Randomized Algorithms for Throughput-Optimality and Fairness in Wireless Networks
|
|
- Annabelle Miles
- 5 years ago
- Views:
Transcription
1 Proceedings o the 45th IEEE Conerence on Decision & Control Manchester Grand Hyatt Hotel San Diego, CA, USA, December 13-15, 2006 Randomized Algorithms or hroughput-optimality and Fairness in Wireless Networks Atilla Eryilmaz, Eytan Modiano and Asuman Ozdaglar Laboratory or Inormation and Decision Systems Massachusetts Institute o echnology Cambridge, MA, s: {eryilmaz, modiano, asuman}@mit.edu Abstract In this paper, we study multi-hop wireless networks with general intererence models, and describe a practical randomized routing-scheduling-congestion-control mechanism that is guaranteed to ully utilize the network capacity, and achieve air allocation o the resources. Using the ramework described in this paper, low complexity distributed algorithms can be developed or a large class o intererence models and airness criteria (such as proportional and max-min airness). Earlier distributed algorithms proposed in this context have been highly intererence model dependent, and can guarantee at most 50% utilization o the achievable throughput. his is the irst work that assures 100% utilization and also provides air allocation in multi-hop wireless networks. I. INRODUCION he control o data networks to achieve high throughput and air allocation o the resources among competing users (or lows) is clearly one o the most important problems in data communications. here has been considerable interest and progress in the development o algorithms that address the issues o eiciency and airness or both wireline and wireless networks. In the case o ixed arrival rates (i.e. inelastic traic), assiulas and Ephremides provided in their seminal work [25] a joint routing-scheduling algorithm that can achieve the highest throughput without violating the stability o the network. Such throughput-optimal policies make dynamic routing and scheduling decisions to avoid highly congested nodes. For wireline networks, these policies can be implemented in a distributed ashion by using buer occupancy inormation o only the neighboring nodes. In contrast, in wireless multi-hop networks, there is no known scheme or low complexity implementation o throughput-optimal policies. Many other throughput-optimal algorithms developed later share the same weakness [1, 21, 19, 9]. It is well-recognized that reducing the complexity o the centralized computation is an essential requirement or the development and implementation o throughput-optimal policies. For the case o switches, assiulas has shown how the use o randomized algorithms can reduce the complexity o the centralized computation [24]. One o the main contributions o our work is to extend the use o randomized algorithms or potential distributed implementation o routing and scheduling in the context o multi-hop wireless networks. he issue o air service o elastic traic, where the rate o an elastic low is assumed to be controllable, is irst considered by Kelly et al. [11, 12] in the context o wireline networks. he authors developed de-centralized algorithms that have strong ties to notions in market economics. he main idea behind these algorithms was or each source to measure the congestion level it experiences and to adjust its low rate accordingly with its utility unction in order to ully utilize the resources. hese ideas have been extended to dierent scenarios and algorithms (e.g. [15], see [22] or a review). However, all o these works were developed or wireline networks, assumed ixed routes, and ignored the stochastic nature o the traic. More recently, it has been realized that ideas o low control can be successully utilized together with the dynamic routing and scheduling algorithm described above [13, 23, 7, 18, 8]. It has been shown that mean rates arbitrarily close to the air allocation can be achieved without violating stability. However, the routing and scheduling part o the algorithm inherited the centralized optimization problem o [25], which is impractical to solve or multi-hop wireless networks. he design and analysis o distributed implementations o the above cross-layer approach attracted a lot o attention rom the community. In particular, [14, 27] provided algorithms that guarantee 50% utilization o the stability region or node-exclusive-spectrum-sharing (NESS) intererence model, where each easible allocation orms a matching 1 o the graph. It has been shown in [3] that 33% can be guaranteed even when the algorithm operates in a totally asynchronous manner (see [2] or a deinition). Distributed implementations exist or this particular intererence model i a signiicant portion o the capacity is sacriiced. For other general intererence models, it has been shown that the amount o sacriice is even greater. For example, [28] and [4] consider the two-hop intererence model 2 and show that the guaranteed raction o the capacity region drops with the increasing number o neighbors. In particular, or a grid topology, only 12.5% o the capacity region is achieved, which is very discouraging. 1 In a matching, no two links that are incident on the same node can be active simultaneously. 2 In the two-hop intererence model, a transmission over a link (n, m) is successul i and only i all the neighbors o n and m are silent at the time /06/$ IEEE. 1936
2 Our main contributions in this work are listed next. By extending the approach in [24] to the multi-hop wireless network scenario, we prove that the capacity region o the network can be ully utilized with a practical schedulingrouting algorithm. hus, no raction o the throughput need to be sacriiced or a practical implementation. In the case o elastic traic, we propose a cross-layer mechanism that is composed o a decentralized congestion controller operating in parallel with the practical schedulingrouting algorithm discussed in the previous item. We prove that this mechanism asymptotically achieves air division o the resources across the lows. All o our analysis considers a generic intererence model that can be applied to a large set o graph theoretic collision models considered in the literature. It is important to note that the proposed mechanism can be implemented with low complexity distributed algorithms or speciic intererence models o practical interest (see [6]). he rest o the paper is