Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks

Similar documents
Optimizing Information Freshness in Wireless Networks under General Interference Constraints

Multicast With Prioritized Delivery: How Fresh is Your Data?

Optimizing Age of Information in Wireless Networks with Throughput Constraints

Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor

Can Determinacy Minimize Age of Information?

Information in Aloha Networks

Age-of-Information in the Presence of Error

Age-Optimal Updates of Multiple Information Flows

Minimizing Age of Information with Soft Updates

Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges

Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels?

The Age of Information in Multihop Networks

Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement

Scheduling Algorithms for Optimizing Age of Information in Wireless Networks with Throughput Constraints

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery

THE Age of Information is a new metric that has been introduced

Fairness and Optimal Stochastic Control for Heterogeneous Networks

Age of Information Upon Decisions

Scheduling Multicast Traffic with Deadlines in Wireless Networks

Channel Allocation Using Pricing in Satellite Networks

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California

Age-Optimal Constrained Cache Updating

Node-based Distributed Optimal Control of Wireless Networks

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Update or Wait: How to Keep Your Data Fresh

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal

Lexicographic Max-Min Fairness in a Wireless Ad Hoc Network with Random Access

14. Duality. ˆ Upper and lower bounds. ˆ General duality. ˆ Constraint qualifications. ˆ Counterexample. ˆ Complementary slackness.

Motivation. Lecture 2 Topics from Optimization and Duality. network utility maximization (NUM) problem:

5. Duality. Lagrangian

Achieving the Age-Energy Tradeoff with a Finite-Battery Energy Harvesting Source

Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks

On queueing in coded networks queue size follows degrees of freedom

ECE Optimization for wireless networks Final. minimize f o (x) s.t. Ax = b,

Extreme Abridgment of Boyd and Vandenberghe s Convex Optimization

Update or Wait: How to Keep Your Data Fresh

Constrained Optimization and Lagrangian Duality

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

AGE of Information (AoI) has been receiving increasing

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

Routing. Topics: 6.976/ESD.937 1

Convex Optimization Boyd & Vandenberghe. 5. Duality

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

Convex Optimization & Lagrange Duality

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

P e = 0.1. P e = 0.01

On the Optimality of Multiuser Zero-Forcing Precoding in MIMO Broadcast Channels

Learning Algorithms for Minimizing Queue Length Regret

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

Lecture: Duality.

Lagrange duality. The Lagrangian. We consider an optimization program of the form

Greedy weighted matching for scheduling the input-queued switch

Spectrum Sharing between DSRC and WiFi: A Repeated Game Approach

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

Lagrangian Duality and Convex Optimization

Delay-Based Connectivity of Wireless Networks

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels

EE/AA 578, Univ of Washington, Fall Duality

Transmission Scheduling of Periodic Real-Time Traffic in Wireless Networks. Igor Kadota

A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels

An Evolutionary Game Perspective to ALOHA with power control

On the Design of Efficient CSMA Algorithms for Wireless Networks

ELE539A: Optimization of Communication Systems Lecture 6: Quadratic Programming, Geometric Programming, and Applications

Optimal power-delay trade-offs in fading channels: small delay asymptotics

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Age of Information under Energy Replenishment Constraints

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling

Optimality Conditions for Constrained Optimization

The Status Update Problem: Optimal Strategies for Pseudo-Deterministic Systems

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

arxiv: v3 [cs.ni] 22 Dec 2018

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

Distributed Random Access Algorithm: Scheduling and Congesion Control

Adaptive Distributed Algorithms for Optimal Random Access Channels

Primal/Dual Decomposition Methods

Blocking Probability and Channel Assignment in Wireless Networks

Tutorial on Convex Optimization: Part II

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels

Scheduling in parallel queues with randomly varying connectivity and switchover delay

12. Interior-point methods

Efficient Nonlinear Optimizations of Queuing Systems

Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance

Energy Harvesting Communications under Explicit and Implicit Temperature Constraints

Markov Chain Model for ALOHA protocol

LECTURE 3. Last time:

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication

Network Control: A Rate-Distortion Perspective

Minimum Age of Information in the Internet of Things with Non-uniform Status Packet Sizes

Convex Optimization M2

Cooperative Diamond Channel With Energy Harvesting Nodes Berk Gurakan, Student Member, IEEE, and Sennur Ulukus, Fellow, IEEE

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel

Broadcasting with a Battery Limited Energy Harvesting Rechargeable Transmitter

ICS-E4030 Kernel Methods in Machine Learning

Update or Wait: How to Keep Your Data Fresh

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence

Transcription:

Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks Rajat Talak, Sertac Karaman, and Eytan Modiano arxiv:803.06469v [cs.it] 7 Mar 208 Abstract Age of Information AoI, measures the time elapsed since the last received information packet was generated at the source. We consider the problem of AoI minimization for singlehop flows in a wireless network, under pairwise interference constraints and time varying channel. We consider simple, yet broad, class of distributed scheduling policies, in which a transmission is attempted over each link with a certain attempt probability. We obtain an interesting relation beten the optimal attempt probability and the optimal AoI of the link, and its neighboring links. We then show that the optimal attempt probabilities can be computed by solving a convex optimization problem, which can be done distributively. I. INTRODUCTION Timely delivery of information updates is gaining increasing relevance with the advent of technologies such as autonomous flying vehicles, internet of things, and other cyber physical systems. In autonomous flying vehicles, for example, timely exchange of position, velocity, and other control information can improve network safety [], [2]. Packet delay, the traditionally used measure, accounts for the average time taken for a packet to reach the destination node, but does not measure the information lag at the destination node, especially when the information update generation can be controlled [3] [5]. For example, if two packets carry the same information, and one arrives early at the destination, then there is no need in accounting for the delay in reception of the second packet. Age of information AoI, a newly proposed metric [3], [6], is defined to be the time elapsed since the last received information update was generated at the source node. AoI, upon reception of a new update packet drops to the time elapsed since generation of the packet, and grows linearly otherwise. AoI, therefore, more accurately captures the information lag at the destination node. AoI has been analyzed for various queueing models [3], [7] [], but very little attention has been paid to AoI minimization in wireless networks. A problem of scheduling finitely many update packets under physical interference constraints was shown to be NP-hard in [2]. Age for a broadcast network, where only a single link can be activated at any time, was studied in [3] [5]. Some preliminary analysis of age for a slotted ALOHA like random access was done in [6], The authors are with the Laboratory for Information and Decision Systems LIDS at the Massachusetts Institute of Technology MIT, Cambridge, MA. {talak, sertac, modiano}@mit.edu Submitted to SPAWC 208. This work was supported by NSF Grants AST-54733, CNS-73725, and CNS-70964, and by Army Research Office ARO grant number W9NF- 7--0508. while multi-hop networks have been considered in [5], [7]. More recent work includes [4], [8], [9], which propose centralized scheduling policies for AoI minimization, under general interference constraints and time varying channels. In a wireless network, it is not always possible to implement centralized schemes. In this paper, consider a simple, yet broad, class of distributed scheduling policies for wireless networks, in which each link attempts transmission with a certain probability. We consider time varying channel and a pairwise interference model, in which each link interferes with a specified set of links in the network. We first derive an interesting relation beten the optimal attempt probability, and the optimal age of the given link and the interfering links. We then characterize the optimal distributed policy π D, as a solution to a convex optimization problem. We further show that this convex problem can be solved distributively. II. SYSTEM MODEL We model a wireless communication network as a graph G = V, E, where V is the set of nodes and E is the set of directed communication links beten the nodes. Each link e E is associated with a source-destination pair. Time is slotted, with the duration of each slot set equal to the time it takes to transmit a single update packet. For simplicity, normalize the slot duration to unity. Transmission of update packets cannot occur simultaneously over all links due to wireless interference constraints [20]. For each link e E, there is a subset of links N e E, that interfere with link e, i.e., if link e and a link l N e attempt simultaneous transmission, then the transmission over link e fails due to interference. We call this the pairwise interference model. Popular models such as -hop and 2-hop interference models [20] are special cases of this model. Channel uncertainty can also lead to failure in reception of update packets. We consider a two state channel process S e t {0, } for all time t and links e. Channel state S e t = implies that link e s channel is ON at time t, and a noninterfering transmission over e is successfully received. When S e t = 0, even a non-interfering transmission over link e fails due to bad channel conditions. We assume the channel process {S e t} t,e to be independent and identically distributed i.i.d. across time t, and only independent across links e. We let γ e = Pr S e t = denote the channel success probability for link e. We consider the case when the channel statistics, namely γ e for all e E, are known but the current channel state S e t cannot be observed.

