-
Distributed Learning for Proportional-Fair Resource Allocation in Coexisting WiFi Networks
Authors:
Piotr Gawłowicz,
Jean Walrand,
Adam Wolisz
Abstract:
In this paper, we revisit the widely known performance anomaly that results in severe network utility degradation in WiFi networks when nodes use diverse modulation and coding schemes. The proportional-fair allocation was shown to mitigate this anomaly and provide a good throughput to the stations. It can be achieved through the selection of contention window values based on the explicit solution…
▽ More
In this paper, we revisit the widely known performance anomaly that results in severe network utility degradation in WiFi networks when nodes use diverse modulation and coding schemes. The proportional-fair allocation was shown to mitigate this anomaly and provide a good throughput to the stations. It can be achieved through the selection of contention window values based on the explicit solution of an optimization problem or, as proposed recently, by following a learning-based approach that uses a centralized gradient descent algorithm. In this paper, we leverage our recent theoretical work on asynchronous distributed optimization and propose a simple algorithm that allows WiFi nodes to independently tune their contention window to achieve proportional fairness. We compare the throughputs and air-time allocation that this algorithm achieves to those of the standard WiFi binary exponential back-off and show the improvements.
△ Less
Submitted 9 February, 2021;
originally announced February 2021.
-
An Architecture for In-Vehicle Network
Authors:
Jean Walrand,
Max Turner,
Roy Myers
Abstract:
As vehicles get equipped with increasingly complex sensors and processors, the communication requirements become more demanding. Traditionally, vehicles have used specialized networking technologies designed to guarantee bounded latencies, such as the Controller Area Network (CAN) bus. Recently, some have used dedicated technologies to transport signals from cameras, lidars, radars, and ultrasonic…
▽ More
As vehicles get equipped with increasingly complex sensors and processors, the communication requirements become more demanding. Traditionally, vehicles have used specialized networking technologies designed to guarantee bounded latencies, such as the Controller Area Network (CAN) bus. Recently, some have used dedicated technologies to transport signals from cameras, lidars, radars, and ultrasonic sensors. In parallel, IEEE working groups are defining Ethernet standards for time-sensitive networks (TSN). This paper describes an Ethernet-based architecture with provable guaranteed performance and simple configuration that is suitable for supporting the communication requirements of many vehicles.
△ Less
Submitted 21 December, 2020;
originally announced December 2020.
-
Convergence of a Distributed Kiefer-Wolfowitz Algorithm
Authors:
Jean Walrand
Abstract:
This paper proposes a proof of the convergence of a distributed and asynchronous version of the Kiefer-Wolfowitz algorithm.
This paper proposes a proof of the convergence of a distributed and asynchronous version of the Kiefer-Wolfowitz algorithm.
△ Less
Submitted 28 August, 2020;
originally announced August 2020.
-
Robust Scheduling for Flexible Processing Networks
Authors:
Ramtin Pedarsani,
Jean Walrand,
Yuan Zhong
Abstract:
Modern processing networks often consist of heterogeneous servers with widely varying capabilities, and process job flows with complex structure and requirements. A major challenge in designing efficient scheduling policies in these networks is the lack of reliable estimates of system parameters, and an attractive approach for addressing this challenge is to design robust policies, i.e., policies…
▽ More
Modern processing networks often consist of heterogeneous servers with widely varying capabilities, and process job flows with complex structure and requirements. A major challenge in designing efficient scheduling policies in these networks is the lack of reliable estimates of system parameters, and an attractive approach for addressing this challenge is to design robust policies, i.e., policies that do not use system parameters such as arrival and/or service rates for making scheduling decisions. In this paper, we propose a general framework for the design of robust policies. The main technical novelty is the use of a stochastic gradient projection method that reacts to queue-length changes in order to find a balanced allocation of service resources to incoming tasks. We illustrate our approach on two broad classes of processing systems, namely the flexible fork-join networks and the flexible queueing networks, and prove the rate stability of our proposed policies for these networks under non-restrictive assumptions.
△ Less
Submitted 12 October, 2016;
originally announced October 2016.
