758 results on '"Shroff, Ness B."'
Search Results
252. Distributed Power Allocation for Coordinated Multipoint Transmissions in Distributed Antenna Systems
- Author
-
Zhang, Xiujun, Sun, Yin, Chen, Xiang, Zhou, Shidong, Wang, Jing, Shroff, Ness B., Zhang, Xiujun, Sun, Yin, Chen, Xiang, Zhou, Shidong, Wang, Jing, and Shroff, Ness B.
- Abstract
This paper investigates the distributed power allocation problem for coordinated multipoint (CoMP) transmissions in distributed antenna systems (DAS). Traditional duality based optimization techniques cannot be directly applied to this problem, because the non-strict concavity of the CoMP transmission's achievable rate with respect to the transmission power induces that the local power allocation subproblems have non-unique optimum solutions. We propose a distributed power allocation algorithm to resolve this non-strict concavity difficulty. This algorithm only requires local information exchange among neighboring base stations serving the same user, and is thus scalable as the network size grows. The step-size parameters of this algorithm are determined by only local user access relationship (i.e., the number of users served by each antenna), but do not rely on channel coefficients. Therefore, the convergence speed of this algorithm is quite robust to different channel fading coefficients. We rigorously prove that this algorithm converges to an optimum solution of the power allocation problem. Simulation results are presented to demonstrate the effectiveness of the proposed power allocation algorithm., Comment: 11 pages, accepted by IEEE Transactions on Wireless Communications
- Published
- 2013
- Full Text
- View/download PDF
253. Low-Complexity Scheduling Policies for Achieving Throughput and Asymptotic Delay Optimality in Multi-Channel Wireless Networks
- Author
-
Ji, Bo, Gupta, Gagan R., Lin, Xiaojun, Shroff, Ness B., Ji, Bo, Gupta, Gagan R., Lin, Xiaojun, and Shroff, Ness B.
- Abstract
In this paper, we study the scheduling problem for downlink transmission in a multi-channel (e.g., OFDM-based) wireless network. We focus on a single cell, with the aim of developing a unifying framework for designing low-complexity scheduling policies that can provide optimal performance in terms of both throughput and delay. We develop new easy-to-verify sufficient conditions for rate-function delay optimality (in the many-channel many-user asymptotic regime) and throughput optimality (in general non-asymptotic setting), respectively. The sufficient conditions allow us to prove rate-function delay optimality for a class of Oldest Packets First (OPF) policies and throughput optimality for a large class of Maximum Weight in the Fluid limit (MWF) policies, respectively. By exploiting the special features of our carefully chosen sufficient conditions and intelligently combining policies from the classes of OPF and MWF policies, we design hybrid policies that are both rate-function delay-optimal and throughput-optimal with a complexity of $O(n^{2.5} \log n)$, where $n$ is the number of channels or users. Our sufficient condition is also used to show that a previously proposed policy called Delay Weighted Matching (DWM) is rate-function delay-optimal. However, DWM incurs a high complexity of $O(n^5)$. Thus, our approach yields significantly lower complexity than the only previously designed delay and throughput optimal scheduling policy. We also conduct numerical experiments to validate our theoretical results., Comment: Accepted for publication by the IEEE/ACM Transactions on Networking. arXiv admin note: text overlap with arXiv:1212.1638
- Published
- 2013
254. Providing Probabilistic Guarantees on the Time of Information Spread in Opportunistic Networks
- Author
-
Kim, Yoora, Lee, Kyunghan, Shroff, Ness B., Rhee, Injong, Kim, Yoora, Lee, Kyunghan, Shroff, Ness B., and Rhee, Injong
- Abstract
A variety of mathematical tools have been developed for predicting the spreading patterns in a number of varied environments including infectious diseases, computer viruses, and urgent messages broadcast to mobile agent (e.g., humans, vehicles, and mobile devices). These tools have mainly focused on estimating the average time for the spread to reach a fraction (e.g., $\alpha$) of the agents, i.e., the so-called average completion time $E(T_{\alpha})$. We claim that providing probabilistic guarantee on the time for the spread $T_{\alpha}$ rather than only its average gives a much better understanding of the spread, and hence could be used to design improved methods to prevent epidemics or devise accelerated methods for distributing data. To demonstrate the benefits, we introduce a new metric $G_{\alpha, \beta}$ that denotes the time required to guarantee $\alpha$ completion with probability $\beta$, and develop a new framework to characterize the distribution of $T_\alpha$ for various spread parameters such as number of seeds, level of contact rates, and heterogeneity in contact rates. We apply our technique to an experimental mobility trace of taxies in Shanghai and show that our framework enables us to allocate resources (i.e., to control spread parameters) for acceleration of spread in a far more efficient way than the state-of-the-art.