organized as ollows. In Section II, we describe the system model. hen, in Section III, we describe the practical algorithm and show its throughputoptimality. Section IV introduces the congestion control mechanism or elastic traic and establishes its air characteristics. We provide our concluding remarks in Section V, and some o the proos in the Appendix. II. SYSEM MODEL Consider a ixed wireless network that is represented by a graph G =(N, L), where N denotes the set o ixed nodes and L denotes the set o undirected links. We assume a time slotted system with synchronized nodes, where each slot is just long enough to accommodate a single packet transmission. Suppose there is a set F o end-to-end lows traversing the network, where each low F is given by the node pair (s(),d()). Here, s() denotes the source node o low and d() denotes the destination node. We allow or multiple routes between each source-destination pair. We consider both the inelastic and elastic traic cases. Associated with each destination a buer is maintained at each node. We let q [t] denote the length o the queue at node n keeping packets destined or node d at the beginning o slot t. Deinition 1 (Stability). A given queue is called stable i E[q [ ]] <, where q [ ] denotes the random variable with distribution given by the steady-state distribution o {q [t]}. he network is stable i all queues are stable; and unstable otherwise. We consider a general intererence model ormulation that contains all o the graph theoretic collision models considered in the context o scheduling (e.g. NESS [20, 14, 27, 3], or two-hop intererence models [28, 4]). We say that two links interere i their concurrent transmissions collide, and assume that i two interering links are activated in a slot, both o the transmissions ail. We use I(l) Lto denote the set o links that interere with link l. ypically, this set will contain links rom the local neighborhood o l. As an example, the matching constraint o the NESS model implies that or link l =(n, m), I(l) :={l L: l i(n) or l i(m)}, where i(n) denotes the set o links that are incident to node n. We will prove our results or the general model. We use π = { π (n,m) to denote a link activation }(n,m) L (or allocation) vector, and Π denote the easible set o allocations that complies with the intererence constraints. An allocation is easible i and only i no two links in the set interere with each other. As an example, or the NESS intererence model, Π corresponds to the set o matchings o G. We introduce the notation π(n,m) d to distinguish packets destined or dierent nodes: at any given slot, π(n,m) d [t] {0, 1} is 1 i link (n, m) serves a packet destined or node d in that slot, and 0 otherwise. Notice that π (n,m) [t] = d N πd (n,m) [t], or all t. Also note that it is suicient to restrict our attention to policies that sets π(n,m) d [t] to zero whenever q [t] = 0, or all (n, m) L, because any other policy that sets π(n,m) d [t] =1when q [t] =0can be replaced by a policy with π(n,m) d [t] =0without aecting the evolution o the queue-lengths. hen, we can write the evolution o a particular queue, say q, as q [t +1]= (q [t] πout(n) d [t]+ x [t]+πinto(n) d [t]), (1) S where x [t] is the number o exogenous low- arrivals to the network in slot t, and S { F: s() =n, d() =d} denotes the set o lows that start at node n and are destined to node d. Also, πinto(n) d [t] k:(k,n) L πd (k,n)[t] is a shorthand or the number o packets entering node n that are destined or node d. Similarly, πout(n) d [t] is the number o packets leaving node n and are destined or node d. We set q d,d [t] =0 t. Deinition 2 (Capacity (Stability) Region). Let G = (N, L) be a given network and Π be the set o easible allocations. he capacity (or stability) region Λ o the network is given by the set o vectors r =(r ) F or which there exists π d() (n,m) 0, or all (n, m) Land F, such that both the low conservation constraints at the nodes and the easibility constraints are satisied, as given below: (C1) For all n Nand F, we have 3 r 1 s()=n + π d() (k,n) = π d() (n,m), k:(k,n) L (C2) [ π (n,m) ](n,m) L Conv(Π). 4 m:(n,m) L It is shown in [25, 19] that Λ is the set o mean arrival rates or which there exists a policy that stabilizes the network. III. SABILIY FOR INELASIC RAFFIC he ocus o this section is throughput-optimality under stability or the inelastic traic scenario. We provide simple 3 We use 1 A as the indicator unction o event A. 4 Conv(A) denotes the convex hull o set A, which is the smallest convex set that includes A. he convex hull is included due to the possibility o timesharing between easible allocations. 1937
3 routing-scheduling mechanisms that can support any mean arrival rate in the capacity region without violating stability (such mechanisms are said to be throughput-optimal [25, 21, 19, 7]). In earlier work [24], assiulas used randomized schemes to provide a low complexity stabilizing algorithm or switches using a centralized controller. In this section, we will extend the use o randomized throughput-optimal schemes or multi-hop networks with general intererence models. In particular, we show that practical algorithms satisying several simple conditions can be designed to achieve ull utilization o the capacity o multi-hop wireless networks with general intererence models. o this end, we introduce the ollowing notation or link weights: w (n,m) [t] =w (m,n) [t] max d q [t] q m,d [t]. his is also reerred to as the dierential backlog 5 over link (n, m) and can be interpreted as a measure o the importance o the link. Consider the ollowing allocation vector π w [t] arg max π Π l L w l [t]π l arg max(w[t] π). (2) π Π his allocation rule is called the back-pressure policy. Once the π w is determined according to (2), only the commodity that maximizes the dierential backlog over link (n, m) is served over that link at the chosen rate. I the backpressure policy is applied at every time slot, it is known to be throughput-optimal. However, it requires a centralized controller that knows w[t] at every time-slot, and also communicates the allocation vector π w [t] instantly to all the nodes o the network. hese requirements make the implementation o this algorithm impractical or the multihop wireless network scenario. he idea is to use a random algorithm, instead o the optimal one described in (2), which yields a easible allocation π[t] Π at