-
Knowledge-Defined Networking
Authors:
Albert Mestres,
Alberto Rodriguez-Natal,
Josep Carner,
Pere Barlet-Ros,
Eduard Alarcón,
Marc Solé,
Victor Muntés,
David Meyer,
Sharon Barkai,
Mike J Hibbett,
Giovani Estrada,
Khaldun Ma`ruf,
Florin Coras,
Vina Ermagan,
Hugo Latapie,
Chris Cassar,
John Evans,
Fabio Maino,
Jean Walrand,
Albert Cabellos
Abstract:
The research community has considered in the past the application of Artificial Intelligence (AI) techniques to control and operate networks. A notable example is the Knowledge Plane proposed by D.Clark et al. However, such techniques have not been extensively prototyped or deployed in the field yet. In this paper, we explore the reasons for the lack of adoption and posit that the rise of two rece…
▽ More
The research community has considered in the past the application of Artificial Intelligence (AI) techniques to control and operate networks. A notable example is the Knowledge Plane proposed by D.Clark et al. However, such techniques have not been extensively prototyped or deployed in the field yet. In this paper, we explore the reasons for the lack of adoption and posit that the rise of two recent paradigms: Software-Defined Networking (SDN) and Network Analytics (NA), will facilitate the adoption of AI techniques in the context of network operation and control. We describe a new paradigm that accommodates and exploits SDN, NA and AI, and provide use cases that illustrate its applicability and benefits. We also present simple experimental results that support its feasibility. We refer to this new paradigm as Knowledge-Defined Networking (KDN).
△ Less
Submitted 23 June, 2016; v1 submitted 20 June, 2016;
originally announced June 2016.
-
An Approximate Dynamic Programming Approach to Adversarial Online Learning
Authors:
Vijay Kamble,
Patrick Loiseau,
Jean Walrand
Abstract:
We describe an approximate dynamic programming (ADP) approach to compute approximations of the optimal strategies and of the minimal losses that can be guaranteed in discounted repeated games with vector-valued losses. Such games prominently arise in the analysis of regret in repeated decision-making in adversarial environments, also known as adversarial online learning. At the core of our approac…
▽ More
We describe an approximate dynamic programming (ADP) approach to compute approximations of the optimal strategies and of the minimal losses that can be guaranteed in discounted repeated games with vector-valued losses. Such games prominently arise in the analysis of regret in repeated decision-making in adversarial environments, also known as adversarial online learning. At the core of our approach is a characterization of the lower Pareto frontier of the set of expected losses that a player can guarantee in these games as the unique fixed point of a set-valued dynamic programming operator. When applied to the problem of regret minimization with discounted losses, our approach yields algorithms that achieve markedly improved performance bounds compared to off-the-shelf online learning algorithms like Hedge. These results thus suggest the significant potential of ADP-based approaches in adversarial online learning.
△ Less
Submitted 26 October, 2020; v1 submitted 16 March, 2016;
originally announced March 2016.
-
Parametric Prediction from Parametric Agents
Authors:
Yuan Luo,
Nihar B. Shah,
Jianwei Huang,
Jean Walrand
Abstract:
We consider a problem of prediction based on opinions elicited from heterogeneous rational agents with private information. Making an accurate prediction with a minimal cost requires a joint design of the incentive mechanism and the prediction algorithm. Such a problem lies at the nexus of statistical learning theory and game theory, and arises in many domains such as consumer surveys and mobile c…
▽ More
We consider a problem of prediction based on opinions elicited from heterogeneous rational agents with private information. Making an accurate prediction with a minimal cost requires a joint design of the incentive mechanism and the prediction algorithm. Such a problem lies at the nexus of statistical learning theory and game theory, and arises in many domains such as consumer surveys and mobile crowdsourcing. In order to elicit heterogeneous agents' private information and incentivize agents with different capabilities to act in the principal's best interest, we design an optimal joint incentive mechanism and prediction algorithm called COPE (COst and Prediction Elicitation), the analysis of which offers several valuable engineering insights. First, when the costs incurred by the agents are linear in the exerted effort, COPE corresponds to a "crowd contending" mechanism, where the principal only employs the agent with the highest capability. Second, when the costs are quadratic, COPE corresponds to a "crowd-sourcing" mechanism that employs multiple agents with different capabilities at the same time. Numerical simulations show that COPE improves the principal's profit and the network profit significantly (larger than 30% in our simulations), comparing to those mechanisms that assume all agents have equal capabilities.
