Matthew Andrews Bell Labs June 27, 2005 Scheduling High Speed Data in (Adversarial) Wireless Networks.

Slides:



Advertisements
Similar presentations
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Advertisements

An Approximate Truthful Mechanism for Combinatorial Auctions An Internet Mathematics paper by Aaron Archer, Christos Papadimitriou, Kunal Talwar and Éva.
Interconnect throughput modeling. Important network performance metrics Throughput – Point to point (link bandwidth + end host software overheads) – Aggregate.
Stochastic optimization for power-aware distributed scheduling Michael J. Neely University of Southern California t ω(t)
Capacity of Wireless Channels
Online Scheduling with Known Arrival Times Nicholas G Hall (Ohio State University) Marc E Posner (Ohio State University) Chris N Potts (University of Southampton)
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
Delay Reduction via Lagrange Multipliers in Stochastic Network Optimization Longbo Huang Michael J. Neely WiOpt *Sponsored in part by NSF.
Short-Term Fairness and Long- Term QoS Lei Ying ECE dept, Iowa State University, Joint work with Bo Tan, UIUC and R. Srikant, UIUC.
Resource Allocation in Wireless Networks: Dynamics and Complexity R. Srikant Department of ECE and CSL University of Illinois at Urbana-Champaign.
EE 685 presentation Optimal Control of Wireless Networks with Finite Buffers By Long Bao Le, Eytan Modiano and Ness B. Shroff.
DYNAMIC POWER ALLOCATION AND ROUTING FOR TIME-VARYING WIRELESS NETWORKS Michael J. Neely, Eytan Modiano and Charles E.Rohrs Presented by Ruogu Li Department.
Stochastic Network Optimization with Non-Convex Utilities and Costs Michael J. Neely University of Southern California
Intelligent Packet Dropping for Optimal Energy-Delay Tradeoffs for Wireless Michael J. Neely University of Southern California
Modelling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks.
1 Stochastic Event Capture Using Mobile Sensors Subject to a Quality Metric Nabhendra Bisnik, Alhussein A. Abouzeid, and Volkan Isler Rensselaer Polytechnic.
1 “Multiplexing Live Video Streams & Voice with Data over a High Capacity Packet Switched Wireless Network” Spyros Psychis, Polychronis Koutsakis and Michael.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
Kuang-Hao Liu et al Presented by Xin Che 11/18/09.
Queuing Theory For Dummies
Max Weight Learning Algorithms with Application to Scheduling in Unknown Environments Michael J. Neely University of Southern California
Hash Tables With Finite Buckets Are Less Resistant to Deletions Yossi Kanizo (Technion, Israel) Joint work with David Hay (Columbia U. and Hebrew U.) and.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
Lecture 9. Unconstrained Optimization Need to maximize a function f(x), where x is a scalar or a vector x = (x 1, x 2 ) f(x) = -x x 2 2 f(x) = -(x-a)
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
Bandwidth sharing: objectives and algorithms Jim Roberts France Télécom - CNET Laurent Massoulié Microsoft Research.
1 Cross-Layer Design for Wireless Communication Networks Ness B. Shroff Center for Wireless Systems and Applications (CWSA) School of Electrical and Computer.
Energy-Efficient Rate Scheduling in Wireless Links A Geometric Approach Yashar Ganjali High Performance Networking Group Stanford University
Optimal Throughput Allocation in General Random Access Networks P. Gupta, A. Stolyar Bell Labs, Murray Hill, NJ March 24, 2006.
ADCN MURI Tools for the Analysis and Design of Complex Multi-Scale Networks Review September 9, 2009 Protocols for Wireless Networks Libin Jiang, Jiwoong.
Online Oblivious Routing Nikhil Bansal, Avrim Blum, Shuchi Chawla & Adam Meyerson Carnegie Mellon University 6/7/2003.
CISS Princeton, March Optimization via Communication Networks Matthew Andrews Alcatel-Lucent Bell Labs.
