Network coding for online and dynamic networking problems. Tracey Ho Center for the Mathematics of Information California Institute of Technology

Size: px
Start display at page:

Download "Network coding for online and dynamic networking problems. Tracey Ho Center for the Mathematics of Information California Institute of Technology"

Transcription

1 Network coding for online and dynamic networking problems Tracey Ho Center for the Mathematics of Information California Institute of Technology 1

2 Work done in collaboration with: Harish Viswanathan: Bell Laboratories Ralf Koetter and Niranjan Ratnakar: Coordinated Science Laboratory, University of Illinois Urbana-Champaign 2

3 Network coding for static single multicast in wired networks Static multicast network connection problem defined on graph (V, E) by given set of sinks T V, source rates λ i, link capacities R ab and link costs C ab (g) Optimal link usage g ab given by optimization with linear constraints [LMHK04]: minimize C ab (g ab ) (a,b) E subject to λ i = λ i = i b:(i,b) E a:(a,β) E f β ib a:(a,i) E f β aβ β T f β ai i V, β T, β i 0 f β ab g ab R ab (a, b) E, β T 3

4 Network coding for static single multicast in wired networks Solution is a union of flows A network code can be constructed over this solution by deterministic or random methods 4

5 Extensions of practical interest static time-varying, packetized, bursty wired wireless single multicast session non-multicast/multiple sessions 5

6 From flows to packets analysis of a dynamic solution static case unit rate source processes unit capacity links coding node dynamic case exogenous source packets coded/forwarded packets formation of a coded packet design of dynamic algorithms? 6

7 c c c c c From wired to wireless flow model must account for wireless multicast advantage: a single wireless link can have multiple destinations, but all receive identical information model each wireless link using a virtual bottleneck node [WuChouKung04] constrain sum of each receiver s flows, via different destination nodes of a wireless link, to be at most the flow on the link [LunMédHoKoe04, HoVis05] 7

8 From wired to wireless (cont d) Minimum energy wireless flow formulation [LunMédHoKoe04]: minimize C ab (g ab ) (a,b) E subject to λ i = f β ib b:(i,b) E a:(a,i) E i V, β T, β i λ i = f β aβ β T i a:(a,β) E f β ab 0 (g ac fac) β 0 (a, b) E, β T c:(a,c) E,(a,c) (a,b) other issues: interference, physical layer cooperation f β ai 8

9 Non-multicast [DouFreZeg05] (1) A scalar linear solution over any ring of characteristic 2 No linear solution for any vector dimension over a finite field with odd characteristic By equating coefficients and manipulating,we have: M i invertible for all i 9

10 Non-multicast [DouFreZeg05] (2) A scalar linear solution over any ring where 2 is a unit No linear solution for any vector dimension over a finite field with characteristic 2 By equating coefficients and manipulating,we have: M i invertible for all i 10

11 Non-multicast [DouFreZeg05] (2) A scalar linear solution over any ring where 2 is a unit No linear solution for any vector dimension over a finite field with characteristic 2 For any value of vector c, there exist values for a,b,d,e such that all six inputs to node 43 are zero 11

12 Non-multicast [DouFreZeg05] (3) 12

13 Multiple multicast/unicast sessions optimal inter-session network coding is an open problem intra-session network coding for multiple multicasts/unicasts improves capacity and optimization complexity over uncoded operation dynamic, bursty settings provides guidance for wireless physical/mac layer choices online network coding across unicast sessions additional flexibility for accommodating more sessions/handling congestion exploits wireless multicast advantage 13

14 Dynamic intra-session network coding for multiple multicast/unicast sessions Problem statement Multi-hop wired/wireless networks with bursty sources, variable channel states, queued packets Multiple multicast/unicast sessions Each session has one or more independent or correlated sources, and one or more sinks Network coding within sessions Problems: network coding, routing, scheduling among packets, power control/scheduling among transmitters, rate control for correlated sources Maximize throughput, minimize cost 14

15 Background back pressure routing introduced for multicommodity unicast problems by [TasEph92,AweLei93] routing and scheduling decisions based on lengths of queues Ui c (t) for each commodity c at each node i supply at sources and removal at sinks create gradients down which packets flow stabilizes any stabilizable set of input rates multicast routing algorithms: predetermined set of multicast trees [SarTas02] a queue for every subset of every session s sinks at each node [AweBriSch02] 15

16 Back pressure multicast with network coding Each node has one queue per sink (independent sources case) or per (source, sink) pair (correlated sources case) local decisions and control: nodes locally determine network coding and packet scheduling for correlated sources, rate control by sinks completely decentralized algorithms for wired networks centralized scheduling and power allocation for interfering wireless transmitters Throughput-optimal given constraint of not coding across sessions 16

17 Back pressure and optimization queue lengths can be interpreted as dual variables (prices) in classical subgradient search methods for multicommodity flow [NeeModRoh05] besides throughput, can optimize cost [Neely05] or achieve fairness [ErySri05] 17

18 Virtual queues Windows of packets that can be coded together Larger windows Handles more burstiness May increase delay Larger code description overhead Packets are replicated in virtual queues for each sink of the session Sink 1 Sink 2 Sink 3 18

19 Case 1: wired network, independent sources Session 1 Sink 1 Sink 2 Active link in this slot In active link in this slot Sink 3 RNC Sink 2 Sink 1 Sink 3 Session 2 Sink 4 RNC Zero fill up to allowed rate if other queue is longer No network coding across sessions Session 1 is chosen as it has a larger sum (over sinks) of positive queue size differences Session 1, Sink 1 queue is not a part of the network code combining as it is less than the corresponding queue at destination of link. 19