△ Less
Submitted 24 February, 2016;
originally announced February 2016.
-
Monotonic Preference Aggregation Mechanisms for Purchasing a Shareable Resource
Authors:
Vijay Kamble,
Jean Walrand
Abstract:
Situations where a group of agents come together to jointly buy a resource that they individually cannot afford to buy are commonly observed in markets. For example in the US market for radio spectrum, a recent proposal invited small firms who would benefit from gaining additional access to spectrum to jointly submit bids for blocks of spectrum with the idea that its utilization could be shared. I…
▽ More
Situations where a group of agents come together to jointly buy a resource that they individually cannot afford to buy are commonly observed in markets. For example in the US market for radio spectrum, a recent proposal invited small firms who would benefit from gaining additional access to spectrum to jointly submit bids for blocks of spectrum with the idea that its utilization could be shared. In such a scenario, the problem is to design a mechanism that truthfully elicits and aggregates the privately held preferences of these agents, and enables them to act as a single decision-making body in order to participate in the market. In this paper, we design a class of mechanisms called monotonic aggregation mechanisms that achieves this under a specific setting. We assume that the resource is being sold in a sealed-bid second-price auction that solicits bids for the entire resource. Our mechanism truthfully elicits utility functions from the buyers, prescribes a joint bid, and prescribes a division of the payment and the resource in the event that they win the resource in the auction. This mechanism further satisfies a popular notion of collusion-resistance known as coalition-strategyproofness. We give two explicit examples of this generic class for the case where the utility functions of the buyers are non-decreasing and concave.
△ Less
Submitted 6 March, 2015; v1 submitted 28 July, 2014;
originally announced July 2014.
-
Motivating Smartphone Collaboration in Data Acquisition and Distributed Computing
Authors:
Lingjie Duan,
Takeshi Kubo,
Kohei Sugiyama,
Jianwei Huang,
Teruyuki Hasegawa,
Jean Walrand
Abstract:
This paper analyzes and compares different incentive mechanisms for a master to motivate the collaboration of smartphone users on both data acquisition and distributed computing applications. To collect massive sensitive data from users, we propose a reward-based collaboration mechanism, where the master announces a total reward to be shared among collaborators, and the collaboration is successful…
▽ More
This paper analyzes and compares different incentive mechanisms for a master to motivate the collaboration of smartphone users on both data acquisition and distributed computing applications. To collect massive sensitive data from users, we propose a reward-based collaboration mechanism, where the master announces a total reward to be shared among collaborators, and the collaboration is successful if there are enough users wanting to collaborate. We show that if the master knows the users' collaboration costs, then he can choose to involve only users with the lowest costs. However, without knowing users' private information, then he needs to offer a larger total reward to attract enough collaborators. Users will benefit from knowing their costs before the data acquisition. Perhaps surprisingly, the master may benefit as the variance of users' cost distribution increases.
To utilize smartphones' computation resources to solve complex computing problems, we study how the master can design an optimal contract by specifying different task-reward combinations for different user types. Under complete information, we show that the master involves a user type as long as the master's preference characteristic outweighs that type's unit cost. All collaborators achieve a zero payoff in this case. If the master does not know users' private cost information, however, he will conservatively target at a smaller group of users with small costs, and has to give most benefits to the collaborators.
△ Less
Submitted 26 January, 2014;
originally announced January 2014.
-
Fluid limits to analyze long-term flow rates of a stochastic network with ingress discarding
Authors:
John Musacchio,
Jean Walrand
Abstract:
We study a simple rate control scheme for a multiclass queuing network for which customers are partitioned into distinct flows that are queued separately at each station. The control scheme discards customers that arrive to the network ingress whenever any one of the flow's queues throughout the network holds more than a specified threshold number of customers. We prove that if the state of a corr…
▽ More
We study a simple rate control scheme for a multiclass queuing network for which customers are partitioned into distinct flows that are queued separately at each station. The control scheme discards customers that arrive to the network ingress whenever any one of the flow's queues throughout the network holds more than a specified threshold number of customers. We prove that if the state of a corresponding fluid model tends to a set where the flow rates are equal to target rates, then there exist sufficiently high thresholds that make the long-term average flow rates of the stochastic network arbitrarily close to these target rates. The same techniques could be used to study other control schemes. To illustrate the application of our results, we analyze a network resembling a 2-input, 2-output communications network switch.