1 40 th Annual CISS 2006 Conference on Information Sciences and Systems Some Optimization Trade-offs in Wireless Network Coding Yalin E. Sagduyu Anthony.
March 24, Joint Optimization of Scheduling and Congestion Control in Communication Networks Matthew Andrews Bell Labs.
Stability and Fairness of Service Networks Jean Walrand – U.C. Berkeley Joint work with A. Dimakis, R. Gupta, and J. Musacchio.
Optimal Energy and Delay Tradeoffs for Multi-User Wireless Downlinks Michael J. Neely University of Southern California
Fast Spectrum Allocation in Coordinated Dynamic Spectrum Access Based Cellular Networks Anand Prabhu Subramanian*, Himanshu Gupta*,
Resource Allocation for E-healthcare Applications
Fair Real-time Traffic Scheduling over Wireless Local Area Networks Insik Shin Joint work with M. Adamou, S. Khanna, I. Lee, and S. Zhou Dept. of Computer.
DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet Jennifer Rexford Princeton University With Jiayue He, Rui Zhang-Shen, Ying Li,
L14. Fair networks and topology design D. Moltchanov, TUT, Spring 2008 D. Moltchanov, TUT, Spring 2015.
Multicast Scheduling in Cellular Data Networks Katherine Guo, Arun Netravali, Krishan Sabnani Bell-Labs Research Hyungsuk Won, Han Cai, Do Young Eun, Injong.
Kevin Ross, UCSC, September Service Network Engineering Resource Allocation and Optimization Kevin Ross Information Systems & Technology Management.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Utility-Optimal Scheduling in Time- Varying Wireless Networks with Delay Constraints I-Hong Hou P.R. Kumar University of Illinois, Urbana-Champaign 1/30.
Fair Queueing. 2 First-Come-First Served (FIFO) Packets are transmitted in the order of their arrival Advantage: –Very simple to implement Disadvantage:
Lecture #11 Stability of switched system: Arbitrary switching João P. Hespanha University of California at Santa Barbara Hybrid Control and Switched Systems.
Michael J. Neely, University of Southern California CISS, Princeton University, March 2012 Asynchronous Scheduling for.
Statistical-Time Access Fairness Index of One-Bit Feedback Fair Scheduler Fumio Ishizaki Dept. of Systems Design and Engineering Nanzan University, Japan.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Order Optimal Delay for Opportunistic Scheduling In Multi-User Wireless Uplinks and Downlinks Michael J. Neely University of Southern California
Scheduling Determines which packet gets the resource. Enforces resource allocation to each flows. To be “Fair”, scheduling must: –Keep track of how many.
OPERATING SYSTEMS CS 3530 Summer 2014 Systems and Models Chapter 03.
Non-Preemptive Buffer Management for Latency Sensitive Packets Moran Feldman Technion Seffi Naor Technion.
Algorithmic Mechanism Design Shuchi Chawla 11/7/2001.
Stochastic Optimization for Markov Modulated Networks with Application to Delay Constrained Wireless Scheduling Michael J. Neely University of Southern.
Delay Analysis for Max Weight Opportunistic Scheduling in Wireless Systems Michael J. Neely --- University of Southern California
Matthew Andrews Bell Labs Joint with Lisa Zhang February 16, 2006 Theory of Mobile Communication.
Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California
04/02/08 1 Packet Scheduling IT610 Prof. A. Sahoo KReSIT.
Scheduling Algorithms for Multi-Carrier Wireless Data Systems
R. Srikant University of Illinois at Urbana-Champaign
Howard Huang, Sivarama Venkatesan, and Harish Viswanathan
Scheduling in Wireless Communication Systems
IEEE Student Paper Contest
Scheduling Algorithms in Broad-Band Wireless Networks
Throughput-Optimal Broadcast in Dynamic Wireless Networks
Javad Ghaderi, Tianxiong Ji and R. Srikant
Presented By Riaz (STD ID: )
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Matthew Andrews Bell Labs June 27, 2005 Scheduling High Speed Data in (Adversarial) Wireless Networks

