ee 685 presentation

30
EE 685 presentation Utility-Optimal Random-Access Control By Jang-Won Lee, Mung Chiang and A. Robert Calderbank

Upload: eden

Post on 05-Feb-2016

41 views

Category:

Documents


0 download

DESCRIPTION

Utility-Optimal Random-Access Control By Jang-Won Lee, Mung Chia ng and A. Robert Calderbank. EE 685 presentation. Objective of the paper. Aims to design medium access control (MAC) protocols for wireless networks through the network utility maximization (NUM) framework. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: EE 685 presentation

EE 685 presentation

Utility-Optimal Random-Access ControlBy Jang-Won Lee, Mung Chiang and A. Robert Calderbank

Page 2: EE 685 presentation

Objective of the paper

Aims to design medium access control (MAC) protocols for wireless networks through the network utility maximization (NUM) framework.

Problem formulation through a collision/persistence probabilistic model and aligning selfish utility with total social welfare.

Controlling the tradeoff between efficiency and fairness of radio resource allocation.

Proposing distributed algorithms to solve the utility-optimal random-access control problem, which lead to more message passing overhead than the current protocols, but significant potential for efficiency and fairness improvement.

Page 3: EE 685 presentation

Motivation and basic approach

Due to the inadequate feedback mechanism in the BEB protocol, neither convergence nor social welfare optimality can be assured

Need for new distributed algorithms convergent to the global optimum of total network utility is obvious

A probabilistic-modeled NUM problem for wireless MAC will be solved by optimal algorithms that will be converted to random access MAC protocols.

Therefore, optimality with respect to prescribed user utilities, which determine protocol efficiency and fairness, is guaranteed

Page 4: EE 685 presentation

Problem Framework

The problem is formulated for A network that consists of a set L of unidirectional links of capacities c l,

where l is element of L.

The network is shared by a set S of sources, where source s is characterized by a utility function Us(xs) that is concave increasing in its transmission rate xs

Each link l is shared by a set S(l) of sources.

The goal is to calculate source rates that maximize the sum of the utilities ∑s ϵ S Us(xs) over xs subject to capacity constraints.

Page 5: EE 685 presentation

S

Problem Framework

s1 s2 s3 ss

..........

DESTINATION NODES

SOURCE NODES

link l4 : S(l4)={s1,s3}

l1

l2

l3 l5

l6

Page 6: EE 685 presentation

The optimization problem :Primal problem

Page 7: EE 685 presentation

Utility functions :Relationship to fairness

Page 8: EE 685 presentation

System Model and Notation :

Page 9: EE 685 presentation

System Model and Notation :

Page 10: EE 685 presentation

Optimization problem :in terms of probabilistic link capacities

The objective of this problem is to obtain the optimal data rate x and the optimal persistence probabilities p for links, and P for nodes so as to maximize the network utility

Page 11: EE 685 presentation

Optimization problem :take log of the constraint and log change of variables

Page 12: EE 685 presentation

Lemma 1 :Concavity after variable change

Lets define a new function gl(xl) as follows

Note that the curvature should be bounded away from 0 as much as

So the traffic should be elastic enough for the concavity of utility

function after the variable change

Page 13: EE 685 presentation

Lemma 2 :Concavity after variable change

Hence, if α > 1, gl(xl) < 0 and if α < 1, gl(xl) > 0. So in this type of utility functions, if α > 1, U’l(xl) becomes a strictly concave function as desired. So throughout the paper α > 1 has been assumed

Page 14: EE 685 presentation

The optimization problem :Lagrangian for primal problem

Page 15: EE 685 presentation

The optimization problem :Dual problem

Note that in this Lagrangian, we do not need to relax the second constraint in problem (5). By definition, the Lagrange dual function is

Dual problem typically formulated as the minimization of upper boundary for the Lagrangian

The maximization of Lagrangian (equation 7) can be independently made in each node in parallel (over x’,p,P)

Page 16: EE 685 presentation

The optimization problem :Dual problem solution

Since Lagrangian function has two components that can be separately maximized in terms of x’ and (p,P) pair, we have

Page 17: EE 685 presentation

The optimization problem :Dual problem solution

Page 18: EE 685 presentation

The optimization problem :Dual problem solution

We can now solve the dual problem (8) by using a subgradient projection algorithm 4 at each link l, i.e., at each node n such that l ∈Lout(n), through the following iterations indexed by t

Page 19: EE 685 presentation

The optimization problem :Distributed Algorithm 1

Page 20: EE 685 presentation

The optimization problem :Distributed Algorithm 1

Page 21: EE 685 presentation

The optimization problem :Distributed Algorithm 2

Page 22: EE 685 presentation

The optimization problem :Distributed Algorithm 2

Page 23: EE 685 presentation

Remarks :Remark 2

Page 24: EE 685 presentation

Remarks Remark 4

The number of message passing required in each of the above two algorithms depends on the network topology. The average numbers of message passing in each iteration for Algorithm 1 and Algorithm 2, M1 and M2, are obtained as

Page 25: EE 685 presentation

Remarks :Remark 5

Page 26: EE 685 presentation

HeuristicsHeuristics decreasing message passing

Page 27: EE 685 presentation

HeuristicsHeuristics decreasing message passing

Page 28: EE 685 presentation

THEOREM 1 (optimality and convergence)

Proceeding to prove the optimality and convergence of Algorithms1 and 2. For a rigorous proof, we first need the following technical condition to have a unique solution to problem (10) at the optimal dual solution. At the optimal dual solution λ*,

Page 29: EE 685 presentation

THEOREM 1 proof (optimality and convergence)

Page 30: EE 685 presentation

Performance results

The performances of proposed protocols have been compared with those of the deterministic approximation protocol and the standard BEB protocol, showing that both protocols can provide not only a higher network utility and a larger fairness index, but also a wider dynamic range of the tradeoff curve between efficiency and fairness.

Performance guarantee of convergence to the global optimum of the NUM formulation is rigorously proved for the proposed algorithms, and simplifying heuristics are then developed based on the optimal algorithmst