△ Less
Submitted 15 July, 2013;
originally announced July 2013.
-
Approximately Optimal Scheduling of an M/G/1 Queue with Heavy Tails
Authors:
Vijay Kamble,
Jean Walrand
Abstract:
Distributions with a heavy tail are difficult to estimate. If the design of a scheduling policy is sensitive to the details of heavy tail distributions of the service times, an approximately optimal solution is difficult to obtain. This paper shows that the optimal scheduling of an M/G/1 queue with heavy tailed service times does not present this difficulty and that an approximately optimal strate…
▽ More
Distributions with a heavy tail are difficult to estimate. If the design of a scheduling policy is sensitive to the details of heavy tail distributions of the service times, an approximately optimal solution is difficult to obtain. This paper shows that the optimal scheduling of an M/G/1 queue with heavy tailed service times does not present this difficulty and that an approximately optimal strategy can be derived by truncating the distributions.
△ Less
Submitted 24 July, 2015; v1 submitted 28 February, 2013;
originally announced March 2013.
-
Stability of Multiclass Queueing Networks under Longest-Queue and Longest-Dominating-Queue Scheduling
Authors:
Ramtin Pedarsani,
Jean Walrand
Abstract:
We consider the stability of robust scheduling policies for multiclass queueing networks. These are open networks with arbitrary routing matrix and several disjoint groups of queues in which at most one queue can be served at a time. The arrival and potential service processes and routing decisions at the queues are independent, stationary and ergodic. A scheduling policy is called robust if it do…
▽ More
We consider the stability of robust scheduling policies for multiclass queueing networks. These are open networks with arbitrary routing matrix and several disjoint groups of queues in which at most one queue can be served at a time. The arrival and potential service processes and routing decisions at the queues are independent, stationary and ergodic. A scheduling policy is called robust if it does not depend on the arrival and service rates nor on the routing probabilities. A policy is called throughput-optimal if it makes the system stable whenever the parameters are such that the system can be stable. We propose two robust polices: longest-queue scheduling and a new policy called longest-dominating-queue scheduling. We show that longest-queue scheduling is throughput-optimal for two groups of two queues. We also prove the throughput-optimality of longest-dominating-queue scheduling when the network topology is acyclic, for an arbitrary number of groups and queues.
△ Less
Submitted 10 May, 2015; v1 submitted 28 December, 2012;
originally announced December 2012.
-
A Benes Packet Network
Authors:
Longbo Huang,
Jean Walrand
Abstract:
Benes networks are constructed with simple switch modules and have many advantages, including small latency and requiring only an almost linear number of switch modules. As circuit-switches, Benes networks are rearrangeably non-blocking, which implies that they are full-throughput as packet switches, with suitable routing.
Routing in Benes networks can be done by time-sharing permutations. Howev…
▽ More
Benes networks are constructed with simple switch modules and have many advantages, including small latency and requiring only an almost linear number of switch modules. As circuit-switches, Benes networks are rearrangeably non-blocking, which implies that they are full-throughput as packet switches, with suitable routing.
Routing in Benes networks can be done by time-sharing permutations. However, this approach requires centralized control of the switch modules and statistical knowledge of the traffic arrivals. We propose a backpressure-based routing scheme for Benes networks, combined with end-to-end congestion control. This approach achieves the maximal utility of the network and requires only four queues per module, independently of the size of the network.
△ Less
Submitted 2 August, 2012;
originally announced August 2012.