Standard single server scheduling problem Choose queue/user to serve – Serve at rate C – Service rate constant in time & user independent Many scheduling algorithms – Weighted Fair Queueing, Earliest Deadline First, First In First Out server rate C

38.4kbps? Basic wireless data scheduling problem 614.4kbps? Choose queue/user – Serve distant user at 38.4kbps or close user at 614.4kbps – Service rates user dependent!!!! – Service rates change over time!!!! (user mobility, channel fading)

Example wireless technology –CDMA1x-EVDO Models –Infinitely backlogged queues vs external arrival process –Stochastic channels vs adversarial channels Scheduling results –How to achieve fairness? –How to maintain quality-of-service? –How to keep queues and delays small? Talk outline

Example Technology: CDMA1x-EVDO (Data Only) Data only – One user at a time. – Chosen user gets all system resources (power etc.) Results apply to most infrastructure based wireless data systems

EVDO continued DRC Time divided into 1.667ms slots (600 slots per second) time Mobile measures downlink signal-to-noise ratio (SNR) Calculates rate at which it can receive data Informs basestation in a Data Rate Control msg (DRC) Scheduler chooses user based on DRC values Potential values for DRC 0kbps 38.4kbps 76.8kbps 153.6kbps 307.2kbps 614.4kbps 921.6kbps 1.2Mbps 1.8Mbps 2.4Mbps Some issues:- For low DRC values, must reserve multiple slots Actual transmission rate may be higher than DRC (due to lucky decoding) EVDO Rev A – multiple users per slot – multiple flows per user

Wireless models

Wireless data scheduling model (models EV-DO) service rate vector (DRC 1 (t),…,DRC n (t)) Choose a queue/user to serve at time t – If we choose user i, serve at rate DRC i (t) Opportunistic scheduling: Serve user when DRC is high data arrival process DRC i (t) DRC j (t) t

Wireline: gigantic literature on end-to-end user-level scheduling –Only the simplest schemes get implemented Wireless: is it any different? –Probably… Scheduling research: should we bother? Wireline Router Deals with thousands of flows Am I the bottleneck? Easy to add capacity Scheduling interval ~1  s Wireless Basestation Deals with tens of flows I’m the bottleneck!! Hard to add capacity Scheduling interval ~1ms

Arrival model 1: Infinitely backlogged queues service rate vector (DRC 1 (t),…,DRC n (t)) Each user always has data to serve R i = long-term throughput of user i Want to optimize F(R 1,…, R n ) Proportional Fair – Optimize  i log R i

service rate vector (DRC 1 (t),…,DRC n (t)) Arrival model 2: External arrival process Arrival vector (a 1 (t),…,a n (t)) Want stability – Want bounded queues whenever possible Want small queues Want small delays arrival vector (a 1 (t),…,a n (t))

service rate vector (DRC 1 (t),…,DRC n (t)) Channel model 1: Stationary stochastic process Service rate vector determined by state of ergodic Markov chain M M(t)  (DRC 1 (t),…,DRC n (t))

Mobility Mobility destroys stationarity DRC i (t)

service rate vector (DRC 1 (t),…,DRC n (t)) Channel model 2: Adversarial process Service rate vector determined by adversary Adversary wants scheduler to do bad things Adversary enables worst-case analysis

Arrival model 1: Infinitely backlogged queues Channel model 1: Stationary stochastic process

Proportional Fair Metric Common objective – R i = long-run throughput of user i – Maximize  i log R i – “Doubling throughput of user i has same effect on metric as doubling throughput of user j ”

Scheduler used in practice… EV-DO scheduler - Proportional Fair (Tse) – r i (t) = service to user i at time t, (either 0 or DRC i (t)) – Prop fair maximizes  i log R i (t)

Intuitive analysis for Proportional Fair R1R1 R2R2 feasible rate region FF (Rigorous analysis by Agrawal-Subramanian, Kushner-Whiting, Stolyar)

Drawback with Proportional Fair Maximizing  i log R i gives no control to rates of individual users Sometimes want to provide minimum/maximum rate constraints to individual users Objective becomes Maximize  i log R i Subject to R i  R i min R i  R i max R1R1 R2R2 unconstrained rate region R1R1 R2R2 rate region with minrate constraints

PFMR (Prop Fair with min/max rate constraints) –Variables and Parameters R i (t) – average service rate (exponentially filtered) T i (t) – “token counter” –decremented by pckt size whenever pckt served –incremented at rate R i min when T i  0 –incremented at rate R i max when T i < 0 Prop Fair with rate constraints 0 service R i min A-Qian-Stolyar Similar objectives considered by Liu-Chong-Shroff