We use U e t to denote scheduling decisions at time t, for each link e. U e t = when link e attempts transmissions in slot t, and U e t = 0 otherwise. Thus, a successful transmission occurs over link e if and only if a transmission is attempted on link e, the link e s channel is ON, and no transmission is attempted over links e N e. This is equivalent to Û e t S e tu e t U e t =. A. Age of Information AoI of a network is a function of AoI of each sourcedestination pair. Thus, define age A e t for each link, to be the time since the last received update was generated. We assume source nodes to be active sources, i.e., it can generates a fresh update packet before every transmission. When all sources are active, the age A e t, is equal to the time elapsed since the last successful transmission over e. Thus, the evolution of age A e t can be written as { Ae t + if A e t + = Ûet = 0 if Ûet =, 2 for all e E. We define average age for link e to be A ave e = lim sup T T A e t, 3 t= whenever the limit exists. We define the peak age to be the average of all the age peaks: A p e = lim sup N et N e T i= A e T e i, 4 where T e i denote the ith instance of successful transmission over link e, i.e., the ith instance when Ûet =, and N e T is the number of successful transmissions over link e until time T. We define average and peak AoI of the network to be a ighted sum of link AoI: A ave = A ave e, and A p = A p e. 5 Our objective is to design distributed scheduling policies that minimize the network average and peak age. B. Distributed Stationary Policies We focus our attention on policies in which scheduling decisions are made by the source of each link e, and not by a centralized scheduler. In particular, consider policies in which each link e attempts transmission with probability p e > 0, independent across links and slots. We refer to these policies as the distributed stationary policies. The probability that a non-interfering transmission is attempted over link e is given by f e = p e p e. We will refer to f e as the link activation frequency of link e, and use f = f e to denote the link activation frequency vector. Fig.. Example of two interfering links, and 2. The yellow region is F D. Also shown is the set of feasible link activation frequencies for centralized schedule: F = {f, f 2 f + f 2 and f i 0}. The space of all link activation frequencies f, attainable using distributed stationary policies, is given by { F D = f R E f e = p e p e and 0 p e e E }. 6 Figure shows the set of feasible link activation frequencies for distributed policies for the two interfering link example. Also, shown is the set of all link activation frequencies F attainable using a centralized scheduler. It can be seen that the set F D is non-convex, and strictly smaller than F. The gap beten these two sets indicates the price one has to pay in resorting to distributed scheduling. III. OPTIMAL POLICY In this section, characterize an age optimal policy, and propose an implementation that requires only local information. We first show that for any distributed stationary policy, the peak and average age are equal, and can be written as a simple convex function in link activation frequencies f e. Lemma : For any distributed stationary policy, the average and peak age is given by A ave = A p =, 7 where f e = p e p e is the link activation frequency of link e. Proof: A similar result was proved in [4] which considered a class of centralized policies, that are not necessarily stationary. Here, provide a proof for distributed stationary policies. Consider a link e. Then, under any distributed stationary policy, the event that link e is successfully activated in slot t is independent and identically distributed across slots, with success probability of. Thus, the time since last activation