-
Incentive Mechanisms based on Minority Game in Heterogeneous DTNs
Authors:
Habib B. A. Sidi,
Wissam Chahin,
Rachid El-Azouzi,
Francesco De Pellegrini,
Jean Walrand
Abstract:
In this paper we design an incentive mechanism for heterogeneous Delay Tolerant Networks (DTNs). The proposed mechanism tackles a core problem of such systems: how to induce coordination of DTN relays in order to achieve a target performance figure, e.g., delivery probability or end-to-end delay, under a given constraint in term of network resources, e.g., number of active nodes or energy consumpt…
▽ More
In this paper we design an incentive mechanism for heterogeneous Delay Tolerant Networks (DTNs). The proposed mechanism tackles a core problem of such systems: how to induce coordination of DTN relays in order to achieve a target performance figure, e.g., delivery probability or end-to-end delay, under a given constraint in term of network resources, e.g., number of active nodes or energy consumption. Also, we account for the realistic case when the cost for taking part in the forwarding process varies with the devices' technology or the users' habits. Finally, the scheme is truly applicable to DTNs since it works with no need for end-to-end connectivity.
In this context, we first introduce the basic coordination mechanism leveraging the notion of a Minority Game. In this game, relays compete to be in the population minority and their utility is defined in combination with a rewarding mechanism. The rewards in turn configure as a control by which the network operator controls the desired operating point for the DTN. To this aim, we provide a full characterization of the equilibria of the game in the case of heterogeneous DTNs. Finally, a learning algorithm based on stochastic approximations provably drives the system to the equilibrium solution without requiring perfect state information at relay nodes or at the source node and without using end-to-end communications to implement the rewarding scheme. We provide extensive numerical results to validate the proposed scheme.
△ Less
Submitted 10 April, 2013; v1 submitted 29 July, 2012;
originally announced July 2012.
-
Optimal Demand Response with Energy Storage Management
Authors:
Longbo Huang,
Jean Walrand,
Kannan Ramchandran
Abstract:
In this paper, we consider the problem of optimal demand response and energy storage management for a power consuming entity. The entity's objective is to find an optimal control policy for deciding how much load to consume, how much power to purchase from/sell to the power grid, and how to use the finite capacity energy storage device and renewable energy, to minimize his average cost, being the…
▽ More
In this paper, we consider the problem of optimal demand response and energy storage management for a power consuming entity. The entity's objective is to find an optimal control policy for deciding how much load to consume, how much power to purchase from/sell to the power grid, and how to use the finite capacity energy storage device and renewable energy, to minimize his average cost, being the disutility due to load- shedding and cost for purchasing power. Due to the coupling effect of the finite size energy storage, such problems are challenging and are typically tackled using dynamic programming, which is often complex in computation and requires substantial statistical information of the system dynamics. We instead develop a low-complexity algorithm called Demand Response with Energy Storage Management (DR-ESM). DR-ESM does not require any statistical knowledge of the system dynamics, including the renewable energy and the power prices. It only requires the entity to solve a small convex optimization program with 6 variables and 6 linear constraints every time for decision making. We prove that DR-ESM is able to achieve near-optimal performance and explicitly compute the required energy storage size.
△ Less
Submitted 19 May, 2012;
originally announced May 2012.
-
Optimal Power Procurement and Demand Response with Quality-of-Usage Guarantees
Authors:
Longbo Huang,
Jean Walrand,
Kannan Ramchandran
Abstract:
In this paper, we propose a general operating scheme which allows the utility company to jointly perform power procurement and demand response so as to maximize the social welfare. Our model takes into consideration the effect of the renewable energy and the multi-stage feature of the power procurement process. It also enables the utility company to provide quality-of-usage (QoU) guarantee to the…
▽ More
In this paper, we propose a general operating scheme which allows the utility company to jointly perform power procurement and demand response so as to maximize the social welfare. Our model takes into consideration the effect of the renewable energy and the multi-stage feature of the power procurement process. It also enables the utility company to provide quality-of-usage (QoU) guarantee to the power consumers, which ensures that the average power usage level meets the target value for each user. To maximize the social welfare, we develop a low-complexity algorithm called the \emph{welfare maximization algorithm} (WMA), which performs joint power procurement and dynamic pricing. WMA is constructed based on a two-timescale Lyapunov optimization technique. We prove that WMA achieves a close-to-optimal utility and ensures that the QoU requirement is met with bounded deficit. WMA can be implemented in a distributed manner and is robust with respect to system dynamics uncertainty.
△ Less
Submitted 3 December, 2011;
originally announced December 2011.