PFMR (Prop Fair with min/max rate constraints) –If R i min  R i (t)  R i max Token counter stays near zero, sched metric reverts to Prop Fair –If R i (t) < R i min Token counter drifts positive until user i satisfies min rate constraint –If R i (t) > R i max Token counter drifts negative until user i satisfies max rate constraint –If  a i   and system converges, then it converges to optimal soln Performance of PFMR 0 service R i min

Rmin 9.6kbps for all users (In practice set token counter to 1.2*R min) 40 users20 users 30 users 10 users 40 users20 users 30 users 10 users PFMR Prop Fair

28 users have Rmin 9.6kbps 2 users have Rmin 48kbps

PFMR (Prop Fair with min/max rate constraints) –Variables and Parameters R i (t) – average service rate (exponentially filtered) T i (t) – “token counter” –decremented by pckt size whenever pckt served –incremented at rate R i min when T i  0 –incremented at rate R i max when T i < 0 Penalty function method Comparison with “obvious” solution 0 service R i min PFMR provides min rate with less throughput loss !! e.g. If Prop Fair, by itself, provides min rate then PFMR acts same as Prop Fair Penalty function method has lower throughput than Prop Fair

R min = 20kbps Penalty Function PFMR with token rate R min PFMR with token rate 1.2 * R min

Arrival model 1: Infinitely backlogged queues Channel model 2: Adversarial process

Proportional Fair Metric Definition different for adversarial channels – R i (t) = total throughput of user i by time t – Objective: Maximize  i log R i (t) for all t – Recall: for stochastic channels, optimality possible

Results For adversarial channels with n users: – For any algorithm (online or offline), there exists rate vector sequence and time T s.t.  i log R i (T)   i log R i * (T) -  (n) – For any online algorithm, there exists rate vector sequence and time T s.t.  i log R i (T)   i log R i * (T) -  (n log n) – There exists online algorithm s.t. for all t and all rate vector sequences,  i log R i (t)   i log R i * (t) - O(n log n) A 2005

Time DRC 0 (t) DRC 1 (t) DRC n/2-1 (t) DRC n/2 (t) DRC n/2+1 (t) DRC n-1 (t) 0nn…n11…1 1nn…n11…1 2nn…n11…1 : n 2 /2-2nn…n11…1 n 2 /2-1nn…n11…1 Optimal schedule for time n 2 /2-1: assign each user n/2 slots n 2 /2 00…0nn…n n 2 /2+1 00…0nn…n n 2 /2+2 00…0nn…n : n …0nn…n n …0nn…n Optimal schedule for time n 2 -1: for first n 2 /2 slots, assign service equally among users 0,1,…,n/2-1 for remaining n 2 /2 slots, assign service equally among users n/2,n/2+1,…,n-1 For adversarial channels with n users: – For any algorithm (online or offline), there exists rate vector sequence and time T s.t.  i log R i (T)   i log R i * (T) -  (n) Lower Bound (1)

Time DRC 0 (t) DRC 1 (t) DRC 2 (t) DRC 3 (t) User 2 has received least amount of service from online alg User 0 has received least amount of service from online alg User 3 has received least amount of service from online alg For adversarial channels with n users: – For any online algorithm, there exists rate vector sequence and time T s.t.  i log R i (T)   i log R i * (T) -  (n log n) Lower Bound (2) OPT serves user 2 in time slots 0-1 user 0 in time slots 2-5 user 3 in time slots 6-13

There exists online algorithm s.t. for all t and all rate vector sequences,  i log R i (t)   i log R i * (t) - O(n log n) – Randomized algorithm: at each time step serve user chosen uniformly at random E[R i (T) ]   t DRC i (t) / n  R i * (t) / n log E[R i (T) ]  log R i * (t) - log n  i log E[R i (T) ]   i log R i * (t) - n log n – Algorithm can be derandomized Upper Bound

Arrival model 2: External arrival process

System Stability Want online algorithm that keeps system stable Proportional Fair is unstable!!! – Basic problem - Prop Fair does not consider queue sizes!!!!! Time Queue sizes

Instability of Proportional Fair DRC A (t) DRC B (t) a A (t) a B (t) Stable algorithm Assign ½ of B-biased slots to B Assign remaining slots to A svc rate of A  95, svc rate of B  50 B-biased slot Proportional fair Assigns all B-biased slots to B Assigns remaining slots to A svc rate of A  90, svc rate of B  100 A 2003

Arrival model 2: External arrival process Channel model 1: Stationary stochastic process

Stable algorithm Max Weight (See Tassiulas-Ephremides, Kahale-Wright, Neely-Modiano-Rohrs, Stolyar) – q i (t) = queuesize of user i at time t – Serve argmax i q i (t) * DRC i (t) – Potential function  i q i (t) 2 has negative drift – Queues remain stable!!!