is geometrically distributed with mean. It turns out that the peak and average age for link e are indeed equal to this quantity, i.e., A ave e = A p e =, and therefore, the network age is. The detailed proof is given in Appendix A. An immediate consequence of Lemma is that both peak and average age minimization problems, over the space of all distributed stationary policies, can be written as f F D 8 Notice that, although the objective function is convex, the constraint set F D is non-convex, see Figure. Furthermore, obtaining optimal link activation frequencies f does not suffice as the distributed policy is characterized by the attempt probabilities p e. The optimal link attempt probabilities p, that solve 0, yield a distributed stationary policy, that is both peak and average age optimal. We call this policy π D. The following result characterizes the optimal link attempt probabilities p in terms of the optimal link age A e. Theorem : The attempt probabilities p = p e e E, that solve 8, are given by p e = A e A e + A e, 9 for all e E, where A e = [ γ e p e p e ] is the optimal peak/average age of link e. Proof: Substituting F D, from 6, in 8 get p [0,] E,f R E subject to f e = p e p e e E f e 0 for all e E 0 Now, substituting q e = p e, the optimization problem 0 reduces to p 0,q 0 γ e p e subject to p e + q e e E This is a convex program in standard form, and can be solved using KKT conditions to obtain Theorem. The details are given in Appendix B. Preliminary results on age optimization for a ALOHA type network model re presented in [6] for a network in which only one link can be activated at any given time. As a heuristic, it was argued in [6] that the attempt rates should be / γ e p e = e E /. 2 γ e Hover, Theorem shows that the attempt probability p e = A e e E A e, 3 is both peak and average age optimal. This gives us a more precise ansr to the question posed in [6]. Our result, hover, holds under the more general pairwise interference constraints, and non-equal ights > 0. A. Distributed Computation of π D Although, Theorem gives a characterization of the optimal attempt probabilities, in terms of the optimal link age A e, it does not provide for a simple method to computation. We now provide for an alternate characterization of the network age minimization problem 8. In particular, show that p can be obtained by a simpler convex optimization problem, than the one in. We will also see that this simpler problem is akin to distributed computation of the policy π D. Theorem 2: The age minimization problem 8 is equivalent to the convex optimization problem: Maximize + H 0 + e :e N e + ] [ + log Gλ, 4 where H p = p log p + p log p is the entropy function. If λ is the optimal solution to this problem, then the optimal attempt probabilities p are given by p λ e e = λ e +, 5 e :e N λ e e for all e E. Proof: See Appendix C. We first note that the variable is a proxy for the ighted age A e of link e, and the solution λ e corresponds to optimal ighted age A e. This can also be intuited from 5, which is same as 9. The objective function Gλ in 4 is a concave function; since the problem is convex. Therefore, a simple projected gradient ascent is guaranteed to converge to the optimal λ [2]. The gradient of the function G λ is given by G λ = log +log + θ e + e :e N e log + θ e, for all e E, where θ e = e :e N e. Note that the gradient Gλ depends only on and, for e that are extended neighbors of e. This space dependence of Gλ on λ makes the projected gradient descent algorithm akin to distributed implementation.