20 Algorithm for wired networks, independent sources local decisions based on lengths of virtual queues U cβ i (t) at each node i for each sink β of each session c at each time slot [t, t + T), for each link (a, b), choose one session c ab = arg max c β T c max ( U cβ a ) U cβ b, 0 send at link capacity a random linear combination of data from session c ab queues at a corresponding to all sinks β for which U c ab β a U c ab β b > 0 each sink decodes when it has enough packets by inverting linear combinations 20

21 Case 2: wireless network, independent sources Additional elements: wireless links wireless multicast advantage physical layer cooperation consider generalized links (a, Z) from an originating node a to a set Z of receiving nodes algorithm must choose which queues to update at receiving nodes d Z interference among transmitters; link rates determined by channel states as well as transmit powers algorithm must determine powers/schedules for transmission 21

22 Wireless links 22

23 Network coding on a given wireless link Sink 1 Multiple destination nodes Session 1 Sink 2 Sink 2 Sink 3 RNC Sink 3 Session 2 Sink 1 Sink 4 RNC Zero fill up to allowed rate if other queue is longer No network coding across sessions Session 1 is chosen as it has a larger sum (over sinks) of positive maximum (over destinations of the link) queue size differences For a link (a,z), we denote this sum by 23

24 Dealing with interference transmit scenarios 24

25 Algorithm for wireless, independent sources In each time slot [t, t + T), Scheduling: for each potential link (a, Z), choose one session c az = arg max c β T c max ( ( max Ua cβ b Z ) ) U cβ b, 0 25

26 Algorithm for wireless, independent sources (cont d) Power control: based on channel state S(t), a power allocation P is chosen to maximize µ az (P, S(t))waZ a,z where µ az (P, S(t)) is the link rate and waz = ( ( max U c az a β b Z β T c az max ) ) U c az β b, 0 26

27 Algorithm for wireless, independent sources (cont d) Network coding: for each link (a, Z), a random linear combination ( of data corresponding ) to each sink β for which max b Z U c az a β U c az β b > 0 is sent at the available rate each destination node d Z associates the received information with the virtual( queues corresponding ) to sinks β for which d = arg max b Z U c az a β U c az β b 27

28 Heuristics for choosing transmission scenarios Choices guided by weights w l based on queue lengths, which may also be useful for non-dynamic optimization Form a set of transmission scenarios with transmit powers fixed at maximum (optimal at low SNRs) Build each scenario S starting with a different link Greedily add link l with maximum µ l w l Scenario is completed when potential increase from adding any link is below some threshold Choose the transmission scenario with maximum l S µ lw l Similar to heuristics used in [MukVis04,WuChoZhaJaiZhuKun05] that try to find scenarios maximizing l S µ l 28

29 Minimizing energy Approach of [Neely05] for multiple unicasts extends to multicast with a network coding Goal: minimize energy while stabilizing any stabilizable rates Objective function: E { a V g a ( Z P az (t)) where g a (p) is any convex increasing cost function of the power p used by node a Power control: choose power allocation P to maximize [ µ az (P, S(t))waZ V g a ( ] P az ) a Z Z Parameter V trades off between condition and power optimality } 29

30 Case 3: correlated sources Slepian-Wolf problem [SW73]: separate encoding of correlated sources for a single receiver R 1 X 1. X 2. R 2 achievable rate region: R 1 H(X 1 X 2 ); R 2 H(X 2 X 1 ); R 1 + R 2 H(X 1, X 2 ) generalization to arbitrary networks achieved by random linear network coding for single multicast session with given link capacities [HoMéEffKoe04] 30

31 Case 3: correlated sources Problem: when there are multiple sessions sharing the network, how to choose data rates from correlated sources (which are to some extent interchangeable)? Approach: each node i maintains a virtual queue for each (source, sink) pair (α, β) of each session c each sink β drains the virtual queues of sources α at rates A cαβ out (t) chosen based on lengths of virtual queues at β token queue associated with each virtual queue at sinks keeps track of deficits in received rate caused by source burstiness and link variability reverse of previous algorithms: uses the difference V cαβ i (t) between maximum queue size M and virtual queue length 31

32 Algorithm for correlated sources In each time slot [t, t + T), Outflow rate allocation: Each sink β chooses outflow rates {A cαβ out (t) α S c } to minimize V cαβ β (t + )A cαβ out (t) subject to α S A cαβ out (t) T A cαβ out (t) T α H(S (S c \S )) + ǫ ˆǫ c, S S c λ c α c, α S c. and removes data accordingly from its virtual queues; when queues become empty the deficit is reflected in the token queues 32

33 Algorithm for correlated sources (cont d) Inflow rate control: Each source α adds random linear combinations of exogenous data to its virtual queues at the exogenous data rate, up to a maximum amount of Vα cαβ (t). Network coding, scheduling and power control: analogous to case of independent sources Token queue adjustments: for each virtual queue at the sinks, an amount ( ) Ŵ cαβ (t) = min V V cαβ β (t ), W cαβ (t ) is removed to repay deficit (or, if negative, is added to the deficit) 33

34 Necessary condition (R az ) and {f cαβ abz, gc az, λcαβ } satisfying: Z,a Z f cαβ aiz Z,b Z α S c,b Z ( c f cαβ abz 0 a, b, Z, c, α S c, β T c λ cαβ c, α S c, β T c, i = α f cαβ ibz = λ cαβ c, α S c, β T c, i = β 0 c, α S c, β T c, i / {α, β} f cαβ abz g c az a, Z, c, β T c g c az ) α S λ cαβ (R az ) for some (R az ) Γ λ cαβ λ c α c, α S c, β T c H(S (S c \S )) c, S S c, β T c 34

