Announcements Deadline extensions –HW 1 dues May 17 (next Wed) –Progress report due May 24 HW 1 clarifications: –On problem 3 users can lower their power.

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Multiuser Diversity Gain Enhancement by Guard Time Reduction Hend Koubaa, Vegard Hassel, Geir E. Øien Norwegian University of Science and Technology (NTNU)
Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
Adopt Algorithm for Distributed Constraint Optimization
Shi Bai, Weiyi Zhang, Guoliang Xue, Jian Tang, and Chonggang Wang University of Minnesota, AT&T Lab, Arizona State University, Syracuse University, NEC.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
DYNAMIC POWER ALLOCATION AND ROUTING FOR TIME-VARYING WIRELESS NETWORKS Michael J. Neely, Eytan Modiano and Charles E.Rohrs Presented by Ruogu Li Department.
Sequential Timing Optimization. Long path timing constraints Data must not reach destination FF too late s i + d(i,j) + T setup  s j + P s i s j d(i,j)
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
1 Channel Capacity Issues For Mobile Teams Ameesh Pandya and Greg Pottie, UCLA Electrical Engineering Department.
“ Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks ”
Channel Access Algorithms with Active Link Protection for Wireless Communication Networks with Power Control Nicholas Bambos, Shou C. Chen, Gregory J.
The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University.
Kuang-Hao Liu et al Presented by Xin Che 11/18/09.
The Capacity of Wireless Ad Hoc Networks
1 Power Control, Interference Suppression and Interference Avoidance in Wireless Systems Roy Yates (with S. Ulukus and C. Rose) WINLAB, Rutgers University.
Optimal Throughput Allocation in General Random Access Networks P. Gupta, A. Stolyar Bell Labs, Murray Hill, NJ March 24, 2006.
EE360: Lecture 7 Outline Adaptive CDMA Techniques Introduction CDMA with power control Adaptive techniques for interference reduction Rate and power adaptation.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
Two Media Access Control Protocols (MAC) for Wireless Networks.
Performance Analysis of Downlink Power Control Algorithms for CDMA Systems Soumya Das Sachin Ganu Natalia Rivera Ritabrata Roy.
6/28/2015CSC82601 Radio-resource sharing for adhoc Networking with UWB. by Francesca Cuomo, Cristina Martello, Andrea Baiocchi, and Fabrizio Capriotti.
Distributed Combinatorial Optimization
Admission Control and Dynamic Adaptation for a Proportional-Delay DiffServ-Enabled Web Server Yu Cai.
Normalised Least Mean-Square Adaptive Filtering
CS Reinforcement Learning1 Reinforcement Learning Variation on Supervised Learning Exact target outputs are not given Some variation of reward is.
Domain decomposition in parallel computing Ashok Srinivasan Florida State University COT 5410 – Spring 2004.
Cost-Performance Tradeoffs in MPLS and IP Routing Selma Yilmaz Ibrahim Matta Boston University.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
MAXIMIZING SPECTRUM UTILIZATION OF COGNITIVE RADIO NETWORKS USING CHANNEL ALLOCATION AND POWER CONTROL Anh Tuan Hoang and Ying-Chang Liang Vehicular Technology.
Opersating Mode DCF: distributed coordination function
Capacity Scaling with Multiple Radios and Multiple Channels in Wireless Mesh Networks Oguz GOKER.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Andreas Larsson, Philippas Tsigas SIROCCO Self-stabilizing (k,r)-Clustering in Clock Rate-limited Systems.
Aris Moustakas, University of Athens CROWN Kickoff NKUA Power Control in Random Networks with N. Bambos, P. Mertikopoulos, L. Lampiris.
Global versus Local Call Admission Control in CDMA Cellular Networks Robert Akl, D.Sc. Asad Parvez University of North Texas.
On QoS Guarantees with Reward Optimization for Servicing Multiple Priority Class in Wireless Networks YaoChing Peng Eunyoung Chang.
A Distributed Clustering Framework for MANETS Mohit Garg, IIT Bombay RK Shyamasundar School of Tech. & Computer Science Tata Institute of Fundamental Research.
Rensselaer Polytechnic Institute Rajagopal Iyengar Combinatorial Approaches to QoS Scheduling in Multichannel Wireless Systems Rajagopal Iyengar Rensselaer.
Lecture 5: Cellular networks Anders Västberg Slides are a selection from the slides from chapter 10 from:
Bandwidth Reallocation for Bandwidth Asymmetry Wireless Networks Based on Distributed Multiservice Admission Control Robert Schafrik Lakshman Krishnamurthy.
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
AUTONOMOUS DISTRIBUTED POWER CONTROL FOR COGNITIVE RADIO NETWORKS Sooyeol Im; Jeon, H.; Hyuckjae Lee; IEEE Vehicular Technology Conference, VTC 2008-Fall.
MAP: Multi-Auctioneer Progressive Auction in Dynamic Spectrum Access Lin Gao, Youyun Xu, Xinbing Wang Shanghai Jiaotong University.
1 Scheduling The part of the OS that makes the choice of which process to run next is called the scheduler and the algorithm it uses is called the scheduling.
The Application of The Improved Hybrid Ant Colony Algorithm in Vehicle Routing Optimization Problem International Conference on Future Computer and Communication,
Power Control in Wireless Ad Hoc Networks Background An ad hoc network is a group of self configuring wireless nodes that lack infrastructure. Motivation—Power.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, and Mung.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
1 Iterative Integer Programming Formulation for Robust Resource Allocation in Dynamic Real-Time Systems Sethavidh Gertphol and Viktor K. Prasanna University.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
OR Chapter 8. General LP Problems Converting other forms to general LP problem : min c’x  - max (-c)’x   = by adding a nonnegative slack variable.
Resource Allocation in Hospital Networks Based on Green Cognitive Radios 王冉茵
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
1 Buffering Strategies in ATM Switches Carey Williamson Department of Computer Science University of Calgary.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP Congestion Control.
Wireless Packet Scheduling With Soft Deadlines Aditya Dua and Nicholas Bambos Department of Electrical Engineering Stanford University ICC 2007.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
1 Chapter 5 Branch-and-bound Framework and Its Applications.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
William Stallings Data and Computer Communications
Data Collection and Dissemination
DTMC Applications Ranking Web Pages & Slotted ALOHA
Data and Computer Communications
The Impact of Multihop Wireless Channel on TCP Performance
Presentation transcript:

Announcements Deadline extensions –HW 1 dues May 17 (next Wed) –Progress report due May 24 HW 1 clarifications: –On problem 3 users can lower their power –On problem 4 the “optimal” power allocation between Rock and Roll is for each state. Their average powers are fixed and equal. Can find true optimal allocation for extra credit. –References for 3G standards will be posted shortly, but idea is to debate technology, not specifics

Power Control Motivation Maintain link SIR (QOS) Increase battery life Efficient channel allocation Better handoff control Reduced delays Increased throughput/capacity

Power Control Centralized Power Control Distributed Power Control Active Link Protection Admission Control Channel Probing Power Control with Channel Assignment Minimum Power Routing Throughput vs. Delay vs. Power

Centralized Power Control Link QOS maintenance SIR of ith link above threshold: Alternate form: where G ij is gain from Xmtr i to Recvr j, P i is power of transmittter I, and  i is noise

Optimal Power Solution Need to solve (I-F)P>u –The matrix F has nonnegative elements and is irreducible. –Maximum modulus eigenvalue  F of F is real, positive, and simple. –Corresponding eigenvector is positive component-wise Soln exists if and only if Pareto optimal soln (min power)

Power Solutions P1P1 P2P2 P*P*

Recursive Calculation When  F <1, Follows from recursive substitution Comments: –Recursive algorithm minimizes the transmit power reqd to meet QOS –Update eqn requires knowledge of path gains for all users (via F ).

Distributed Power Control Can rewrite recursion as For user i, this recursion only depends on –His target SIR  i –His local SIR measurement R i (k) –His previous power P i (k) Fully distributed algorithm. –Same calculation as centralized algorithm. –Converges to Pareto optimal when it exists.

Convergence Step size  used to tradeoff speed versus stability. –Stability not included previously (  =1). For 6 users, algorithm converges within 5-10 iterations for  =1, iterations for  =.5. Small  reduces SIR fluctuations during convergence or due to new users.

Dynamics Algorithm must reiterate every time the channel changes –Existing users may not be feasible under new channel –How to “kick out” users (channel deallocation) –Algorithm convergence must be faster than the channel dynamics Algorithm must reiterate when new users enter the system

Effect of New Users New users cause a new iteration of algorithm –Existing users may drop below SIR threshold, even if new user can be eventually accommodated –May cause call dropping If new user cannot be accepted: –All SIRs will degrade –Power will escalate uncontrollably Need mechanism to block new users that cannot be accepted –Admission and power control

Active Link Protection Maintain active user SIRS while suppressing infeasible new users. Basic idea: –Increase active user SIR (in A k ) threshold to ,,  >1. –Increase new user SIR (in B k ) slowly

Algorithm Properties For at most 1 new user per iteration, for active links: This implies that –Active links stay active –New links that become active stay active. Bounded power overshoot New links improve with time

Additional Dynamics Let A 0 denote initally active users and B 0 denote new users If no new link ever becomes active –Active users will converge to desired SIR threshold  i –Powers will explode exponentially If set A 0 U B 0 is feasible then all new users become active in finite time. –Powers explode to infinity if enhanced SIR thresholds (  i ) infeasible –Can dynamically relax  to 1.

Voluntary Dropout (VDO) New links voluntarily drop out if target SIR seems infeasible –Reduces power of active links. –Facilitates admission of feasible new users. –Don’t want to drop out too early. Channel dynamics and user departures may make infeasible user feasible. Timeout-Based VDO –New link sets timeout horizon T –At time T, computes dropout time D as decreasing function of  - R(T) –New link drops out if it has not reached  by time T+D. –Retries after random wait time

SIR-Saturation Based VDO –Each new user retains previous M SIRs values of iteration. M wide enough to allow channel and user dynamics to improve link, but narrow enough to limit persistance. –At each new iteration, user checks if SIR has significantly increased over last M steps. –If so, continues power iteration –If not, drops out with probability p that is an increasing function of (  - R(k) ) –Retries after random wait time Forced dropout –New users may cause active users to violate max power constraint –Force new users to drop out as active users approach max power

Channel Probing New users cause interference without being active New users can probe channel to predict if they are feasible –Use 1-2 interations, low power. –Drops out if predicts infeasible. –Does not significantly impact active users –When multiple users trying to gain admission, probing becomes more complicated.

Channel Allocation When multiple channels are available –New link can probe multiple channels simultaneously –Choose channel with lowest power requirements –Active users can intermittently probe other channels to minimize power requirements. –55% delay reduction and 45% power savings for two channels versus single channel (Bambos) –Modeling time dynamics essential. Dynamics of using, probing, and switching channels causes large increase in call dropping (Foschini)

Ad-Hoc Issues Minimum Power Routing –Route in multihop network based on minimum power. –Uses a Viterbi-like trellis search to find best route Throughput vs. Delay vs. Power –A user can increase chances of successful transmission by increasing his power Entails tradeoff of delay vs. power –May raise power as buffer size increases to prevent overflow –Optimizing power relative to channel can increase throughput.