Randomized Algorithms for Throughput-Optimality and Fairness in Wireless Networks

Size: px
Start display at page:

Download "Randomized Algorithms for Throughput-Optimality and Fairness in Wireless Networks"

Transcription

1 Proceedings o the 45th IEEE Conerence on Decision & Control Manchester Grand Hyatt Hotel San Diego, CA, USA, December 13-15, 2006 Randomized Algorithms or hroughput-optimality and Fairness in Wireless Networks Atilla Eryilmaz, Eytan Modiano and Asuman Ozdaglar Laboratory or Inormation and Decision Systems Massachusetts Institute o echnology Cambridge, MA, s: {eryilmaz, modiano, asuman}@mit.edu Abstract In this paper, we study multi-hop wireless networks with general intererence models, and describe a practical randomized routing-scheduling-congestion-control mechanism that is guaranteed to ully utilize the network capacity, and achieve air allocation o the resources. Using the ramework described in this paper, low complexity distributed algorithms can be developed or a large class o intererence models and airness criteria (such as proportional and max-min airness). Earlier distributed algorithms proposed in this context have been highly intererence model dependent, and can guarantee at most 50% utilization o the achievable throughput. his is the irst work that assures 100% utilization and also provides air allocation in multi-hop wireless networks. I. INRODUCION he control o data networks to achieve high throughput and air allocation o the resources among competing users (or lows) is clearly one o the most important problems in data communications. here has been considerable interest and progress in the development o algorithms that address the issues o eiciency and airness or both wireline and wireless networks. In the case o ixed arrival rates (i.e. inelastic traic), assiulas and Ephremides provided in their seminal work [25] a joint routing-scheduling algorithm that can achieve the highest throughput without violating the stability o the network. Such throughput-optimal policies make dynamic routing and scheduling decisions to avoid highly congested nodes. For wireline networks, these policies can be implemented in a distributed ashion by using buer occupancy inormation o only the neighboring nodes. In contrast, in wireless multi-hop networks, there is no known scheme or low complexity implementation o throughput-optimal policies. Many other throughput-optimal algorithms developed later share the same weakness [1, 21, 19, 9]. It is well-recognized that reducing the complexity o the centralized computation is an essential requirement or the development and implementation o throughput-optimal policies. For the case o switches, assiulas has shown how the use o randomized algorithms can reduce the complexity o the centralized computation [24]. One o the main contributions o our work is to extend the use o randomized algorithms or potential distributed implementation o routing and scheduling in the context o multi-hop wireless networks. he issue o air service o elastic traic, where the rate o an elastic low is assumed to be controllable, is irst considered by Kelly et al. [11, 12] in the context o wireline networks. he authors developed de-centralized algorithms that have strong ties to notions in market economics. he main idea behind these algorithms was or each source to measure the congestion level it experiences and to adjust its low rate accordingly with its utility unction in order to ully utilize the resources. hese ideas have been extended to dierent scenarios and algorithms (e.g. [15], see [22] or a review). However, all o these works were developed or wireline networks, assumed ixed routes, and ignored the stochastic nature o the traic. More recently, it has been realized that ideas o low control can be successully utilized together with the dynamic routing and scheduling algorithm described above [13, 23, 7, 18, 8]. It has been shown that mean rates arbitrarily close to the air allocation can be achieved without violating stability. However, the routing and scheduling part o the algorithm inherited the centralized optimization problem o [25], which is impractical to solve or multi-hop wireless networks. he design and analysis o distributed implementations o the above cross-layer approach attracted a lot o attention rom the community. In particular, [14, 27] provided algorithms that guarantee 50% utilization o the stability region or node-exclusive-spectrum-sharing (NESS) intererence model, where each easible allocation orms a matching 1 o the graph. It has been shown in [3] that 33% can be guaranteed even when the algorithm operates in a totally asynchronous manner (see [2] or a deinition). Distributed implementations exist or this particular intererence model i a signiicant portion o the capacity is sacriiced. For other general intererence models, it has been shown that the amount o sacriice is even greater. For example, [28] and [4] consider the two-hop intererence model 2 and show that the guaranteed raction o the capacity region drops with the increasing number o neighbors. In particular, or a grid topology, only 12.5% o the capacity region is achieved, which is very discouraging. 1 In a matching, no two links that are incident on the same node can be active simultaneously. 2 In the two-hop intererence model, a transmission over a link (n, m) is successul i and only i all the neighbors o n and m are silent at the time /06/$ IEEE. 1936

