962 ieee journal on selected areas in communications, …chiangm/ratereliability.pdf · coding in...

15
962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006 Price-Based Distributed Algorithms for Rate-Reliability Tradeoff in Network Utility Maximization Jang-Won Lee, Member, IEEE, Mung Chiang, Member, IEEE, and A. Robert Calderbank, Fellow, IEEE Abstract—The current framework of network utility maximiza- tion for rate allocation and its price-based algorithms assumes that each link provides a fixed-size transmission “pipe” and each user’s utility is a function of transmission rate only. These assumptions break down in many practical systems, where, by adapting the physical layer channel coding or transmission diversity, different tradeoffs between rate and reliability can be achieved. In network utility maximization problems formulated in this paper, the utility for each user depends on both transmission rate and signal quality, with an intrinsic tradeoff between the two. Each link may also pro- vide a higher (or lower) rate on the transmission “pipes” by al- lowing a higher (or lower) decoding error probability. Despite non- separability and nonconvexity of these optimization problems, we propose new price-based distributed algorithms and prove their convergence to the globally optimal rate-reliability tradeoff under readily-verifiable sufficient conditions. We first consider networks in which the rate-reliability tradeoff is controlled by adapting channel code rates in each link’s phys- ical-layer error correction codes, and propose two distributed algorithms based on pricing, which respectively implement the “in- tegrated” and “differentiated” policies of dynamic rate-reliability adjustment. In contrast to the classical price-based rate control algorithms, in our algorithms, each user provides an offered price for its own reliability to the network, while the network provides congestion prices to users. The proposed algorithms converge to a tradeoff point between rate and reliability, which we prove to be a globally optimal one for channel codes with sufficiently large coding length and utilities whose curvatures are sufficiently negative. Under these conditions, the proposed algorithms can thus generate the Pareto optimal tradeoff curves between rate and reliability for all the users. In addition, the distributed algorithms and convergence proofs are extended for wireless mul- tiple-inpit–multiple-output multihop networks, in which diversity and multiplexing gains of each link are controlled to achieve the optimal rate-reliability tradeoff. Numerical examples confirm that there can be significant enhancement of the network utility by distributively trading-off rate and reliability, even when only some of the links can implement dynamic reliability. Index Terms—Mathematical programming/optimization, network control by pricing, network utility maximization, phys- ical-layer channel coding, rate allocation. Manuscript received February 15, 2005; revised January 15, 2006. This work was supported in part by Yonsei University Research Fund of 2005 and in part by the National Science Foundation (NSF) under Grant CCF-0440443, Grant CNS-0417607, Grant CNS-0427677, and Grant CCF-0448012. This paper was presented in part at IEEE Infocom 2006. J.-W. Lee is with the Center for Information Technology, Department of Electrical and Electronic Engineering, Yonsei University, Seoul 120-749, Korea (e-mail: [email protected]). M. Chiang and A. R. Calderbank are with the Department of Electrical En- gineering, Princeton University, Princeton, NJ 08544 USA (e-mail: chiangm@ princeton.edu; [email protected]). Digital Object Identifier 10.1109/JSAC.2006.872877 I. INTRODUCTION S INCE the publication of the seminal paper [1] by Kelly et al. in 1998, the framework of Network Utility Maximization (NUM) has found many applications in network rate allocation algorithms, Internet congestion control protocols, user behavior models, and network efficiency-fairness characterization. By allowing nonlinear, concave utility objective functions, NUM substantially expands the scope of the classical Network Flow Problem based on linear programming. Moreover, there is an elegant economics interpretation of the dual-based distributed algorithm, in which the Lagrange dual variables can be in- terpreted as shadow prices for resource allocation, and each end user and the network maximize their net utilities and net revenue, respectively. Consider a communication network with logical links, wired or wireless, each with a fixed capacity of b/s, and sources (i.e., end users), each transmitting at a source rate of b/s. Each source emits one flow, using a fixed set of links in its path, and has a utility function . Each link is shared by a set of sources. NUM, in its basic version, is the following problem of maximizing the network utility , over the source rates , subject to linear flow constraints for all links (1) Making the standard assumption on concavity of the utility functions, problem (1) is a simple concave maximization of decoupled terms under linear constraints, which has long been studied in optimization theory as a monotropic program [2]. Among many of its recent applications to communication networks, the basic NUM (1) has been extensively studied as a model for distributed network rate allocation (e.g., [1], [3], and [4]), TCP congestion control protocol analysis (e.g., [5] and [6]), and design (e.g., FAST TCP [7]). Primal and dual- based distributed algorithms have been proposed to solve for the global optimum of (1) (e.g., [8]–[12]). Various extensions of the basic NUM problem (1) have been recently investigated, e.g., for joint congestion control and power control [13], and joint opportunistic scheduling and congestion control [14] in wire- less networks, for TCP/IP interactions [15], for medium access 0733-8716/$20.00 © 2006 IEEE

Upload: others

Post on 22-Sep-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006

Price-Based Distributed Algorithms forRate-Reliability Tradeoff in Network

Utility MaximizationJang-Won Lee, Member, IEEE, Mung Chiang, Member, IEEE, and A. Robert Calderbank, Fellow, IEEE

Abstract—The current framework of network utility maximiza-tion for rate allocation and its price-based algorithms assumes thateach link provides a fixed-size transmission “pipe” and each user’sutility is a function of transmission rate only. These assumptionsbreak down in many practical systems, where, by adapting thephysical layer channel coding or transmission diversity, differenttradeoffs between rate and reliability can be achieved. In networkutility maximization problems formulated in this paper, the utilityfor each user depends on both transmission rate and signal quality,with an intrinsic tradeoff between the two. Each link may also pro-vide a higher (or lower) rate on the transmission “pipes” by al-lowing a higher (or lower) decoding error probability. Despite non-separability and nonconvexity of these optimization problems, wepropose new price-based distributed algorithms and prove theirconvergence to the globally optimal rate-reliability tradeoff underreadily-verifiable sufficient conditions.

We first consider networks in which the rate-reliability tradeoffis controlled by adapting channel code rates in each link’s phys-ical-layer error correction codes, and propose two distributedalgorithms based on pricing, which respectively implement the “in-tegrated” and “differentiated” policies of dynamic rate-reliabilityadjustment. In contrast to the classical price-based rate controlalgorithms, in our algorithms, each user provides an offered pricefor its own reliability to the network, while the network providescongestion prices to users. The proposed algorithms convergeto a tradeoff point between rate and reliability, which we proveto be a globally optimal one for channel codes with sufficientlylarge coding length and utilities whose curvatures are sufficientlynegative. Under these conditions, the proposed algorithms canthus generate the Pareto optimal tradeoff curves between rateand reliability for all the users. In addition, the distributedalgorithms and convergence proofs are extended for wireless mul-tiple-inpit–multiple-output multihop networks, in which diversityand multiplexing gains of each link are controlled to achieve theoptimal rate-reliability tradeoff. Numerical examples confirm thatthere can be significant enhancement of the network utility bydistributively trading-off rate and reliability, even when only someof the links can implement dynamic reliability.

Index Terms—Mathematical programming/optimization,network control by pricing, network utility maximization, phys-ical-layer channel coding, rate allocation.

Manuscript received February 15, 2005; revised January 15, 2006. This workwas supported in part by Yonsei University Research Fund of 2005 and in partby the National Science Foundation (NSF) under Grant CCF-0440443, GrantCNS-0417607, Grant CNS-0427677, and Grant CCF-0448012. This paper waspresented in part at IEEE Infocom 2006.

