Cross layer design in wireless multihop networks

advertisement
In this report we use Network Utility Maximization (NUM) Framework to study the
joint assignment of rate and reliability among sources in multi-hop wireless network.
Formulating the above problem in the NUM framework can lead to natural functional
decomposition into layers and distributed algorithms. The optimality is preserved
through messages passing between layers and local messages exchanging among
nodes. The framework reasons (joint) cross layer design. Heuristic layering turns out
to be solving a NUM optimization problem. This is so called “Layering as optimization
decomposition”. Especially, our problem leads to congestion control at transport
layer and the adaptive coding at the physical layer. The messages passing between
layers are congestion prices (Lagrange multipliers). Updating is performed
distributively using local messages.
Each source s has a utility function π‘ˆπ‘  (π‘₯𝑠 , 𝑅𝑠 ), where π‘₯𝑠 is an information data rate
and 𝑅𝑠 is the reliability of source s. We assume that the utility function is a
continuous, increasing, and concave function of π‘₯𝑠 and 𝑅𝑠 .
Each source s has its information data rate bounded between a minimum and a
maximum: π‘₯π‘ π‘šπ‘–π‘› and π‘₯π‘ π‘šπ‘Žπ‘₯ , and has a minimum reliability requirement 𝑅𝑠min .The
reliability of source s is defined as
𝑅𝑠 = 1 − 𝑝 𝑠
𝑑𝑙,𝑠 = π‘₯𝑠 /π‘Ÿπ‘™,𝑠
𝑝𝑙,𝑠 = 𝐸𝑙 (π‘Ÿπ‘™,𝑠 )
𝑝 𝑠 = 1 − ∏ (1 − 𝑝𝑙,𝑠 ) = 1 − ∏ (1 − 𝐸𝑙 (π‘Ÿπ‘™,𝑠 ))
𝑙∈𝐿(𝑠)
𝑙∈𝐿(𝑠)
Assume 𝑝𝑙,𝑠 β‰ͺ 1
𝑝 𝑠 ≈ ∑ 𝑝𝑙,𝑠 = ∑ 𝐸𝑙 (π‘Ÿπ‘™,𝑠 )
𝑙∈𝐿(𝑠)
𝑙∈𝐿(𝑠)
𝑅𝑠 ≈ 1 − ∑ 𝐸𝑙 (π‘Ÿπ‘™,𝑠 )
𝑙∈𝐿(𝑠)
𝑠
𝑝 is the end-to-end error probability
π‘Ÿπ‘™,𝑠 is the code rate of source s at link l
π‘₯𝑠 is the information data rate of source s
𝑑𝑙,𝑠 is the transmission data rate of source s at link l
𝑝𝑙,𝑠 is the error probability of source s at link l
𝐸𝑙 (π‘Ÿπ‘™,𝑠 ) is an increasing function of π‘Ÿπ‘™,𝑠 reflecting the rate-reliability trade-off
𝐿(𝑠) is the set of links used by source s
∑ 𝑑𝑙,𝑠 = ∑
𝑠∈𝑆(𝑙)
𝑠∈𝑆(𝑙)
π‘₯𝑠
≤ πΆπ‘™π‘šπ‘Žπ‘₯ , ∀𝑙
π‘Ÿπ‘™,𝑠
𝑆(𝑙) is the set of sources using link l