2 Our main contributions in this work are listed next. By extending the approach in [24] to the multi-hop wireless network scenario, we prove that the capacity region o the network can be ully utilized with a practical schedulingrouting algorithm. hus, no raction o the throughput need to be sacriiced or a practical implementation. In the case o elastic traic, we propose a cross-layer mechanism that is composed o a decentralized congestion controller operating in parallel with the practical schedulingrouting algorithm discussed in the previous item. We prove that this mechanism asymptotically achieves air division o the resources across the lows. All o our analysis considers a generic intererence model that can be applied to a large set o graph theoretic collision models considered in the literature. It is important to note that the proposed mechanism can be implemented with low complexity distributed algorithms or speciic intererence models o practical interest (see [6]). he rest o the paper is organized as ollows. In Section II, we describe the system model. hen, in Section III, we describe the practical algorithm and show its throughputoptimality. Section IV introduces the congestion control mechanism or elastic traic and establishes its air characteristics. We provide our concluding remarks in Section V, and some o the proos in the Appendix. II. SYSEM MODEL Consider a ixed wireless network that is represented by a graph G =(N, L), where N denotes the set o ixed nodes and L denotes the set o undirected links. We assume a time slotted system with synchronized nodes, where each slot is just long enough to accommodate a single packet transmission. Suppose there is a set F o end-to-end lows traversing the network, where each low F is given by the node pair (s(),d()). Here, s() denotes the source node o low and d() denotes the destination node. We allow or multiple routes between each source-destination pair. We consider both the inelastic and elastic traic cases. Associated with each destination a buer is maintained at each node. We let q [t] denote the length o the queue at node n keeping packets destined or node d at the beginning o slot t. Deinition 1 (Stability). A given queue is called stable i E[q [ ]] <, where q [ ] denotes the random variable with distribution given by the steady-state distribution o {q [t]}. he network is stable i all queues are stable; and unstable otherwise. We consider a general intererence model ormulation that contains all o the graph theoretic collision models considered in the context o scheduling (e.g. NESS [20, 14, 27, 3], or two-hop intererence models [28, 4]). We say that two links interere i their concurrent transmissions collide, and assume that i two interering links are activated in a slot, both o the transmissions ail. We use I(l) Lto denote the set o links that interere with link l. ypically, this set will contain links rom the local neighborhood o l. As an example, the matching constraint o the NESS model implies that or link l =(n, m), I(l) :={l L: l i(n) or l i(m)}, where i(n) denotes the set o links that are incident to node n. We will prove our results or the general model. We use π = { π (n,m) to denote a link activation }(n,m) L (or allocation) vector, and Π denote the easible set o allocations that complies with the intererence constraints. An allocation is easible i and only i no two links in the set interere with each other. As an example, or the NESS intererence model, Π corresponds to the set o matchings o G. We introduce the notation π(n,m) d to distinguish packets destined or dierent nodes: at any given slot, π(n,m) d [t] {0, 1} is 1 i link (n, m) serves a packet destined or node d in that slot, and 0 otherwise. Notice that π (n,m) [t] = d N πd (n,m) [t], or all t. Also note that it is suicient to restrict our attention to policies that sets π(n,m) d [t] to zero whenever q [t] = 0, or all (n, m) L, because any other policy that sets π(n,m) d [t] =1when q [t] =0can be replaced by a policy with π(n,m) d [t] =0without aecting the evolution o the queue-lengths. hen, we can write the evolution o a particular queue, say q, as q [t +1]= (q [t] πout(n) d [t]+ x [t]+πinto(n) d [t]), (1) S where x [t] is the number o exogenous low- arrivals to the network in slot t, and S { F: s() =n, d() =d} denotes the set o lows that start at node n and are destined to node d. Also, πinto(n) d [t] k:(k,n) L πd (k,n)[t] is a shorthand or the number o packets entering node n that are destined or node d. Similarly, πout(n) d [t] is the number o packets leaving node n and are destined or node d. We set q d,d [t] =0 t. Deinition 2 (Capacity (Stability) Region). Let G = (N, L) be a given network and Π be the set o easible allocations. he capacity (or stability) region Λ o the network is given by the set o vectors r =(r ) F or which there exists π d() (n,m) 0, or all (n, m) Land F, such that both the low conservation constraints at the nodes and the easibility constraints are satisied, as given below: (C1) For all n Nand F, we have 3 r 1 s()=n + π d() (k,n) = π d() (n,m), k:(k,n) L (C2) [ π (n,m) ](n,m) L Conv(Π). 4 m:(n,m) L It is shown in [25, 19] that Λ is the set o mean arrival rates or which there exists a policy that stabilizes the network. III. SABILIY FOR INELASIC RAFFIC he ocus o this section is throughput-optimality under stability or the inelastic traic scenario. We provide simple 3 We use 1 A as the indicator unction o event A. 4 Conv(A) denotes the convex hull o set A, which is the smallest convex set that includes A. he convex hull is included due to the possibility o timesharing between easible allocations. 1937

3 routing-scheduling mechanisms that can support any mean arrival rate in the capacity region without violating stability (such mechanisms are said to be throughput-optimal [25, 21, 19, 7]). In earlier work [24], assiulas used randomized schemes to provide a low complexity stabilizing algorithm or switches using a centralized controller. In this section, we will extend the use o randomized throughput-optimal schemes or multi-hop networks with general intererence models. In particular, we show that practical algorithms satisying several simple conditions can be designed to achieve ull utilization o the capacity o multi-hop wireless networks with general intererence models. o this end, we introduce the ollowing notation or link weights: w (n,m) [t] =w (m,n) [t] max d q [t] q m,d [t]. his is also reerred to as the dierential backlog 5 over link (n, m) and can be interpreted as a measure o the importance o the link. Consider the ollowing allocation vector π w [t] arg max π Π l L w l [t]π l arg max(w[t] π). (2) π Π his allocation rule is called the back-pressure policy. Once the π w is determined according to (2), only the commodity that maximizes the dierential backlog over link (n, m) is served over that link at the chosen rate. I the backpressure policy is applied at every time slot, it is known to be throughput-optimal. However, it requires a centralized controller that knows w[t] at every time-slot, and also communicates the allocation vector π w [t] instantly to all the nodes o the network. hese requirements make the implementation o this algorithm impractical or the multihop wireless network scenario. he idea is to use a random algorithm, instead o the optimal one described in (2), which yields a easible allocation π[t] Π at every time slot, which is not necessarily equal to π w [t], but has a positive probability δ>0 o being equal to π w [t]. hus, we have P ( π[t] = π w [t]) δ, or all w[t] and t. (3) Once the allocation π[t] is chosen, the actual allocation π[t] is determined according to the ollowing evolution. { π[t] i w[t] π[t] w[t] π[t] π[t +1]= (4) π[t] otherwise he above randomized algorithm was introduced in [24] in the context o switches, where there exists a centralized scheduler. A similar approach has been used in developing a distributed implementation or networks restricted to singlehop communication with matching constraints and Bernoulli arrival processes [17]. As we will prove shortly, it turns out that the two conditions (3) and (4) are suicient to achieve throughput-optimality in a more general setting. he algorithm updates its allocation vector only i the proposed allocation o the randomized algorithm yields a better objective unction. Such an algorithm can be divided into two 5 his deinition o dierential-backlog is slightly dierent rom the ones in the literature, which is due to the assumption o undirected links here. parts: PICK and COMPARE, where PICK chooses a easible schedule π[t] satisying (3), and COMPARE communicates the relevant weight inormation to other nodes in the network to perorm (4). Distributed implementations o both PICK and COMPARE can be developed or a given intererence model (see [6] or an example). heorem 1. Assume that x [t] is independent and identically distributed (i.i.d.) 6 or all t and with E[x 2 [1]] A<. hen, or any mean arrival vector λ := (E[x [1]]) interior(λ), the above randomized policy is stabilizing. Proo: We start by noting that y[t] (q[t],π[t]) orms a Markov Chain. hen, we study the mean drit o the ollowing Lyapunov unction o the state y =(q,π): V (y) = ( ) 2 q 2 + w l (( π w ) l π l ) n N = q q }{{} V 1 (y) d N l L +(w ( π w π)) 2 }{{} V 2 (y) he proo uses the ollowing two key lemmas the proos o which are moved to Appendix A and B. Lemma 1. Let 1 (y[t]) E[V 1 (y[t + 1]) V 1 (y[t]) y[t]], then or some γ>0and c 1 <, we have 1 (y[t]) γ V 1 (y[t])+2 V 2 (y[t]) + c 1. Lemma 2. Let 2 (y[t]) E[V 2 (y[t + 1]) V 2 (y[t]) y[t]], then or some δ>0 and c 2,c 3 <, we have 2 (y[t]) δv 2 (y[t]) + c 2 V2 (y[t]) + c 3. Proo o heorem 1 (Continued): Combining these lemmas, we upper-bound (y[t]) E[V (y[t + 1]) V (y[t]) y[t]] by γ V 1 (y[t]) δv 2 (y[t])+(2+c 2 ) V 2 (y[t]) + c 1 + c 3. hus, i we consider the scenario where V (y[t]) B or a suiciently large B<, then we can guarantee that (5) (y[t]) ɛ V 1 (y[t]) + ˆB, (6) or some ɛ>0 and ˆB <. his is true because in this scenario, since we have V 1 (y[t]) B V 2 (y[t]), we can write E[V (y[t + 1]) y[t]] V (y[t]) γ 2 V1 (y[t]) γ 2 B V2 (y[t]) δv 2 (y[t])(7) +(2 + c 2 ) V 2 (y[t]) + c 1 + c 3.(8) Notice that the sum o the expressions in (7) and (8) can be made negative by choosing B large enough. Hence (6) holds when we let ɛ = γ/2 and choose ˆB large enough. he proo o positive recurrence o the chain ollows rom Foster s Criteria (c. [22] or [16]). Let us use y[ ] to denote the random variable to which {y[t]} t converges. Due to the -ergodic theorem o [16], the drit condition o (6) 6 he assumption o i.i.d. arrivals is not critical to the analysis. he same results continue to hold or processes with mild ergodicity properties ([10]). 1938