J.-W. Lee is with the Center for Information Technology, Department ofElectrical and Electronic Engineering, Yonsei University, Seoul 120-749,Korea (e-mail: [email protected]).

M. Chiang and A. R. Calderbank are with the Department of Electrical En-gineering, Princeton University, Princeton, NJ 08544 USA (e-mail: [email protected]; [email protected]).

Digital Object Identifier 10.1109/JSAC.2006.872877

I. INTRODUCTION

S INCE the publication of the seminal paper [1] by Kelly et al.in 1998, the framework of Network Utility Maximization

(NUM) has found many applications in network rate allocationalgorithms, Internet congestion control protocols, user behaviormodels, and network efficiency-fairness characterization. Byallowing nonlinear, concave utility objective functions, NUMsubstantially expands the scope of the classical Network FlowProblem based on linear programming. Moreover, there is anelegant economics interpretation of the dual-based distributedalgorithm, in which the Lagrange dual variables can be in-terpreted as shadow prices for resource allocation, and eachend user and the network maximize their net utilities and netrevenue, respectively.

Consider a communication network with logical links,wired or wireless, each with a fixed capacity of b/s, andsources (i.e., end users), each transmitting at a source rate of

b/s. Each source emits one flow, using a fixed setof links in its path, and has a utility function . Eachlink is shared by a set of sources. NUM, in its basicversion, is the following problem of maximizing the networkutility , over the source rates , subject to linearflow constraints for all links

(1)

Making the standard assumption on concavity of the utilityfunctions, problem (1) is a simple concave maximization ofdecoupled terms under linear constraints, which has long beenstudied in optimization theory as a monotropic program [2].

Among many of its recent applications to communicationnetworks, the basic NUM (1) has been extensively studied asa model for distributed network rate allocation (e.g., [1], [3],and [4]), TCP congestion control protocol analysis (e.g., [5]and [6]), and design (e.g., FAST TCP [7]). Primal and dual-based distributed algorithms have been proposed to solve for theglobal optimum of (1) (e.g., [8]–[12]). Various extensions of thebasic NUM problem (1) have been recently investigated, e.g.,for joint congestion control and power control [13], and jointopportunistic scheduling and congestion control [14] in wire-less networks, for TCP/IP interactions [15], for medium access

0733-8716/$20.00 © 2006 IEEE

Page 2: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

LEE et al.: PRICE-BASED DISTRIBUTED ALGORITHMS FOR RATE-RELIABILITY TRADEOFF IN NETWORK UTILITY MAXIMIZATION 963

control [16]–[20], for joint congestion control and medium ac-cess [21], for joint multicommodity flow and resource allocation[22], for nonconcave utility functions [23]–[25], and for hetero-geneous congestion control protocols [26].

Despite the above extensions, the current NUM frameworkfor rate control and its price-based algorithms still assumesthat each link provides a fixed coding and modulation schemein the physical layer, and that each user’s utility is only afunction of local source rate. These assumptions break downin many practical systems. On some communication links,physical-layer’s adaptive channel coding (i.e., error correc-tion coding) can change the information “pipe” sizes anddecoding error probability, e.g., through adaptive channelcoding in Digital Subscriber Loop (DSL) broadband accessnetworks or adaptive diversity-multiplexing control in mul-tiple-input–multiple-output (MIMO) wireless systems. Then,each link capacity is no longer a fixed number but a functionof the signal quality (i.e., decoding reliability) attained on thatlink.1 A higher throughput can be obtained on a link at theexpense of lower decoding reliability, which in turn lowers theend-to-end signal quality for sources traversing the link andreduces users’ utilities, thus leading to an intrinsic tradeoffbetween rate and reliability. This tradeoff also provides anadditional degree-of-freedom for improving each user’s utility,as well as system efficiency. For example, if we allow lowerdecoding reliability, thus higher information capacity, on themore congested links, and higher decoding reliability, thuslower information capacity, on the less congested links, wemay improve the end-to-end rate and reliability performance ofeach user. Clearly, rate-reliability tradeoff is globally coupledacross the links and users.

How can we provide a price-based framework to exploit thedegree of freedom in utility maximization offered by rate-relia-bility tradeoff and make the above intuitions rigorous? The basicNUM framework in (1) is inadequate because it completely ig-nores the concept of communication reliability. In particular, ittakes link capacity as a fixed number rather than a function ofdecoding error probabilities, does not discriminate the transmis-sion data rate from the information data rate,2 and formulates theutility function as a function of rate only.

In this paper, we study the rate-reliability tradeoff by ex-tending the NUM framework. In the basic NUM, convexity andseparability properties of the optimization problem readily leadto a distributed algorithm that converges to the globally optimalrate allocation. However, our new optimization formulationsfor the rate-reliability tradeoff are neither separable problemsnor convex optimization. The constraints become nonlinear,nonconvex, and globally coupled. Despite such difficulties, wedevelop simple and distributed algorithms based on networkpricing that converge to the optimal rate-reliability tradeoff

1Some recent work like [13] studies how adaptive transmit power control inthe physical layer interacts with congestion control. Note that the dimension ofend-to-end signal reliability is still missing in such work. However, this papercan indeed be viewed as a new case in the general framework of “layering asoptimization decomposition,” as discussed in Section VII.

2In this paper, the information data rate refers to the data rate before addingthe error control code and the transmission data rate refers to the data rate afteradding the error control code.

with readily verifiable sufficient conditions. In contrast to stan-dard price-based rate control algorithms for the basic NUM,in which each link provides the same congestion price to eachof its users and/or each user provides its willingness to payfor rate allocation to the network, in our algorithms each linkprovides a possibly different congestion price to each of itsusers and each user also provides its willingness to pay for itsown reliability to the network.

In addition to extending the approach of price-based dis-tributed algorithms, we also consider the specifics of controllingthe rate-reliability tradeoff in different types of networks. Wefirst study the case where the rate-reliability tradeoff is con-trolled through the code rate of each source on each link.We proposes a new optimization framework and price-baseddistributed algorithms by considering two policies: integrateddynamic reliability policy and differentiated dynamic reliabilitypolicy. In the integrated policy, a link provides the same errorprobability (i.e., the same code rate) to each of the sourcestraversing it. In this policy, since a link provides the samecode rate to each of its sources, it must provide the lowestcode rate that satisfies the requirement of the source with thehighest reliability. This motivates a more general approachcalled the differentiated policy that we propose to fully exploitthe rate-reliability tradeoff when there exist multiclass sources(i.e., sources with different reliability requirements) in thenetwork. Under the differentiated dynamic reliability policy, alink can provide a different error probability (i.e., a differentcode rate) to each of the sources using this link. We also proveconvergence of the proposed algorithms to the globally optimalrate-reliability tradeoff for sufficiently strong channel codesand sufficiently elastic applications.

We then consider wireless MIMO multihop networks. InMIMO networks, each logical link has multiple transmitantennas and multiple receive antennas, which can providemultiple independent wireless links between a transceiver pair.If independent information streams are transmitted in parallel,data rate can be increased. This is often referred to as themultiplexing gain. On the other hand, if the same informationstreams are transmitted in parallel, decoding error probabilitycan be lowered. This is often referred to as the diversity gain.A larger value of the diversity gain implies a lower decodingerror probability and a larger value of the multiplexing gainimplies a higher information transmission rate. As in adaptivechannel coding, there exists a tradeoff between informationdata rate and error probability on each MIMO link [27]–[29].By appropriately controlling diversity and multiplexing gainson each individual link, we can achieve the optimal end-to-endrate-reliability tradeoff for all sources in the network. Weshow that our techniques developed for networks with adaptivechannel coding can be extended to wireless MIMO networkswith adaptive diversity-multiplexing gain.