πΆπ‘™π‘šπ‘Žπ‘₯ is the capacity of link l
Assume π‘Ÿπ‘™,𝑠 = π‘Ÿπ‘™ , ∀𝑠 ∈ 𝑆(𝑙), ∀𝑙
maximize ∑𝑠 π‘ˆπ‘  (π‘₯𝑠 , 𝑅𝑠 )
subject to 𝑅𝑠 ≤ 1 − ∑π‘™πœ–πΏ(𝑠) 𝐸𝑙 (π‘Ÿπ‘™ ), ∀𝑠
π‘₯𝑠
∑
≤ πΆπ‘™π‘šπ‘Žπ‘₯ , ∀𝑙
π‘Ÿπ‘™
𝑠∈𝑆(𝑙)
π‘₯π‘ π‘šπ‘–π‘› ≤ π‘₯𝑠 ≤ π‘₯π‘ π‘šπ‘Žπ‘₯ , ∀𝑠
π‘…π‘ π‘šπ‘–π‘› ≤ 𝑅𝑠 ≤ 1, ∀𝑠
0 ≤ π‘Ÿπ‘™ ≤ 1, ∀𝑙
𝐿(𝐱, 𝐑, 𝐫, π›Œ, 𝛍) = ∑ π‘ˆπ‘  (π‘₯𝑠 , 𝑅𝑠 ) + ∑ πœ†π‘™ (π‘Ÿπ‘™ πΆπ‘™π‘šπ‘Žπ‘₯ − ∑ π‘₯𝑠 )
𝑠
𝑙
𝑠∈𝑆(𝑙)
+ ∑ πœ‡π‘  (1 − ∑ 𝐸𝑙 (π‘Ÿπ‘™ ) − 𝑅𝑠 )
𝑠
π‘™πœ–πΏ(𝑠)
= ∑ (π‘ˆπ‘  (π‘₯𝑠 , 𝑅𝑠 ) − ∑ πœ†π‘™ π‘₯𝑠 − πœ‡π‘  𝑅𝑠 )
𝑠
π‘™πœ–πΏ(𝑠)
+ ∑ (πœ†π‘™ π‘Ÿπ‘™ πΆπ‘™π‘šπ‘Žπ‘₯ − ∑ πœ‡π‘  𝐸𝑙 (π‘Ÿπ‘™ )) + ∑ πœ‡π‘ 
𝑙
𝑠∈𝑆(𝑙)
𝑠
= ∑(π‘ˆπ‘  (π‘₯𝑠 , 𝑅𝑠 ) − πœ†π‘  π‘₯𝑠 − πœ‡π‘  𝑅𝑠 ) + ∑(πœ†π‘™ π‘Ÿπ‘™ πΆπ‘™π‘šπ‘Žπ‘₯ − πœ‡ 𝑙 𝐸𝑙 (π‘Ÿπ‘™ ))
𝑠
𝑙
+ ∑ πœ‡π‘ 
𝑠
πœ†π‘  = ∑π‘™πœ–πΏ(𝑠) πœ†π‘™ and πœ‡ 𝑙 = ∑𝑠∈𝑆(𝑙) πœ‡π‘ 
πœ†π‘™ : the Lagrange multiplier on link l with an interpretation of “congestion price”, the
price per unit rate to use link l
πœ‡π‘  : the Lagrange multiplier on source s with an interpretation of “reliability price”,
the price per unit reliability that the source s must pay to the network
πœ†π‘  : with an interpretation of “end-to-end congestion price” on source s
πœ‡ 𝑙 : with an interpretation of “aggregate reliability price” paid by sources using link l
The Lagrange dual function is
𝑄(π›Œ, 𝛍) =
max
𝐱 min β‰Ό 𝐱 β‰Ό 𝐱 max
𝐑min β‰Ό 𝐑 β‰Ό 𝟏
πŸŽβ‰Όπ«β‰ΌπŸ
𝐿(𝐱, 𝐑, 𝐫, π›Œ, 𝛍)
The dual problem is
minimize 𝑄(π›Œ, 𝛍)
subject to π›Œ ≽ 𝟎
π›β‰½πŸŽ
Since the Lagrangian is separable, this maximization of the Lagrangian over (𝐱, 𝐑, 𝐫)
can be conducted in parallel at each source s
maximize π‘ˆπ‘  (π‘₯𝑠 , 𝑅𝑠 ) − πœ†π‘  π‘₯𝑠 − πœ‡π‘  𝑅𝑠
subject to π‘₯π‘ π‘šπ‘–π‘› ≤ π‘₯𝑠 ≤ π‘₯π‘ π‘šπ‘Žπ‘₯
π‘…π‘ π‘šπ‘–π‘› ≤ 𝑅𝑠 ≤ 1
and on each link l
maximize πœ†π‘™ π‘Ÿπ‘™ πΆπ‘™π‘šπ‘Žπ‘₯ − πœ‡ 𝑙 𝐸𝑙 (π‘Ÿπ‘™ )
subject to 0 ≤ π‘Ÿπ‘™ ≤ 1
dual problem can be solved by using the gradient projection algorithm as
+
πœ†π‘™ (𝑑 + 1) = [πœ†π‘™ (𝑑) − 𝛽(𝑑)(π‘Ÿπ‘™ (𝑑)πΆπ‘™π‘šπ‘Žπ‘₯ − ∑ π‘₯𝑠 (𝑑))] , ∀𝑙
𝑠∈𝑆(𝑙)
+
πœ‡π‘  (𝑑 + 1) = [πœ‡π‘  (𝑑) − 𝛽(𝑑)(1 − ∑ 𝐸𝑙 (π‘Ÿπ‘™ (𝑑)) − 𝑅𝑠 (𝑑))] , ∀𝑠
π‘™πœ–πΏ(𝑠)
𝛽(𝑑) is the step size.