35 Sufficient condition For some ǫ > 0, (R az ) and {f cαβ abz, gc az, λcαβ } satisfying: Z,a Z f cαβ aiz Z,b Z α S c,b Z ( c f cαβ abz 0 a, b, Z, c, α S c, β T c λ cαβ c, α S c, β T c, i = α f cαβ ibz = λ cαβ c, α S c, β T c, i = β 0 c, α S c, β T c, i / {α, β} f cαβ abz g c az a, Z, c, β T c g c az ) α S λ cαβ (R az ) for some (R az ) Γ λ cαβ λ c α c, α S c, β T c H(S (S c \S )) + ǫ c, S S c, β T c 35

36 Theorem The back-pressure algorithm with V = TBN ˆǫ M = V + Nµ out max, where B = τ max 2 ( 1 N ( E i,c +(µ out max) 2 + (µ in max) 2 ) A cαβ in T, 0 < ˆǫ < ǫ and ) N σ maxµ out maxµ in max is stable and asymptotically achieves the desired multicast rates. 36

37 Proof outline Compare with a randomized policy that depends on the (unknown) flow solution At t = (kt), token queue adjustments for both policies: for each virtual queue at the sinks, an amount ( ) Ŵ cαβ (t) = min V V cαβ β (t ), W cαβ (t ) is removed to repay token queue deficit (or, if negative, is added to the deficit), i.e. V cαβ β (t + ) = V cαβ (t ) + Ŵ cαβ (t) β W cαβ (t + ) = W cαβ (t ) Ŵ cαβ (t) 37

38 Proof outline Outflow rate allocation: back pressure policy: each sink β chooses {A cαβ out (t) α S c } to minimize V cαβ β (t + )A cαβ out (t) subject to α S A cαβ out (t) T A cαβ out (t) T α H(S (S c \S )) + ǫ ˆǫ c, S S c λ c α c, α S c randomized policy: A cαβ out (t) = T(λ cαβ ˆǫ) 38

39 Inflow at sources: Proof outline back pressure policy: A cαβ in (t) = Tλc α randomized policy: A cαβ in (t) = Tλcαβ add a corresponding amount of data to source queues up to maximum capacity Scheduling and power control: back pressure policy: choose so as to maximize µ az (P, S(t))waZ a,z where µ az (P, S(t)) is the link rate and waz = ( ( max U c az a β b Z β T c az max ) ) U c az β b, 0 39

40 randomized policy: choose so as to achieve average rates power allocation: for each S, choose allocation from a finite set according to a set of probabilities for each link (a, Z), one session c is chosen randomly with g c az probability c gc az each of its sinks β is independently chosen with probability α,b fcαβ abz g c az for each chosen sink, one (source, destination node) pair (α S c, b Z) is chosen with probability f cαβ abz α,b fcαβ abz 40

41 Proof outline Network coding: send a random linear combination of data corresponding to the chosen (session, source, sink, destination)-tuples (c, α, β, d) on each link (a, Z) at its instantaneous rate (back pressure policy) c or at a fraction gc az R az of its instantaneous rate (randomized policy) up to maximum capacity of destination queue 41

42 Evolution of queues in interval (t,t + T): V cαβ α (t + T) max V α cαβ (t) A cαβ in (t) T a,z aαz (t), 0 µ cαβ +T b,z V cαβ i (t + T) max µ cαβ αbz (t) V cαβ i (t) T a,z aiz (t), 0 µ cαβ +T b,z µ cαβ ibz (t) i / {α, β} 42

43 Evolution of sink queues in interval (t,t + T): V cαβ β ((t + T) ) max V cαβ β (t + ) T a,z aβz (t), 0 µ cαβ +T b,z µ cαβ βbz (t) + Âcαβ out (t) W cαβ ((t + T) ) = W cαβ (t + ) + A cαβ out (t) Âcαβ out (t) 43

44 Lyapunov functions For each (c, α S c, β T c ), define the Lyapunov function L cαβ (V cαβ, W cαβ ) = i (V cαβ i ) 2 + 2V W cαβ and let L cαβ (t) = L cαβ (V cαβ (t), W cαβ (t)). 44

45 Evolution of Lyapunov functions At t = kt, L cαβ (t + ) L cαβ (t ) = Ŵ cαβ (t) (Ŵ cαβ (t) + 2V cαβ β (t ) 2V ) 0 45

46 Evolution of Lyapunov functions (cont d) For (t, t + T), E{L cαβ ((t + T) ) L cαβ (t + ) V (t + ), W(t + )} c,α S c,β T c 2T 2 BN 2T V cαβ i (t)e µ cαβ aiz c,α S c,β T c i a,z b,z { } { }] +Vα cαβ A cαβ in (t)e V cαβ β (t + A cαβ out )E T T µ cαβ ibz = D(V (t + ), W(t + )) where B = τ max 2 ( 5 2N c,α (λ c α) 2 + 4σ maxµ in maxµ out max N + (µ out max) 2 + (µ in max) 2 ) 46

47 Comparing the policies Token queue adjustment at t = kt identical for both policies For (t, t + T), D = K 2T + c,α,β = K 2T + c,α,β i,c Vα cαβ (t)e a,b,z V cαβ i α S c,β T c c,β Vα cαβ (t)e { } A cαβ in T { E µ cαβ abz { A cαβ in T } (t)e } ( c,α,β V cαβ a c,α,β a,z V cαβ β (t)e µ cαβ aiz b,z µ cαβ ibz { } A cαβ out T ) (t) V cαβ b (t) V cαβ β (t)e { } A cαβ out T 47