4 is equivalent to E[ V 1 (y[ ]] <. Invoking the deinition o V 1 ( ) results in the intended stability result. heorem 1 shows that under very mild conditions, i a randomized scheduler can be ound that satisies (3), and the control in (4) can be perormed, then the stability will be achieved or any stabilizable incoming traic. IV. FAIR SERVICE OF ELASIC RAFFIC In the previous section, we proved the throughput optimality o a randomized scheme or inelastic traic, provided that the exogenous arrival rates are stabilizable. hus, with that scheme, even i stability is achieved or a given mean arrival vector, the system may be seriously underutilized. Ideally, it would be desired to know the stability region o the network and choose the arrival rates to ully utilize the network resources. However, as noted in [26], the task o determining whether a given set o arrival rates is in the characterized stability region becomes an intractable problem as the network size grows. In this section, we extend the throughput-optimal algorithm so that the available capacity o the network is ully utilized and airly shared among the lows in a completely decentralized and dynamic ashion without the need to explicitly characterize the stability region. o that end, we change the considered traic model rom inelastic to elastic, where in the latter case the mean arrival rates o the sources can be modiied. o deine airness, as is standard in the recent literature (e.g. [11, 12, 15, 22, 7, 18, 13]), we use a utility unction, U ( ), o mean arrival rates that is a measure o low s preerences. hroughout, we will assume that this unction is concave and non-decreasing. We call the allocation, x, that satisies x arg max U (x ) (9) x Λ F the air allocation. Notice that this is the allocation that maximizes the aggregate utility o the network. It is known that by deining U ( ) appropriately dierent airness criteria o interest, such as proportional or max-min airness, can be achieved (see [22] or an extensive review). Next, we describe the so called Dual Congestion Control mechanism that is implemented at the source o each low in a completely decentralized ashion. Variations o this mechanism are studied recently in the literature [7, 18, 14, 23]. DUAL CONGESION CONROL MECHANISM: Assume that every low has access to the its entry point queue-length inormation, i.e. low knows q b(),e() [t] or all t. hen, at the beginning o each time slot t, low generates x [t] packets satisying { ( ) } x [t] = min U 1 qb(),e() [t],m, (10) K where M and K are positive scalars. he policy is easy to implement at each source because it only requires the queue length o the buer at the source, and the individual utility unction o the low. Note that the only common inormation required at all the sources is K. Once K is determined, the low control mechanism can operate in a completely decentralized ashion in parallel with the randomized routing-scheduling algorithm described in Section III. heorem 2. For some inite constants C 1,C 2 we have q C 1 K (11) n N d N U ( x ) U (x ) C 2 (12) K F F 1 1 where x lim E[x [t]], and similarly or q. t=0 Proo: We start by introducing a relaxed version o the optimization problem (9): or any ε>0, let x (ε) arg max U (x ), x Λ(ε) where Λ(ε) ={x Λ:[x + ε] Λ}. Λ(ε) is a subset o the capacity region Λ with an ε-strip o its positive surace is deleted. It is not diicult to see that x (ε) x as ε 0. We use the same Lyapunov unctions V (y),v 1 (y) and V 2 (y) introduced in Section III (c.. (5)) to prove the theorem. he ollowing theorem studies the single-step mean drit o V 1 (y). he proo o this lemma is provided in Appendix C. Lemma 3. For some constants ɛ>0,c 1 <, 1 (y[t]) ε q [t]+2k E[U (x [t]) y[t]] 2K U (x (ε)) ε V1 N 2 (y[t]) + 2 V 2 (y[t]) + c 1 Proo o heorem 2 (Continued): In what ollows, we will omit [t] or convenience. By combining the result o Lemma 3 with that o Lemma 2, we can write: (y[t]) ε q +2K U (x ) 2KE[ U (x (ε)) y]+c 1 + c 3 V1 (y) ε N 2 δv 2 (y) + (2 + c 2 ) V 2 (y) (13) (a) c 4 ε q +2K{ E[U (x ) y] U (x (ε))} where the inequality (a) ollows rom the act that (13) is upper-bounded as argued in the proo o heorem 1. By taking expectations o both sides o the last inequality and summing over t =0, 1,, 1, we get 1 E[V (y[ ]) V (y[0])] c 4 ε E[q [t]] t=0 1 +2K E[U (x [t])] 2K t=0 U (x (ε)). (14) 1939