Algorithm 1 for Integrated Dynamic Reliability Policy
Source problem and reliability price update at source s:
 Source problem
maximize π‘ˆπ‘  (π‘₯𝑠 , 𝑅𝑠 ) − πœ†π‘  (𝑑)π‘₯𝑠 − πœ‡π‘  (𝑑)𝑅𝑠
subject to π‘₯π‘ π‘šπ‘–π‘› ≤ π‘₯𝑠 ≤ π‘₯π‘ π‘šπ‘Žπ‘₯
π‘…π‘ π‘šπ‘–π‘› ≤ 𝑅𝑠 ≤ 1

Price update
πœ‡π‘  (𝑑 + 1) = [πœ‡π‘  (𝑑) − 𝛽(𝑑)(𝑅 𝑠 (𝑑) − 𝑅𝑠 (𝑑))]+
where 𝑅 𝑠 (𝑑) = 1 − ∑π‘™πœ–πΏ(𝑠) 𝐸𝑙 (π‘Ÿπ‘™ (𝑑)) is the end-to-end reliability at iteration t.
Link problem and congestion price update at link l:
 Link problem
maximize πœ†π‘™ (𝑑)π‘Ÿπ‘™ πΆπ‘™π‘šπ‘Žπ‘₯ − πœ‡ 𝑙 (𝑑)𝐸𝑙 (π‘Ÿπ‘™ )
subject to 0 ≤ π‘Ÿπ‘™ ≤ 1
 Price update
πœ†π‘™ (𝑑 + 1) = [πœ†π‘™ (𝑑) − 𝛽(𝑑)(π‘Ÿπ‘™ (𝑑)πΆπ‘™π‘šπ‘Žπ‘₯ − π‘₯ 𝑙 (𝑑))]+
where π‘₯ 𝑙 (𝑑) = ∑𝑠∈𝑆(𝑙) π‘₯𝑠 (𝑑) is the aggregate information rate on link l at iteration t.
In Algorithm 1, to solve problem (8), source s needs to know πœ†π‘  (𝑑), the sum of πœ†π‘™ (𝑑)’s
of links that are along its path 𝐿(𝑠).This can be obtained by notification from the
links, e.g., through the presence or timing of acknowledgment packets in TCP. To
carry out price update (9), the source needs to know the sum of error probabilities of
the links that are along its path [i.e., its own reliability that are offered by the
network 𝑅 𝑠 (𝑑)].This can be obtained by the notification from the destination
that can measure its end-to-end reliability. To solve link problem (10), each link needs
to know πœ‡ 𝑙 (𝑑), the sum of πœ‡π‘  (𝑑)’s from sources 𝑠 ∈ 𝑆(𝑙) using this link. This can be
obtained by the notification from these sources. To carry out price update (11), the
link needs to know π‘₯ 𝑙 (𝑑) , the aggregate information data rate of the sources that
are using it. This can be measured by the link itself.