48 Comparing the policies The three terms of the preceding expression involve disjoint sets of policy-dependent variables The back-pressure policy maximizes each of them subject to constraints which are also satisfied by the randomized policy Thus, D backpressure (V (t + ), W(t + )) D randomized (V (t + ), W(t + )) 48

49 Evolution over one time step For the randomized policy, E{µ cαβ abz (t)} = fcαβ abz a, b, Z, c, α S c, β T c A cαβ in = Tλ cαβ c, α S c, β T c A cαβ out = T ˆλ cαβ = T(λ cαβ ˆǫ) c, α S c, β T c independently of V (t), W(t) Thus, E { L cαβ ((t T) ) L cαβ (t ) } D backpressure D randomized 2T 2 BN 2Tˆǫ c V cαβ β α S c,β T c (t) 49

50 Stability of back pressure policy If W cαβ (t + ) = 0 for all (c, α, β), L cαβ (t ) NM 2 t (t, t + T) If W cαβ (t + ) > 0 for some (c, α, β), then V cαβ β (t + ) = V, and E { L cαβ ((t T) ) L cαβ (t ) } 2T 2 BN 2TˆǫV 0 for V = TBN ˆǫ 50

51 Coding across unicast sessions wired 51

52 Coding across unicast sessions wired 52

53 Coding across unicast sessions wired 53

54 Coding across unicast sessions wired 54

55 Coding across unicast sessions wireless 55

56 Coding across unicast sessions wireless 56

57 Coding across unicast sessions wireless 57

58 Coding across sessions advantages in capacity, online incremental solutions how to find the minimum cost way to add a connection? additional flow requirements depend on which existing flow(s), if any, are coded with new flow use butterfly structure as a basic building block 58

59 re m e d y re q u e s t re m e d y re q u e s t Wired butterfly structure 59

60 Linear constraints for adding a new connection x e (i): usage of link e by flow i p e (m n, u): poison on flow n originating from merger with flow m at node u q e (m n, u): associated remedy request r e (m n, u): associated remedy r e (m n, u) is a positive real flow; p e (m n, u) and q e (m n, u) are negative virtual flows completing loop in opposite direction to real flows 60

61 Linear constraints for adding a new connection Src 1 x(1) = 1, q(1 2) = 1 r(1 2) = 1 Rcv 2 x(2) = 1, p(1 2) = 1 61

62 Linear constraints for adding a new connection New flow of size r n from source s n to sink t n x e (n) 0 v / {s n, t n } x e (n) = r n v = t n e: d(e)=v e: o(e)=v r n v = s n Conservation of flow in loops (p e (m n, u) + q e ( ) + r e ( )) = e: d(e)=v e: o(e)=v (p e ( ) + q e ( ) + r e ( )) Virtual flows are associated with corresponding real flows x e (n) + (p e (m n, u) + q e (n m, u)) 0 u m 62

63 Linear constraints for adding a new connection p e (m n, u) generated at u and diminishes going downstream p e (m n, u) p e (m n, u) e: d(e)=u p e (m n, v) e: o(e)=u e: d(e)=v e: o(e)=v p e (m n, v) v u q e (m n, u) generated at u and diminishes going upstream q e (m n, u) q e (m n, u) e: d(e)=u q e (m n, v) e: o(e)=u e: d(e)=v e: o(e)=v q e (m n, v) v u 63

64 Linear constraints for adding a new connection Poison generated symmetrically p e (m n, o(e)) = p e (n m, o(e)) Link capacity constraint n max(p e (m n, u), p e (n m, u)) + x e (i) u m + u i=1 (r e (m n, u) + r e (n m, u)) z e m 64

65 Wireless multicast advantage 65

66 Linear constraints for adding a new connection wireless multicast advantage Poison generation Link capacity constraints ( max u m b Z p ubz (m n, u) = b Z p ubz (n m, u) p abz (n m, u) p abz (m n, u), b Z b Z + [ ( max x az (m), ) r abz (m n, u) m u b ( + max x az (n), )] r abz (n m, u) u b ) z abz 66

67 Competitive online algorithms we extend the approach of Awerbuch et al. [AAP93] on throughput-competitive online routing to network coding sequentially consider unicast session requests β j, j = 1, 2,...,k, each specifying source s j, destination d j, duration, bandwidth and an associated reward goal is to maximize total reward (e.g. throughput) online algorithm either allocates sufficient capacity to accommodate request or rejects request; no rerouting Evaluate online algorithm by competitive ratio: supremum, over all possible input sequences, of the ratio of the optimal offline reward to the online reward 67

68 m links in network Notation and assumptions reward ρ j of j th request bounded within range [1, R] consider single period and unit bandwidth requests for simplicity capacity u e of each link e bounded within range [log µ, P], where P 1 and µ = 2mPR 68

69 Online routing approach of Awerbuch et al. Online strategy: assign link costs exponential in fractional usage accept a connection only if worthwhile compared to costs Competitive ratio of O(log n) achieved, where n is the number of nodes 69

70 Incorporating network coding allow up to two connections to share capacity by being coded together associate with each edge e a cost, after considering j 1 requests, based on fraction λ e,x (j) of its capacity already assigned to x = 1, 2 or more flows: where 0 α < 1 c e (j) = 1 m µλ e,1(j)+αλ e,2 (j)(1 1 ue λ e,1(j)) + 70

71 Online strategy algorithm accommodates request β j iff it can find a solution such that (a e,1 + αa e,2 ) c e (j) ρ j u e e a e,1 + αa e,2 u e a e,2 u e λ e,1 (j) λ e,2 (j) e & 1 log µ e where a e,x is the capacity of e used in adding β j that becomes shared by x = 1, 2 connections 71