- Published
- 2013
255. Multi-armed bandits in the presence of side observations in social networks
- Author
-
Buccapatnam, Swapna, primary, Eryilmaz, Atilla, additional, and Shroff, Ness B., additional
- Published
- 2013
- Full Text
- View/download PDF
256. Fair rate allocation for broadcast channel with confidential messages
- Author
-
Mao, Zhoujia, primary, Koksal, C. Emre, additional, and Shroff, Ness B., additional
- Published
- 2013
- Full Text
- View/download PDF
257. Optimal SINR based resource allocation for simultaneous energy and information transfer
- Author
-
Saleh, Ghada, primary, Koksal, C. Emre, additional, and Shroff, Ness B., additional
- Published
- 2013
- Full Text
- View/download PDF
258. Capacity of Compound MIMO Gaussian Channels With Additive Uncertainty
- Author
-
Sun, Yin, primary, Koksal, Can Emre, additional, and Shroff, Ness B., additional
- Published
- 2013
- Full Text
- View/download PDF
259. A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources.
- Author
-
Zhang, Ming, Zheng, Zizhan, and Shroff, Ness B.
- Published
- 2015
- Full Text
- View/download PDF
260. Achieving Optimal Throughput and Near-Optimal Asymptotic Delay Performance in Multi-Channel Wireless Networks with Low Complexity: A Practical Greedy Scheduling Policy
- Author
-
Ji, Bo, Gupta, Gagan R., Sharma, Manu, Lin, Xiaojun, Shroff, Ness B., Ji, Bo, Gupta, Gagan R., Sharma, Manu, Lin, Xiaojun, and Shroff, Ness B.
- Abstract
In this paper, we focus on the scheduling problem in multi-channel wireless networks, e.g., the downlink of a single cell in fourth generation (4G) OFDM-based cellular networks. Our goal is to design practical scheduling policies that can achieve provably good performance in terms of both throughput and delay, at a low complexity. While a class of $O(n^{2.5} \log n)$-complexity hybrid scheduling policies are recently developed to guarantee both rate-function delay optimality (in the many-channel many-user asymptotic regime) and throughput optimality (in the general non-asymptotic setting), their practical complexity is typically high. To address this issue, we develop a simple greedy policy called Delay-based Server-Side-Greedy (D-SSG) with a \lower complexity $2n^2+2n$, and rigorously prove that D-SSG not only achieves throughput optimality, but also guarantees near-optimal asymptotic delay performance. Specifically, we show that the rate-function attained by D-SSG for any delay-violation threshold $b$, is no smaller than the maximum achievable rate-function by any scheduling policy for threshold $b-1$. Thus, we are able to achieve a reduction in complexity (from $O(n^{2.5} \log n)$ of the hybrid policies to $2n^2 + 2n$) with a minimal drop in the delay performance. More importantly, in practice, D-SSG generally has a substantially lower complexity than the hybrid policies that typically have a large constant factor hidden in the $O(\cdot)$ notation. Finally, we conduct numerical simulations to validate our theoretical results in various scenarios. The simulation results show that D-SSG not only guarantees a near-optimal rate-function, but also empirically is virtually indistinguishable from delay-optimal policies., Comment: Accepted for publication by the IEEE/ACM Transactions on Networking, February 2014. A preliminary version of this work was presented at IEEE INFOCOM 2013, Turin, Italy, April 2013
- Published
- 2012
261. Maximizing System Throughput Using Cooperative Sensing in Multi-Channel Cognitive Radio Networks
- Author
-
Li, Shuang, Zheng, Zizhan, Ekici, Eylem, Shroff, Ness B., Li, Shuang, Zheng, Zizhan, Ekici, Eylem, and Shroff, Ness B.
