderbank.

Slides:



Advertisements
Similar presentations
Optimal Capacity Sharing of Networks with Multiple Overlays Zheng Ma, Jiang Chen, Yang Richard Yang and Arvind Krishnamurthy Yale University University.
Advertisements

Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Price Of Anarchy: Routing
Price-based Resource Allocation in Wireless Ad Hoc Networks Yuan Xue, Baochun Li and Klara Nahrstedt University of Illinois at Urbana-Champaign University.
EE 685 presentation Optimal Control of Wireless Networks with Finite Buffers By Long Bao Le, Eytan Modiano and Ness B. Shroff.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
Easy Optimization Problems, Relaxation, Local Processing for a small subset of variables.
Chapter 4: Network Layer
Decomposable Optimisation Methods LCA Reading Group, 12/04/2011 Dan-Cristian Tomozei.
1 Fast Primal-Dual Strategies for MRF Optimization (Fast PD) Robot Perception Lab Taha Hamedani Aug 2014.
Kuang-Hao Liu et al Presented by Xin Che 11/18/09.
Fast Distributed Algorithm for Convergecast in Ad Hoc Geometric Radio Networks Alex Kesselman, Darek Kowalski MPI Informatik.
Competitive Routing in Multi-User Communication Networks Presentation By: Yuval Lifshitz In Seminar: Computational Issues in Game Theory (2002/3) By: Prof.
CS541 Advanced Networking 1 Spectrum Sharing in Cognitive Radio Networks Neil Tang 3/23/2009.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
Optimal Throughput Allocation in General Random Access Networks P. Gupta, A. Stolyar Bell Labs, Murray Hill, NJ March 24, 2006.
Base Station Association Game in Multi-cell Wireless Network Libin Jiang, Shyam Parekh, Jean Walrand.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
1 TDMA Scheduling in Competitive Wireless Networks Mario CagaljHai Zhan EPFL - I&C - LCA February 9, 2005.
Distributed Combinatorial Optimization
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
1 Optimization and Stochastic Control of MANETs Asu Ozdaglar Electrical Engineering and Computer Science Massachusetts Institute of Technology CBMANET.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
1 IEEE Trans. on Smart Grid, 3(1), pp , Optimal Power Allocation Under Communication Network Externalities --M.G. Kallitsis, G. Michailidis.
EE 685 presentation Distributed Cross-layer Algorithms for the Optimal Control of Multi-hop Wireless Networks By Atilla Eryılmaz, Asuman Özdağlar, Devavrat.
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
By Avinash Sridrahan, Scott Moeller and Bhaskar Krishnamachari.
Adaptive CSMA under the SINR Model: Fast convergence using the Bethe Approximation Krishna Jagannathan IIT Madras (Joint work with) Peruru Subrahmanya.
A Distributed Framework for Correlated Data Gathering in Sensor Networks Kevin Yuen, Ben Liang, Baochun Li IEEE Transactions on Vehicular Technology 2008.
© 2009 IBM Corporation 1 Improving Consolidation of Virtual Machines with Risk-aware Bandwidth Oversubscription in Compute Clouds Amir Epstein Joint work.
Mazumdar Ne X tworking’03 June 23-25,2003, Chania, Crete, Greece The First COST-IST(EU)-NSF(USA) Workshop on EXCHANGES & TRENDS IN N ETWORKING 1 Non-convex.
Quasi-static Channel Assignment Algorithms for Wireless Communications Networks Frank Yeong-Sung Lin Department of Information Management National Taiwan.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Optimization Flow Control—I: Basic Algorithm and Convergence Present : Li-der.
Scalable Multi-Class Traffic Management in Data Center Backbone Networks Amitabha Ghosh (UtopiaCompression) Sangtae Ha (Princeton) Edward Crabbe (Google)
Congestion Control in CSMA-Based Networks with Inconsistent Channel State V. Gambiroza and E. Knightly Rice Networks Group
Minimax Open Shortest Path First (OSPF) Routing Algorithms in Networks Supporting the SMDS Service Frank Yeong-Sung Lin ( 林永松 ) Information Management.
Approximate Dynamic Programming Methods for Resource Constrained Sensor Management John W. Fisher III, Jason L. Williams and Alan S. Willsky MIT CSAIL.
OPTIMUM INTEGRATED LINK SCHEDULING AND POWER CONTROL FOR MULTI-HOP WIRELESS NETWORKS Arash Behzad, and Izhak Rubin, IEEE Transactions on Vehicular Technology,
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, and Mung.
Lagrange and Water Filling algorithm Speaker : Kuan-Chou Lee Date : 2012/8/20.
Simultaneous routing and resource allocation via dual decomposition AUTHOR: Lin Xiao, Student Member, IEEE, Mikael Johansson, Member, IEEE, and Stephen.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
1  The Problem: Consider a two class task with ω 1, ω 2   LINEAR CLASSIFIERS.
The Method of Moving Asymptotes
1  Problem: Consider a two class task with ω 1, ω 2   LINEAR CLASSIFIERS.
1 Slides by Yong Liu 1, Deep Medhi 2, and Michał Pióro 3 1 Polytechnic University, New York, USA 2 University of Missouri-Kansas City, USA 3 Warsaw University.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Bing Wang, Wei Wei, Hieu Dinh, Wei Zeng, Krishna R. Pattipati (Fellow IEEE) IEEE Transactions on Mobile Computing, March 2012.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Self-Organized Resource Allocation in LTE Systems with Weighted Proportional Fairness I-Hong Hou and Chung Shue Chen.
D. AriflerCMPE 548 Fall CMPE 548 Routing and Congestion Control.
Approximation Algorithms Duality My T. UF.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Approximation Algorithms based on linear programming.
Optimization-based Cross-Layer Design in Networked Control Systems Jia Bai, Emeka P. Eyisi Yuan Xue and Xenofon D. Koutsoukos.
Reverse-Engineering MAC: A non-cooperative game model
Impact of Interference on Multi-hop Wireless Network Performance
Cross layer design is wireless multi-hop network
Network Optimization Research Laboratory
Distributed Network Utility Maximization in Multi-hop Wireless Networks: Noisy Feedback, Lossy Channel and Stability Junshan Zhang Department of Electrical.
Department of Information Management National Taiwan University
Advisor: Yeong-Sung, Lin, Ph.D. Presented by Yu-Ren, Hsieh
ACHIEVEMENT DESCRIPTION
Presentation transcript:

EE 685 presentation Utility-Optimal Random-Access Control By Jang-Won Lee, Mung Chiang and A. Robert Calderbank

Objective of the paper  Aims to design medium access control (MAC) protocols for wireless networks through the network utility maximization (NUM) framework.  Problem formulation through a collision/persistence probabilistic model and aligning selfish utility with total social welfare.  Controlling the tradeoff between efficiency and fairness of radio resource allocation.  Proposing distributed algorithms to solve the utility-optimal random- access control problem, which lead to more message passing overhead than the current protocols, but significant potential for efficiency and fairness improvement.

Motivation and basic approach  Due to the inadequate feedback mechanism in the BEB protocol, neither convergence nor social welfare optimality can be assured  Need for new distributed algorithms convergent to the global optimum of total network utility is obvious  A probabilistic-modeled NUM problem for wireless MAC will be solved by optimal algorithms that will be converted to random access MAC protocols.  Therefore, optimality with respect to prescribed user utilities, which determine protocol efficiency and fairness, is guaranteed

Problem Framework The problem is formulated for  A network that consists of a set L of unidirectional links of capacities c l, where l is element of L.  The network is shared by a set S of sources, where source s is characterized by a utility function U s (x s ) that is concave increasing in its transmission rate x s  Each link l is shared by a set S(l) of sources.  The goal is to calculate source rates that maximize the sum of the utilities ∑ s S U s (x s ) over x s subject to capacity constraints.

S Problem Framework s1s1 s2s2 s3s3s DESTINATION NODES SOURCE NODES link l 4 : S(l 4 )={s 1,s 3 } l1l1 l2l2 l3l3 l5l5 l6l6

The optimization problem : Primal problem

Utility functions : Relationship to fairness

System Model and Notation :

Optimization problem : in terms of probabilistic link capacities  The objective of this problem is to obtain the optimal data rate x and the optimal persistence probabilities p for links, and P for nodes so as to maximize the network utility

Optimization problem : take log of the constraint and log change of variables

Lemma 1 : Concavity after variable change  Lets define a new function g l (x l ) as follows  Note that the curvature should be bounded away from 0 as much as So the traffic should be elastic enough for the concavity of utility function after the variable change

Lemma 2 : Concavity after variable change  Hence, if α > 1, g l (x l ) 0. So in this type of utility functions, if α > 1, U’ l (x l ) becomes a strictly concave function as desired. So throughout the paper α > 1 has been assumed

The optimization problem : Lagrangian for primal problem

The optimization problem : Dual problem  Note that in this Lagrangian, we do not need to relax the second constraint in problem (5). By definition, the Lagrange dual function is  Dual problem typically formulated as the minimization of upper boundary for the Lagrangian  The maximization of Lagrangian (equation 7) can be independently made in each node in parallel (over x’,p,P)

The optimization problem : Dual problem solution  Since Lagrangian function has two components that can be separately maximized in terms of x’ and (p,P) pair, we have

The optimization problem : Dual problem solution

 We can now solve the dual problem (8) by using a subgradient projection algorithm 4 at each link l, i.e., at each node n such that l ∈ L out (n), through the following iterations indexed by t

The optimization problem : Distributed Algorithm 1

The optimization problem : Distributed Algorithm 2

Remarks : Remark 2

Remarks Remark 4  The number of message passing required in each of the above two algorithms depends on the network topology. The average numbers of message passing in each iteration for Algorithm 1 and Algorithm 2, M 1 and M 2, are obtained as

Remarks : Remark 5

Heuristics Heuristics decreasing message passing

THEOREM 1 (optimality and convergence)  Proceeding to prove the optimality and convergence of Algorithms1 and 2. For a rigorous proof, we first need the following technical condition to have a unique solution to problem (10) at the optimal dual solution. At the optimal dual solution λ*,

THEOREM 1 proof (optimality and convergence)

Performance results  The performances of proposed protocols have been compared with those of the deterministic approximation protocol and the standard BEB protocol, showing that both protocols can provide not only a higher network utility and a larger fairness index, but also a wider dynamic range of the tradeoff curve between efficiency and fairness.  Performance guarantee of convergence to the global optimum of the NUM formulation is rigorously proved for the proposed algorithms, and simplifying heuristics are then developed based on the optimal algorithmst