72 Finding a low-cost solution for a connection by linear programming based on the equations described earlier, or by heuristics, e.g. searching for remedy paths within limited local areas, greedy Dijkstra-like approach 72

73 Performance A (2 log µ + 3) competitive ratio is obtained as long as each connection added uses a solution costing no more than the lowest cost routing-only solution This is order-optimal [AAP93] 73

74 Enforcing capacity constraints When λ e,1 (j) > 1 1 u e, using the assumption that log µ u e P, we have 1 c e (j) > µ1 u e mu e µ 2mP = R, so capacity will not be exceeded log µ 74

75 Lower bounding online performance If request β j is admitted, (c e (j + 1) c e (j)) e e e c e (j) ρ j log µ ( ) µ a e,1 +αa e,2 ue 1 ( ) ae,1 + αa e,2 c e (j) log µ Summing over set A of all accepted requests, ρ j log µ ( c e (k + 1) 1 ) m j A e = e where k is the total number of requests. c e (k + 1) 1, u e 75

76 Upper bounding off-line performance If request j is admitted by the off-line algorithm but not the online algorithm, ρ j < e P j c e (j) u e e P j c e (k + 1) u e where P j is the path from s j to t j that forms part of the set of links used by the off-line algorithm to accommodate β j Total reward from the set Q of these requests is at most j Q e P j c e (k + 1) u e = e: e P j, j Q c e (k + 1) j Q: e P j 1 u e 2 e c e (k + 1) 76

77 Competitive ratio Off-line reward is at most j Qρ j + j Aρ j 2 e c e (k + 1) + j A ρ j 2 + (2 log µ + 1) j Aρ j Competitive ratio is 2 log µ

78 Conclusions and further work Dynamic back pressure-based algorithms for intra-session multicast with independent or correlated sources Online algorithm for sequentially phasing in multiple unicast connections Further work: fully decentralized dynamic algorithms for wireless evaluation and comparisons on typical or random graphs randomized online network coding algorithms 78

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Fairness and Optimal Stochastic Control for Heterogeneous Networks

Fairness and Optimal Stochastic Control for Heterogeneous Networks λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping

More information

Code Construction for Two-Source Interference Networks

Code Construction for Two-Source Interference Networks Code Construction for Two-Source Interference Networks Elona Erez and Meir Feder Dept. of Electrical Engineering-Systems, Tel Aviv University, Tel Aviv, 69978, Israel, E-mail:{elona, meir}@eng.tau.ac.il

More information

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling 1 Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling Saswati Sarkar and Koushik Kar Abstract In this paper, we consider queue-length stability in wireless

More information

K User Interference Channel with Backhaul

K User Interference Channel with Backhaul 1 K User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade Off Borna Kananian,, Mohammad A. Maddah-Ali,, Babak H. Khalaj, Department of Electrical Engineering, Sharif University

More information

Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel

Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Wang, ISIT 2011 p. 1/15 Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Chih-Chun Wang, Jaemin Han Center of Wireless Systems and Applications (CWSA) School

More information

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Half-Duplex Gaussian Relay Networks with Interference Processing Relays Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras

More information

How to deal with uncertainties and dynamicity?

How to deal with uncertainties and dynamicity? How to deal with uncertainties and dynamicity? http://graal.ens-lyon.fr/ lmarchal/scheduling/ 19 novembre 2012 1/ 37 Outline 1 Sensitivity and Robustness 2 Analyzing the sensitivity : the case of Backfilling

More information

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally

More information

Communication constraints and latency in Networked Control Systems

Communication constraints and latency in Networked Control Systems Communication constraints and latency in Networked Control Systems João P. Hespanha Center for Control Engineering and Computation University of California Santa Barbara In collaboration with Antonio Ortega

More information

Competitive Management of Non-Preemptive Queues with Multiple Values

Competitive Management of Non-Preemptive Queues with Multiple Values Competitive Management of Non-Preemptive Queues with Multiple Values Nir Andelman and Yishay Mansour School of Computer Science, Tel-Aviv University, Tel-Aviv, Israel Abstract. We consider the online problem

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Node-based Distributed Optimal Control of Wireless Networks

Node-based Distributed Optimal Control of Wireless Networks Node-based Distributed Optimal Control of Wireless Networks CISS March 2006 Edmund M. Yeh Department of Electrical Engineering Yale University Joint work with Yufang Xi Main Results Unified framework for

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

Optimal Sensing and Transmission in Energy Harvesting Sensor Networks

Optimal Sensing and Transmission in Energy Harvesting Sensor Networks University of Arkansas, Fayetteville ScholarWorks@UARK Theses and Dissertations 2-206 Optimal Sensing and Transmission in Energy Harvesting Sensor Networks Xianwen Wu University of Arkansas, Fayetteville

More information

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks Technical Report Computer Networks Research Lab Department of Computer Science University of Toronto CNRL-08-002 August 29th, 2008 On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

More information

Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989)

Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989) Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989) September 13th, 1995 Donald Ferguson*,** Christos Nikolaou* Yechiam Yemini** *IBM T.J. Watson Research Center

More information

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Ibrahim Fawaz 1,2, Philippe Ciblat 2, and Mireille Sarkiss 1 1 LIST, CEA, Communicating Systems Laboratory,

More information

Dynamic spectrum access with learning for cognitive radio

Dynamic spectrum access with learning for cognitive radio 1 Dynamic spectrum access with learning for cognitive radio Jayakrishnan Unnikrishnan and Venugopal V. Veeravalli Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University