- Abstract
In Cognitive Radio Networks (CRNs), unlicensed users are allowed to access the licensed spectrum when it is not currently being used by primary users (PUs). In this paper, we study the throughput maximization problem for a multi-channel CRN where each SU can only sense a limited number of channels. We show that this problem is strongly NP-hard, and propose an approximation algorithm with a factor at least $1/2\mu$ where $\mu \in [1,2]$ is a system parameter reflecting the sensing capability of SUs across channels and their sensing budgets. This performance guarantee is achieved by exploiting a nice structural property of the objective function and constructing a particular matching. Our numerical results demonstrate the advantage of our algorithm compared with both a random and a greedy sensing assignment algorithm.
- Published
- 2012
262. Low-complexity Optimal Scheduling over Correlated Fading Channels with ARQ Feedback
- Author
-
Ouyang, Wenzhuo, Eryilmaz, Atilla, Shroff, Ness B., Ouyang, Wenzhuo, Eryilmaz, Atilla, and Shroff, Ness B.
- Abstract
We investigate the downlink scheduling problem under Markovian ON/OFF fading channels, where the instantaneous channel state information is not directly accessible, but is revealed via ARQ-type feedback. The scheduler can exploit the temporal correlation/channel memory inherent in the Markovian channels to improve network performance. However, designing low-complexity and throughput-optimal algorithms under temporal correlation is a challenging problem. In this paper, we find that under an average number of transmissions constraint, a low-complexity index policy is throughput-optimal. The policy uses Whittle's index value, which was previously used to capture opportunistic scheduling under temporally correlated channels. Our results build on the interesting finding that, under the intricate queue length and channel memory evolutions, the importance of scheduling a user is captured by a simple multiplication of its queue length and Whittle's index value. The proposed queue-based index policy has provably low complexity. Numerical results show that significant throughput gains can be realized by exploiting the channel memory using the proposed low-complexity policy., Comment: A shorter version of this paper appeared in IEEE WiOpt 2012
- Published
- 2012
- Full Text
- View/download PDF
263. An Analytical Approach to the Adoption of Asymmetric Bidirectional Firewalls: Need for Regulation?
- Author
-
Khouzani, M. H. R., Sen, Soumya, Shroff, Ness B., Khouzani, M. H. R., Sen, Soumya, and Shroff, Ness B.
- Abstract
Recent incidents of cybersecurity violations have revealed the importance of having firewalls and other intrusion detection systems to monitor traffic entering and leaving access networks. But the adoption of such security measures is often stymied by `free-riding' effects and `shortsightedness' among Internet service providers (ISPs). In this work, we develop an analytical framework that not only accounts for these issues but also incorporates technological factors, like asymmetries in the performance of bidirectional firewalls. Results on the equilibrium adoption and stability are presented, along with detailed analysis on several policy issues related to social welfare, price of anarchy, and price of shortsightedness., Comment: 9 pages, 1 figure, technical report (detailed version) of a conference submission
- Published
- 2012
264. On the Efficiency-vs-Security Tradeoff in the Smart Grid
- Author
-
Abdallah, Yara, Zheng, Zizhan, Shroff, Ness B., Gamal, Hesham El, Abdallah, Yara, Zheng, Zizhan, Shroff, Ness B., and Gamal, Hesham El
- Abstract
The smart grid is envisioned to significantly enhance the efficiency of energy consumption, by utilizing two-way communication channels between consumers and operators. For example, operators can opportunistically leverage the delay tolerance of energy demands in order to balance the energy load over time, and hence, reduce the total operational cost. This opportunity, however, comes with security threats, as the grid becomes more vulnerable to cyber-attacks. In this paper, we study the impact of such malicious cyber-attacks on the energy efficiency of the grid in a simplified setup. More precisely, we consider a simple model where the energy demands of the smart grid consumers are intercepted and altered by an active attacker before they arrive at the operator, who is equipped with limited intrusion detection capabilities. We formulate the resulting optimization problems faced by the operator and the attacker and propose several scheduling and attack strategies for both parties. Interestingly, our results show that, as opposed to facilitating cost reduction in the smart grid, increasing the delay tolerance of the energy demands potentially allows the attacker to force increased costs on the system. This highlights the need for carefully constructed and robust intrusion detection mechanisms at the operator., Comment: A shorter version appears in IEEE CDC 2012
- Published
- 2012
- Full Text
- View/download PDF
265. Distributed Cross-Layer Optimization in Wireless Networks: A Second-Order Approach
- Author
-
Liu, Jia, Xia, Cathy H., Shroff, Ness B., Sherali, Hanif D., Liu, Jia, Xia, Cathy H., Shroff, Ness B., and Sherali, Hanif D.