5 Since V (y) 0 or all y, we can re-arrange the terms in (14) to obtain the ollowing inequality. 1 1 t=0 E[q [t]] V (y[0]) ε + c 4 +2M F K. ε he proo o (11) is complete when we let, and deine C 1 2M F ε. I, on the other hand, we re-arrange the terms in (14) dierently, we can get 1 1 E[U (x [t])] U (x (ε)) V (y[0]) 2K c 4 2K. t=0 Hence, the proo o (12) is complete when we use Jensen s inequality to write U ( x ) 1 1 t=0 E[U (x [t])], and deine C 2 c4 2. V. CONCLUSIONS In this work, we provided a ramework or the design o practical cross-layer algorithms or multi-hop wireless networks that are throughput-optimal and air. Previously proposed low complexity implementations or multi-hop wireless networks have been greedy in nature. Despite their ease o implementation, such policies have been shown in recent works to have poor throughput perormance. he greatest weakness o greedy policies is their lack o memory. In this work, we considered the generalization o a practical randomized policy irst introduced in [24] or switches to multi-hop networks. We proved that with the use o a small memory unit at the nodes, this policy achieves 100% o the available capacity o the network. We also considered the case o elastic lows and provided a decentralized congestion control algorithm that works in parallel with the randomized algorithm. We showed that the resulting cross-layer algorithm allocates resources airly across users. We note that the extra overhead that will appear in our randomized algorithm can be reduced at the expense o larger delay, but without sacriicing rom throughput. Also, our initial indings suggest that the additional complexity is comparable to the complexity o the greedy policies. In our companion paper [6], we show that the development and analysis o low complexity, distributed PICK and COMPARE algorithms (as described in Section III) or the two-hop intererence model. APPENDIX A. Proo o Lemma 1: Proo: We start by arranging the terms o 1 (y[t]). 1 (y[t]) = E[(q[t +1] q[t]) (q[t +1]+q[t]) y[t]] (a) c 1 +2 q [t](λ + π d into(n) [t] π d out(n) [t]) (15) +2 q [t](πinto(n) d [t] πd out(n) [t] π d into(n) [t]+ π d out(n) [t]), (16) where inequality (a) is due to the act that E[x 2 [t]] A, and that πinto(n) d [t] and πd out(n) [t] are both upper-bounded by the maximum degree o G. In (15) and (16), the optimal allocation π w is added and subtracted. For notational convenience, we use λ S λ. Also, π d into(n) and π d out(n) are deined similarly to πinto(n) d and πd out(n). Since the arrival rate vector λ is known to be within the stability region Λ, we can upper-bound the second expression in (15) by γ V 1 (y[t] (e.g. see [5]). Next, notice that (16) = 2w[t] ( π w [t] π[t]) 2 V 2 (y[t]). Combination o these results yields the proo. B. Proo o Lemma 2: Proo: We start by analyzing the conditional expectation E[V 2 (y[t + 1]) y[t]] (1 δ)e[(w[t +1] ( π w [t +1] π[t + 1])) 2 y[t],π[t +1] π w [t + 1]]. Next, we write the evolution o the weight vector w[t] as w[t +1] =w[t]+r[t] z[t], where r[t] denotes the vector o packets entering the queues and z[t] is the vector o packets leaving the queues. We can describe these vectors more precisely, but this is not necessary or the proo. he only important actor is the boundedness o them. Now, we can write E[V 2 (y[t + 1]) y[t]] (1 δ)e[(w[t] ( π w [t +1] π[t + 1]) (17) +( π w [t +1] π[t + 1]) (r[t] z[t])) 2 y[t],π[t +1] π w [t + 1]](18) It is not diicult to upper-bound the expression in (18) with a inite constant. o bound (17), we make two observations: (i) w[t] π w [t +1] w[t] π w [t] due to the deinition o the optimal allocation vector π w in (2). (ii) w[t] π[t +1] w[t] π[t] due to the update rule (3) o the randomized algorithm. By combining these observations, we can ind constants c 2,c 3 < that satisy E[V 2 (y[t + 1]) y[t]] (1 δ)v 2 (y[t]) + c 2 V2 (y[t]) + c 3, which completes the proo. C. Proo o Lemma 3: Proo: he proo starts with the ollowing upper bound on 1 (y[t]) (c. (15) and (16)): 1940

6 1 (y[t]) [4] P. Chaporkar, K. Kar, and S. Sarkar. hroughput guarantees through c 1 +2 V 2 (y[t])+2 maximal scheduling in wireless networks. In Proceedings o the E[q [t] x [t] y[t]] Allerton Conerence on Control, Communications and Computing, S [5] A. Eryilmaz. Eicient and air scheduling or wireless networks. PhD 2 π(n,m) d [t](q thesis, University o Illinois at Urbana, Champaign, August [t] q m,d [t]) [6] A. Eryilmaz, A. Ozdaglar, and E. Modiano. Polynomial complexity (n,m) L d = c 1 +2 V 2 (y[t])+2 algorithms or ull utilization o multi-hop wireless networks, LIDS Report, submitted. KE[U (x [t]) y[t]] [7] A. Eryilmaz and R. Srikant. Fair resource allocation in wireless 2 networks using queue-length based scheduling and congestion control. In Proceedings o IEEE Inocom, Miami, FL, March E[KU (x [t]) q b(),e() x [t] y[t]] (19) [8] A. Eryilmaz and R. Srikant. Resource allocation o multi-hop wireless networks. In Proceedings o International Zurich Seminar 2 π(n,m) d [t](q on Communications, February [t] q m,d [t]), (20) [9] A. Eryilmaz, R. Srikant, and J. Perkins. Stable scheduling policies (n,m) L d or ading wireless channels. In Proceedings o IEEE International Symposium on Inormation heory, A longer version appeared where we get the last equality by adding and subtracting 2K in the IEEE/ACM ransactions on Networking, E[U [10] A. Eryilmaz, R. Srikant, and J. R. Perkins. Stable scheduling policies (x [t]) y[t]], and by noting that or ading wireless channels. IEEE/ACM ransactions on Networking, q [t]( 13: , April x [t]) = q b(),e() [t]x [t]. [11] F. P. Kelly. Charging and rate control or elastic traic. European ransactions on elecommunications, 8:33 37, S [12] F. P. Kelly, A. Maulloo, and D. an. Rate control in communication networks: Shadow prices, proportional airness and stability. Journal Notice that the Dual Congestion Control mechanism is o the Operational Research Society, 49: , designed to optimize the expression in (19), and the Backpressure Policy is designed to optimize (20). Bounds to wireless networks. In Proceedings o IEEE Conerence on Decision [13] X. Lin and N. Shro. Joint rate control and scheduling in multihop and Control, Paradise Island, Bahamas, December these expressions are obtained in [18], which are reproduced [14] X. Lin and N. Shro. he impact o imperect scheduling on crosslayer rate control in multihop wireless networks. In Proceedings o below. IEEE Inocom, Miami, FL, March E[KU (x [t]) q b(),e() x [t] y[t]] [15] S. H. Low and D. E. Lapsley. Optimization low control, I: Basic algorithm and convergence. IEEE/ACM ransactions on Networking, K U (x (ε)) 7: , December q b(),e() [t]x (ε) [16] S. Meyn and R. weedie. Markov Chains and Stochastic Stability. Springer-Verlag, π(n,m) d [t](q [t] q m,d [t]) [17] E. Modiano, D. Shah, and G. Zussman. Maximizing throughput q [t](x in wireless networks via gossiping. In ACM SIGMERICS/IFIP (ε)+ε). (n,m) L d he irst inequality is straight-orward since x (ε) is an element o the set o easible rate vectors (i.e. vectors in [0,M] F ) over which the Congestion Controller o (10) maximizes the the expression on the let. he second inequality ollows rom the act that x (ε) =(x (ε)) is at least ε away rom the boundary o Λ or all. By canceling common terms, we obtain 1 (y[t]) 2ε q [t]+2k 2K E[U (x [t]) y[t]] U (x (ε)) + 2 V 2 (y[t]) + c 1. Finally, we use the ollowing lower bound q [t] V1(y[t]) N 2, which, when substituted into the previous expression, yields the statement o the lemma. REFERENCES [1] M. Andrews, K. Kumaran, K. Ramanan, A. Stolyar, R. Vijayakumar, and P. Whiting. Scheduling in a queueing system with asynchronously varying service rates, Bell Laboratories echnical Report. [2] D. P. Bertsekas and J. N. sitsiklis. Parallel and Distributed Computation: Numerical Methods. Athena Scientiic, Belmont, MA, [3] L. Bui, A. Eryilmaz, R. Srikant, and X. Wu. Joint asynchronous congestion control and distributed scheduling or wireless networks. Proceedings o IEEE Inocom Perormance, [18] M.J. Neely, E. Modiano, and C. Li. Fairness and optimal stochastic control or heterogeneous networks. In Proceedings o IEEE Inocom, pages , Miami, FL, March [19] M.J. Neely, E. Modiano, and C.E. Rohrs. Dynamic power allocation and routing or time varying wireless networks. In Proceedings o IEEE Inocom, pages , April [20] G. Sasaki and B. Hajek. Link scheduling in polynomial time. IEEE ransactions on Inormation heory, 32: , [21] S. Shakkottai and A. Stolyar. Scheduling or multiple lows sharing a time-varying channel: he exponential rule. ranslations o the AMS, Series 2, A volume in memory o F. Karpelevich, 207: , [22] R. Srikant. he Mathematics o Internet Congestion Control. Birkhäuser, Boston, MA, [23] A. Stolyar. Maximizing queueing network utility subject to stability: Greedy primal-dual algorithm. Queueing Systems, 50(4): , [24] L. assiulas. Linear complexity algorithms or maximum throughput in radio networks and input queued switches. In Proceedings o IEEE Inocom, pages , [25] L. assiulas and A. Ephremides. Stability properties o constrained queueing systems and scheduling policies or maximum throughput in multihop radio networks. IEEE ransactions on Automatic Control, 36: , December [26] L. assiulas and A. Ephremides. Dynamic server allocation to parallel queues with randomly varying connectivity. IEEE ransactions on Inormation heory, 39: , March [27] X. Wu and R. Srikant. Regulated maximal matching: A distributed scheduling algorithm or multi-hop wireless networks with nodeexclusive spectrum sharing, Submitted to IEEE Conerence on Decision and Control. [28] X. Wu and R. Srikant. Bounds on the capacity region o multi-hop wireless networks under distributedgreedy scheduling. In Proceedings o IEEE Inocom, 2006.