every time slot, which is not necessarily equal to π w [t], but has a positive probability δ>0 o being equal to π w [t]. hus, we have P ( π[t] = π w [t]) δ, or all w[t] and t. (3) Once the allocation π[t] is chosen, the actual allocation π[t] is determined according to the ollowing evolution. { π[t] i w[t] π[t] w[t] π[t] π[t +1]= (4) π[t] otherwise he above randomized algorithm was introduced in [24] in the context o switches, where there exists a centralized scheduler. A similar approach has been used in developing a distributed implementation or networks restricted to singlehop communication with matching constraints and Bernoulli arrival processes [17]. As we will prove shortly, it turns out that the two conditions (3) and (4) are suicient to achieve throughput-optimality in a more general setting. he algorithm updates its allocation vector only i the proposed allocation o the randomized algorithm yields a better objective unction. Such an algorithm can be divided into two 5 his deinition o dierential-backlog is slightly dierent rom the ones in the literature, which is due to the assumption o undirected links here. parts: PICK and COMPARE, where PICK chooses a easible schedule π[t] satisying (3), and COMPARE communicates the relevant weight inormation to other nodes in the network to perorm (4). Distributed implementations o both PICK and COMPARE can be developed or a given intererence model (see [6] or an example). heorem 1. Assume that x [t] is independent and identically distributed (i.i.d.) 6 or all t and with E[x 2 [1]] A<. hen, or any mean arrival vector λ := (E[x [1]]) interior(λ), the above randomized policy is stabilizing. Proo: We start by noting that y[t] (q[t],π[t]) orms a Markov Chain. hen, we study the mean drit o the ollowing Lyapunov unction o the state y =(q,π): V (y) = ( ) 2 q 2 + w l (( π w ) l π l ) n N = q q }{{} V 1 (y) d N l L +(w ( π w π)) 2 }{{} V 2 (y) he proo uses the ollowing two key lemmas the proos o which are moved to Appendix A and B. Lemma 1. Let 1 (y[t]) E[V 1 (y[t + 1]) V 1 (y[t]) y[t]], then or some γ>0and c 1 <, we have 1 (y[t]) γ V 1 (y[t])+2 V 2 (y[t]) + c 1. Lemma 2. Let 2 (y[t]) E[V 2 (y[t + 1]) V 2 (y[t]) y[t]], then or some δ>0 and c 2,c 3 <, we have 2 (y[t]) δv 2 (y[t]) + c 2 V2 (y[t]) + c 3. Proo o heorem 1 (Continued): Combining these lemmas, we upper-bound (y[t]) E[V (y[t + 1]) V (y[t]) y[t]] by γ V 1 (y[t]) δv 2 (y[t])+(2+c 2 ) V 2 (y[t]) + c 1 + c 3. hus, i we consider the scenario where V (y[t]) B or a suiciently large B<, then we can guarantee that (5) (y[t]) ɛ V 1 (y[t]) + ˆB, (6) or some ɛ>0 and ˆB <. his is true because in this scenario, since we have V 1 (y[t]) B V 2 (y[t]), we can write E[V (y[t + 1]) y[t]] V (y[t]) γ 2 V1 (y[t]) γ 2 B V2 (y[t]) δv 2 (y[t])(7) +(2 + c 2 ) V 2 (y[t]) + c 1 + c 3.(8) Notice that the sum o the expressions in (7) and (8) can be made negative by choosing B large enough. Hence (6) holds when we let ɛ = γ/2 and choose ˆB large enough. he proo o positive recurrence o the chain ollows rom Foster s Criteria (c. [22] or [16]). Let us use y[ ] to denote the random variable to which {y[t]} t converges. Due to the -ergodic theorem o [16], the drit condition o (6) 6 he assumption o i.i.d. arrivals is not critical to the analysis. he same results continue to hold or processes with mild ergodicity properties ([10]). 1938
4 is equivalent to E[ V 1 (y[ ]] <. Invoking the deinition o V 1 ( ) results in the intended stability result. heorem 1 shows that under very mild conditions, i a randomized scheduler can be ound that satisies (3), and the control in (4) can be perormed, then the stability will be achieved or any stabilizable incoming traic. IV. FAIR SERVICE OF ELASIC RAFFIC In the previous section, we proved the throughput optimality o a randomized scheme or inelastic traic, provided that the exogenous arrival rates are stabilizable. hus, with that scheme, even i stability is achieved or a given mean arrival vector, the system may be seriously underutilized. Ideally, it would be desired to know the stability region o the network and choose the arrival rates to ully utilize the network resources. However, as noted in [26], the task o determining whether a given set o arrival rates is in the characterized stability region becomes an intractable problem as the network size grows. In this section, we extend the throughput-optimal algorithm so that the available capacity o the network is ully utilized and airly shared among the lows in a completely decentralized and dynamic ashion without the need to explicitly characterize the stability region. o that end, we change the considered traic model rom inelastic to elastic, where in the latter case the mean arrival rates o the sources can be modiied. o deine airness, as is standard in the recent literature (e.g. [11, 12, 15, 22, 7, 18, 13]), we use a utility unction, U ( ), o mean arrival rates that is a measure o low s preerences. hroughout, we will assume that this unction is concave and non-decreasing. We call the allocation, x, that satisies x arg max U (x ) (9) x Λ F the air allocation. Notice that this is the allocation that maximizes the aggregate utility o the network. It is known that by deining U ( ) appropriately dierent airness criteria o interest, such as proportional or max-min airness, can be achieved (see [22] or an extensive review). Next, we describe the so called Dual Congestion Control mechanism that is implemented at the source o each low in a completely decentralized ashion. Variations o this mechanism are studied recently in the literature [7, 18, 14, 23]. DUAL CONGESION CONROL MECHANISM: Assume that every low has access to the its entry point queue-length inormation, i.e. low knows q b(),e() [t] or all t. hen, at the beginning o each time slot t, low generates x [t] packets satisying { ( ) } x [t] = min U 1 qb(),e() [t],m, (10) K where M and K are positive scalars. he policy is easy to implement at each source because it only requires the queue length o the buer at the source, and the individual utility unction o the low. Note that the only common inormation required at all the sources is K. Once K is determined, the low control mechanism can operate in a completely decentralized ashion in parallel with the randomized routing-scheduling algorithm described in Section III. heorem 2. For some inite constants C 1,C 2 we have q C 1 K (11) n N d N U ( x ) U (x ) C 2 (12) K F F 1 1 where x lim E[x [t]], and similarly or q. t=0 Proo: We start by introducing a relaxed version o the optimization problem (9): or any ε>0, let x (ε) arg max U (x ), x Λ(ε) where Λ(ε) ={x Λ:[x + ε] Λ}. Λ(ε) is a subset o the capacity region Λ with an ε-strip o its positive surace is deleted. It is not diicult to see that x (ε) x as ε 0. We use the same Lyapunov unctions V (y),v 1 (y) and V 2 (y) introduced in Section III (c.. (5)) to prove the theorem. he ollowing theorem studies the single-step mean drit o V 1 (y). he proo o this lemma is provided in Appendix C. Lemma 3. For some constants ɛ>0,c 1 <, 1 (y[t]) ε q [t]+2k E[U (x [t]) y[t]] 2K U (x (ε)) ε V1 N 2 (y[t]) + 2 V 2 (y[t]) + c 1 Proo o heorem 2 (Continued): In what ollows, we will omit [t] or convenience. By combining the result o Lemma 3 with that o Lemma 2, we can write: (y[t]) ε q +2K U (x ) 2KE[ U (x (ε)) y]+c 1 + c 3 V1 (y) ε N 2 δv 2 (y) + (2 + c 2 ) V 2 (y) (13) (a) c 4 ε q +2K{ E[U (x ) y] U (x (ε))} where the inequality (a) ollows rom the act that (13) is upper-bounded as argued in the proo o heorem 1. By taking expectations o both sides o the last inequality and summing over t =0, 1,, 1, we get 1 E[V (y[ ]) V (y[0])] c 4 ε E[q [t]] t=0 1 +2K E[U (x [t])] 2K t=0 U (x (ε)). (14) 1939
5 Since V (y) 0 or all y, we can re-arrange the terms in (14) to obtain the ollowing inequality. 1 1 t=0 E[q [t]] V (y[0]) ε + c 4 +2M F K. ε he proo o (11) is complete when we let, and deine C 1 2M F ε. I, on the other hand, we re-arrange the terms in (14) dierently, we can get 1 1 E[U (x [t])] U (x (ε)) V (y[0]) 2K c 4 2K. t=0 Hence, the proo o (12) is complete when we use Jensen s inequality to write U ( x ) 1 1 t=0 E[U (x [t])], and deine C 2 c4 2. V. CONCLUSIONS In this work, we provided a ramework or the design o practical cross-layer algorithms or multi-hop wireless networks that are throughput-optimal and air. Previously proposed low complexity implementations or multi-hop wireless networks have been greedy in nature. Despite their ease o implementation, such policies have been shown in recent works to have poor throughput perormance. he greatest weakness o greedy policies is their lack o memory. In this work, we considered the generalization o a practical randomized policy irst introduced in [24] or switches to multi-hop networks. We proved that with the use o a small memory unit at the nodes, this policy achieves 100% o the available capacity o the network. We also considered the case o elastic lows and provided a decentralized congestion control algorithm that works in parallel with the randomized algorithm. We showed that the resulting cross-layer algorithm allocates resources airly across users. We note that the extra overhead that will appear in our randomized algorithm can be reduced at the expense o larger delay, but without sacriicing rom throughput. Also, our initial indings suggest that the additional complexity is comparable to the complexity o the greedy policies. In our companion paper [6], we show that the development and analysis o low complexity, distributed PICK and COMPARE algorithms (as described in Section III) or the two-hop intererence model. APPENDIX A. Proo o Lemma 1: Proo: We start by arranging the terms o 1 (y[t]). 1 (y[t]) = E[(q[t +1] q[t]) (q[t +1]+q[t]) y[t]] (a) c 1 +2 q [t](λ + π d into(n) [t] π d out(n) [t]) (15) +2 q [t](πinto(n) d [t] πd out(n) [t] π d into(n) [t]+ π d out(n) [t]), (16) where inequality (a) is due to the act that E[x 2 [t]] A, and that πinto(n) d [t] and πd out(n) [t] are both upper-bounded by the maximum degree o G. In (15) and (16), the optimal allocation π w is added and subtracted. For notational convenience, we use λ S λ. Also, π d into(n) and π d out(n) are deined similarly to πinto(n) d and πd out(n). Since the arrival rate vector λ is known to be within the stability region Λ, we can upper-bound the second expression in (15) by γ V 1 (y[t] (e.g. see [5]). Next, notice that (16) = 2w[t] ( π w [t] π[t]) 2 V 2 (y[t]). Combination o these results yields the proo. B. Proo o Lemma 2: Proo: We start by analyzing the conditional expectation E[V 2 (y[t + 1]) y[t]] (1 δ)e[(w[t +1] ( π w [t +1] π[t + 1])) 2 y[t],π[t +1] π w [t + 1]]. Next, we write the evolution o the weight vector w[t] as w[t +1] =w[t]+r[t] z[t], where r[t] denotes the vector o packets entering the queues and z[t] is the vector o packets leaving the queues. We can describe these vectors more precisely, but this is not necessary or the proo. he only important actor is the boundedness o them. Now, we can write E[V 2 (y[t + 1]) y[t]] (1 δ)e[(w[t] ( π w [t +1] π[t + 1]) (17) +( π w [t +1] π[t + 1]) (r[t] z[t])) 2 y[t],π[t +1] π w [t + 1]](18) It is not diicult to upper-bound the expression in (18) with a inite constant. o bound (17), we make two observations: (i) w[t] π w [t +1] w[t] π w [t] due to the deinition o the optimal allocation vector π w in (2). (ii) w[t] π[t +1] w[t] π[t] due to the update rule (3) o the randomized algorithm. By combining these observations, we can ind constants c 2,c 3 < that satisy E[V 2 (y[t + 1]) y[t]] (1 δ)v 2 (y[t]) + c 2 V2 (y[t]) + c 3, which completes the proo. C. Proo o Lemma 3: Proo: he proo starts with the ollowing upper bound on 1 (y[t]) (c. (15) and (16)): 1940
6 1 (y[t]) [4] P. Chaporkar, K. Kar, and S. Sarkar. hroughput guarantees through c 1 +2 V 2 (y[t])+2 maximal scheduling in wireless networks. In Proceedings o the E[q [t] x [t] y[t]] Allerton Conerence on Control, Communications and Computing, S [5] A. Eryilmaz. Eicient and air scheduling or wireless networks. PhD 2 π(n,m) d [t](q thesis, University o Illinois at Urbana, Champaign, August [t] q m,d [t]) [6] A. Eryilmaz, A. Ozdaglar, and E. Modiano. Polynomial complexity (n,m) L d = c 1 +2 V 2 (y[t])+2 algorithms or ull utilization o multi-hop wireless networks, LIDS Report, submitted. KE[U (x [t]) y[t]] [7] A. Eryilmaz and R. Srikant. Fair resource allocation in wireless 2 networks using queue-length based scheduling and congestion control. In Proceedings o IEEE Inocom, Miami, FL, March E[KU (x [t]) q b(),e() x [t] y[t]] (19) [8] A. Eryilmaz and R. Srikant. Resource allocation o multi-hop wireless networks. In Proceedings o International Zurich Seminar 2 π(n,m) d [t](q on Communications, February [t] q m,d [t]), (20) [9] A. Eryilmaz, R. Srikant, and J. Perkins. Stable scheduling policies (n,m) L d or ading wireless channels. In Proceedings o IEEE International Symposium on Inormation heory, A longer version appeared where we get the last equality by adding and subtracting 2K in the IEEE/ACM ransactions on Networking, E[U [10] A. Eryilmaz, R. Srikant, and J. R. Perkins. Stable scheduling policies (x [t]) y[t]], and by noting that or ading wireless channels. IEEE/ACM ransactions on Networking, q [t]( 13: , April x [t]) = q b(),e() [t]x [t]. [11] F. P. Kelly. Charging and rate control or elastic traic. European ransactions on elecommunications, 8:33 37, S [12] F. P. Kelly, A. Maulloo, and D. an. Rate control in communication networks: Shadow prices, proportional airness and stability. Journal Notice that the Dual Congestion Control mechanism is o the Operational Research Society, 49: , designed to optimize the expression in (19), and the Backpressure Policy is designed to optimize (20). Bounds to wireless networks. In Proceedings o IEEE Conerence on Decision [13] X. Lin and N. Shro. Joint rate control and scheduling in multihop and Control, Paradise Island, Bahamas, December these expressions are obtained in [18], which are reproduced [14] X. Lin and N. Shro. he impact o imperect scheduling on crosslayer rate control in multihop wireless networks. In Proceedings o below. IEEE Inocom, Miami, FL, March E[KU (x [t]) q b(),e() x [t] y[t]] [15] S. H. Low and D. E. Lapsley. Optimization low control, I: Basic algorithm and convergence. IEEE/ACM ransactions on Networking, K U (x (ε)) 7: , December q b(),e() [t]x (ε) [16] S. Meyn and R. weedie. Markov Chains and Stochastic Stability. Springer-Verlag, π(n,m) d [t](q [t] q m,d [t]) [17] E. Modiano, D. Shah, and G. Zussman. Maximizing throughput q [t](x in wireless networks via gossiping. In ACM SIGMERICS/IFIP (ε)+ε). (n,m) L d he irst inequality is straight-orward since x (ε) is an element o the set o easible rate vectors (i.e. vectors in [0,M] F ) over which the Congestion Controller o (10) maximizes the the expression on the let. he second inequality ollows rom the act that x (ε) =(x (ε)) is at least ε away rom the boundary o Λ or all. By canceling common terms, we obtain 1 (y[t]) 2ε q [t]+2k 2K E[U (x [t]) y[t]] U (x (ε)) + 2 V 2 (y[t]) + c 1. Finally, we use the ollowing lower bound q [t] V1(y[t]) N 2, which, when substituted into the previous expression, yields the statement o the lemma. REFERENCES [1] M. Andrews, K. Kumaran, K. Ramanan, A. Stolyar, R. Vijayakumar, and P. Whiting. Scheduling in a queueing system with asynchronously varying service rates, Bell Laboratories echnical Report. [2] D. P. Bertsekas and J. N. sitsiklis. Parallel and Distributed Computation: Numerical Methods. Athena Scientiic, Belmont, MA, [3] L. Bui, A. Eryilmaz, R. Srikant, and X. Wu. Joint asynchronous congestion control and distributed scheduling or wireless networks. Proceedings o IEEE Inocom Perormance, [18] M.J. Neely, E. Modiano, and C. Li. Fairness and optimal stochastic control or heterogeneous networks. In Proceedings o IEEE Inocom, pages , Miami, FL, March [19] M.J. Neely, E. Modiano, and C.E. Rohrs. Dynamic power allocation and routing or time varying wireless networks. In Proceedings o IEEE Inocom, pages , April [20] G. Sasaki and B. Hajek. Link scheduling in polynomial time. IEEE ransactions on Inormation heory, 32: , [21] S. Shakkottai and A. Stolyar. Scheduling or multiple lows sharing a time-varying channel: he exponential rule. ranslations o the AMS, Series 2, A volume in memory o F. Karpelevich, 207: , [22] R. Srikant. he Mathematics o Internet Congestion Control. Birkhäuser, Boston, MA, [23] A. Stolyar. Maximizing queueing network utility subject to stability: Greedy primal-dual algorithm. Queueing Systems, 50(4): , [24] L. assiulas. Linear complexity algorithms or maximum throughput in radio networks and input queued switches. In Proceedings o IEEE Inocom, pages , [25] L. assiulas and A. Ephremides. Stability properties o constrained queueing systems and scheduling policies or maximum throughput in multihop radio networks. IEEE ransactions on Automatic Control, 36: , December [26] L. assiulas and A. Ephremides. Dynamic server allocation to parallel queues with randomly varying connectivity. IEEE ransactions on Inormation heory, 39: , March [27] X. Wu and R. Srikant. Regulated maximal matching: A distributed scheduling algorithm or multi-hop wireless networks with nodeexclusive spectrum sharing, Submitted to IEEE Conerence on Decision and Control. [28] X. Wu and R. Srikant. Bounds on the capacity region o multi-hop wireless networks under distributedgreedy scheduling. In Proceedings o IEEE Inocom, 2006.
Imperfect Randomized Algorithms for the Optimal Control of Wireless Networks
Imperfect Randomized Algorithms for the Optimal Control of Wireless Networks Atilla ryilmaz lectrical and Computer ngineering Ohio State University Columbus, OH 430 mail: eryilmaz@ece.osu.edu Asuman Ozdaglar,
More informationMax-Weight Scheduling in Queueing Networks with. Heavy-Tailed Traffic
Max-Weight Scheduling in Queueing Networks with Heavy-Tailed Traic arxiv:1108.0370v1 [cs.ni] 1 Aug 011 Mihalis G. Markakis, Eytan H. Modiano, and John N. Tsitsiklis Abstract We consider the problem o packet
More informationDelay Efficient Scheduling via Redundant Constraints in Multihop Networks
Delay Eicient Scheduling via Redundant Constraints in Multihop Networks Longbo Huang, Michael J. Neely Abstract We consider the problem o delay-eicient scheduling in general multihop networks. While the
More informationInformation Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels
1 Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels Invited Paper Ali ParandehGheibi, Muriel Médard, Asuman Ozdaglar, and Atilla Eryilmaz arxiv:0810.167v1 cs.it
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationDynamic Power Allocation and Routing for Time Varying Wireless Networks
Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,
More informationUnderstanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo, Xiaojun Lin, and Ness B. Shroff Abstract In this paper, we characterize the performance
More informationOn the Flow-level Dynamics of a Packet-switched Network
On the Flow-level Dynamics o a Packet-switched Network Ciamac C. Moallemi and Devavrat Shah Abstract: The packet is the undamental unit o transportation in modern communication networks such as the Internet.
More informationUnderstanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo Departments of ECE and CSE The Ohio State University Email: cjoo@ece.osu.edu Xiaojun
More informationFairness and Optimal Stochastic Control for Heterogeneous Networks
λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution
More informationThroughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting
Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210
More informationAny Work-conserving Policy Stabilizes the Ring with Spatial Reuse
Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse L. assiulas y Dept. of Electrical Engineering Polytechnic University Brooklyn, NY 20 leandros@olympos.poly.edu L. Georgiadis IBM. J. Watson
More informationTowards Achieving Full Secrecy Rate and Low Delays in Wireless Networks
owards Achieving Full Secrecy Rate and Low Delays in Wireless Networks Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State University
More informationDistributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks
Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks Xin Wang, Koushik Kar Department of Electrical, Computer and Systems Engineering, Rensselaer Polytechnic Institute,
More informationNode-based Distributed Optimal Control of Wireless Networks
Node-based Distributed Optimal Control of Wireless Networks CISS March 2006 Edmund M. Yeh Department of Electrical Engineering Yale University Joint work with Yufang Xi Main Results Unified framework for
More informationOperations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads
Operations Research Letters 37 (2009) 312 316 Contents lists available at ScienceDirect Operations Research Letters journal homepage: www.elsevier.com/locate/orl Instability of FIFO in a simple queueing
More informationUtility-Maximizing Scheduling for Stochastic Processing Networks
Utility-Maximizing Scheduling for Stochastic Processing Networks Libin Jiang and Jean Walrand EECS Department, University of California at Berkeley {ljiang,wlr}@eecs.berkeley.edu Abstract Stochastic Processing
More informationContinuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks
Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer
More informationSTABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING
Applied Probability Trust (7 May 2015) STABILITY OF MULTICLASS QUEUEING NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING RAMTIN PEDARSANI and JEAN WALRAND, University of California,
More informationTowards Achieving Full Secrecy Rate in Wireless Networks: A Control Theoretic Approach
owards Achieving Full Secrecy Rate in Wireless Networks: A Control heoretic Approach Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State
More informationOptimal scaling of average queue sizes in an input-queued switch: an open problem
DOI 10.1007/s11134-011-9234-1 Optimal scaling of average queue sizes in an input-queued switch: an open problem Devavrat Shah John N. Tsitsiklis Yuan Zhong Received: 9 May 2011 / Revised: 9 May 2011 Springer
More informationOptimizing Queueing Cost and Energy Efficiency in a Wireless Network
Optimizing Queueing Cost and Energy Efficiency in a Wireless Network Antonis Dimakis Department of Informatics Athens University of Economics and Business Patission 76, Athens 1434, Greece Email: dimakis@aueb.gr
More informationA Probabilistic Sample Path Convergence Time Analysis of Drift-Plus-Penalty Algorithm for Stochastic Optimization
A Probabilistic Sample Path Convergence ime Analysis of Drift-Plus-Penalty Algorithm for Stochastic Optimization Xiaohan Wei, Hao Yu and Michael J. Neely arxiv:50.0973v3 math.oc 7 Dec 06 Abstract his paper
More informationOn wireless scheduling with partial channel-state information
On wireless scheduling with partial channel-state information Aditya Gopalan, Constantine Caramanis and Sanjay Shakkottai Abstract We consider a single server serving a time-slotted queued system of multiple
More informationDistributed Random Access Algorithm: Scheduling and Congesion Control
Distributed Random Access Algorithm: Scheduling and Congesion Control The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As
More informationEnergy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California
Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally
More informationOn the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks
Technical Report Computer Networks Research Lab Department of Computer Science University of Toronto CNRL-08-002 August 29th, 2008 On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks
More informationGreedy weighted matching for scheduling the input-queued switch
Greedy weighted matching for scheduling the input-queued switch Andrew Brzezinski and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {brzezin,modiano}@mit.edu
More informationA Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch
A Starvation-free Algorithm For Achieving 00% Throughput in an Input- Queued Switch Abstract Adisak ekkittikul ick ckeown Department of Electrical Engineering Stanford University Stanford CA 9405-400 Tel
More informationExploring the Tradeoff between Waiting Time and Service Cost in Non-Asymptotic Operating Regimes
Exploring the radeoff between Waiting ime and Service Cost in Non-Asymptotic Operating Regimes Bin Li, Ozgur Dalkilic and Atilla Eryilmaz Abstract Motivated by the problem of demand management in smart
More information( x) f = where P and Q are polynomials.
9.8 Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm ( ) ( ) ( ) P where P and Q are polynomials. Q An eample o a simple rational
More informationInequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers
IEEE Proceedings of the International Conference on Communications, 2000 Inequality Comparisons and raffic Smoothing in Multi-Stage AM Multiplexers Michael J. Neely MI -- LIDS mjneely@mit.edu Abstract
More informationA Mechanism for Pricing Service Guarantees
A Mechanism for Pricing Service Guarantees Bruce Hajek Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign Sichao Yang Qualcomm
More informationOn the stability of flow-aware CSMA
On the stability of flow-aware CSMA Thomas Bonald, Mathieu Feuillet To cite this version: Thomas Bonald, Mathieu Feuillet. On the stability of flow-aware CSMA. Performance Evaluation, Elsevier, 010, .
More informationDelay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic
1 Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic Mihalis G. Markakis, Eytan Modiano, and John N. Tsitsiklis Abstract We study multi-hop networks with flow-scheduling
More informationFeasible rate allocation in wireless networks
Feasible rate allocation in wireless networks Ramakrishna Gummadi gummadi2@uiuc.edu Kyomin Jung kmjung@mit.edu Devavrat Shah devavrat@mit.edu Ramavarapu Sreenivas rsree@uiuc.edu Abstract Rate allocation
More informationA Simple Memoryless Proof of the Capacity of the Exponential Server Timing Channel
A Simple Memoryless Proof of the Capacity of the Exponential Server iming Channel odd P. Coleman ECE Department Coordinated Science Laboratory University of Illinois colemant@illinois.edu Abstract his
More informationQueue Proportional Scheduling in Gaussian Broadcast Channels
Queue Proportional Scheduling in Gaussian Broadcast Channels Kibeom Seong Dept. of Electrical Engineering Stanford University Stanford, CA 9435 USA Email: kseong@stanford.edu Ravi Narasimhan Dept. of Electrical
More informationNode-Based Distributed Optimal Control of Wireless Networks
Node-Based Distributed Optimal Control of Wireless Networks Yufang Xi and Edmund M. Yeh Department of Electrical Engineering Yale University New Haven CT 06520 USA Email: {yufang.xi edmund.yeh}@yale.edu
More informationLow-complexity Scheduling Algorithms for Multi-channel Downlink Wireless Networks
Low-complexity Scheduling Algorithms for Multi-channel Downlink Wireless Networks Shreeshankar Bodas, Sanay Shakkottai Department of ECE The University of Texas at Austin {shreeshankar,shakkott}@mail.utexas.edu
More informationDelay bounds (Simon S. Lam) 1
1 Pacet Scheduling: End-to-End E d Delay Bounds Delay bounds (Simon S. Lam) 1 2 Reerences Delay Guarantee o Virtual Cloc server Georey G. Xie and Simon S. Lam, Delay Guarantee o Virtual Cloc Server, IEEE/ACM
More informationOn High-Rate Cryptographic Compression Functions
On High-Rate Cryptographic Compression Functions Richard Ostertág and Martin Stanek Department o Computer Science Faculty o Mathematics, Physics and Inormatics Comenius University Mlynská dolina, 842 48
More informationThroughput-Lifetime Tradeoffs in Multihop Wireless Networks under an SINR-based Interference Model
1 Throughput-Lietime Tradeos in Multihop Wireless Networks under an SINR-based Intererence Model Jun Luo, Aravind Iyer and Catherine Rosenberg Abstract High throughput and lietime are both crucial design