- Abstract
Due to the rapidly growing scale and heterogeneity of wireless networks, the design of distributed cross-layer optimization algorithms have received significant interest from the networking research community. So far, the standard distributed cross-layer approach in the literature is based on first-order Lagrangian dual decomposition and the subgradient method, which suffers a slow convergence rate. In this paper, we make the first known attempt to develop a distributed Newton's method, which is second-order and enjoys a quadratic convergence rate. However, due to interference in wireless networks, the Hessian matrix of the cross-layer problem has an non-separable structure. As a result, developing a distributed second-order algorithm is far more challenging than its counterpart for wireline networks. Our main results in this paper are two-fold: i) For a special network setting where all links mutually interfere, we derive decentralized closed-form expressions to compute the Hessian inverse; ii) For general wireless networks where the interference relationships are arbitrary, we propose a distributed iterative matrix splitting scheme for the Hessian inverse. These results successfully lead to a new theoretical framework for cross-layer optimization in wireless networks. More importantly, our work contributes to an exciting second-order paradigm shift in wireless networks optimization theory., Comment: This paper is going to appear in IEEE INFOCOM 2013, Turin, Italy
- Published
- 2012
- Full Text
- View/download PDF
266. Capacity of Compound MIMO Gaussian Channels with Additive Uncertainty
- Author
-
Sun, Yin, Koksal, C. Emre, Shroff, Ness B., Sun, Yin, Koksal, C. Emre, and Shroff, Ness B.
- Abstract
This paper considers reliable communications over a multiple-input multiple-output (MIMO) Gaussian channel, where the channel matrix is within a bounded channel uncertainty region around a nominal channel matrix, i.e., an instance of the compound MIMO Gaussian channel. We study the optimal transmit covariance matrix design to achieve the capacity of compound MIMO Gaussian channels, where the channel uncertainty region is characterized by the spectral norm. This design problem is a challenging non-convex optimization problem. However, in this paper, we reveal that this problem has a hidden convexity property, which can be exploited to map the problem into a convex optimization problem. We first prove that the optimal transmit design is to diagonalize the nominal channel, and then show that the duality gap between the capacity of the compound MIMO Gaussian channel and the min-max channel capacity is zero, which proves the conjecture of Loyka and Charalambous (IEEE Trans. Inf. Theory, vol. 58, no. 4, pp. 2048-2063, 2012). The key tools for showing these results are a new matrix determinant inequality and some unitarily invariant properties., Comment: 8 pages, submitted to IEEE Transactions on Information Theory
- Published
- 2012
267. Throughput of Rateless Codes over Broadcast Erasure Channels
- Author
-
Yang, Yang, Shroff, Ness B., Yang, Yang, and Shroff, Ness B.