Imperfect Randomized Algorithms for the Optimal Control of Wireless Networks

Imperfect Randomized Algorithms for the Optimal Control of Wireless Networks Imperfect Randomized Algorithms for the Optimal Control of Wireless Networks Atilla ryilmaz lectrical and Computer ngineering Ohio State University Columbus, OH 430 mail: eryilmaz@ece.osu.edu Asuman Ozdaglar,

More information

Max-Weight Scheduling in Queueing Networks with. Heavy-Tailed Traffic

Max-Weight Scheduling in Queueing Networks with. Heavy-Tailed Traffic Max-Weight Scheduling in Queueing Networks with Heavy-Tailed Traic arxiv:1108.0370v1 [cs.ni] 1 Aug 011 Mihalis G. Markakis, Eytan H. Modiano, and John N. Tsitsiklis Abstract We consider the problem o packet

More information

Delay Efficient Scheduling via Redundant Constraints in Multihop Networks

Delay Efficient Scheduling via Redundant Constraints in Multihop Networks Delay Eicient Scheduling via Redundant Constraints in Multihop Networks Longbo Huang, Michael J. Neely Abstract We consider the problem o delay-eicient scheduling in general multihop networks. While the

More information

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels 1 Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels Invited Paper Ali ParandehGheibi, Muriel Médard, Asuman Ozdaglar, and Atilla Eryilmaz arxiv:0810.167v1 cs.it

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo, Xiaojun Lin, and Ness B. Shroff Abstract In this paper, we characterize the performance

More information

On the Flow-level Dynamics of a Packet-switched Network

On the Flow-level Dynamics of a Packet-switched Network On the Flow-level Dynamics o a Packet-switched Network Ciamac C. Moallemi and Devavrat Shah Abstract: The packet is the undamental unit o transportation in modern communication networks such as the Internet.

More information

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo Departments of ECE and CSE The Ohio State University Email: cjoo@ece.osu.edu Xiaojun

More information

Fairness and Optimal Stochastic Control for Heterogeneous Networks

Fairness and Optimal Stochastic Control for Heterogeneous Networks λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse

Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse L. assiulas y Dept. of Electrical Engineering Polytechnic University Brooklyn, NY 20 leandros@olympos.poly.edu L. Georgiadis IBM. J. Watson

More information

Towards Achieving Full Secrecy Rate and Low Delays in Wireless Networks

Towards Achieving Full Secrecy Rate and Low Delays in Wireless Networks owards Achieving Full Secrecy Rate and Low Delays in Wireless Networks Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State University

More information

Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks

Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks Xin Wang, Koushik Kar Department of Electrical, Computer and Systems Engineering, Rensselaer Polytechnic Institute,

More information

Node-based Distributed Optimal Control of Wireless Networks

Node-based Distributed Optimal Control of Wireless Networks Node-based Distributed Optimal Control of Wireless Networks CISS March 2006 Edmund M. Yeh Department of Electrical Engineering Yale University Joint work with Yufang Xi Main Results Unified framework for

More information

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads Operations Research Letters 37 (2009) 312 316 Contents lists available at ScienceDirect Operations Research Letters journal homepage: www.elsevier.com/locate/orl Instability of FIFO in a simple queueing

More information

Utility-Maximizing Scheduling for Stochastic Processing Networks

Utility-Maximizing Scheduling for Stochastic Processing Networks Utility-Maximizing Scheduling for Stochastic Processing Networks Libin Jiang and Jean Walrand EECS Department, University of California at Berkeley {ljiang,wlr}@eecs.berkeley.edu Abstract Stochastic Processing

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING

STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING Applied Probability Trust (7 May 2015) STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING RAMTIN PEDARSANI and JEAN WALRAND, University of California,

More information

Towards Achieving Full Secrecy Rate in Wireless Networks: A Control Theoretic Approach

Towards Achieving Full Secrecy Rate in Wireless Networks: A Control Theoretic Approach owards Achieving Full Secrecy Rate in Wireless Networks: A Control heoretic Approach Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State

More information

Optimal scaling of average queue sizes in an input-queued switch: an open problem

Optimal scaling of average queue sizes in an input-queued switch: an open problem DOI 10.1007/s11134-011-9234-1 Optimal scaling of average queue sizes in an input-queued switch: an open problem Devavrat Shah John N. Tsitsiklis Yuan Zhong Received: 9 May 2011 / Revised: 9 May 2011 Springer

More information

Optimizing Queueing Cost and Energy Efficiency in a Wireless Network

Optimizing Queueing Cost and Energy Efficiency in a Wireless Network Optimizing Queueing Cost and Energy Efficiency in a Wireless Network Antonis Dimakis Department of Informatics Athens University of Economics and Business Patission 76, Athens 1434, Greece Email: dimakis@aueb.gr

