490 likes | 637 Views
MURI ADCN Workshop. John Doyle, Steven Low EAS, Caltech OSU, Columbus October 14, 2010. Post-docs Lijun Chen Krister Jacobsson Nader Motee Chee -Wei Tan. Grad students Masoud Fariva Javad Lavaei JK Nair Somayeh Sojoudi. Outline. Overview of Caltech projects ( 40 mins , Low)
E N D
MURI ADCN Workshop John Doyle, Steven Low EAS, Caltech OSU, Columbus October 14, 2010 Post-docs Lijun Chen KristerJacobsson Nader Motee Chee-Wei Tan Grad students MasoudFariva JavadLavaei JK Nair SomayehSojoudi
Outline • Overview of Caltech projects (40mins, Low) • Optimal wireless protocols and devices (40 mins, Lavaei)
Overview • Heavy-tailed traffic • File fragmentation to mitigate heavy-tailed delay • Tail-robust scheduling algorithms • Wireless • Random access game • Smart antenna design • Power control • Congestion control • Effect of ack-clocking • Reverse-engineering transients
Overview • Heavy-tailed traffic • File fragmentation to mitigate heavy-tailed delay • Tail-robust scheduling algorithms • Wireless • Random access game • Smart antenna design (JavadLavaei) • Power control • Congestion control • Effect of ack-clocking • Reverse-engineering transients
File fragmentation File fragmentation over an unreliable channel J. Nair, M. Andreasson, L. Andrew, S. Low and J. Doyle. IEEE Infocom, San Diego, CA, March 2010
File fragmentation: summary • Motivation: how to mitigate heavy tail? • Recent work showed file transfer time can be heavy-tailed even if file size is light-tailed (Fiorini, Sheahan, & Lipsky, 2005; Jelenkovic & Tan 2007; etc.) • Results • Independent or bounded fragmentation preserves light-tailedness • Constant fragmentation min expected delay • Asymptotically optimal design: blind fragmentation • Optimal or blind fragmentation preserves tail index
Model • Given file of random size L • L is fragmented into K packets for transmission at unit rate • n-th transmission of size • n-th transmission is successful if where are iid with distribution F constant overhead file fragment
Model fragment size at n remaining file size at time n+1 per-packet overhead iid random var of distrF
Model per-stage cost: total cost:
Prior work Theorem[Fiorini, Sheahan, & Lipsky, 2005; Jelenkovic & Tan 2007] Without fragmentation T(L) has heavy tail even when L is light-tailed, provided F has unbounded support
Result: LT-preserving frag independent fragmentation: bounded fragmentation: Theorem With independent frag or bounded frag: T(L) is light-tailed provided L is light-tailed Then, heavy-tailed delay originates only from heavy-tailed files
Result: optimal fragmentation per-bit cost: • Theorem • Constant fragmentation is uniquely optimal • Optimal #fragments: K*(L) = • Optimal fragment size: x*(L) = L/K*(L)
Result: blind fragmentation blind fragmentation: expected total cost: • Theorem • for allL • Blind fragmentation is asymptotically optimal
Result: tail distribution of T(L) optimal frag: blind frag: • Theorem • If L light-tailed, so is T(L) • If L RV(a) (heavy-tailed), so isT(L)
Overview • Heavy-tailed traffic • File fragmentation to mitigate heavy-tailed delay • Tail-robust scheduling algorithms • Wireless • Random access game • Smart antenna design (JavadLavaei) • Power control • Congestion control • Effect of ack-clocking • Reverse-engineering transients
Tail-robust scheduling Tail-robust scheduling via Limited Processor Sharing J. Nair, A. Wierman, and B. Zwart. Proc. IFIP Performance, 2010; to appear in Performance Evaluation
The “simplest” scheduling model Q: What policy minimizes mean response time? A: Shortest Remaining Processing Time (SRPT) Optimal regardless of interarrival times, job sizes, etc. Robust A Wierman
Q: Can a policy be optimal & robust for the tail? Lot’s of analysis over the last 20+ years… Power-law job sizes Light-tailed job sizes We’ll study the tail index: We’ll study the decay rate: A Wierman
Q: Can a policy be optimal & robust for the tail? Lot’s of analysis over the last 20+ years… Power-law sizes Light-tailed sizes SRPT Optimal [NWZ 08] Worst possible [NZ 06] Optimal [BBQZ 06] Worst possible [MZ 06] Worst possible [B76] Optimal [RS 01] Optimal [MT 80] Worst possible [NWZ 08] Worst possible [A99] Worst possible [N 07] PS FCFS PLCFS LCFS A Wierman
(non-learning) Q: Can a policy be optimal & robust for the tail? ^ A:NO! A Wierman
Theorem: There does not exist a work-conserving, online, non-learning scheduling policy ν that has: for all ε>0 and work-conserving, online policies πunder both light-tailed and power-law job sizes. Corollary: Optimal under power-laws worst-case under light-tails,and vice-versa A Wierman
(non-learning) (non-learning) Q: Can a policy be optimal & robust for the tail? ^ ^ A: NO! Q: Can a policy be weakly robust for the tail? better-than-worst-case under bothlight-tailed and power-law workloads A: No known policies are. A Wierman
Our candidate:Limited Processor Sharing, LPS(c) at most c jobs PS …but it uses ρ FCFS queue A Wierman is weakly robust and optimal for large classes of power-law and light-tailed distributions.