-
Approaching Throughput-optimality in Distributed CSMA Scheduling Algorithms with Collisions
Authors:
Libin Jiang,
Jean Walrand
Abstract:
It was shown recently that CSMA (Carrier Sense Multiple Access)-like distributed algorithms can achieve the maximal throughput in wireless networks (and task processing networks) under certain assumptions. One important, but idealized assumption is that the sensing time is negligible, so that there is no collision. In this paper, we study more practical CSMA-based scheduling algorithms with collis…
▽ More
It was shown recently that CSMA (Carrier Sense Multiple Access)-like distributed algorithms can achieve the maximal throughput in wireless networks (and task processing networks) under certain assumptions. One important, but idealized assumption is that the sensing time is negligible, so that there is no collision. In this paper, we study more practical CSMA-based scheduling algorithms with collisions. First, we provide a Markov chain model and give an explicit throughput formula which takes into account the cost of collisions and overhead. The formula has a simple form since the Markov chain is "almost" time-reversible. Second, we propose transmission-length control algorithms to approach throughput optimality in this case. Sufficient conditions are given to ensure the convergence and stability of the proposed algorithms. Finally, we characterize the relationship between the CSMA parameters (such as the maximum packet lengths) and the achievable capacity region.
△ Less
Submitted 16 November, 2010;
originally announced November 2010.
-
Fast Mixing of Parallel Glauber Dynamics and Low-Delay CSMA Scheduling
Authors:
Libin Jiang,
Mathieu Leconte,
Jian Ni,
R. Srikant,
Jean Walrand
Abstract:
Glauber dynamics is a powerful tool to generate randomized, approximate solutions to combinatorially difficult problems. It has been used to analyze and design distributed CSMA (Carrier Sense Multiple Access) scheduling algorithms for multi-hop wireless networks. In this paper we derive bounds on the mixing time of a generalization of Glauber dynamics where multiple links are allowed to update the…
▽ More
Glauber dynamics is a powerful tool to generate randomized, approximate solutions to combinatorially difficult problems. It has been used to analyze and design distributed CSMA (Carrier Sense Multiple Access) scheduling algorithms for multi-hop wireless networks. In this paper we derive bounds on the mixing time of a generalization of Glauber dynamics where multiple links are allowed to update their states in parallel and the fugacity of each link can be different. The results can be used to prove that the average queue length (and hence, the delay) under the parallel Glauber dynamics based CSMA grows polynomially in the number of links for wireless networks with bounded-degree interference graphs when the arrival rate lies in a fraction of the capacity region. We also show that in specific network topologies, the low-delay capacity region can be further improved.
△ Less
Submitted 2 August, 2010;
originally announced August 2010.
-
Optimism in Games with Non-Probabilistic Uncertainty
Authors:
Jiwoong Lee,
Jean Walrand
Abstract:
The paper studies one-shot two-player games with non-Bayesian uncertainty. The players have an attitude that ranges from optimism to pessimism in the face of uncertainty. Given the attitudes, each player forms a belief about the set of possible strategies of the other player. If these beliefs are consistent, one says that they form an uncertainty equilibrium. One then considers a two-phase game wh…
▽ More
The paper studies one-shot two-player games with non-Bayesian uncertainty. The players have an attitude that ranges from optimism to pessimism in the face of uncertainty. Given the attitudes, each player forms a belief about the set of possible strategies of the other player. If these beliefs are consistent, one says that they form an uncertainty equilibrium. One then considers a two-phase game where the players first choose their attitude and then play the resulting game. The paper illustrates these notions with a number of games where the approach provides a new insight into the plausible strategies of the players.
△ Less
Submitted 4 April, 2010; v1 submitted 19 December, 2009;
originally announced December 2009.
-
Distributed Random Access Algorithm: Scheduling and Congesion Control
Authors:
Libin Jiang,
Devavrat Shah,
**woo Shin,
Jean Walrand
Abstract:
This paper provides proofs of the rate stability, Harris recurrence, and epsilon-optimality of CSMA algorithms where the backoff parameter of each node is based on its backlog. These algorithms require only local information and are easy to implement.