More information

A Probabilistic Sample Path Convergence Time Analysis of Drift-Plus-Penalty Algorithm for Stochastic Optimization

A Probabilistic Sample Path Convergence Time Analysis of Drift-Plus-Penalty Algorithm for Stochastic Optimization A Probabilistic Sample Path Convergence ime Analysis of Drift-Plus-Penalty Algorithm for Stochastic Optimization Xiaohan Wei, Hao Yu and Michael J. Neely arxiv:50.0973v3 math.oc 7 Dec 06 Abstract his paper

More information

On wireless scheduling with partial channel-state information

On wireless scheduling with partial channel-state information On wireless scheduling with partial channel-state information Aditya Gopalan, Constantine Caramanis and Sanjay Shakkottai Abstract We consider a single server serving a time-slotted queued system of multiple

More information

Distributed Random Access Algorithm: Scheduling and Congesion Control

Distributed Random Access Algorithm: Scheduling and Congesion Control Distributed Random Access Algorithm: Scheduling and Congesion Control The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As

More information

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally

More information

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks Technical Report Computer Networks Research Lab Department of Computer Science University of Toronto CNRL-08-002 August 29th, 2008 On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

More information

Greedy weighted matching for scheduling the input-queued switch

Greedy weighted matching for scheduling the input-queued switch Greedy weighted matching for scheduling the input-queued switch Andrew Brzezinski and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {brzezin,modiano}@mit.edu

More information

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch A Starvation-free Algorithm For Achieving 00% Throughput in an Input- Queued Switch Abstract Adisak ekkittikul ick ckeown Department of Electrical Engineering Stanford University Stanford CA 9405-400 Tel

More information

Exploring the Tradeoff between Waiting Time and Service Cost in Non-Asymptotic Operating Regimes

Exploring the Tradeoff between Waiting Time and Service Cost in Non-Asymptotic Operating Regimes Exploring the radeoff between Waiting ime and Service Cost in Non-Asymptotic Operating Regimes Bin Li, Ozgur Dalkilic and Atilla Eryilmaz Abstract Motivated by the problem of demand management in smart

More information

( x) f = where P and Q are polynomials.

( x) f = where P and Q are polynomials. 9.8 Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm ( ) ( ) ( ) P where P and Q are polynomials. Q An eample o a simple rational

More information

Inequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers

Inequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers IEEE Proceedings of the International Conference on Communications, 2000 Inequality Comparisons and raffic Smoothing in Multi-Stage AM Multiplexers Michael J. Neely MI -- LIDS mjneely@mit.edu Abstract

More information

A Mechanism for Pricing Service Guarantees

A Mechanism for Pricing Service Guarantees A Mechanism for Pricing Service Guarantees Bruce Hajek Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign Sichao Yang Qualcomm

More information

On the stability of flow-aware CSMA

On the stability of flow-aware CSMA On the stability of flow-aware CSMA Thomas Bonald, Mathieu Feuillet To cite this version: Thomas Bonald, Mathieu Feuillet. On the stability of flow-aware CSMA. Performance Evaluation, Elsevier, 010, .

More information

Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic

Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic 1 Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic Mihalis G. Markakis, Eytan Modiano, and John N. Tsitsiklis Abstract We study multi-hop networks with flow-scheduling

More information

Feasible rate allocation in wireless networks

Feasible rate allocation in wireless networks Feasible rate allocation in wireless networks Ramakrishna Gummadi gummadi2@uiuc.edu Kyomin Jung kmjung@mit.edu Devavrat Shah devavrat@mit.edu Ramavarapu Sreenivas rsree@uiuc.edu Abstract Rate allocation

More information

A Simple Memoryless Proof of the Capacity of the Exponential Server Timing Channel

A Simple Memoryless Proof of the Capacity of the Exponential Server Timing Channel A Simple Memoryless Proof of the Capacity of the Exponential Server iming Channel odd P. Coleman ECE Department Coordinated Science Laboratory University of Illinois colemant@illinois.edu Abstract his

More information

Queue Proportional Scheduling in Gaussian Broadcast Channels

Queue Proportional Scheduling in Gaussian Broadcast Channels Queue Proportional Scheduling in Gaussian Broadcast Channels Kibeom Seong Dept. of Electrical Engineering Stanford University Stanford, CA 9435 USA Email: kseong@stanford.edu Ravi Narasimhan Dept. of Electrical

More information

Node-Based Distributed Optimal Control of Wireless Networks

Node-Based Distributed Optimal Control of Wireless Networks Node-Based Distributed Optimal Control of Wireless Networks Yufang Xi and Edmund M. Yeh Department of Electrical Engineering Yale University New Haven CT 06520 USA Email: {yufang.xi edmund.yeh}@yale.edu

More information

Low-complexity Scheduling Algorithms for Multi-channel Downlink Wireless Networks

Low-complexity Scheduling Algorithms for Multi-channel Downlink Wireless Networks Low-complexity Scheduling Algorithms for Multi-channel Downlink Wireless Networks Shreeshankar Bodas, Sanay Shakkottai Department of ECE The University of Texas at Austin {shreeshankar,shakkott}@mail.utexas.edu

More information

Delay bounds (Simon S. Lam) 1

Delay bounds (Simon S. Lam) 1 1 Pacet Scheduling: End-to-End E d Delay Bounds Delay bounds (Simon S. Lam) 1 2 Reerences Delay Guarantee o Virtual Cloc server Georey G. Xie and Simon S. Lam, Delay Guarantee o Virtual Cloc Server, IEEE/ACM

More information

On High-Rate Cryptographic Compression Functions

On High-Rate Cryptographic Compression Functions On High-Rate Cryptographic Compression Functions Richard Ostertág and Martin Stanek Department o Computer Science Faculty o Mathematics, Physics and Inormatics Comenius University Mlynská dolina, 842 48

More information

Throughput-Lifetime Tradeoffs in Multihop Wireless Networks under an SINR-based Interference Model

Throughput-Lifetime Tradeoffs in Multihop Wireless Networks under an SINR-based Interference Model 1 Throughput-Lietime Tradeos in Multihop Wireless Networks under an SINR-based Intererence Model Jun Luo, Aravind Iyer and Catherine Rosenberg Abstract High throughput and lietime are both crucial design

More information

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling 1 Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling Saswati Sarkar and Koushik Kar Abstract In this paper, we consider queue-length stability in wireless

More information

The Multi-Path Utility Maximization Problem

The Multi-Path Utility Maximization Problem The Multi-Path Utility Maximization Problem Xiaojun Lin and Ness B. Shroff School of Electrical and Computer Engineering Purdue University, West Lafayette, IN 47906 {linx,shroff}@ecn.purdue.edu Abstract