More information

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Marco Moretti, Andrea Abrardo Dipartimento di Ingegneria dell Informazione, University of Pisa, Italy

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

Multicast Packing for Coding across Multiple Unicasts

Multicast Packing for Coding across Multiple Unicasts Multicast Packing for Coding across Multiple Unicasts Chun Meng INC, CUHK & EECS, UC Irvine cmeng1@uci.edu Hulya Seferoglu LIDS, MIT hseferog@mit.edu Athina Markopoulou EECS, UC Irvine athina@uci.edu Kenneth

More information

Learning Algorithms for Minimizing Queue Length Regret

Learning Algorithms for Minimizing Queue Length Regret Learning Algorithms for Minimizing Queue Length Regret Thomas Stahlbuhk Massachusetts Institute of Technology Cambridge, MA Brooke Shrader MIT Lincoln Laboratory Lexington, MA Eytan Modiano Massachusetts

More information

Network Optimization and Control

Network Optimization and Control Foundations and Trends R in Networking Vol. 2, No. 3 (2007) 271 379 c 2008 S. Shakkottai and R. Srikant DOI: 10.1561/1300000007 Network Optimization and Control Srinivas Shakkottai 1 and R. Srikant 2 1

More information

Flow-level performance of wireless data networks

Flow-level performance of wireless data networks Flow-level performance of wireless data networks Aleksi Penttinen Department of Communications and Networking, TKK Helsinki University of Technology CLOWN seminar 28.8.08 1/31 Outline 1. Flow-level model

More information

OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback. Prof. Phil Schniter

OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback. Prof. Phil Schniter OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback Prof. Phil Schniter T. H. E OHIO STATE UNIVERSITY Joint work with Mr. Rohit Aggarwal, Dr. Mohamad Assaad, Dr. C. Emre Koksal September

More information

Imperfect Randomized Algorithms for the Optimal Control of Wireless Networks

Imperfect Randomized Algorithms for the Optimal Control of Wireless Networks Imperfect Randomized Algorithms for the Optimal Control of Wireless Networks Atilla ryilmaz lectrical and Computer ngineering Ohio State University Columbus, OH 430 mail: eryilmaz@ece.osu.edu Asuman Ozdaglar,

More information

ABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013

ABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013 ABSTRACT Title of dissertation: CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS Anthony A. Fanous, Doctor of Philosophy, 2013 Dissertation directed by: Professor Anthony Ephremides Department of Electrical

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

Optimal matching in wireless sensor networks

Optimal matching in wireless sensor networks Optimal matching in wireless sensor networks A. Roumy, D. Gesbert INRIA-IRISA, Rennes, France. Institute Eurecom, Sophia Antipolis, France. Abstract We investigate the design of a wireless sensor network

More information

distributed approaches For Proportional and max-min fairness in random access ad-hoc networks

distributed approaches For Proportional and max-min fairness in random access ad-hoc networks distributed approaches For Proportional and max-min fairness in random access ad-hoc networks Xin Wang, Koushik Kar Rensselaer Polytechnic Institute OUTline Introduction Motivation and System model Proportional

More information

A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case. 1

A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case. 1 A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case 1 Abhay K Parekh 2 3 and Robert G Gallager 4 Laboratory for Information and Decision Systems

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers

Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers Mohammad H. Yarmand and Douglas G. Down Department of Computing and Software, McMaster University, Hamilton, ON, L8S

More information

Repeated Inter-Session Network Coding Games: Efficiency and Min-Max Bargaining Solution

Repeated Inter-Session Network Coding Games: Efficiency and Min-Max Bargaining Solution Repeated Inter-Session Networ Coding Games: Efficiency and Min-Max Bargaining Solution Hamed Mohsenian-Rad, Member, IEEE, Jianwei Huang, Senior Member, IEEE, Vincent W.S. Wong, Senior Member, IEEE, and

More information

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano

More information

Wireless Transmission with Energy Harvesting and Storage. Fatemeh Amirnavaei

Wireless Transmission with Energy Harvesting and Storage. Fatemeh Amirnavaei Wireless Transmission with Energy Harvesting and Storage by Fatemeh Amirnavaei A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in The Faculty of Engineering

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks

Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks Xin Wang, Koushik Kar Department of Electrical, Computer and Systems Engineering, Rensselaer Polytechnic Institute,

More information

An Achievable Rate for the Multiple Level Relay Channel

An Achievable Rate for the Multiple Level Relay Channel An Achievable Rate for the Multiple Level Relay Channel Liang-Liang Xie and P. R. Kumar Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University of Illinois, Urbana-Champaign

More information

Topics in Data Mining Fall Bruno Ribeiro

Topics in Data Mining Fall Bruno Ribeiro Network Utility Maximization Topics in Data Mining Fall 2015 Bruno Ribeiro 2015 Bruno Ribeiro Data Mining for Smar t Cities Need congestion control 2 Supply and Demand (A Dating Website [China]) Males

More information

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels 1 Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels Invited Paper Ali ParandehGheibi, Muriel Médard, Asuman Ozdaglar, and Atilla Eryilmaz arxiv:0810.167v1 cs.it

More information

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs 01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,

More information

An Ins t Ins an t t an Primer

An Ins t Ins an t t an Primer An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,

More information

Alpha Fair Coded Caching

Alpha Fair Coded Caching Alpha Fair Coded Caching Apostolos Destounis 1, Mari Kobayashi 2, Georgios Paschos 1, Asma Ghorbel 2 1 France Research Center, Huawei Technologies Co. Ltd., email: firstname.lastname@huawei.com 2 Centrale-Supélec,

