Job Scheduling and Multiple Access. Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley)

Similar documents
Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Chapter 3 Balance equations, birth-death processes, continuous Markov Chains

On queueing in coded networks queue size follows degrees of freedom

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

NATCOR: Stochastic Modelling

The Timing Capacity of Single-Server Queues with Multiple Flows

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017

Computer Networks More general queuing systems

Lecture 1: The Multiple Access Channel. Copyright G. Caire 12

Queueing Theory and Simulation. Introduction

Computer Systems Modelling

Multiaccess Communication

Random Access: An Information-Theoretic Perspective

Optimal power-delay trade-offs in fading channels: small delay asymptotics

Introduction to Queueing Theory

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Broadcasting with a Battery Limited Energy Harvesting Rechargeable Transmitter

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Performance Evaluation of Queuing Systems

Relaying Information Streams

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

On ARQ for Packet Erasure Channels with Bernoulli Arrivals

Towards control over fading channels

Modeling and Simulation NETW 707

Approximately achieving the feedback interference channel capacity with point-to-point codes

Part I Stochastic variables and Markov chains

Homework 1 - SOLUTION

16:330:543 Communication Networks I Midterm Exam November 7, 2005

Power Controlled FCFS Splitting Algorithm for Wireless Networks

Variable Length Codes for Degraded Broadcast Channels

Chapter 2 Queueing Theory and Simulation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

DELAY, MEMORY, AND MESSAGING TRADEOFFS IN DISTRIBUTED SERVICE SYSTEMS

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

Approximate Queueing Model for Multi-rate Multi-user MIMO systems.

Queue Proportional Scheduling in Gaussian Broadcast Channels

On the Duality between Multiple-Access Codes and Computation Codes

Chapter 6 Queueing Models. Banks, Carson, Nelson & Nicol Discrete-Event System Simulation

ECE Information theory Final (Fall 2008)

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic

Shannon s A Mathematical Theory of Communication

Approximate Capacity of Fast Fading Interference Channels with no CSIT

THE capacity of the exponential server timing channel

Information Theory for Wireless Communications. Lecture 10 Discrete Memoryless Multiple Access Channel (DM-MAC): The Converse Theorem

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel

Slides 9: Queuing Models

Link Models for Circuit Switching

Introduction to Queueing Theory

State-dependent and Energy-aware Control of Server Farm

A Comparison of Two Achievable Rate Regions for the Interference Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Capacity of a Two-way Function Multicast Channel

On Network Interference Management

On the Capacity Region of the Gaussian Z-channel

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems

Embedded Systems 15. REVIEW: Aperiodic scheduling. C i J i 0 a i s i f i d i

Intro to Queueing Theory

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback

Convolution Algorithm

COMP9334: Capacity Planning of Computer Systems and Networks

Optimal Power Allocation over Parallel Gaussian Broadcast Channels

Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel

18.2 Continuous Alphabet (discrete-time, memoryless) Channel

CHAPTER 3 STOCHASTIC MODEL OF A GENERAL FEED BACK QUEUE NETWORK

Anytime Capacity of the AWGN+Erasure Channel with Feedback. Qing Xu. B.S. (Beijing University) 1997 M.S. (University of California at Berkeley) 2000

Stochastic Models of Manufacturing Systems

Introduction to Queueing Theory

Multiuser Capacity in Block Fading Channel

Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe

ECE 3511: Communications Networks Theory and Analysis. Fall Quarter Instructor: Prof. A. Bruce McDonald. Lecture Topic

Analysis of A Single Queue

Information Theory Meets Game Theory on The Interference Channel

1.225J J (ESD 205) Transportation Flow Systems

Data Rate Theorem for Stabilization over Time-Varying Feedback Channels

PBW 654 Applied Statistics - I Urban Operations Research

Networking = Plumbing. Queueing Analysis: I. Last Lecture. Lecture Outline. Jeremiah Deng. 29 July 2013

EE126: Probability and Random Processes

2DI90 Probability & Statistics. 2DI90 Chapter 4 of MR

Operational Laws 33-1

EE 505 Introduction. What do we mean by random with respect to variables and signals?

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding

On the Secrecy Capacity of the Z-Interference Channel

6 Solving Queueing Models

Fundamental Limits of Invisible Flow Fingerprinting

Chapter 5. Elementary Performance Analysis

Lecture 5 Channel Coding over Continuous Channels

Embedded Systems 14. Overview of embedded systems design

Answers to selected exercises

channel of communication noise Each codeword has length 2, and all digits are either 0 or 1. Such codes are called Binary Codes.