More information

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. XX, XXXXXXX X Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks Longbi Lin, Xiaojun Lin, Member, IEEE, and Ness B. Shroff,

More information

On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks

On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networs V.J. Venataramanan and Xiaojun Lin School of ECE Purdue University Email: {vvenat,linx}@purdue.edu Lei Ying Department

More information

Efficiency and Braess Paradox under Pricing

Efficiency and Braess Paradox under Pricing Efficiency and Braess Paradox under Pricing Asuman Ozdaglar Joint work with Xin Huang, [EECS, MIT], Daron Acemoglu [Economics, MIT] October, 2004 Electrical Engineering and Computer Science Dept. Massachusetts

More information

On Throughput Optimality with Delayed Network-State Information

On Throughput Optimality with Delayed Network-State Information 1 On Throughput Optimality with Delayed Network-State Information Lei Ying and Sanjay Shakkottai Abstract We study the problem of routing/scheduling in a wireless network with partial/delayed Network channel

More information

Concave switching in single-hop and multihop networks

Concave switching in single-hop and multihop networks Queueing Syst (2015) 81:265 299 DOI 10.1007/s11134-015-9447-9 Concave switching in single-hop and multihop networks Neil Walton 1 Received: 21 July 2014 / Revised: 17 April 2015 / Published online: 23

More information

Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems

Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Yueping Zhang and Dmitri Loguinov Texas A&M University, College Station, TX 77843 Email: {yueping, dmitri}@cs.tamu.edu Abstract

More information

Stability of the Maximum Size Matching

Stability of the Maximum Size Matching Stability of the Maximum Size Matching Mohsen Bayati Dept. of Electrical Engineering Stanford University Stanford, CA 9405-950 bayati@stanford.edu Neda Beheshti Dept. of Electrical Engineering Stanford

More information

Scheduling: Queues & Computation

Scheduling: Queues & Computation Scheduling: Queues Computation achieving baseline performance efficiently Devavrat Shah LIDS, MIT Outline Two models switched network and bandwidth sharing Scheduling: desirable performance queue-size

More information

Rate and Power Allocation in Fading Multiple Access Channels

Rate and Power Allocation in Fading Multiple Access Channels 1 Rate and Power Allocation in Fading Multiple Access Channels Ali ParandehGheibi, Atilla Eryilmaz, Asuman Ozdaglar, and Muriel Médard Abstract We consider the problem of rate and power allocation in a

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Equivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues

Equivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues Proceedings of the 38th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2000. Equivalent Models and Analysis for Multi-Stage ree Networks of Deterministic Service ime Queues Michael

More information

Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications

Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications Alp Simsek Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Asuman E.

More information

c 2013 Javad Ghaderi Dehkordi

c 2013 Javad Ghaderi Dehkordi c 2013 Javad Ghaderi Dehkordi FUNDAMENTAL LIMITS OF RANDOM ACCESS IN WIRELESS NETWORKS BY JAVAD GHADERI DEHKORDI DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor

More information

OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION

OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION Xu Bei, Yeo Jun Yoon and Ali Abur Teas A&M University College Station, Teas, U.S.A. abur@ee.tamu.edu Abstract This paper presents

More information

Novel Architectures and Algorithms for Delay Reduction in Back-pressure Scheduling and Routing

Novel Architectures and Algorithms for Delay Reduction in Back-pressure Scheduling and Routing Novel Architectures and Algorithms for Delay Reduction in Back-pressure Scheduling and Routing 1 arxiv:0901.1312v3 [cs.ni] 28 May 2010 Loc Bui, R. Srikant, Alexander Stolyar Abstract The back-pressure

More information

[4] T. I. Seidman, \\First Come First Serve" is Unstable!," tech. rep., University of Maryland Baltimore County, 1993.

[4] T. I. Seidman, \\First Come First Serve is Unstable!, tech. rep., University of Maryland Baltimore County, 1993. [2] C. J. Chase and P. J. Ramadge, \On real-time scheduling policies for exible manufacturing systems," IEEE Trans. Automat. Control, vol. AC-37, pp. 491{496, April 1992. [3] S. H. Lu and P. R. Kumar,

More information

Resource Allocation and Pricing. R. Srikant University of Illinois

Resource Allocation and Pricing. R. Srikant University of Illinois Resource Allocation and Pricing R. Srikant University of Illinois References The Mathematics of Internet Congestion Control, Birkhauser, 2004. Pricing: Kelly Distributed Resource Allocation: Kelly, Mauloo

More information

1 Relative degree and local normal forms

1 Relative degree and local normal forms THE ZERO DYNAMICS OF A NONLINEAR SYSTEM 1 Relative degree and local normal orms The purpose o this Section is to show how single-input single-output nonlinear systems can be locally given, by means o a

More information

A New Approach for Asynchronous Distributed Rate Control of Elastic Sessions in Integrated Packet Networks

A New Approach for Asynchronous Distributed Rate Control of Elastic Sessions in Integrated Packet Networks A New Approach or Asynchronous Distributed Rate Control o Elastic Sessions in Integrated Packet Networks Santosh P. Abraham and Anurag Kumar Abstract We develop a new class o asynchronous distributed algorithms

More information

Stochastic Subgradient Methods with Approximate Lagrange Multipliers

Stochastic Subgradient Methods with Approximate Lagrange Multipliers Stochastic Subgradient Methods with Approximate Lagrange Multipliers Víctor Valls, Douglas J. Leith Trinity College Dublin Abstract We study the use of approximate Lagrange multipliers in the stochastic

More information

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent

More information

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano

More information

Data Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems

Data Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems Data Center Server Provision: Distributed Asynchronous Control or Coupled Renewal Systems Xiaohan Wei and Michael J. Neely, Senior Member, I arxiv:5.0609v cs.dc 7 Dec 06 Abstract his paper considers a

More information

THE Internet is increasingly being used in the conduct of

THE Internet is increasingly being used in the conduct of 94 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 1, FEBRUARY 2006 Global Stability Conditions for Rate Control With Arbitrary Communication Delays Priya Ranjan, Member, IEEE, Richard J. La, Member,

More information

Wireless Scheduling. Mung Chiang Electrical Engineering, Princeton University. WiOpt Seoul, Korea June 23, 2009

Wireless Scheduling. Mung Chiang Electrical Engineering, Princeton University. WiOpt Seoul, Korea June 23, 2009 Wireless Scheduling Mung Chiang Electrical Engineering, Princeton University WiOpt Seoul, Korea June 23, 2009 Outline Structured teaser on wireless scheduling Focus on key ideas and 10 open problems Biased

More information

Basic mathematics of economic models. 3. Maximization

Basic mathematics of economic models. 3. Maximization John Riley 1 January 16 Basic mathematics o economic models 3 Maimization 31 Single variable maimization 1 3 Multi variable maimization 6 33 Concave unctions 9 34 Maimization with non-negativity constraints