We give the projected gradient descent algorithm for distributively computing policy π D in Algorithm. In it, divide time into frames, each frame of F slots. For simplicity, assume symmetric interference, i.e., e interferes with e if and only if e interferes with e which is same as the condition N e = {e E e N e } for all links e. Link e, sets its attempt probability to p e m, in frame m. The source of link e tracks and updates two variables, namely, m and θ e m. We use Π ɛ to denote the projection on the set [ɛ, +, for a ɛ > 0. As seen in Steps 5 and 7 in Algorithm, variables m and θ e m need to be exchanged only beten the neighboring links. Algorithm Distributed Computation of Policy π D : p e m: attempt probability of link e, in frame m 2: m, θ e m: dual variables, in frame m 3: Start: Set 0 = and θ e 0 = N e for all e E. Set p e 0 = /2 and m = 0. 4: for each frame m do 5: Send: θ e m to all e N e 6: Compute m + : [ { m + Π ɛ m + η m log + log + θ em + log + m m θ e m 7: Send: m + to all e N e 8: Update θ e m + : θ e m + 9: Update p e m + : 0: m m + : end for p e m + m + m + m + + θ e m + IV. CONCLUSION m }] We considered age minimization in a wireless network, with pairwise interference constraints, time varying channels, and single-hop flows. We considered a simple class of distributed scheduling policies, in which each link attempts transmission with probability p e. We shod an interesting relationship beten the optimal attempt probability for a link, and the optimal age of the link and it s neighboring links. We then shod that the optimal link attempt probabilities can be obtained by solving a convex optimization problem, which can be done distributively using the projected gradient ascent algorithm. REFERENCES [] O. K. Sahingoz, Networking models in flying ad-hoc networks FANETs: Concepts and challenges, J. Intell. Robotics Syst., vol. 74, pp. 53 527, Apr. 204. [2] R. Talak, S. Karaman, and E. Modiano, Speed limits in autonomous vehicular networks due to communication constraints, in Proc. CDC, pp. 4998 5003, Dec. 206. [3] S. Kaul, R. Yates, and M. Gruteser, Real-time status: How often should one update?, in Proc. INFOCOM, pp. 273 2735, Mar. 202. [4] R. Talak, S. Karaman, and E. Modiano, Optimizing information freshness in wireless networks under general interference constraints, in submited to Mobihoc, Jun. 208. [5] R. Talak, S. Karaman, and E. Modiano, Minimizing age-of-information in multi-hop wireless networks, in Proc. Allerton, Oct. 207. [6] S. Kaul, M. Gruteser, V. Rai, and J. Kenney, Minimizing age of information in vehicular networks, in Proc. SECON, pp. 350 358, Jun. 20. [7] L. Huang and E. Modiano, Optimizing age-of-information in a multiclass queueing system, in Proc. ISIT, pp. 68 685, Jun. 205. [8] C. Kam, S. Kompella, and A. Ephremides, Age of information under random updates, in Proc. ISIT, pp. 66 70, Jul. 203. [9] S. K. Kaul, R. D. Yates, and M. Gruteser, Status updates through queues, in Proc. CISS, pp. 6, Mar. 202. [0] E. Najm and R. Nasser, Age of information: The gamma awakening, in Proc. ISIT, pp. 2574 2578, Jul. 206. [] M. Costa, M. Codreanu, and A. Ephremides, Age of information with packet management, in Proc. ISIT, pp. 583 587, Jun. 204. [2] Q. He, D. Yuan, and A. Ephremides, Optimizing freshness of information: On minimum age link scheduling in wireless systems, in Proc. WiOpt, pp. 8, May 206. [3] I. Kadota, E. Uysal-Biyikoglu, R. Singh, and E. Modiano, Minimizing the age of information in broadcast wireless networks, in Proc. Allerton, pp. 844 85, Sep. 206. [4] Y.-P. Hsu, E. Modiano, and L. Duan, Age of information: Design and analysis of optimal scheduling algorithms, in Proc. ISIT, pp. 5, Jun. 207. [5] I. Kadota, A. Sinha, and E. Modiano, Optimizing age of information in wireless networks with throughput constraints, in to appear in Proc. INFOCOM, Apr. 208. [6] S. K. Kaul and R. D. Yates, Status updates over unreliable multiaccess channels, ArXiv e-prints, May 207. [7] A. M. Bedewy, Y. Sun, and N. B. Shroff, Age-optimal information updates in multihop networks, in Proc. ISIT, pp. 576 580, Jun. 207. [8] R. Talak, I. Kadota, S. Karaman, and E. Modiano, Scheduling policies for age minimization in wireless networks with unknown channel state, in submitted to ISIT, Jun. 208. [9] R. Talak, S. Karaman, and E. Modiano, Optimizing age of information in wireless networks with perfect channel state information, in to appear in Proc. WiOpt, May 208. [20] A. Kumar, D. Manjunath, and J. Kuri, Wireless Networking. Morgan Kaufmann, 2008. [2] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press, 2004. [22] R. W. Wolff, Stochastic Modeling and the Theory of Queues. Prentice Hall, ed., 989. A. Proof of Lemma APPENDIX Consider a distributed stationary policy with link activation frequencies f e > 0 for each e E. For a link e, let T e i be the ith instance when link e was successfully activated, i.e., the ith instance when Ûet =. Let X e i = T e i T e i to be the ith inter-successful activation time for link e. Since all the processes involved, namely S e t and U e t, are i.i.d. across time t, X e i ] is geometrically distributed with rate equal to P [Ûe t = =, i.e., P [X e i = k] = k, for all k {, 2,...}. We now compute the average age A ave e for link e. Note that the age A e t over slots t {T e i+,... T e i+} increases from to X e i in steps of. Therefore, T ei+ t=t A ei+ et =