The setup is a network of wireless nodes with a fixed conflict graph that identifies pairs of nodes whose simultaneous transmissions conflict. T…
▽ More
This paper provides proofs of the rate stability, Harris recurrence, and epsilon-optimality of CSMA algorithms where the backoff parameter of each node is based on its backlog. These algorithms require only local information and are easy to implement.
The setup is a network of wireless nodes with a fixed conflict graph that identifies pairs of nodes whose simultaneous transmissions conflict. The paper studies two algorithms. The first algorithm schedules transmissions to keep up with given arrival rates of packets. The second algorithm controls the arrivals in addition to the scheduling and attempts to maximize the sum of the utilities of the flows of packets at the different nodes. For the first algorithm, the paper proves rate stability for strictly feasible arrival rates and also Harris recurrence of the queues. For the second algorithm, the paper proves the epsilon-optimality. Both algorithms operate with strictly local information in the case of decreasing step sizes, and operate with the additional information of the number of nodes in the network in the case of constant step size.
△ Less
Submitted 7 July, 2009;
originally announced July 2009.
-
Design and Analysis of an Asynchronous Zero Collision MAC Protocol
Authors:
Jiwoong Lee,
Jean C. Walrand
Abstract:
This paper proposes and analyzes a distributed MAC protocol that achieves zero collision with no control message exchange nor synchronization. ZC (ZeroCollision) is neither reservation-based nor dynamic TDMA; the protocol supports variable-length packets and does not lose efficiency when some of the stations do not transmit. At the same time, ZC is not a CSMA; in its steady state, it is complete…
▽ More
This paper proposes and analyzes a distributed MAC protocol that achieves zero collision with no control message exchange nor synchronization. ZC (ZeroCollision) is neither reservation-based nor dynamic TDMA; the protocol supports variable-length packets and does not lose efficiency when some of the stations do not transmit. At the same time, ZC is not a CSMA; in its steady state, it is completely collision-free. The stations transmit repeatedly in a round-robin order once the convergence state is reached. If some stations skip their turn, their transmissions are replaced by idle $20 μ$-second mini-slots that enable the other stations to keep track of their order. Because of its short medium access delay and its efficiency, the protocol supports both real-time and elastic applications. The protocol allows for nodes leaving and joining the network; it can allocate more throughput to specific nodes (such as an access point). The protocol is robust against carrier sensing errors or clock drift. While collision avoidance is guaranteed in a single collision domain, it is not the case in a multiple collision one. However, experiments show ZC supports a comparable amount of goodput to CSMA in a multiple collision domain environment. The paper presents an analysis and extensive simulations of the protocol, confirming that ZC outperforms both CSMA and TDMA at high and low load.
△ Less
Submitted 21 June, 2008;
originally announced June 2008.
-
Distributed Fair Scheduling Using Variable Transmission Lengths in Carrier-Sensing-based Wireless Networks
Authors:
Libin Jiang,
Jean Walrand
Abstract:
The fairness of IEEE 802.11 wireless networks (including Wireless LAN and Ad-hoc networks) is hard to predict and control because of the randomness and complexity of the MAC contentions and dynamics. Moreover, asymmetric channel conditions such as those caused by capture and channel errors often lead to severe unfairness among stations. In this paper we propose a novel distributed scheduling alg…
▽ More
The fairness of IEEE 802.11 wireless networks (including Wireless LAN and Ad-hoc networks) is hard to predict and control because of the randomness and complexity of the MAC contentions and dynamics. Moreover, asymmetric channel conditions such as those caused by capture and channel errors often lead to severe unfairness among stations. In this paper we propose a novel distributed scheduling algorithm that we call VLS, for ``{\em variable-length scheduling}'', that provides weighted fairness to all stations despite the imperfections of the MAC layer and physical channels. Distinct features of VLS include the use of variable transmission lengths based on distributed observations, compatibility with 802.11's contention window algorithm, opportunistic scheduling to achieve high throughput in time-varying wireless environments, and flexibility and ease of implementation. Also, VLS makes the throughput of each station more smooth, which is appealing to real-time applications such as video and voice. Although the paper mostly assumes 802.11 protocol, the idea generally applies to wireless networks based on CSMA (Carrier Sensing Multiple Access).
△ Less
Submitted 12 December, 2007;
originally announced December 2007.