The rest of this paper is organized as follows. In Section II,we provide the system model for the adaptive channel codingproblem that we consider in this paper. In Sections III and IV, wepresent algorithms for the integrated dynamic reliability policyand the differentiated dynamic reliability policy, respectively.We provide numerical examples for the proposed algorithms inSection V to illustrate how our algorithms can trace the Pareto

Page 3: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

964 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006

optimal curves between rate and reliability for all users, andhighlight the enhancement to the network utility through dy-namic rate-reliability adjustments, even when only some of thelinks can implement dynamic reliability. In Section VI, we showhow to control the diversity-multiplexing gains to attain the op-timal rate-reliability tradeoff in wireless MIMO multihop net-works. Finally, we conclude in Section VII.

II. SYSTEM MODEL

In this section, we present the system model for the adaptivechannel coding problem. Introducing the concept of reliabilityinto the NUM framework, each source has a utility function

, where is an information data rate and is thereliability of source . We assume that the utility function isa continuous, increasing, and concave function3 of and .Each source has its information data rate bounded between aminimum and a maximum: and , and has a minimumreliability requirement . The reliability of source is de-fined as

where is the end-to-end error probability of source . Eachlogical link has its maximum transmission capacity .After link receives the data of source from the upstream link,it first decodes it to extract the information data of the sourceand encodes it again with its own code rate , where the coderate is defined by the ratio of the information data rate atthe input of the encoder to the transmission data rate at theoutput of the encoder [30], [31]. This allows a link to adjust thetransmission rate and the error probability of the sources, sincethe transmission rate of source at link can be defined as

and the error probability of source at link can be defined asa function of by

which is assumed to be an increasing function of . Rarely isthere an analytic formula for , and we will use variousupper bounds on this function in this paper. The end-to-end errorprobability for each source is

Assuming that the error probability of each link is small (i.e.,), we can approximate the end-to-end error probability

of source as

3Throughout this paper, a concave (convex) function means a strictly concave(convex) function.

Hence, the reliability of source can be expressed as

Since each link has a maximum transmission capacity, the sum of transmission rates of sources that are

traversing the link cannot exceed , i.e.,

III. INTEGRATED DYNAMIC RELIABILITY POLICY

We first investigate a simpler, more restrictive policy where alink provides the same code rate to each of the sources that areusing it, i.e.,

and an extended NUM problem is formulated as follows:

(2)

In this problem, the first constraint states that the network mustprovide reliability to each source that equals to its desired re-liability. Notice that the inequality constraint will be satisfiedwith equality at optimality since the objective function is an in-creasing function of . The second constraint states that theaggregate transmission rate of the sources at each link must besmaller than or equal to its maximum transmission capacity. Therest are simple, decoupled constraints on the minimum and max-imum values for the data rate, reliability for each source, andcode rate for each link.

In order to derive a distributed algorithm to solve problem (2)and to prove convergence to global optimum, the critical prop-erties of separability and convexity need to be carefully exam-ined. Because of the physical layer coding and the rate-relia-bility tradeoff that we introduce into the problem formulation,these two properties are no longer trivially held as in the basicNUM (1).

First, the integrated policy naturally leads to a decompositionof problem (2) across the links, since the second constraint canbe written as

(3)

Page 4: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

LEE et al.: PRICE-BASED DISTRIBUTED ALGORITHMS FOR RATE-RELIABILITY TRADEOFF IN NETWORK UTILITY MAXIMIZATION 965

The more complicated issue is the convexity of function. As an example, if random coding based on -ary

binary coded signals is used, a standard upper bound on theerror probability is [31]

where is the block length and is the cutoff rate. Hence, ifwe let

then is a convex function for given and . A moregeneral approach is to use the random code ensemble error ex-ponent [30] that upper bounds the decoding error probability

where is the codeword block length and is the randomcoding exponent function, which is defined for discrete memo-ryless channels as [30]

where

is the size of input alphabet, is the size of output alphabet,is the probability that input letter is chosen, and

is the probability that output letter is received given that inputletter is transmitted.

In general, may not be convex,even though it is known [30] that is a convex function.However, the following lemma provides a sufficient conditionfor its convexity.

Lemma 1: If the absolute value of the first derivatives ofis bounded away from 0 and absolute value of the second

derivative of is upper bounded, then for a large enoughcodeword block length , is a convex function.

Proof: Assume that there exist positive constants andsuch that and .

We have

If , then and convexity isproved.

Throughout this paper, we assume that is a convexfunction, e.g., the conditions in Lemma 1 are satisfied if therandom code ensemble error exponent is used. Hence, problem(2) is turned into a convex and separable optimization problem.

To solve problem (2), we use a dual decomposition approach.We write down the Lagrangian associated with problem (2) asfollows, where and are the Lagrange multipliers on link

with an interpretation of “congestion price” and on sourcewith an interpretation of “reliability price,” respectively

where and with interpreta-tions of “end-to-end congestion price” on source and “aggre-gate reliability price” on link . The Lagrange dual function is

(4)

where and are vectors whose elements are all zeros and ones,respectively. The dual problem is formulated as

(5)

To solve the dual problem, we first consider problem (4).Since the Lagrangian is separable, this maximization of theLagrangian over can be conducted in parallel at eachsource

(6)

and on each link

(7)

Then, dual problem (5) can be solved by using the gradient pro-jection algorithm as

Page 5: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

966 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006

Fig. 1. Diagram for the distributed algorithm of the integrated dynamicreliability policy. Each link needs the aggregate information rate x andreliability price � from the sources using it, and in turn provides the samecongestion price � and code rate r to these sources. Note that the source doesnot need to tell its desired reliability R to links.

and

where , is step size, and aresolutions of problem (6), and is a solution of problem (7)for a given .

We now describe the following distributed algorithm, whereeach source and each link solve their own problems with onlylocal information, as in Fig. 1. In this case, we can interpretas the price per unit rate to use link , and as the price perunit reliability that the source must pay to the network.

Algorithm 1 for Integrated Dynamic Reliability PolicySource problem and reliability price update at source :

• Source problem

(8)

where is the end-to-end conges-tion price at iteration .

• Price update

(9)

where is the end-to-endreliability at iteration .

Link problem and congestion price update at link :

• Link problem

(10)

where is the aggregate reliabilityprice paid by sources using link at iteration .

• Price update

(11)

where is the aggregate informa-tion rate on link at iteration .

In each iteration , by locally solving the following problem(8) over , each source determines its information datarate and desired reliability [i.e., and ] that maximizeits net utility based on the prices in the currentiteration. Furthermore, by price update (9), the source adjusts itsoffered price per unit reliability for the next iteration. Intuitively,from the end-to-end principle of network architecture design,reliability prices should indeed be updated at the sources.

Concurrently, in each iteration , by locally solvingproblem (10) over , each link determines its coderate [i.e., ] that maximizes the “net revenue” ofthe network based on the prices in the current iteration.This pricing interpretation holds because maximizing

over , , i.e., maximizingover , is equivalent to

maximizingover . Since is the available (anticipated) aggregateinformation data rate at link , we can interpret thatas the revenue obtained at link through the congestion price.We can also interpret as the revenueobtained from source through the reliability price. In addition,by price update (11), the link adjusts its congestion price perunit rate for the next iteration.