Xei m= m for all i. Then, using renewal theory [22], can derive the average age to be A ave T N Xei e = lim sup A e t = lim i= m= m T m t= i= X, ei N i= 2 = lim X ei X e i + N i= X, ei = E [X e i X e i + ] 2 E [X e i] a.s.. 6 Computing the moments of X e i get A ave e = a.s.. For peak age, note that the ith peak is equal to the ith inter- successful activation time X e i, i.e., A e T e i = X e i. Therefore, have A p e = lim sup N t N T i= A e T e i = lim N N X e i, i= which is equal to E [X e ] = a.s.. This proves the result. B. Proof of Theorem Consider the Lagrangian dual Lp, q, λ = + p e + q e. γ e p e 7 The problem satisfies Slater s conditions, and thus, the KKT conditions are both necessary and sufficient. Setting partial derivatives of L with respect to p e and q e to zero, obtain p e = A e, and q e = A e, 8 for all e E, where A e = γ ep e e Ne q is the age of e link e. Equations 8 imply that λ e cannot be zero. By complementary slackness criteria must have p e + q e =. w This, with 8, gives p e = ea e w ea e+ e :e N e A and = e A e + e :e N e A e. This proves the result. C. Proof of Theorem 2 The age minimization problem, given in 0, can be written as by substituting q e = p e : f 0,p 0,q 0 subject to f e p e p e + q e e E e E 9 Now, substituting P e = log p e, Q e = log q e, and h e = log f e, the problem reduces to exp { h e } h,p,q γ e subject to h e P e 0 e E 20 Q e log exp {P e } + exp {Q e } 0 e E This follows by first making the the substitution p e = e Pe, q e = e Qe, and f e = e he, and then taking log in each of the constraints. This is a standard technique in geometric programming [2]. Hover, unlike geometric programming, don t need to apply log function to the objective as it is already convex, and also separable in variables h e. The problem 20 is convex [2], and satisfies slater s conditions. As a consequence, the duality gap is zero, and the problem 20 is equivalent to its Lagrangian dual problem. Define the Lagrangian function of the optimization problem 20 to be L h, P, Q, λ, ν = e he + ν e log e Pe + e Qe γ e + he P e Q e, 2 for λ 0 and ν 0. The dual problem for 20 is given by Maximize λ 0,ν 0 g λ, ν, 22 where g λ, ν is the dual objective function defines as g λ, ν = h,p,q L h, P, Q, λ, ν. 23 We will now show that the the optimization problem in Theorem 2 is in fact the dual problem 22. First note that the Lagrangian function L h, P, Q, λ, ν is strictly convex in h, P, and Q [2]. Thus, first order conditions h,p,q L = 0 yield the optimal h, P, and Q. Setting these partial derivatives to 0, get = ν ee Pe e Pe + e Qe, = ν ee Qe e Pe + e, and λ Qe e = e he, γ e 24 for all e E. Adding and dividing the first two equations in 24 also yields ν e = +, and P e Q e = log 25 respectively, for all e. Substituting 24 and 25 in L, in 2, recover gλ, µ = Gλ, the objective function in 4, and therefore, the dual problem 22 is same as the optimization problem in Theorem 2. This proves the first part. We now show that if λ is the solution to this problem, then the optimal attempt probability is given by 5. Let f, p, q be the solution to 9, h, P, Q be the solution to 20, and λ be the solution to the problem in Theorem 2. Note that, for each link e E, must have fe = p e qe and p e + qe = ; as otherwise the objective function can be reduced by increasing fe and/or p e. Since p e = e P e and q e = e Q e, have e P e +e Q e =. Substituting this in 24, and using 25, obtain which proves the result. p e = e P e = λ e λ e + λ e, 26,