More information

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. XX, XXXXXXX X Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks Longbi Lin, Xiaojun Lin, Member, IEEE, and Ness B. Shroff,

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Online Packet Routing on Linear Arrays and Rings

Online Packet Routing on Linear Arrays and Rings Proc. 28th ICALP, LNCS 2076, pp. 773-784, 2001 Online Packet Routing on Linear Arrays and Rings Jessen T. Havill Department of Mathematics and Computer Science Denison University Granville, OH 43023 USA

More information

Optimal Utility-Lifetime Trade-off in Self-regulating Wireless Sensor Networks: A Distributed Approach

Optimal Utility-Lifetime Trade-off in Self-regulating Wireless Sensor Networks: A Distributed Approach Optimal Utility-Lifetime Trade-off in Self-regulating Wireless Sensor Networks: A Distributed Approach Hithesh Nama, WINLAB, Rutgers University Dr. Narayan Mandayam, WINLAB, Rutgers University Joint work

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling On Centralized Smooth Scheduling Ami Litman January 25, 2005 Abstract Shiri Moran-Schein This paper studies evenly distributed sets of natural numbers and their applications to scheduling in a centralized

More information

Random Linear Intersession Network Coding With Selective Cancelling

Random Linear Intersession Network Coding With Selective Cancelling 2009 IEEE Information Theory Workshop Random Linear Intersession Network Coding With Selective Cancelling Chih-Chun Wang Center of Wireless Systems and Applications (CWSA) School of ECE, Purdue University

More information

Towards Achieving Full Secrecy Rate in Wireless Networks: A Control Theoretic Approach

Towards Achieving Full Secrecy Rate in Wireless Networks: A Control Theoretic Approach owards Achieving Full Secrecy Rate in Wireless Networks: A Control heoretic Approach Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State

More information

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Syracuse University SURFACE Dissertations - ALL SURFACE June 2017 Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Yi Li Syracuse University Follow this and additional works

More information

Linear Codes, Target Function Classes, and Network Computing Capacity

Linear Codes, Target Function Classes, and Network Computing Capacity Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:

More information

Towards Achieving Full Secrecy Rate and Low Delays in Wireless Networks

Towards Achieving Full Secrecy Rate and Low Delays in Wireless Networks owards Achieving Full Secrecy Rate and Low Delays in Wireless Networks Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State University

More information

UNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours.

UNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours. UNIVERSITY OF YORK MSc Examinations 2004 MATHEMATICS Networks Time Allowed: 3 hours. Answer 4 questions. Standard calculators will be provided but should be unnecessary. 1 Turn over 2 continued on next

More information

Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View

Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View P. Mohapatra 9 th March 2013 Outline Motivation Problem statement Achievable scheme 1 Weak interference

More information

Optimization and Stability of TCP/IP with Delay-Sensitive Utility Functions

Optimization and Stability of TCP/IP with Delay-Sensitive Utility Functions Optimization and Stability of TCP/IP with Delay-Sensitive Utility Functions Thesis by John Pongsajapan In Partial Fulfillment of the Requirements for the Degree of Master of Science California Institute

More information

12. LOCAL SEARCH. gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria

12. LOCAL SEARCH. gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria 12. LOCAL SEARCH gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley h ttp://www.cs.princeton.edu/~wayne/kleinberg-tardos

More information

Communicating the sum of sources in a 3-sources/3-terminals network

Communicating the sum of sources in a 3-sources/3-terminals network Communicating the sum of sources in a 3-sources/3-terminals network Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel Email: mikel@openu.ac.il Aditya Ramamoorthy

More information

WIRELESS systems often operate in dynamic environments

WIRELESS systems often operate in dynamic environments IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 9, NOVEMBER 2012 3931 Structure-Aware Stochastic Control for Transmission Scheduling Fangwen Fu and Mihaela van der Schaar, Fellow, IEEE Abstract

More information

An Algebraic Approach to Network Coding

An Algebraic Approach to Network Coding An Algebraic Approach to July 30 31, 2009 Outline 1 2 a 3 Linear 4 Digital Communication Digital communication networks are integral parts of our lives these days; so, we want to know how to most effectively

More information

Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio

Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Jayakrishnan Unnikrishnan, Student Member, IEEE, and Venugopal V. Veeravalli, Fellow, IEEE 1 arxiv:0807.2677v2 [cs.ni] 21 Nov 2008

More information

Dirichlet s Principle on Multiclass Multihop Wireless Networks: Minimum Cost Routing Subject to Stability

Dirichlet s Principle on Multiclass Multihop Wireless Networks: Minimum Cost Routing Subject to Stability Dirichlet s Principle on Multiclass Multihop Wireless Networks: Minimum Cost Routing Subject to Stability Reza Banirazi, Edmond Jonckheere, Bhaskar Krishnamachari Department of Electrical Engineering,

More information

Multicast Packing for Coding across Multiple Unicasts

Multicast Packing for Coding across Multiple Unicasts Multicast Packing for Coding across Multiple Unicasts Chun Meng INC, CUHK & EECS, UC Irvine cmeng@uci.edu Athina Markopoulou EECS, UC Irvine athina@uci.edu Hulya Seferoglu LIDS, MIT hseferog@mit.edu Kenneth

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

Optimal Secondary Spectrum Auctions for Markets with Communication Constraints

Optimal Secondary Spectrum Auctions for Markets with Communication Constraints Optimal Secondary Spectrum Auctions for Markets with Communication Constraints Deepan Palguna, David J. Love, and Ilya Pollak Abstract Auctions have been proposed as a way to provide economic incentives

More information

Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions

Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Chih-Chun Wang Center for Wireless Systems and Applications (CWSA) School of

More information

Delay-Based Back-Pressure Scheduling in. Multihop Wireless Networks

Delay-Based Back-Pressure Scheduling in. Multihop Wireless Networks Delay-Based Back-Pressure Scheduling in Multihop Wireless Networks Bo Ji, Student Member, IEEE, Changhee Joo, Member, IEEE, and Ness B. Shroff, Fellow, IEEE arxiv:0.5674v3 [cs.ni] 7 Nov 202 Abstract Scheduling

More information

On the stability of flow-aware CSMA

On the stability of flow-aware CSMA On the stability of flow-aware CSMA Thomas Bonald, Mathieu Feuillet To cite this version: Thomas Bonald, Mathieu Feuillet. On the stability of flow-aware CSMA. Performance Evaluation, Elsevier, 010, .