More informationQueue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling
1 Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling Saswati Sarkar and Koushik Kar Abstract In this paper, we consider queue-length stability in wireless
More informationThe Multi-Path Utility Maximization Problem
The Multi-Path Utility Maximization Problem Xiaojun Lin and Ness B. Shroff School of Electrical and Computer Engineering Purdue University, West Lafayette, IN 47906 {linx,shroff}@ecn.purdue.edu Abstract
More informationLow-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. XX, XXXXXXX X Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks Longbi Lin, Xiaojun Lin, Member, IEEE, and Ness B. Shroff,
More informationOn Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks
On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networs V.J. Venataramanan and Xiaojun Lin School of ECE Purdue University Email: {vvenat,linx}@purdue.edu Lei Ying Department
More informationEfficiency and Braess Paradox under Pricing
Efficiency and Braess Paradox under Pricing Asuman Ozdaglar Joint work with Xin Huang, [EECS, MIT], Daron Acemoglu [Economics, MIT] October, 2004 Electrical Engineering and Computer Science Dept. Massachusetts
More informationOn Throughput Optimality with Delayed Network-State Information
1 On Throughput Optimality with Delayed Network-State Information Lei Ying and Sanjay Shakkottai Abstract We study the problem of routing/scheduling in a wireless network with partial/delayed Network channel
More informationConcave switching in single-hop and multihop networks
Queueing Syst (2015) 81:265 299 DOI 10.1007/s11134-015-9447-9 Concave switching in single-hop and multihop networks Neil Walton 1 Received: 21 July 2014 / Revised: 17 April 2015 / Published online: 23
More informationLocal and Global Stability of Symmetric Heterogeneously-Delayed Control Systems
Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Yueping Zhang and Dmitri Loguinov Texas A&M University, College Station, TX 77843 Email: {yueping, dmitri}@cs.tamu.edu Abstract
More informationStability of the Maximum Size Matching
Stability of the Maximum Size Matching Mohsen Bayati Dept. of Electrical Engineering Stanford University Stanford, CA 9405-950 bayati@stanford.edu Neda Beheshti Dept. of Electrical Engineering Stanford
More informationScheduling: Queues & Computation
Scheduling: Queues Computation achieving baseline performance efficiently Devavrat Shah LIDS, MIT Outline Two models switched network and bandwidth sharing Scheduling: desirable performance queue-size
More informationRate and Power Allocation in Fading Multiple Access Channels
1 Rate and Power Allocation in Fading Multiple Access Channels Ali ParandehGheibi, Atilla Eryilmaz, Asuman Ozdaglar, and Muriel Médard Abstract We consider the problem of rate and power allocation in a
More informationChannel Allocation Using Pricing in Satellite Networks
Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract
More informationEquivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues
Proceedings of the 38th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2000. Equivalent Models and Analysis for Multi-Stage ree Networks of Deterministic Service ime Queues Michael
More informationUniqueness of Generalized Equilibrium for Box Constrained Problems and Applications
Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications Alp Simsek Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Asuman E.
More informationc 2013 Javad Ghaderi Dehkordi
c 2013 Javad Ghaderi Dehkordi FUNDAMENTAL LIMITS OF RANDOM ACCESS IN WIRELESS NETWORKS BY JAVAD GHADERI DEHKORDI DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor
More informationOPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION
OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION Xu Bei, Yeo Jun Yoon and Ali Abur Teas A&M University College Station, Teas, U.S.A. abur@ee.tamu.edu Abstract This paper presents
More informationNovel Architectures and Algorithms for Delay Reduction in Back-pressure Scheduling and Routing
Novel Architectures and Algorithms for Delay Reduction in Back-pressure Scheduling and Routing 1 arxiv:0901.1312v3 [cs.ni] 28 May 2010 Loc Bui, R. Srikant, Alexander Stolyar Abstract The back-pressure
More information[4] T. I. Seidman, \\First Come First Serve" is Unstable!," tech. rep., University of Maryland Baltimore County, 1993.
[2] C. J. Chase and P. J. Ramadge, \On real-time scheduling policies for exible manufacturing systems," IEEE Trans. Automat. Control, vol. AC-37, pp. 491{496, April 1992. [3] S. H. Lu and P. R. Kumar,
More informationResource Allocation and Pricing. R. Srikant University of Illinois
Resource Allocation and Pricing R. Srikant University of Illinois References The Mathematics of Internet Congestion Control, Birkhauser, 2004. Pricing: Kelly Distributed Resource Allocation: Kelly, Mauloo
More information1 Relative degree and local normal forms
THE ZERO DYNAMICS OF A NONLINEAR SYSTEM 1 Relative degree and local normal orms The purpose o this Section is to show how single-input single-output nonlinear systems can be locally given, by means o a
More informationA New Approach for Asynchronous Distributed Rate Control of Elastic Sessions in Integrated Packet Networks
A New Approach or Asynchronous Distributed Rate Control o Elastic Sessions in Integrated Packet Networks Santosh P. Abraham and Anurag Kumar Abstract We develop a new class o asynchronous distributed algorithms
More informationStochastic Subgradient Methods with Approximate Lagrange Multipliers
Stochastic Subgradient Methods with Approximate Lagrange Multipliers Víctor Valls, Douglas J. Leith Trinity College Dublin Abstract We study the use of approximate Lagrange multipliers in the stochastic
More informationFair Scheduling in Input-Queued Switches under Inadmissible Traffic
Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent
More informationCapacity and Delay Tradeoffs for Ad-Hoc Mobile Networks
IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano
More informationData Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems
Data Center Server Provision: Distributed Asynchronous Control or Coupled Renewal Systems Xiaohan Wei and Michael J. Neely, Senior Member, I arxiv:5.0609v cs.dc 7 Dec 06 Abstract his paper considers a
More informationTHE Internet is increasingly being used in the conduct of
94 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 1, FEBRUARY 2006 Global Stability Conditions for Rate Control With Arbitrary Communication Delays Priya Ranjan, Member, IEEE, Richard J. La, Member,
More informationWireless Scheduling. Mung Chiang Electrical Engineering, Princeton University. WiOpt Seoul, Korea June 23, 2009
Wireless Scheduling Mung Chiang Electrical Engineering, Princeton University WiOpt Seoul, Korea June 23, 2009 Outline Structured teaser on wireless scheduling Focus on key ideas and 10 open problems Biased
More informationBasic mathematics of economic models. 3. Maximization
John Riley 1 January 16 Basic mathematics o economic models 3 Maimization 31 Single variable maimization 1 3 Multi variable maimization 6 33 Concave unctions 9 34 Maimization with non-negativity constraints
More informationQueue length analysis for multicast: Limits of performance and achievable queue length with random linear coding
Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits
More informationSolving Dual Problems
Lecture 20 Solving Dual Problems We consider a constrained problem where, in addition to the constraint set X, there are also inequality and linear equality constraints. Specifically the minimization problem
More informationA Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification (ECN) Marking
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering June 2002 A Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification
More informationAsymptotics, asynchrony, and asymmetry in distributed consensus
DANCES Seminar 1 / Asymptotics, asynchrony, and asymmetry in distributed consensus Anand D. Information Theory and Applications Center University of California, San Diego 9 March 011 Joint work with Alex
More informationFeedback Linearization
Feedback Linearization Peter Al Hokayem and Eduardo Gallestey May 14, 2015 1 Introduction Consider a class o single-input-single-output (SISO) nonlinear systems o the orm ẋ = (x) + g(x)u (1) y = h(x) (2)
More informationScheduling in parallel queues with randomly varying connectivity and switchover delay
Scheduling in parallel queues with randomly varying connectivity and switchover delay The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters.