More information

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits

More information

Solving Dual Problems

Solving Dual Problems Lecture 20 Solving Dual Problems We consider a constrained problem where, in addition to the constraint set X, there are also inequality and linear equality constraints. Specifically the minimization problem

More information

A Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification (ECN) Marking

A Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification (ECN) Marking University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering June 2002 A Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification

More information

Asymptotics, asynchrony, and asymmetry in distributed consensus

Asymptotics, asynchrony, and asymmetry in distributed consensus DANCES Seminar 1 / Asymptotics, asynchrony, and asymmetry in distributed consensus Anand D. Information Theory and Applications Center University of California, San Diego 9 March 011 Joint work with Alex

More information

Feedback Linearization

Feedback Linearization Feedback Linearization Peter Al Hokayem and Eduardo Gallestey May 14, 2015 1 Introduction Consider a class o single-input-single-output (SISO) nonlinear systems o the orm ẋ = (x) + g(x)u (1) y = h(x) (2)

More information

Scheduling in parallel queues with randomly varying connectivity and switchover delay

Scheduling in parallel queues with randomly varying connectivity and switchover delay Scheduling in parallel queues with randomly varying connectivity and switchover delay The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters.

More information

Caching Policy Optimization for Video on Demand

Caching Policy Optimization for Video on Demand Caching Policy Optimization or Video on Demand Hao Wang, Shengqian Han, and Chenyang Yang School o Electronics and Inormation Engineering, Beihang University, China, 100191 Email: {wang.hao, sqhan, cyyang}@buaa.edu.cn

More information

Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance

Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance Yu Sang, Gagan R. Gupta, and Bo Ji Member, IEEE arxiv:52.02328v2 [cs.ni] 8 Nov 207 Abstract This

More information

Crowdsourcing in Cyber-Physical Systems: Stochastic Optimization with Strong Stability

Crowdsourcing in Cyber-Physical Systems: Stochastic Optimization with Strong Stability Received 1 April 2013; revised 25 May 2013; accepted 29 June 2013. Date of publication 15 July 2013; date of current version 21 January 2014. Digital Object Identifier 10.1109/EC.2013.2273358 Crowdsourcing

More information

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Matthew Johnston, Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge,

More information

Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Radio Networks Considering Self-Interference

Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Radio Networks Considering Self-Interference Received November 8, 015, accepted December 10, 015, date o publication December 17, 015, date o current version December 8, 015. Digital Object Identiier 10.1109/ACCE.015.509449 Design and Optimal Coniguration

More information

arxiv: v1 [cs.sy] 10 Apr 2014

arxiv: v1 [cs.sy] 10 Apr 2014 Concave Switching in Single and Multihop Networks arxiv:1404.2725v1 [cs.sy] 10 Apr 2014 Neil Walton 1 1 University of Amsterdam, n.s.walton@uva.nl Abstract Switched queueing networks model wireless networks,

More information

Data Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems

Data Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems I/ACM RANSACIONS ON NWORKING, VOL 5, ISSU 4, AUG. 07 Data Center Server Provision: Distributed Asynchronous Control or Coupled Renewal Systems Xiaohan Wei and Michael J. Neely, Senior Member, I Abstract

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling On Centralized Smooth Scheduling Ami Litman January 25, 2005 Abstract Shiri Moran-Schein This paper studies evenly distributed sets of natural numbers and their applications to scheduling in a centralized

More information

A Distributed Newton Method for Network Utility Maximization, I: Algorithm

A Distributed Newton Method for Network Utility Maximization, I: Algorithm A Distributed Newton Method for Networ Utility Maximization, I: Algorithm Ermin Wei, Asuman Ozdaglar, and Ali Jadbabaie October 31, 2012 Abstract Most existing wors use dual decomposition and first-order

More information

Dynamic resource sharing

Dynamic resource sharing J. Virtamo 38.34 Teletraffic Theory / Dynamic resource sharing and balanced fairness Dynamic resource sharing In previous lectures we have studied different notions of fair resource sharing. Our focus

More information

Distributed Optimization over Networks Gossip-Based Algorithms

Distributed Optimization over Networks Gossip-Based Algorithms Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random

More information

Delay Bounds for Approximate Maximum Weight Matching Algorithms for Input Queued Switches

Delay Bounds for Approximate Maximum Weight Matching Algorithms for Input Queued Switches Delay Bounds for Approximate Maximum Weight Matching Algorithms for Input Queued Switches Devavrat Shah, Milind Kopikare devavrat@cs.stanford.edu,kopi@stanford.edu Dept. of CS, Stanford University; Dept.

More information

Stability of the two queue system

Stability of the two queue system Stability of the two queue system Iain M. MacPhee and Lisa J. Müller University of Durham Department of Mathematical Science Durham, DH1 3LE, UK (e-mail: i.m.macphee@durham.ac.uk, l.j.muller@durham.ac.uk)

More information

Percentile Policies for Inventory Problems with Partially Observed Markovian Demands

Percentile Policies for Inventory Problems with Partially Observed Markovian Demands Proceedings o the International Conerence on Industrial Engineering and Operations Management Percentile Policies or Inventory Problems with Partially Observed Markovian Demands Farzaneh Mansouriard Department

More information

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks 1 Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo, Member, IEEE, Xiaojun Lin, Member, IEEE, and Ness B. Shroff, Fellow, IEEE Abstract

More information

Ergodic Stochastic Optimization Algorithms for Wireless Communication and Networking

Ergodic Stochastic Optimization Algorithms for Wireless Communication and Networking University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 11-17-2010 Ergodic Stochastic Optimization Algorithms for Wireless Communication and

More information

Power and Server Allocation in a Multi-Beam Satellite with Time Varying Channels

Power and Server Allocation in a Multi-Beam Satellite with Time Varying Channels Power and Server Allocation in a Multi-Beam Satellite with Time Varying hannels Michael J. eely Eytan Modiano harles Rohrs MIT--LIDS: {mjneely@mit.edu, modiano@mit.edu, crohrs@mit.edu} Abstract -- We consider

More information

A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels

A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels Krishna Jagannathan, Shie Mannor, Ishai Menache, Eytan Modiano Abstract We consider scheduling over a wireless

More information

arxiv: v1 [cs.sy] 24 Jul 2012

arxiv: v1 [cs.sy] 24 Jul 2012 Delay Stability Regions of the Max-Weight Policy under Heavy-Tailed Traffic Mihalis G. Markakis, Eytan Modiano, and John N. Tsitsiklis arxiv:1207.5746v1 [cs.sy] 24 Jul 2012 Abstract We carry out a delay

More information

APPENDIX 1 ERROR ESTIMATION

APPENDIX 1 ERROR ESTIMATION 1 APPENDIX 1 ERROR ESTIMATION Measurements are always subject to some uncertainties no matter how modern and expensive equipment is used or how careully the measurements are perormed These uncertainties

More information