- Abstract
In this paper, we characterize the throughput of a broadcast network with n receivers using rateless codes with block size K. We assume that the underlying channel is a Markov modulated erasure channel that is i.i.d. across users, but can be correlated in time. We characterize the system throughput asymptotically in n. Specifically, we explicitly show how the throughput behaves for different values of the coding block size K as a function of n, as n approaches infinity. For finite values of K and n, under the more restrictive assumption of Gilbert-Elliott channels, we are able to provide a lower bound on the maximum achievable throughput. Using simulations we show the tightness of the bound with respect to system parameters n and K, and find that its performance is significantly better than the previously known lower bounds., Comment: Submitted to IEEE/ACM Transactions on Networking (July 2012)
- Published
- 2012
268. On the Generalized Delay-Capacity Tradeoff of Mobile Networks with L\'evy Flight Mobility
- Author
-
Kim, Yoora, Lee, Kyunghan, Shroff, Ness B., Rhee, Injong, Chong, Song, Kim, Yoora, Lee, Kyunghan, Shroff, Ness B., Rhee, Injong, and Chong, Song
- Abstract
In the literature, scaling laws for wireless mobile networks have been characterized under various models of node mobility and several assumptions on how communication occurs between nodes. To improve the realism in the analysis of scaling laws, we propose a new analytical framework. The framework is the first to consider a L\'{e}vy flight mobility pattern, which is known to closely mimic human mobility patterns. Also, this is the first work that allows nodes to communicate while being mobile. Under this framework, delays ($\bar{D}$) to obtain various levels of per-node throughput $(\lambda)$ for L\'evy flight are suggested as $\bar{D}(\lambda) = O(\sqrt{\min (n^{1+\alpha} \lambda, n^2)})$, where L\'evy flight is a random walk of a power-law flight distribution with an exponent $\alpha \in (0,2]$. The same framework presents a new tighter tradeoff $\bar{D}(\lambda) = O(\sqrt{\max (1,n\lambda^3)})$ for \textit{i.i.d.} mobility, whose delays are lower than existing results for the same levels of per-node throughput., Comment: 21 pages
- Published
- 2012
269. Delay Asymptotics with Retransmissions and Incremental Redundancy Codes over Erasure Channels
- Author
-
Yang, Yang, Tan, Jian, Shroff, Ness B., El-Gamal, Hesham, Yang, Yang, Tan, Jian, Shroff, Ness B., and El-Gamal, Hesham
- Abstract
Recent studies have shown that retransmissions can cause heavy-tailed transmission delays even when packet sizes are light-tailed. Moreover, the impact of heavy-tailed delays persists even when packets size are upper bounded. The key question we study in this paper is how the use of coding techniques to transmit information, together with different system configurations, would affect the distribution of delay. To investigate this problem, we model the underlying channel as a Markov modulated binary erasure channel, where transmitted bits are either received successfully or erased. Erasure codes are used to encode information prior to transmission, which ensures that a fixed fraction of the bits in the codeword can lead to successful decoding. We use incremental redundancy codes, where the codeword is divided into codeword trunks and these trunks are transmitted one at a time to provide incremental redundancies to the receiver until the information is recovered. We characterize the distribution of delay under two different scenarios: (I) Decoder uses memory to cache all previously successfully received bits. (II) Decoder does not use memory, where received bits are discarded if the corresponding information cannot be decoded. In both cases, we consider codeword length with infinite and finite support. From a theoretical perspective, our results provide a benchmark to quantify the tradeoff between system complexity and the distribution of delay., Comment: 12 pages, 4 figures
- Published
- 2012
270. Optimal control of wireless networks with finite buffers
- Author
-
Massachusetts Institute of Technology. Department of Aeronautics and Astronautics, Modiano, Eytan H., Le, Long Bao, Shroff, Ness B., Massachusetts Institute of Technology. Department of Aeronautics and Astronautics, Modiano, Eytan H., Le, Long Bao, and Shroff, Ness B.