ABSTRACT WIRELESS COMMUNICATIONS. criterion. Therefore, it is imperative to design advanced transmission schemes to

Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes

Discrete Random Variables

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Probability Models in Electrical and Computer Engineering Mathematical models as tools in analysis and design Deterministic models Probability models

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Transcription:

Job Scheduling and Multiple Access Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley) 1

Multiple Access Setting Characteristics of Multiple Access: Bursty Arrivals Uncoordinated Transmitters Interference Limited Feedback Different bodies of research approach these characteristics in different ways. 2

Multi Processor Queues Consider n tasks to be completed. Task k requires s k units of service. We also have m processors. Processor j can deliver service at a rate r j units of service per unit time. We can: Assign processors to tasks Change the assignment at any time cannot: Assign > 1 processor to a task at a given time Assign > 1 task to a processor at a given time Task k is complete when the cumulative service it has received equals s k. 3

Multi Processor Queues Example: We have several cows, ( ) (oo) /-------\/ / * ---- ~~ ~~ s k = amount of milk in cow k and we have a number of milkers to milk them r j = amount of milk milker j can milk in an hour 4

Example 3 Three tasks with 2 1 s 1 (t) s 2(t) s 3 (t) s 1 = 1, s 2 = 2, s 3 = 3. Two processors with 0 3 2 1 0 n(t) 0 1 2 1 2 4 3 4 t t r 1 = 1, r 2 = 1/2. First assign the processor 1 to task 1 and processor 2 to task 2. When task 1 completes, assign processor 1 to task 2, processor 2 to task 3. When task 2 completes, assign processor 1 to task 3. 5

Assume Service Rates r 1 r 2 If we have only three tasks to serve, what is the set of service rates (R 1, R 2, R 3 ) that they can receive? R 3 R 1 R 2 The vertices of the hexagon and those rates achievable by permuting the assignment of the first three processors to the three tasks. The hexagon itself can be achieved by time sharing, and any point contained in the polymatroid is dominated by some point of the hexagon. The set of service rates are then given by R i r 1, R i +R j r 1 +r 2 (i j), R 1 +R 2 +R 3 r 1 +r 2 +r 3 6

Service Rates In general, if we had n tasks, the deliverable service rates are those (R 1,..., R n ) that satisfy: for every I {1,..., n}, R i i I I j=1 r j. That is, for any collection of tasks, the total rate these tasks receive cannot exceed the the total rate they would get if the fastest processors were assigned to them. 7

Service Policies Given a collection of processors and a set of tasks, if we know the remaining service requirement s k (t) for each task k at a time t, we do not need to know anything else about the past of the system to determine the future evolution. That is, ( sk (t), k = 1, 2,... ) is a state of the system. A service policy is a function that maps the state of the system to a deliverable service rate vector. It thus determines the rate of service offered to each task at time t based on the state at time t. 8

Service Policies (cont) Example: Assume again r 1 r 2. Consider a policy that assigns faster processors to shorter tasks. That is: if the state of the system is (s 1,..., s n ) and π is a permutation of {1,..., n} that orders the tasks in increasing service requirements, i.e., s π(1) s π(n), then this policy will assign processor i to task π(i). Formally, this policy maps (s 1,..., s n ) (r π 1 (1),..., r π 1 (n)), where π is the above permutation. 9

Job Scheduling Suppose we serve the tasks using some policy P. Let t k (P ) denote the completion time of task k. Define t(p ) = 1 n n t k (P ) k=1 as the average completion time of the tasks. Theorem: The policy of assigning shorter tasks to faster processors minimizes t(p ). In fact, if s 1 s n, this policy minimizes t k (P j ) for every j n. k=1 10

Gaussian Multiple Access Channel We have n transmitters and 1 receiver. transmitted and received signals is The relationship between the Y = x 1 + + x n + Z where Y x k Z is the received signal is the signal sent by transmitter k is memoryless Gaussian noise with unit variance Suppose the transmitters have equal power P. Then the data rate vector (R 1,..., R n ) is achievable if and only if for all I {1,..., n} R i 1 log(1 + I P ). 2 i I 11

If we define Gaussian Multiple Access Channel then we see that r j = 1 2 log( 1 + jp ) 1 2 log( 1 + (j 1)P ), = (1 1 2 log P ) + 1 + (j 1)P I 1 2 log(1 + I P ) = j=1 and so the data rate constraints in the achievability condition is for all I {1,..., n} r j, R i i I I Thus, the same formula determines the achievable data rates in a multiple access channel and and deliverable service rates in multi processor queues. Can this be put to some use? j=1 r j. 12