Arrival model 2: External arrival process Channel model 2: Adversarial process

The adversary At time t adversary generates – DRC vector (DRC 1 (t),…,DRC n (t)) – Arrival vector (a 1 (t),…,a n (t)) – Its “own” schedule X (t) Admissibility: – For each time window [ ,  +w), (1-  )  t  [ ,  +w):X(t)=i DRC i (t)   t  [ ,  +w) a i (t) – i.e. there exists a stable schedule arrival vector (a 1 (t),…,a n (t)) DRC vector (DRC 1 (t),…,DRC n (t)) known to online algorithm

Instability No online algorithm is stable f(x) = smooth, convex, increasing, unbounded function, e.g. x k Can force potential function  i f(q i (t)) to be unbounded AZ 2002

Instability Two users, 0 and 1 – DRC vector satisfies – If online algorithm serves user 0 a 0 (t) = 0 a 1 (t) = (1-  )DRC 1 (t) – If online algorithm serves user 1 a 0 (t) = (1-  )DRC 0 (t) a 1 (t) = 0 – Online algorithm always serves “wrong” user f always increases Remark – Rate set = set of all DRC values is infinite algorithm adversary algorithm adversary

Stable algorithm Is stability possible for finite rate set? – Yes Bad situation: – Online alg. keeps serving i but adv. keeps serving j Intuition – Track adversary’s schedule in past Look at past DRCs and past arrivals – Try and “copy” the adversary AZ 2002

Tracking Algorithms Linear Tracking Algorithm – Counter C i (r) for each user i and DRC value r – Serve j=argmax i C i (DRC i (t)) – Decrease C j (DRC j (t)) by 1 – Calculate adversary’s schedule X(s) for some s  t – Increase C X(s) (DRC X(s) (t)) by 1 – Stable…? Don’t know… Quadratic Tracking Algorithm – Counters for pairs of users. Stable with polynomial queues Adv serves 1 Trk serves 0 DRC process: (5,3) (3,10) (4,6) (1,0) (7,4) time s time t C 0 (7) - - C 1 (10) + +

Stability How do we compute adversary’s schedule? – Need schedule X(t) such that admissibility condition holds (1-  )  t  [ ,  +w):X(t)=i DRC i (t)   t  [ ,  +w) a i (t) – Problem: this is NP-hard to compute – Fix: can run tracking algorithm against a fractional schedule x(t) = (x 1 (t),…,x n (t)) such that (1-  )  t  [ ,  +w) x i (t) DRC i (t)   t  [ ,  +w) a i (t) 0  x i (t)  1  i x i (t) = 1

Max Weight – q i (t) = queuesize of user i at time t – Serve argmax i q i (t) * DRC i (t) – Stable with finite rate set...? Don’t know... – Max Weight produces “exponential queues” – Queuesize > 2 N for N < U rateset – U EVDO-rateset = 2048 AZ 2004

Max Weight DRC 0 (t)DRC 1 (t)DRC 2 (t)DRC 3 (t) : : Build up user 1 queue a 0 (t) = 64 a 2 (t) = 1 a 1 (t) = 1 a 3 (t) = 1 Build up user 2 queue Build up user 3 queue

Summary The model matters – Do we assume users with large backlogs or do we want to serve an external arrival process? – Do we assume a smooth stationary channel process or do we assume an unpredictable adversarial channel process Infinite backlogs, stationary channels – Prop Fair and PFMR allocate thruputs fairly subject to bounds on user performance Infinite backlogs, adversarial channels – Cannot beat simple random algorithm External arrival process, stationary channels – Prop Fair not stable, MaxWeight maintains stability External arrival process, adversarial channels – Stability not always possible. Tracking algorithm gives stability when possible