- Abstract
This paper considers network control for wireless networks with finite buffers. We investigate the performance of joint flow control, routing, and scheduling algorithms which achieve high network utility and deterministically bounded backlogs inside the network. Our algorithms guarantee that buffers inside the network never overflow. We study the tradeoff between buffer size and network utility and show that if internal buffers have size (N - 1)/à ¿ then a high fraction of the maximum utility can be achieved, where à ¿ captures the loss in utility and N is the number of network nodes. The underlying scheduling/routing component of the considered control algorithms requires ingress queue length information (IQI) at all network nodes. However, we show that these algorithms can achieve the same utility performance with delayed ingress queue length information. Numerical results reveal that the considered algorithms achieve nearly optimal network utility with a significant reduction in queue backlog compared to the existing algorithm in the literature. Finally, we discuss extension of the algorithms to wireless networks with time-varying links.
- Published
- 2011
271. Secrecy Outage Capacity of Fading Channels
- Author
-
Gungor, Onur, Tan, Jian, Koksal, C. Emre, Gamal, Hesham El, Shroff, Ness B., Gungor, Onur, Tan, Jian, Koksal, C. Emre, Gamal, Hesham El, and Shroff, Ness B.
- Abstract
This paper considers point to point secure communication over flat fading channels under an outage constraint. More specifically, we extend the definition of outage capacity to account for the secrecy constraint and obtain sharp characterizations of the corresponding fundamental limits under two different assumptions on the transmitter CSI (Channel state information). First, we find the outage secrecy capacity assuming that the transmitter has perfect knowledge of the legitimate and eavesdropper channel gains. In this scenario, the capacity achieving scheme relies on opportunistically exchanging private keys between the legitimate nodes. These keys are stored in a key buffer and later used to secure delay sensitive data using the Vernam's one time pad technique. We then extend our results to the more practical scenario where the transmitter is assumed to know only the legitimate channel gain. Here, our achievability arguments rely on privacy amplification techniques to generate secret key bits. In the two cases, we also characterize the optimal power control policies which, interestingly, turn out to be a judicious combination of channel inversion and the optimal ergodic strategy. Finally, we analyze the effect of key buffer overflow on the overall outage probability., Comment: submitted to IEEE Transactions on Information Theory
- Published
- 2011
272. Throughput-optimal Scheduling in Multi-hop Wireless Networks without Per-flow Information
- Author
-
Ji, Bo, Joo, Changhee, Shroff, Ness B., Ji, Bo, Joo, Changhee, and Shroff, Ness B.
- Abstract
In this paper, we consider the problem of link scheduling in multi-hop wireless networks under general interference constraints. Our goal is to design scheduling schemes that do not use per-flow or per-destination information, maintain a single data queue for each link, and exploit only local information, while guaranteeing throughput optimality. Although the celebrated back-pressure algorithm maximizes throughput, it requires per-flow or per-destination information. It is usually difficult to obtain and maintain this type of information, especially in large networks, where there are numerous flows. Also, the back-pressure algorithm maintains a complex data structure at each node, keeps exchanging queue length information among neighboring nodes, and commonly results in poor delay performance. In this paper, we propose scheduling schemes that can circumvent these drawbacks and guarantee throughput optimality. These schemes use either the readily available hop-count information or only the local information for each link. We rigorously analyze the performance of the proposed schemes using fluid limit techniques via an inductive argument and show that they are throughput-optimal. We also conduct simulations to validate our theoretical results in various settings, and show that the proposed schemes can substantially improve the delay performance in most scenarios., Comment: To appear in IEEE/ACM Transactions on Networking. A preliminary version of this work was presented at IEEE WiOpt 2011
- Published
- 2011
273. On the Critical Delays of Mobile Networks under L\'{e}vy Walks and L\'{e}vy Flights
- Author
-
Lee, Kyunghan, Kim, Yoora, Chong, Song, Rhee, Injong, Yi, Yung, Shroff, Ness. B., Lee, Kyunghan, Kim, Yoora, Chong, Song, Rhee, Injong, Yi, Yung, and Shroff, Ness. B.