In Algorithm 1, to solve problem (8), source needs to know, the sum of ’s of links that are along its path .

This can be obtained by the notification from the links, e.g.,through the presence or timing of acknowledgment packets inTCP [5]. To carry out price update (9), the source needs to knowthe sum of error probabilities of the links that are along its path[i.e., its own reliability that are offered by the network ].This can be obtained by the notification from the destinationthat can measure its end-to-end reliability. To solve link problem(10), each link needs to know , the sum of ’s fromsources using this link . This can be obtained by thenotification from these sources. To carry out price update (11),the link needs to know , the aggregate information data rateof the sources that are using it. This can be measured by the linkitself.

After the above dual decomposition, the following result canbe proved using standard techniques in distributed gradient al-gorithm’s convergence analysis.

Theorem 1: By Algorithm 1, dual variables andconverge to the optimal dual solutions and , and the cor-responding primal variables , , and are the globally op-timal primal solutions of (2).

Outline of the Proof: Since strong duality holds for problem(2) and its Lagrange dual problem (5), we solve the dual problemthrough distributed gradient method and recover the primal op-timizers from the dual optimizers. By Danskin’s Theorem [32]

and

Hence, the algorithm in (9) and (11) is a gradient projection al-gorithm for dual problem (5). Since the dual objective function

Page 6: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

LEE et al.: PRICE-BASED DISTRIBUTED ALGORITHMS FOR RATE-RELIABILITY TRADEOFF IN NETWORK UTILITY MAXIMIZATION 967

is a convex function, there exists a step size thatguarantees and to converge to the optimal dual solu-tions and [32]. Also, if satisfies a Lipschitz con-tinuity condition, i.e., there exists a constant such that

then and converges to the optimal dual solutionsand with a constant step size , [32].The Lipschitz continuity condition is satisfied if the curvaturesof the utility functions are bounded away from zero, see [10] forfurther details.

Furthermore, since problem (2) is a convex optimizationproblem and problems (8) and (10) have unique solutions, ,

, and are the globally optimal primal solutions of (2)[33].

IV. DIFFERENTIATED DYNAMIC RELIABILITY POLICY

We now investigate the more general differentiated dynamicreliability policy in which a link may provide a different coderate to each of the sources traversing it.4 To this end, the ex-tended NUM formulation in (2) needs to be further generalizedto the following problem:

(12)

The objective function and constraints of problem (12) are thesame as those of problem (2), except that we have here in-stead of . Due to this critical difference, we may not modifythe second constraint in this problem as in (3), and problem (12)in general is neither a convex problem nor a separable one, evenwhen is assumed to be a convex function.

These issues can be resolved through a series of problemtransformations. First, we modify problem (12) by introducingthe auxiliary variables , which can be interpreted as the allo-cated transmission capacity to source at link . Then, the aboveproblem can be reformulated as

4An example of such coding techniques recently proposed is coding with em-bedded diversity [34], which allows data streams with different rate-reliabilitytradeoffs be embedded within each other. An interesting next step is to studyhow to use this technique as a practical mechanism to implement the differenti-ated dynamic reliability policy. Other adaptive resource allocation in the phys-ical layer, such as adaptive modulation or interleaver depth, can also be used tothe implement dynamic reliability policy.

(13)

The second constraint in problem (12) is now decomposedinto two constraints in problem (13): the second and third con-straints. Here, the second constraint states that the transmissiondata rate of each source at each link must be smaller than orequal to its allocated transmission capacity at the link, and thethird constraint states that the aggregate allocated transmissioncapacity to the sources at each link must be smaller than orequal to its maximum transmission capacity. In this formula-tion, each link explicitly allocates a transmission capacity toeach of its sources. We can easily show that problem (13) isequivalent to problem (12), since at the optimal solution ofproblem (13), the second constraint must be satisfied with theequality.

Note that is a parameter in the link layer. Hence, eventhough we started from the TCP/PHY layer problem, here weintroduce another layer, i.e., link layer, by using a vertical de-composition of the optimization problem. At the first sight, itmay seem that this makes the problem more complicated. How-ever, it in fact enables us to implement a simple and distributedalgorithm.

The next step of problem transformation is to take the log ofboth sides of the second constraint in problem (13) and a changeof variable: (i.e., ). This reformulationturns the problem into

(14)

where , , and.

Note that problem (14) is now separable but still may not bea convex optimization problem since the objective

Page 7: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

968 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006

may not be a concave function, even though is a con-cave function. However, the following lemma provides a suffi-cient condition for its concavity. Define

Lemma 2: If , , and, then is a concave function of

and .Proof: This can be easily verified using the fact that

is a concave function if and only if

where and is a Hessian matrix of ,which is defined as

It can be readily verified that if the conditions in the Lemma aresatisfied, then indeed

i.e., is negative definite and is a concave functionof .

Furthermore, if is additive in each variable,(i.e.,

), the following lemma provides the suffi-cient condition. Define

(15)

Lemma 3: Suppose andis a concave function. Then, if , is

a concave function of and is a concave functionof and .

Proof: Since is a concave function,. Furthermore, since is additive, im-

plies , and . This im-plies . Hence, theconditions in Lemma 2 are all satisfied.

The conditions of and areequivalent to

Since is positive and isnegative, the above inequalities state that the utility functionneeds to be more than just concave. In particular, if it is additivein and , its curvature needs to be not just negative butbounded away from 0 by as much as , i.e.,the application represented by this utility function must beelastic enough.

For example, consider the following utility function parame-terized by [12]:

ifotherwise

where can be interpreted as the correctly decodedthroughput of source . Then, we can show that

ififif

Hence, in this type of utility functions, if ,becomes a concave function.

Throughout this section, we will assume that the conditionsin Lemma 2 are satisfied. Hence, problem (14) is turned into aconvex and separable optimization problem.

To solve problem (14), we use a dual decomposition approachagain. We first write down the Lagrangian function associatedwith problem (14) as

Page 8: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

LEE et al.: PRICE-BASED DISTRIBUTED ALGORITHMS FOR RATE-RELIABILITY TRADEOFF IN NETWORK UTILITY MAXIMIZATION 969

where . As in the previous case, we can inter-pret , , and as “congestion price” on link , end-to-endcongestion price on source , and “reliability price” on source, respectively. Note that in this Lagrangian function, we do not

relax the third constraint in problem (14). The Lagrange dualfunction is

(16)

where. The dual problem is formulated as

(17)

To solve the dual problem, we first consider problem (16).This maximization of the Lagrangian over , , , can beconducted in parallel at each source

(18)

and on each link

(19)

Then, dual problem (17) can be solved by using the gradientprojection algorithm as

and

where and are solutions to problem (18), andand are solutions to problem (19) for a given .

We now describe the following distributed algorithm whereeach source and each link solve their own problems with onlylocal information, as in Fig. 2. As before, we can interpretas the price per unit rate (in terms of ) for source

to use link , and as the price per unit reliability that thesource must pay to the network.

Fig. 2. Diagram for the distributed algorithm of the differentiated dynamicreliability policy. Each link needs the individual information rate x andreliability price � from each of the sources using it, and in turn provides adifferent congestion price � and code rate r to each of these sources. Notethat the source does not need to tell its desired reliability R to links, and thelink does not need to tell the allocated capacity c to sources.

Algorithm 2 for Differentiated Dynamic Reliability PolicySource problem and reliability price update at source :

• Source problem

(20)

where is the end-to-end conges-tion price at iteration .

• Price update

(21)

where is the end-to-endreliability at iteration .