a linear topology consisting of four links and eight users
min(1−𝛼)
π‘ˆπ‘  (π‘₯𝑠 , 𝑅𝑠 ) = π‘Žπ‘ 
π‘₯𝑠1−𝛼 − π‘₯𝑠
max(1−𝛼)
π‘₯𝑠
𝛼 = 1.1, π‘₯π‘–π‘šπ‘–π‘› = 0.1 (
Mb
s
and π‘…π‘–π‘šπ‘–π‘› = 0.9
1
𝑝𝑙 = exp(−𝑁(1 − π‘Ÿπ‘™ ))
2
min(1−𝛼)
+ (1 − π‘Žπ‘  )
min(1−𝛼)
− π‘₯𝑠
Mb
) , π‘₯π‘–π‘šπ‘Žπ‘₯ = 2 (
s
𝑅𝑠1−𝛼 − 𝑅𝑠
max(1−𝛼)
𝑅𝑠
Mb
) , πΆπ‘™π‘šπ‘Žπ‘₯ = 2 (
s
min(1−𝛼)
− 𝑅𝑠
) , π‘…π‘–π‘šπ‘Žπ‘₯ = 1,
maximize ∑𝑠 π‘ˆπ‘  (π‘₯𝑠 , 𝑅𝑠 )
subject to 𝑅𝑠 ≤ 1 − ∑π‘™πœ–πΏ(𝑠) 𝐸𝑙 (π‘Ÿπ‘™,𝑠 ), ∀𝑠
π‘₯𝑠
∑
≤ πΆπ‘™π‘šπ‘Žπ‘₯ , ∀𝑙
π‘Ÿπ‘™,𝑠
𝑠∈𝑆(𝑙)
π‘₯π‘ π‘šπ‘–π‘› ≤ π‘₯𝑠 ≤ π‘₯π‘ π‘šπ‘Žπ‘₯ , ∀𝑠
π‘…π‘ π‘šπ‘–π‘› ≤ 𝑅𝑠 ≤ 1, ∀𝑠
0 ≤ π‘Ÿπ‘™,𝑠 ≤ 1, ∀𝑙, 𝑠 ∈ 𝑆(𝑙)
By introducing the auxiliary variables 𝑐𝑙,𝑠 , which can be interpreted as the allocated
transmission capacity to source s at link l,
maximize ∑𝑠 π‘ˆπ‘  (π‘₯𝑠 , 𝑅𝑠 )
subject to 𝑅𝑠 ≤ 1 − ∑π‘™πœ–πΏ(𝑠) 𝐸𝑙 (π‘Ÿπ‘™,𝑠 ), ∀𝑠
π‘₯𝑠
≤ 𝑐𝑙,𝑠 , ∀𝑙, 𝑠 ∈ 𝑆(𝑙)
π‘Ÿπ‘™,𝑠
∑ 𝑐𝑙,𝑠 ≤ πΆπ‘™π‘šπ‘Žπ‘₯ , ∀𝑙
𝑠∈𝑆(𝑙)
π‘₯π‘ π‘šπ‘–π‘› ≤ π‘₯𝑠 ≤ π‘₯π‘ π‘šπ‘Žπ‘₯ , ∀𝑠
π‘…π‘ π‘šπ‘–π‘› ≤ 𝑅𝑠 ≤ 1, ∀𝑠
0 ≤ π‘Ÿπ‘™,𝑠 ≤ 1, ∀𝑙, 𝑠 ∈ 𝑆(𝑙)
0 ≤ 𝑐𝑙,𝑠 ≤ πΆπ‘™π‘šπ‘Žπ‘₯ , ∀𝑙, 𝑠 ∈ 𝑆(𝑙)
We introduce another layer, i.e., link layer (𝑐𝑙,𝑠 ), by using a vertical decomposition of
the optimization problem.