Response time tail gets lighter Power-law c Response time tail gets lighter Light-tailed c c=1FCFS c=∞PS A Wierman
better-than-worst-case Power-law kc ≥ 2 better-than-worst-case Light-tailed c < ∞ c=1FCFS c=∞PS A Wierman
better-than-worst-case Power-law optimal (if sizes have a finite variance) better-than-worst-case Light-tailed optimal (if sizes are more “variable” thanan Exponential dist.) c=1FCFS c=∞PS A Wierman
Overview • Heavy-tailed traffic • File fragmentation to mitigate heavy-tailed delay • Tail-robust scheduling algorithms • Wireless • Random access game • Smart antenna design (JavadLavaei) • Power control • Congestion control • Effect of ack-clocking • Reverse-engineering transients
Random access game Random Access Game and MAC Design, L. Chen, S. H. Low and J. C. Doyle, IEEE/ACM Transactions on Networking, 2010
Contention-based MAC (contention control) • Two components • A contention resolution algorithm: adjusts channel access probability in response to the contention • A feedback mechanism: updates a contention measureand sends it back to wireless nodes L. Chen
Dynamical model • The exact form of and are determined by or can be designed for the specific MAC protocol • Present a game-theoretic model to understand the dynamical system (1) and use it to design new protocols (1) L. Chen
Random access game fixed point • Only determined by the contention resolution algorithm • Usually continuous, increasing and concave
Definition: A random access game is defined as a quadruple • is a set of players (wireless nodes) • Strategy with • Payoff function with given contention measure • MAC (i.e., system (1)) as strategy update algorithm achieving the equilibrium of random access game • The equilibrium properties can be understood and designed through the specification of and • The adaptation of channel access probability can be specified through , corresponding to different strategies to approach the equilibrium.
Conditional collision probability as contention measure • Assumptions (single cell wireless LANs): • A0: is continuously differentiable, strictly concave, and with bounded curvature away from zero, i.e., • A1: let and denote the smallest eigenvalue of by . Then, . • A2: functions are all strictly increasing or all strictly decreasing
Equilibrium • Theorem: Under assumption A0, there exists a Nash equilibrium for random access game. Suppose additionally A1 holds. Then random access game has a unique Nash equilibrium. • A channel access probability is a Nash equilibrium of random access game, if • Proof: By showing the equilibrium condition is the optimality condition for a strictly convex optimization problem.
Nontrivial Nash Equilibrium • A Nash equilibrium is a nontrivial equilibrium if for all nodes , the equilibrium strategy satisfies and trivial equilibrium otherwise. • Theorem: Suppose A2 holds. If the random access game has a nontrivial Nash equilibrium, it must be unique. • Proof by contradiction: Note that a nontrivial Nash equilibrium
Definition: A Nash equilibrium is said to be symmetric if for all , and an asymmetric equilibrium otherwise. • By symmetry, there must have multiple asymmetric equilibria if there exists any. • Theorem: For a system with several classes of users, suppose A1 and A2 hold. If random access game has a nontrivial equilibrium, it must be unique and symmetric. • Guarantees fair sharing of wireless channel among the same class of wireless nodes • Provides service differentiation among different classes of wireless nodes
Gradient play • Have a nice economic interpretation • Theorem: Suppose A0 and A1 hold. The gradient play converges to the unique Nash equilibrium of the random access game if for any , the stepsize • Proof by Lyapunov method. • Also studied its robust verification to the estimation error.
A concrete MAC design • Consider a single-cell network with classes of users • Each class associated with a weight • Assume • Want to achieve maximal throughput under the weighted fairness constraint
Utility design • Let . Under the assumption of Poisson arrival, the throughput achieves maximum at that satisfies • the duration of idle slot, the duration of a collision • Under the decoupling approximation, to achieve weighted fairness requires
Requires • A convenient choice • Utility function
Equilibrium and dynamics • Theorem: Suppose • The random access game has a unique and nontrivial equilibrium • The gradient play converges if the stepsize
A natural progression Centralized optimization Optimization Distributed but cooperative actions with rich information and signaling allowed Less cooperation (economic perspective) Less information or signaling available (engineering perspective) Game theory
Overview • Heavy-tailed traffic • File fragmentation to mitigate heavy-tailed delay • Tail-robust scheduling algorithms • Wireless • Random access game • Smart antenna design (JavadLavaei) • Power control • Congestion control • Effect of ack-clocking • Reverse-engineering transients