More information

Utility Maximizing Routing to Data Centers

Utility Maximizing Routing to Data Centers 0-0 Utility Maximizing Routing to Data Centers M. Sarwat, J. Shin and S. Kapoor (Presented by J. Shin) Sep 26, 2011 Sep 26, 2011 1 Outline 1. Problem Definition - Data Center Allocation 2. How to construct

More information

Cross-layer Optimization for Wireless

Cross-layer Optimization for Wireless Cross-layer Optimization for Wireless 1 Networks with Deterministic Channel Models Ziyu Shao, Minghua Chen, A. Salman Avestimehr +, and Shuo-Yen Robert Li Department of Information Engineering The Chinese

More information

A Mechanism for Pricing Service Guarantees

A Mechanism for Pricing Service Guarantees A Mechanism for Pricing Service Guarantees Bruce Hajek Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign Sichao Yang Qualcomm

More information

Utility-Maximizing Scheduling for Stochastic Processing Networks

Utility-Maximizing Scheduling for Stochastic Processing Networks Utility-Maximizing Scheduling for Stochastic Processing Networks Libin Jiang and Jean Walrand EECS Department, University of California at Berkeley {ljiang,wlr}@eecs.berkeley.edu Abstract Stochastic Processing

More information

Online Path Computation & Function Placement in SDNs

Online Path Computation & Function Placement in SDNs Online Path Computation & Function Placement in SDNs Guy Even Tel Aviv University Moti Medina MPI for Informatics Boaz Patt-Shamir Tel Aviv University Today s Focus: Online Virtual Circuit Routing Network:

More information

Optimal Association of Stations and APs in an IEEE WLAN

Optimal Association of Stations and APs in an IEEE WLAN Optimal Association of Stations and APs in an IEEE 802. WLAN Anurag Kumar and Vinod Kumar Abstract We propose a maximum utility based formulation for the problem of optimal association of wireless stations

More information

Backlog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network

Backlog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network MTech Dissertation Backlog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network Submitted in partial fulfillment of the requirements for the degree of Master of Technology

More information

Stabilizing Hybrid Data Traffics in Cyber Physical Systems with Case Study on Smart Grid

Stabilizing Hybrid Data Traffics in Cyber Physical Systems with Case Study on Smart Grid 1 Stabilizing Hybrid Data Traffics in Cyber Physical Systems with Case Study on Smart Grid Husheng Li, Zhu Han and Ju Bin Song Abstract In many cyber physical systems such as smart grids, communications

More information

An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits

An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits Peter Jacko YEQT III November 20, 2009 Basque Center for Applied Mathematics (BCAM), Bilbao, Spain Example: Congestion

More information

Distributed Optimization over Networks Gossip-Based Algorithms

Distributed Optimization over Networks Gossip-Based Algorithms Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random

More information

Weakly Secure Data Exchange with Generalized Reed Solomon Codes

Weakly Secure Data Exchange with Generalized Reed Solomon Codes Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,

More information

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent

More information

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,

More information

Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes

Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes Jingjing Zhang and Osvaldo Simeone arxiv:72.04266v4 [cs.it] 2 Mar 208 Abstract In fog-aided cellular systems,

More information

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Mohammed Karmoose 1 Ahmed Sultan 1 Moustafa Youseff 2 1 Electrical Engineering Dept, Alexandria University 2 E-JUST Agenda 1

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

Markov decision processes with threshold-based piecewise-linear optimal policies

Markov decision processes with threshold-based piecewise-linear optimal policies 1/31 Markov decision processes with threshold-based piecewise-linear optimal policies T. Erseghe, A. Zanella, C. Codemo Dept. of Information Engineering, University of Padova, Italy Padova, June 2, 213

More information

Analyzing Large Communication Networks

Analyzing Large Communication Networks Analyzing Large Communication Networks Shirin Jalali joint work with Michelle Effros and Tracey Ho Dec. 2015 1 The gap Fundamental questions: i. What is the best achievable performance? ii. How to communicate

More information

Maximum-Life Routing Schedule

Maximum-Life Routing Schedule Maximum-Life Routing Schedule Peng-Jun Wan wan@cs.iit.edu Peng-Jun Wan (wan@cs.iit.edu) Maximum-Life Routing Schedule 1 / 42 Outline Problem Description Min-Cost Routing Ellipsoid Algorithm Price-Directive

More information

Throughput-Optimal Multi-hop Broadcast Algorithms

Throughput-Optimal Multi-hop Broadcast Algorithms Throughput-Optimal Multi-hop Broadcast Algorithms Abhishe Sinha Laboratory for Information and Decision Systems MIT sinhaa@mit.edu Georgios Paschos Eytan Modiano Mathematical and Algorithmic Laboratory

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Optimal power-delay trade-offs in fading channels: small delay asymptotics

Optimal power-delay trade-offs in fading channels: small delay asymptotics Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract

More information