′
It is a GP, let π‘₯𝑠′ = log π‘₯𝑠 , π‘ˆπ‘  (𝑒 π‘₯𝑠 , 𝑅𝑠 ) = π‘ˆπ‘ ′ (π‘₯𝑠′ , 𝑅𝑠 )
maximize ∑𝑠 π‘ˆπ‘ ′ (π‘₯𝑠′ , 𝑅𝑠 )
subject to 𝑅𝑠 ≤ 1 − ∑π‘™πœ–πΏ(𝑠) 𝐸𝑙 (π‘Ÿπ‘™,𝑠 ), ∀𝑠
π‘₯𝑠′ − log π‘Ÿπ‘™,𝑠 ≤ log 𝑐𝑙,𝑠 , ∀𝑙, 𝑠 ∈ 𝑆(𝑙)
∑ 𝑐𝑙,𝑠 ≤ πΆπ‘™π‘šπ‘Žπ‘₯ , ∀𝑙
𝑠∈𝑆(𝑙)
π‘₯′π‘šπ‘–π‘›
≤ π‘₯′𝑠 ≤ π‘₯′π‘šπ‘Žπ‘₯
, ∀𝑠
𝑠
𝑠
π‘šπ‘–π‘›
𝑅𝑠 ≤ 𝑅𝑠 ≤ 1, ∀𝑠
0 ≤ π‘Ÿπ‘™,𝑠 ≤ 1, ∀𝑙, 𝑠 ∈ 𝑆(𝑙)
0 ≤ 𝑐𝑙,𝑠 ≤ πΆπ‘™π‘šπ‘Žπ‘₯ , ∀𝑙, 𝑠 ∈ 𝑆(𝑙)
𝐿(𝐱 ′ , 𝐑, 𝐫, 𝐜, π›Œ, 𝛍)
= ∑ π‘ˆ′𝑠 (π‘₯′𝑠 , 𝑅𝑠 ) + ∑ πœ‡π‘  (1 − ∑ 𝐸𝑙 (π‘Ÿπ‘™,𝑠 ) − 𝑅𝑠 )
𝑠
𝑠
π‘™πœ–πΏ(𝑠)
+ ∑ ∑ πœ†π‘™,𝑠 (log 𝑐𝑙,𝑠 + log π‘Ÿπ‘™,𝑠 − π‘₯𝑠′ )
𝑙
𝑠∈𝑆(𝑙)
= ∑ (π‘ˆ′𝑠 (π‘₯′𝑠 , 𝑅𝑠 ) − ∑ πœ†π‘™,𝑠 π‘₯′𝑠 − πœ‡π‘  𝑅𝑠 )
𝑠
π‘™πœ–πΏ(𝑠)
+ ∑ ( ∑ (πœ†π‘™,𝑠 ( log 𝑐𝑙,𝑠 + log π‘Ÿπ‘™,𝑠 ) − πœ‡π‘  𝐸𝑙 (π‘Ÿπ‘™,𝑠 ))) + ∑ πœ‡π‘ 
𝑙
𝑠∈𝑆(𝑙)
𝑠
The Lagrange dual function is
𝑄(π›Œ, 𝛍) =
𝐱′min
max
β‰Ό 𝐱′ β‰Ό 𝐱′max
𝐿(𝐱 ′ , 𝐑, 𝐫, 𝐜, π›Œ, 𝛍)
𝐑min β‰Ό 𝐑 β‰Ό 𝟏
πŸŽβ‰Όπ«β‰ΌπŸ
𝐜∈C
𝐢 = {𝑐𝑙,𝑠 | ∑ 𝑐𝑙,𝑠 ≤ πΆπ‘™π‘šπ‘Žπ‘₯ , ∀𝑙, 0 ≤ 𝑐𝑙,𝑠 ≤ πΆπ‘™π‘šπ‘Žπ‘₯ , ∀𝑙, 𝑠 ∈ 𝑆(𝑙)}
𝑠∈𝑆(𝑙)
The dual problem is
minimize 𝑄(π›Œ, 𝛍)
subject to π›Œ ≽ 𝟎
π›β‰½πŸŽ
Algorithm 2 for Differentiated Dynamic Reliability Policy
Source problem and reliability price update at source s:
 Source problem
maximize π‘ˆπ‘  (π‘₯′𝑠 , 𝑅𝑠 ) − πœ†π‘  (𝑑)π‘₯′𝑠 − πœ‡π‘  (𝑑)𝑅𝑠
subject to π‘₯𝑠′π‘šπ‘–π‘› ≤ π‘₯′𝑠 ≤ π‘₯′π‘šπ‘Žπ‘₯
𝑠
π‘…π‘ π‘šπ‘–π‘› ≤ 𝑅𝑠 ≤ 1
 Price update
πœ‡π‘  (𝑑 + 1) = [πœ‡π‘  (𝑑) − 𝛽(𝑑)(𝑅 𝑠 (𝑑) − 𝑅𝑠 (𝑑))]+
where 𝑅 𝑠 (𝑑) = 1 − ∑π‘™πœ–πΏ(𝑠) 𝐸𝑙 (π‘Ÿπ‘™,𝑠 (𝑑)) is the end-to-end reliability at iteration t.