Link problems and congestion price update at link :

• Link problemsLink-layer problem

(22)

Physical-layer problem for source ,

(23)

• Price update

(24)

In each iteration , by locally solving (20) over , eachsource determines its information data rate and desired relia-bility [i.e., , or equivalently, , and ]

Page 9: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

970 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006

that maximize its net utility based on the prices in the currentiteration. Furthermore, by price update (21), the source adjustsits offered price per unit reliability for the next iteration.

Concurrently, in each iteration , by locally solving problems(22) over , and (23) , for each , whichare decomposed from (19), each link determines the allocatedtransmission capacity and the code rate , respec-tively, of each of the sources using the link so as to maximizethe “net revenue” of the network based on the prices in the cur-rent iteration. In addition, by price update (24), the link adjustsits congestion price per unit rate for source during the nextiteration.

Even though Algorithm 2 (i.e., the differentiated dynamic re-liability policy) can be implemented and interpreted in a sim-ilar way to Algorithm 1 (i.e., the integrated dynamic reliabilitypolicy), there are important differences. In Algorithm 2, the linkdifferentiates each of its sources and provides a different coderate and a different price , while in Algorithm 1, the linkprovides the same code rate and the same price to all ofits sources. In Algorithm 2, a link provides an explicit capacityallocation to each of its sources and the price is deter-mined based on the expected information data rate andthe actual information data rate of each individual source,while in Algorithm 1, a link does not explicitly allocated the ca-pacity to each individual source, and the price is determinedbased on the expected aggregate information rate andthe actual aggregate information rate of itssources.

The advantages of allowing different code rates for differentsources on a shared link and more message passing overhead in-clude a more dynamic rate-reliability tradeoff and a higher net-work utility, as confirmed through numerical examples below.However, this performance improvement is achieved at the ex-pense of keeping per-flow states on the links and more restric-tive conditions on utility functions for convergence proof (i.e.,the conditions in Lemma 2).

After the above decomposition and by Lemma 2, the fol-lowing result can be proved similar to Theorem 1.

Theorem 2: By Algorithm 2, dual variables andconverge to the optimal dual solutions and and the corre-sponding primal variables , , , and are the globallyoptimal primal solutions of problem (14), i.e., ,

, , and are the globally optimal primal solutions ofproblem (12).

V. NUMERICAL EXAMPLES

A. Basic Examples

In this section, we present numerical examples for theproposed algorithms by considering a simple network, shownin Fig. 3, with a linear topology consisting of four linksand eight users. Utility function for user is inthe following standard form of concave utility parameter-ized by [12], shifted such that and

, and with utility on rate and utility on

Fig. 3. Network topology and flow routes for numerical examples.

Fig. 4. Optimal tradeoff between rate and reliability for different users underthe integrated dynamic reliability (Algorithm 1).

reliability summed up with a given weight between rate andreliability utilities

The decoding error probability on each link is assumed to beof the following form:

where is the channel code block length and the code ratefor link .

We trace the globally optimal tradeoff curve between rate andreliability using Algorithms 1 and 2, and then compare the net-work utility achieved by the following three schemes.

• Static reliability (by the standard dual-based algorithm inthe literature e.g., [5], [10]): Each link provides a fixederror probability 0.025. Only rate control is performed tomaximize the network utility.

• Integrated dynamic reliability (by Algorithm 1): Each linkprovides the same adjustable error probability to each ofits users.

• Differentiated dynamic reliability (by Algorithm 2): Eachlink provides a possibly different error probability to eachof its users.

In Figs. 4–9, the constant parameters have the followingvalues: , Mb/s , Mb/s ,

Mb/s , , and . Each pointon the curves in all the graphs represents the result of runninga corresponding distributed algorithm until convergence to aprovably global optimum.

We first investigate the case where all the users have the same, and vary the value of from 0 to 1 in step size of

Page 10: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

LEE et al.: PRICE-BASED DISTRIBUTED ALGORITHMS FOR RATE-RELIABILITY TRADEOFF IN NETWORK UTILITY MAXIMIZATION 971

Fig. 5. Aggregate information data rate on each link if the integrated dynamicreliability is used (Algorithm 1).

Fig. 6. Error probability on each link if the integrated dynamic reliability isused (Algorithm 1).

Fig. 7. Comparison of the achieved network utility attained by thedifferentiated dynamic policy (Algorithm 2), the integrated dynamic policy(Algorithm 1), and the static policy (current practice).

0.1. The resulting tradeoff curve, which is globally optimal, isshown in Fig. 4.5 As expected, a larger (i.e., rate utility is givena heavier weight) leads to a higher rate at the expense of lowerreliability. The tradeoff curve has a steeper slope at a larger(i.e., compared with low rate regime, in high rate regime furtherrate increment is achieved at the expense of a larger drop in reli-ability). The more congested links a user’s flow passes through,the steeper the tradeoff curve becomes. For each user, the area

5Note that by symmetry, the tradeoff curves for users 1 and 2 are the same,those for users 5 and 6 are the same, and those for the other fours users are thesame. Therefore, only users 1, 3, and 5 are shown in this figure.

Fig. 8. Comparison of optimal tradeoff between rate and reliability for user 2in each policy, when a are changed according to (25).

Fig. 9. Comparison of the achieved network utility attained by thedifferentiated dynamic policy (Algorithm 2), the integrated dynamic policy(Algorithm 1), and the static policy (current practice), when a are changedaccording to (25).

to the left and below of the tradeoff curve is the achievable re-gion [i.e., every (rate, reliability) point in this region can be ob-tained], and the area to the right and above of the tradeoff curveis the infeasible region [i.e., it is impossible to have any combi-nation of (rate, reliability) represented by points in this region].It is impossible to operate in the infeasible region. Moreover,we can always find a better operating point on the boundary ofthe achievable region than a operating point in the interior ofthe achievable region. Hence, operating on the boundary of theachievable region, i.e., the Pareto optimal tradeoff curve, is thebest. In the Pareto optimal tradeoff curve, which point is betterdepends on the relative weight between rate utility and relia-bility utility given by each user.

Figs. 5 and 6 show the aggregate information data rate anddecoding error probability on each link as the weight varies.6

As expected, as increases, data rates increase but decodingerror probabilities also rise. Since link 2 is more congested thanlink 1, link 2 provides a higher data rate, also a higher errorprobability than link 1.

For the same experimental setup, Fig. 7 shows the networkutility achieved (i.e., sum of utilities of all the users) as theweight varies. It is clear that the performance of the NUMalgorithm that takes into account the rate-reliability tradeoff issignificantly better than the standard distributed algorithms for

6By symmetry, link 1 and 4’s curves are the same, and link 2 and 3’s curvesare the same. Hence, the figure shows only links 1 and 2.

Page 11: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

972 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006

Fig. 10. Network topology and flow routes for the partial dynamic reliabilityexample.

the basic NUM that ignores the possibility of jointly optimizingrate and reliability.7 Within the dynamic approach, the perfor-mance gap between the integrated and differentiated policies issmall because all the users are set to have the same weight .

We now give different weights to the eight users indexedby as follows:

if is an odd numberif is an even number

(25)

and vary from 0 to 0.5 in step size of 0.05. No two users havethe same utility function and flow route now. Fig. 8 shows theglobally optimal tradeoff curves between rate and reliability foruser 2, under the three policies of static reliability, integrated dy-namic reliability, and differentiated dynamic reliability, respec-tively. The differentiated scheme shows a much larger dynamicrange of tradeoff than both the integrated and static schemes.