More informationCaching Policy Optimization for Video on Demand
Caching Policy Optimization or Video on Demand Hao Wang, Shengqian Han, and Chenyang Yang School o Electronics and Inormation Engineering, Beihang University, China, 100191 Email: {wang.hao, sqhan, cyyang}@buaa.edu.cn
More informationNode-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance
Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance Yu Sang, Gagan R. Gupta, and Bo Ji Member, IEEE arxiv:52.02328v2 [cs.ni] 8 Nov 207 Abstract This
More informationCrowdsourcing in Cyber-Physical Systems: Stochastic Optimization with Strong Stability
Received 1 April 2013; revised 25 May 2013; accepted 29 June 2013. Date of publication 15 July 2013; date of current version 21 January 2014. Digital Object Identifier 10.1109/EC.2013.2273358 Crowdsourcing
More informationChannel Probing in Communication Systems: Myopic Policies Are Not Always Optimal
Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Matthew Johnston, Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge,
More informationDesign and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Radio Networks Considering Self-Interference
Received November 8, 015, accepted December 10, 015, date o publication December 17, 015, date o current version December 8, 015. Digital Object Identiier 10.1109/ACCE.015.509449 Design and Optimal Coniguration
More informationarxiv: v1 [cs.sy] 10 Apr 2014
Concave Switching in Single and Multihop Networks arxiv:1404.2725v1 [cs.sy] 10 Apr 2014 Neil Walton 1 1 University of Amsterdam, n.s.walton@uva.nl Abstract Switched queueing networks model wireless networks,
More informationData Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems
I/ACM RANSACIONS ON NWORKING, VOL 5, ISSU 4, AUG. 07 Data Center Server Provision: Distributed Asynchronous Control or Coupled Renewal Systems Xiaohan Wei and Michael J. Neely, Senior Member, I Abstract
More informationOn queueing in coded networks queue size follows degrees of freedom
On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,
More informationTechnion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling
On Centralized Smooth Scheduling Ami Litman January 25, 2005 Abstract Shiri Moran-Schein This paper studies evenly distributed sets of natural numbers and their applications to scheduling in a centralized
More informationA Distributed Newton Method for Network Utility Maximization, I: Algorithm
A Distributed Newton Method for Networ Utility Maximization, I: Algorithm Ermin Wei, Asuman Ozdaglar, and Ali Jadbabaie October 31, 2012 Abstract Most existing wors use dual decomposition and first-order
More informationDynamic resource sharing
J. Virtamo 38.34 Teletraffic Theory / Dynamic resource sharing and balanced fairness Dynamic resource sharing In previous lectures we have studied different notions of fair resource sharing. Our focus
More informationDistributed Optimization over Networks Gossip-Based Algorithms
Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random
More informationDelay Bounds for Approximate Maximum Weight Matching Algorithms for Input Queued Switches
Delay Bounds for Approximate Maximum Weight Matching Algorithms for Input Queued Switches Devavrat Shah, Milind Kopikare devavrat@cs.stanford.edu,kopi@stanford.edu Dept. of CS, Stanford University; Dept.
More informationStability of the two queue system
Stability of the two queue system Iain M. MacPhee and Lisa J. Müller University of Durham Department of Mathematical Science Durham, DH1 3LE, UK (e-mail: i.m.macphee@durham.ac.uk, l.j.muller@durham.ac.uk)
More informationPercentile Policies for Inventory Problems with Partially Observed Markovian Demands
Proceedings o the International Conerence on Industrial Engineering and Operations Management Percentile Policies or Inventory Problems with Partially Observed Markovian Demands Farzaneh Mansouriard Department
More informationUnderstanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks
1 Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo, Member, IEEE, Xiaojun Lin, Member, IEEE, and Ness B. Shroff, Fellow, IEEE Abstract
More informationErgodic Stochastic Optimization Algorithms for Wireless Communication and Networking
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 11-17-2010 Ergodic Stochastic Optimization Algorithms for Wireless Communication and
More informationPower and Server Allocation in a Multi-Beam Satellite with Time Varying Channels
Power and Server Allocation in a Multi-Beam Satellite with Time Varying hannels Michael J. eely Eytan Modiano harles Rohrs MIT--LIDS: {mjneely@mit.edu, modiano@mit.edu, crohrs@mit.edu} Abstract -- We consider
More informationA State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels
A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels Krishna Jagannathan, Shie Mannor, Ishai Menache, Eytan Modiano Abstract We consider scheduling over a wireless
More informationarxiv: v1 [cs.sy] 24 Jul 2012
Delay Stability Regions of the Max-Weight Policy under Heavy-Tailed Traffic Mihalis G. Markakis, Eytan Modiano, and John N. Tsitsiklis arxiv:1207.5746v1 [cs.sy] 24 Jul 2012 Abstract We carry out a delay
More informationAPPENDIX 1 ERROR ESTIMATION
1 APPENDIX 1 ERROR ESTIMATION Measurements are always subject to some uncertainties no matter how modern and expensive equipment is used or how careully the measurements are perormed These uncertainties
More information