Link problem and congestion price update at link l:

Link problems
Link-layer problem
maximize ∑𝑠∈𝑆(𝑙) πœ†π‘™,𝑠 (𝑑) log 𝑐𝑙,𝑠
subject to ∑𝑠∈𝑆(𝑙) 𝑐𝑙,𝑠 ≤ πΆπ‘™π‘šπ‘Žπ‘₯ ; 0 ≤ 𝑐𝑙,𝑠 ≤ πΆπ‘™π‘šπ‘Žπ‘₯ , 𝑠 ∈ 𝑆(𝑙)
Physical-layer problem for source s, 𝑠 ∈ 𝑆(𝑙)
maximize πœ†π‘™,𝑠 (𝑑)log π‘Ÿπ‘™π‘  − πœ‡π‘  (𝑑)𝐸𝑙 (π‘Ÿπ‘™,𝑠 )
subject to 0 ≤ π‘Ÿπ‘™,𝑠 ≤ 1

Price update
+
πœ†π‘™,𝑠 (𝑑 + 1) = [πœ†π‘™,𝑠 (𝑑) − 𝛽(𝑑)(log 𝑐𝑙,𝑠 (𝑑) + log π‘Ÿπ‘™,𝑠 (𝑑) − π‘₯𝑠′ (𝑑))] , 𝑠 ∈ 𝑆(𝑙)
Reference:
[1] Lee, J.-W.; Mung Chiang; Calderbank, A.R., "Price-based distributed algorithms for
rate-reliability tradeoff in network utility maximization," Selected Areas in
Communications, IEEE Journal on , vol.24, no.5, pp. 962-976, May 2006
[2] M. Chiang “Balancing transport and physical layer in wireless multihop networks:
Jointly optimal congestion control and power control,” IEEE J. Sel. Areas Commun.,
vol. 23, pp. 104, Jan. 2005.
[3] Mung Chiang; Low, S.H.; Calderbank, A.R.; Doyle, J.C., "Layering as Optimization
Decomposition: A Mathematical Theory of Network Architectures," Proceedings of
the IEEE , vol.95, no.1, pp.255-312, Jan. 2007
[4] Palomar, D.P.; Mung Chiang, "A tutorial on decomposition methods for network
utility maximization," Selected Areas in Communications, IEEE Journal on , vol.24,
no.8, pp.1439-1451, Aug. 2006
[5] Lee Jang-Won; Tang Ao; Huang Jianwei; Mung Chiang; Robert, A.,
"Reverse-Engineering MAC: A Non-Cooperative Game Model," Selected Areas in
Communications, IEEE Journal on , vol.25, no.6, pp.1135-1147, August 2007
[6] Jang-Won Lee; Mung Chiang; Calderbank, A.R., "Utility-Optimal Random-Access
Control," Wireless Communications, IEEE Transactions on , vol.6, no.7, pp.2741-2751,
July 2007
[7] Jang-Won Lee; Chiang, M.; Calderbank, R.A., "Jointly optimal congestion and
contention control based on network utility maximization," Communications Letters,
IEEE , vol.10, no.3, pp. 216-218, Mar 2006
Download