Fig. 9 shows the relative performance in terms of the net-work utility achieved by the three policies as changes. Asexpected, dynamic reliability policies are much better than thestatic reliability policy, and in this case where users have dif-ferent weights , the gap between differentiated and integratedpolicies is wider than that in Fig. 7.

B. Partially Dynamic Reliability

In some networks, only a subset of links have adaptivechannel coding while other links have fixed code rates. Forexample, in the DSL access networks, edge links can provideadaptive channel coding while links in the backbone may not.Hence, it is useful to know what happens if only a subset oflinks adopt the dynamic reliability policy. Here, we present theperformance of the differentiated dynamic reliability policy forsuch situations considering the network in Fig. 10, in whicheach link is symmetric in terms of the demand from users.

We fix the capacity of links 1 and 4 as(Mb/s) and compute the network utility while varying the ca-

pacity of links 2 and 3 as Mb/s ,. Hence, if , links 2 and 3 are bot-

tleneck links. Otherwise, links 1 and 4 are bottleneck links. Wecompare the performance of four scenarios.

• Dynamic: All links use the differentiated dynamic relia-bility policy.

• Partial1: Only links 2 and 3 use the differentiated dynamicreliability policy, while links 1 and 4 still use the staticreliability policy.

• Partial2: Only links 1 and 4 use the differentiated dynamicreliability policy, while links 2 and 3 still use the staticreliability policy.

• Static: All links still use the static reliability polity.

7In this example, this performance gap narrows as the weight a on rate utilityincreases. This happens since the error probability of each link in the staticscheme is set to barely satisfy the minimum reliability requirement of the users.With a different parameter setting, the performance gap may widen as param-eter a increases.

Fig. 11. Comparison of the achieved network utility in each system withthe partially differentiated dynamic reliability policy. Dynamic: all links havethe differentiated dynamic reliability policy; Partial1: only links 2 and 3have the differentiated reliability policy; Partial2: only links 1 and 4 have thedifferentiated reliability policy; Static: all links have the static reliability policy.

Fig. 11 shows that we can still obtain significant performancegain over the static policy even though only a subset of linkshave adaptive channel coding. As expected, this performancegain is reduced compared with the case where all links havethe dynamic policy. It also shows that we can obtain a higherperformance gain by applying dynamic reliability to more con-gested links (usually the access links, precisely where adaptivecoding is possible) than less congested ones. Furthermore, inthe static policy, increasing link capacities beyond a certainthreshold does not provide any further increase in networkutility, while with the dynamic policy we can continue toimprove network utility (with a diminishing marginal return)by increasing link capacities.

VI. RATE-RELIABILITY TRADEOFF IN WIRELESS

MIMO MULTIHOP NETWORKS THROUGH

DIVERSITY-MULTIPLEXING GAIN CONTROL

In the previous sections, we have developed the optimizationframework and distributed algorithms for the optimal rate-relia-bility tradeoff by controlling adaptive channel coding. They canbe applied to other types of networks such as wireless MIMOmultihop networks, where the optimal rate-reliability tradeoffcan be achieved by appropriately controlling diversity and mul-tiplexing gains on each MIMO link [27]–[29]. In this section,we briefly present how our framework can be extended to wire-less MIMO multihop networks. The detailed algorithms are thenseen to be readily derived from Algorithms 1 and 2, and their de-tails are skipped here for brevity.

In MIMO networks, each logical link has multiple transmitand multiple receive antennas, and , respectively, enablingboth diversity and spatial multiplexing gains, which are definedas follows [29].

Definition 1: Link has diversity gain and multiplexinggain if its data rate (b/s/Hz) and average error proba-bility satisfy the following conditions:

(26)

and

(27)

where is signal-to-noise ratio (SNR).

Page 12: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

LEE et al.: PRICE-BASED DISTRIBUTED ALGORITHMS FOR RATE-RELIABILITY TRADEOFF IN NETWORK UTILITY MAXIMIZATION 973

Hence, for a given (high) SNR, we can achieve a higher datarate with a larger multiplexing gain or a lower error probabilitywith a larger diversity gain. There exists a tradeoff betweenthese two gains, and the optimal tradeoff curve is proved fora point-to-point link in [29]. For given multiplexing gain , de-fine to be the supremum of the diversity gain that can beachieved over all schemes at link .

Lemma 4: [29] Suppose that the channel gain is constant fora duration of symbols. If ,8 is given bythe piecewise-linear function connecting the point ,

, where

(28)

By using the result in Lemma 4, we study the end-to-end rate-reliability tradeoff in wireless MIMO multihop networks, i.e.,we assume that each link uses a multiple-antenna coding schemethat achieves the optimal diversity-multiplexing tradeoff givenin Lemma 4, and that there is no joint coding across point-to-point logical links. To turn the piecewise linear tradeoff curveinto a differentiable one, we approximate with a differ-entiable function as

(29)

The approximated tradeoff curve (29) is always below the op-timum one (28), thus more conservative than the optimum curve.As the number of antennas increases, the gap between (29) and(28) decreases. From (26) and (27), we assume that for eachsource traversing link , its data rate (b/s) and errorprobability are given by

and

where and are positive constants, and and are mul-tiplexing and diversity gains of source at link , respectively.

We assume that each link transmits data from each of itssources in a round-robin manner and the fraction of the trans-mission time of source on link is given by . Hence, theaverage data rate of source at link is obtained by

and the reliability of source is obtained by

SNR at each link is fixed, and as before, each source hasits utility function .

We consider two policies: static and dynamic scheduling poli-cies. In the static scheduling policy, each link transmits data ofeach of its sources for a fixed fraction of time, i.e., is fixed(e.g., , ). In the dynamic scheduling

8For the case of i < m + n � 1, the upper and lower bounds of d (r) arealso proved in [29]. For the brevity of the paper, we only consider the case thati � m + n � 1 here, and the other case can be studied in a similar manner.

policy, can be adjusted based on network conditions underthe following constraint:

where is the maximum fraction of the time that link cantransmit data.9

A. Static Scheduling Policy

The NUM problem for the static scheduling policy is formu-lated as

(30)

In the above problem, is a constant, and if

were a convex function, it would be a separableand convex problem. In general, is not convex. How-ever, the following lemma shows that in most cases that are in-teresting in practice, it is a convex function or can be closelyapproximated with a convex function. Define

Lemma 5: If , then is aconvex function, i.e., ,

. Otherwise, it has an inflection point such thatfor and

for .Proof:

Hence, is convex if and only if

Since , . There-fore, is convex if

which completes the proof.Since if , and

if , the above lemmaimplies that converges to a convex function if oneof the following conditions is satisfied: 1) ;

9Ideally, t = 1, but if we considered collisions under random-accessMAC protocols, it would be less than one.

Page 13: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

974 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006

Fig. 12. Error probability function (p (r )) with m = n = 2 and k =0:5.

Fig. 13. Error probability function (p (r )) with = 10 (dB) and k =0:5.

2) ; and 3) . Furthermore, from theabove lemma, we have the following.

Corollary 1: If and (dB)[ 8.69 (dB)], then is a convex function.

This corollary implies that if the number of transmit antennasis different from that of receive antennas, is a convex func-tion even when SNR is not too high. Also, the required SNRfor the convexity decreases as the difference between the num-bers of transmit and receive antennas increases. In Figs. 12 and13, with is plotted when the number oftransmit antennas is the same as that of receive antennas, varyingSNR and the number of antennas, respectively. As indicated inLemma 5, the figures show that as either SNR or the number ofantennas increases, can be approximated by a convexfunction with higher and higher accuracy.