Example Application Given the number of bits s 1, s 2,... each transmitter has to send not the data rate, just bits what transmission strategy will minimize the average transmission time? Mimic the shorter tasks faster policy: Consider just two users with s 1 s 2. Give user 1 service at rate r 1 until its message is decoded at time t 1 = s 1 /r 1. By then, also decode t 1 r 2 bits of the second user. Then, user 2 should get service at rate r 1 until its remaining s 2 t 1 r 2 bits are decoded. Can this wishful analogy be made into a transmission strategy? Since user 1 is supposed to get rate r 1, it should be as if it is the only user of the channel. But if user 2 is silent, then how is it supposed to get rate r 2? Nevertheless, by a small miracle, all is well. User 2 should break its s 2 bits into two portions of size t 1 r 2 and s 2 t 1 r 2. Then, during the interval [0, t 1 ] we can decode the first portion regarding user 1 as noise, at rate r 2. Once this portion is decoded user 2 s signal can be subtracted, and we can indeed decode user 1, at rate r 1. 13

Multiprocessor Queues with Arrivals Suppose that the tasks are not all present at the beginning of time, but they arrive at random instants of time. What policy should be used to minimize the expected time a task spends in the system? I don t know the answer, but we can still propose the shorter tasks faster policy as a heuristic: Suppose tasks arrive according to some stochastic process (say Poisson) with rate λ. Suppose each task requires 1 unit of service when it arrives. Observe: under the shorter tasks faster policy a task cannot disturb the service of earlier tasks. Not only is there no overtaking, the departure time of a task is known as soon as it arrives, and is independent of all future arrivals. 14

Multiprocessor Queues with Arrivals Tasks Arrive ( ) (oo) /-------\/ / * ---- ~~ ~~ ( ) (oo) /-------\/ / * ---- ~~ ~~ ( ) (oo) /-------\/ / * ---- ~~ ~~ Tasks Leave Proc 4 Proc 3 Proc 2 Proc 1 A task finding an empty system is assigned processor 1, otherwise it will be assigned the first idle processor. When the earliest job completes, the remaining tasks are promoted up the processor hierarchy. One can show that if j r j diverges, then the system is stable for any arrival rate λ. 15

Multiple Access Channel with Arrivals Can one implement the policy just described as a transmission strategy? With a bit of feedback, yes: maintain a departures timetable for the transmissions currently in service. An arriving packet that finds n people already in service will need to be served at rates r n+1, r n,..., r 1, the transitions taking place every time some other packet is decoded. With the departures timetable the incoming packet knows when these transitions are to take place, and split itself to subpackets of appropriate size. Furthermore, during the first interval, the rate it is to get r n+1 is exactly what it can get if it is decoded while treating the earlier packets as noise. At the end of the first period, the subpacket can be decoded and subtracted, and thus not disturbing the earlier packets. And similarly for the remaining periods. 16

Multiple Access Channel with Arrivals λ DW/S (1/bits) 20 10 5 SNR=0dB SNR=30dB 2 1 0.5 0.2 0.1 0 5 10 15 20 λs/w (bits) Performance of the policy: average delay vs arrival rate. 17

A Lower Bound on Delay Suppose we have a multiprocessor queue to which unit length tasks arrive at a rate λ. Suppose we have some service policy. Let p n denote the long term fraction of time during which there are n tasks in the queue (assume p n exists). Thus, the time-average number of tasks in queue is N = np n. n=0 By Little s law, the average time D a task spends in the system is given by λ D = N The long-term average service that is offered by the system is at most n C n p n ; C n = n=0 j=1 r j 18

A Lower Bound on Delay For stability λ n C np n, and thus, { N inf np n : n n Equivalently, { λ sup C n p n : n n C(n) (1, C 1 ) (2, C 2 ) (3, C 3 ) (4, C 4) 0 1 2 3 4 5 } np n N n } C n p n λ. = sup { E[C(N)] : E[N] N } But, by Jensen s Inequality E[C(N)] C(E[N]) C( N), with equality if p puts mass only on N and N. Thus: D C 1 (λ). λ 19

λ DW/S (1/bits) Multiple Access With Arrivals 20 10 5 SNR=0dB SNR=30dB 2 1 0.5 0.2 0.1 0 5 10 15 20 λs/w (bits) Comparison of the performance of the policy with the lower bound. 20

Concluding Remarks Understanding multiuser communications will require a unified view of networking and physical layers. Network information theory is already hard enough even without trying to incorporate network-layer questions. Still, we may be able to say more than what we currently do. The example above is too fragile, but is perhaps useful as an illustration. 21