In the rest of this section, we assume that is a convexfunction. Hence, problem (30) is turned into a convex and sepa-rable problem. Moreover, since its structure is similar to that ofproblem (2), we can achieve the optimal rate-reliability tradeoffto problem (30) by using the same dual decomposition approachto that in Section III. Due to space limit, we do not repeat thedetails here.

B. Dynamic Scheduling Policy

The problem formulation for the dynamic scheduling policyis similar to problem (30). The crucial difference is that, inthis more general policy, each link can dynamically adjust thefraction of the transmission time for each of its sources.The extended NUM problem is formulated as

(31)

In contrast to the static scheduling policy where is a constant,it is now a variable to be determined in the above problem. Dueto the second constraint, problem (31) is neither convex nor sep-arable. However, using the same technique as in Section IV, wecan turn problem (31) into a convex and separable problem. Wetake the log of both sides of the second constraint in problem(31) and a log change of variable: . The problem isturned into

(32)

where . The structure of the aboveproblem is similar to that of problem (14). Hence, if the condi-tions on utility curvature in Lemma 2 are satisfied, it is convexand separable, and the optimal rate-reliability tradeoff can beachieved by using the same dual decomposition approach as inSection IV. Algorithm 2 in that section then readily extends tosolve problem (31).

VII. CONCLUDING REMARKS

Motivated by needs from the application-layer utilities andpossibilities at the physical-layer coding, this paper removesthe rate-dependency assumption on utility functions and allows

Page 14: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

LEE et al.: PRICE-BASED DISTRIBUTED ALGORITHMS FOR RATE-RELIABILITY TRADEOFF IN NETWORK UTILITY MAXIMIZATION 975

the physical-layer adaptive channel coding (or diversity-multi-plexing gain control) to tradeoff rate and reliability. The basicnetwork utility maximization is thus extended to concave maxi-mization problems over nonlinear, nonconvex, and coupled con-straints, which are much more difficult problems to be solvedby distributed and globally optimal algorithms. In particular,the standard price-based distributed algorithm cannot be appliedsince the entire dimension of reliability is absent from the orig-inal formulation of network utility maximization.

We present two new price-based distributed algorithmsfor two possible formulations of the adaptive channel codingproblem: the integrated policy where each link maintains thesame code rate for all flows traversing it, and the differentiatedpolicy where each link can assign different code rates for eachof the flows traversing it. We also provide sufficient conditionsunder which convergence to the globally optimal rate-relia-bility tradeoff can be proved. A key idea is that, in additionto link-updated congestion prices for distributed rate control,we need to introduce source-updated signal quality prices fordistributed reliability control. We also show that the optimiza-tion framework and distributed algorithms of network-widerate-reliability optimal tradeoff can be extended from tuningthe “knobs” of adaptive channel coding to tuning the “knobs”of diversity-multiplexing gain in wireless MIMO networks.

In the context of “layering as optimization decomposition,” asoutlined in [13] (see also, e.g., [15], [21], [22], [35], and [36]),this paper shows that in the case of joint congestion control in thetransport layer and channel coding or MIMO signal processingin the physical layer, the new reliability prices, in addition tothe standard congestion prices, become the “layering variables”controlling the optimal interaction between the two layers. Thetechnique of introducing auxiliary flow variables, using a logchange of variables, and proving convergence under additionalconditions on utility curvatures may also be applicable (e.g.,[37]) to solve other nonconvex and coupled NUM problems indistributed network resource allocation.

REFERENCES

[1] F. P. Kelly, A. Maulloo, and D. Tan, “Rate control for communicationnetworks: Shadow prices, proportional fairness and stability,” J. Oper.Res. Soc., vol. 49, no. 3, pp. 237–252, Mar. 1998.

[2] R. T. Rockafellar, Network Flows and Monotropic Program-ming. Nashua, NH: Athena Scientific, 1998.

[3] F. P. Kelly, “Charging and rate control for elastic traffic,” Eur. Trans.Telecommun., vol. 8, no. 1, pp. 33–37, Jan. 1997.

[4] H. Yäiche, R. R. Mazumdar, and C. Rosenberg, “A game theoreticframework for bandwidth allocation and pricing of elastic connectionsin broadband networks: Theory and algorithms,” IEEE/ACM Trans.Netw., vol. 8, no. 5, pp. 667–678, October 2000.

[5] S. H. Low, “A duality model of TCP and queue management algo-rithms,” IEEE/ACM Trans. Netw., vol. 11, no. 4, pp. 525–536, August2003.

[6] R. Srikant, The Mathematics of Internet Congestion Control. Cam-bridge, MA: Birkhauser, 2004.

[7] C. Jin, D. X. Wei, and S. H. Low, “TCP FAST: Motivation, architecture,algorithms, and performance,” in IEEE INFOCOM, vol. 4, Hong Kong,China, Mar. 2004, pp. 2490–2501.

[8] S. Kunniyur and R. Srikant, “End-to-end congestion control: Utilityfunctions, random losses and ECN marks,” IEEE/ACM Trans. Netw.,vol. 10, no. 5, pp. 689–702, Oct. 2003.

[9] R. J. La and V. Anantharam, “Utility-based rate control in the Internetfor elastic traffic,” IEEE/ACM Trans. Netw., vol. 9, no. 2, pp. 272–286,Apr. 2002.

[10] S. H. Low and D. E. Lapsley, “Optimization flow control, I: Basic al-gorithm and convergence,” IEEE/ACM Trans. Netw., vol. 7, no. 6, pp.861–874, Dec. 1999.

[11] S. H. Low, L. Peterson, and L. Wang, “Understanding Vegas: A dualitymodel,” J. ACM, vol. 49, no. 2, pp. 207–235, Mar. 2002.

[12] J. Mo and J. Walrand, “Fair end-to-end window-based congestion con-trol,” IEEE/ACM Trans. Netw., vol. 8, no. 5, pp. 556–567, Oct. 2000.

[13] M. Chiang, “Balancing transport and physical layer in wireless multihopnetworks: Jointly optimal congestion control and power control,” IEEEJ. Sel. Area Commun., vol. 23, no. 1, pp. 104–116, Jan. 2005.

[14] J.-W. Lee, R. R. Mazumdar, and N. B. Shroff, “Opportunistic resourcescheduling for wireless ad-hoc networks,” in Proc. BroadWISE’04, Oct.2004.

[15] J. Wang, L. Li, S. H. Low, and J. C. Doyle, “Can TCP and shortest pathrouting maximize utility,” in Proc. IEEE INFOCOM, vol. 3, Apr. 2003,pp. 2049–2056.

[16] T. Nandagopal, T.-E. Kim, X. Gao, and V. Bharghavan, “AchievingMAC layer fairness in wireless packet networks,” in Proc. ACM Mo-biCom, 2000, pp. 87–98.

[17] Z. Fang and B. Bensaou, “Fair bandwidth sharing algorithms based ongame theory frameworks for wireless ad-hoc networks,” in Proc. IEEEINFOCOM, vol. 2, 2004, pp. 1284–1295.

[18] X. Wang and K. Kar, “Distributed algorithms for max-min fair rate allo-cation in ALOHA networks,” in Proc. 41th Annual Allerton Conf., 2003.

[19] K. Kar, S. Sarkar, and L. Tassiulas, “Achieving proportional fairnessusing local information in Aloha networks,” IEEE Trans. AutomaticControl, vol. 49, no. 10, pp. 1858–1862, Oct. 2004.

[20] J.-W. Lee, M. Chiang, and A. R. Calderbank, “Utility-optimal mediumaccess control: Reverse and forward engineering,” in Proc. IEEE IN-FOCOM, 2006.

[21] L. Chen, S. Low, and J. Doyle, “Joint congestion control and media ac-cess control design for ad hoc wireless networks,” in Proc. IEEE IN-FOCOM, 2005.

[22] L. Xiao, M. Johansson, and S. Boyd, “Simultaneous routing and resourceallocation via dual decomposition,” IEEE Trans. Commun., vol. 52, no.7, pp. 1136–1144, Jul. 2004.

[23] J.-W. Lee, R. R. Mazumdar, and N. B. Shroff, “Non-convexity issues forinternet rate control with multi-class services: Stability and optimality,”in Proc. IEEE INFOCOM, vol. 1, Hong Kong, China, Mar. 2004, pp.24–34.

[24] M. Chiang, S. Zhang, and P. Hande, “Distributed rate allocation forinelastic flows: Optimization frameworks,” in Proc. IEEE INFOCOM,Miami, FL, Mar. 2005, pp. 2679–2690.

[25] M. Fazel and M. Chiang, “Network utility maximization with noncon-cave utilities using sum-of-squares method,” in Proc. IEEE Conf. Dec.Contr., Dec. 2005, pp. 1867–1874.

[26] A. Tang, J. Wang, S. H. Low, and M. Chiang, “Network equilibrium ofheterogeneous congestion control protocols,” in Proc. IEEE INFOCOM,Miami, FL, Mar. 2005, pp. 1338–1349.

[27] D. Gesbert, M. Shafi, D. Shiu, P. J. Smith, and A. Naguib, “From theoryto practice: An overview of MIMO space-time coded wireless systems,”IEEE J. Sel. Area Commun., vol. 21, no. 3, pp. 281–302, Apr. 2003.

[28] S. N. Diggavi, N. Al-Dhahir, A. Stamoulis, and A. R. Calderbank, “Greatexpectations: The value of spatial diversity in wireless networks,” Proc.IEEE, vol. 92, no. 2, pp. 219–270, Feb. 2004.

[29] L. Zheng and D. N. C. Tse, “Diversity and multiplexing: A fundamentaltradeoff in multiple-antenna channels,” IEEE Trans. Inf. Theory, vol. 49,no. 5, pp. 1073–1096, May 2003.

[30] R. G. Gallager, Information Theory and Reliable Communica-tion. New York: Wiley, 1968.

[31] J. G. Proakis, Digital Communications. New York: McGraw-Hill,1989.

[32] D. P. Bertsekas, Nonlinear Programming. Nashua, NH: Athena Scien-tific, 1999.

[33] M. Minoux, Mathematical Programming: Theory and Algo-rithms. New York: Wiley, 1986.

[34] A. R. Calderbank, S. N. Diggavi, and N. Al-Dhahir, “Space-time sig-nalling based on Kerdock and Delsarte-Goethals codes,” in Proc. IEEEICC, vol. 1, Paris, France, Jun. 2004, pp. 483–487.

[35] X. Lin and N. B. Shroff, “The impact of imperfect scheduling oncross-layer rate control in wireless networks,” in Proc. IEEE IN-FOCOM, Miami, FL, Mar. 2005, pp. 1804–1814.

Page 15: 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, …chiangm/ratereliability.pdf · coding in Digital Subscriber Loop (DSL) broadband access networks or adaptive diversity-multiplexing

976 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006

[36] L. Chen, S. H. Low, M. Chiang, and J. C. Doyle, “Optimal cross-layercongestion control, routing, and scheduling design in ad hoc wirelessnetworks,” in Proc. IEEE INFOCOM, 2006.

[37] J.-W. Lee, M. Chiang, and A. R. Calderbank, “Jointly optimal conges-tion and contention control in wireless ad hoc networks,” IEEE Commun.Lett., vol. 10, no. 3, pp. 216–218, Mar. 2006.

Jang-Won Lee (S’02–M’04) received the B.S.degree in electronic engineering from Yonsei Uni-versity, Seoul, Korea, in 1994, the M.S. degree inelectrical engineering from the Korea Advanced In-stitute of Science and Technology (KAIST), Taejon,Korea, in 1996, and the Ph.D. degree in electricaland computer engineering from Purdue University,West Lafayette, IN, in 2004.

From 1997 to 1998, he was with Dacom R&DCenter, Taejon. From 2004 to 2005, he was a Post-doctoral Research Associate in the Department of

Electrical Engineering, Princeton University, Princeton, NJ. Since September2005, he has been an Assistant Professor in the School of Electrical andElectronic Engineering, Yonsei University, Seoul, Korea. His research interestsinclude resource allocation, quality-of-service (QoS) and pricing issues,optimization, and performance analysis in communication networks.

Mung Chiang (S’00–M’03) received the B.S.(Hon.) degree in electrical engineering and mathe-matics, and the M.S. and Ph.D. degrees in electricalengineering from Stanford University, Stanford, CA,in 1999, 2000, and 2003, respectively.

He is an Assistant Professor of Electrical En-gineering at Princeton University, Princeton, NJ.He conducts research in the areas of nonlinearoptimization of communication systems, distributednetwork control algorithms, broadband accessnetwork architectures, and information theory and

stochastic analysis of communication systems.Prof. Chiang has been awarded a Hertz Foundation Fellow. He received the

Stanford University School of Engineering Terman Award, the SBC Communi-cations New Technology Introduction Contribution Award, the NSF CAREERAward, and the Princeton University Howard B. Wentz Junior Faculty Award.He is the Lead Guest Editor of the IEEE JOURNAL ON SELECTED AREAS IN

COMMUNICATIONS (Special Issue on Nonlinear Optimization of Communica-tion Systems), a Guest Editor of the IEEE TRANSACTIONS ON INFORMATION

THEORY, and the IEEE/ACM TRANSACTIONS ON NETWORKING (Special Issueon Networking and Information Theory). He is Program Co-Chair of the 38thConference on Information Science and Systems.

A. Robert Calderbank (M’89–SM’97–F’98) re-ceived the B.Sc. degree from Warwick University,Warwick, U.K., in 1975, the M.Sc. degree fromOxford University, Oxford, U.K., in 1976, andthe Ph.D. degree from the California Institute ofTechnology, Pasadena, in 1980, all in mathematics.

He is currently a Professor of Electrical Engi-neering and Mathematics at Princeton University,Princeton, NJ, where he directs the Program inApplied and Computational Mathematics. He joinedBell Telephone Laboratories as a Member of Tech-

nical Staff in 1980, and retired from AT&T in 2003 as Vice President ofResearch. He has research interests that range from algebraic coding theoryand quantum computing to the design of wireless and radar systems.

Dr. Calderbank was honored by the IEEE Information Theory Prize PaperAward in 1995 for his work on the Z4 linearity of Kerdock and Preparata Codes(joint with A. R. Hammons, Jr., P. V. Kumar, N. J. A. Sloane, and P. Sole), andagain in 1999 for the invention of space–time codes (joint with V. Tarokh andN. Seshadri). He is a recipient of the IEEE Millennium Medal, and was electedto the National Academy of Engineering in 2005. He served as Editor-in-Chiefof the IEEE TRANSACTIONS ON INFORMATION THEORY from 1995 to 1998, andas Associate Editor for Coding Techniques from 1986 to 1989. He was a memberof the Board of Governors of the IEEE Information Theory Society from 1991to 1996.