- Abstract
Delay-capacity tradeoffs for mobile networks have been analyzed through a number of research work. However, L\'{e}vy mobility known to closely capture human movement patterns has not been adopted in such work. Understanding the delay-capacity tradeoff for a network with L\'{e}vy mobility can provide important insights into understanding the performance of real mobile networks governed by human mobility. This paper analytically derives an important point in the delay-capacity tradeoff for L\'{e}vy mobility, known as the critical delay. The critical delay is the minimum delay required to achieve greater throughput than what conventional static networks can possibly achieve (i.e., $O(1/\sqrt{n})$ per node in a network with $n$ nodes). The L\'{e}vy mobility includes L\'{e}vy flight and L\'{e}vy walk whose step size distributions parametrized by $\alpha \in (0,2]$ are both heavy-tailed while their times taken for the same step size are different. Our proposed technique involves (i) analyzing the joint spatio-temporal probability density function of a time-varying location of a node for L\'{e}vy flight and (ii) characterizing an embedded Markov process in L\'{e}vy walk which is a semi-Markov process. The results indicate that in L\'{e}vy walk, there is a phase transition such that for $\alpha \in (0,1)$, the critical delay is always $\Theta (n^{1/2})$ and for $\alpha \in [1,2]$ it is $\Theta(n^{\frac{\alpha}{2}})$. In contrast, L\'{e}vy flight has the critical delay $\Theta(n^{\frac{\alpha}{2}})$ for $\alpha\in(0,2]$.
- Published
- 2011
274. Optimal Distributed Resource Allocation for Decode-and-Forward Relay Networks
- Author
-
Sun, Yin, Mao, Zhoujia, Zhong, Xiaofeng, Xiao, Yuanzhang, Zhou, Shidong, Shroff, Ness B., Sun, Yin, Mao, Zhoujia, Zhong, Xiaofeng, Xiao, Yuanzhang, Zhou, Shidong, and Shroff, Ness B.
- Abstract
This paper presents a distributed resource allocation algorithm to jointly optimize the power allocation, channel allocation and relay selection for decode-and-forward (DF) relay networks with a large number of sources, relays, and destinations. The well-known dual decomposition technique cannot directly be applied to resolve this problem, because the achievable data rate of DF relaying is not strictly concave, and thus the local resource allocation subproblem may have non-unique solutions. We resolve this non-strict concavity problem by using the idea of the proximal point method, which adds quadratic terms to make the objective function strictly concave. However, the proximal solution adds an extra layer of iterations over typical duality based approaches, which can significantly slow down the speed of convergence. To address this key weakness, we devise a fast algorithm without the need for this additional layer of iterations, which converges to the optimal solution. Our algorithm only needs local information exchange, and can easily adapt to variations of network size and topology. We prove that our distributed resource allocation algorithm converges to the optimal solution. A channel resource adjustment method is further developed to provide more channel resources to the bottleneck links and realize traffic load balance. Numerical results are provided to illustrate the benefits of our algorithm.
- Published
- 2011
275. Downlink Scheduling over Markovian Fading Channels
- Author
-
Ouyang, Wenzhuo, Eryilmaz, Atilla, Shroff, Ness B., Ouyang, Wenzhuo, Eryilmaz, Atilla, and Shroff, Ness B.
- Abstract
We consider the scheduling problem in downlink wireless networks with heterogeneous, Markov-modulated, ON/OFF channels. It is well-known that the performance of scheduling over fading channels relies heavily on the accuracy of the available Channel State Information (CSI), which is costly to acquire. Thus, we consider the CSI acquisition via a practical ARQ-based feedback mechanism whereby channel states are revealed at the end of only scheduled users' transmissions. In the assumed presence of temporally-correlated channel evolutions, the desired scheduler must optimally balance the exploitation-exploration trade-off, whereby it schedules transmissions both to exploit those channels with up-to-date CSI and to explore the current state of those with outdated CSI. In earlier works, Whittle's Index Policy had been suggested as a low-complexity and high-performance solution to this problem. However, analyzing its performance in the typical scenario of statistically heterogeneous channel state processes has remained elusive and challenging, mainly because of the highly-coupled and complex dynamics it possesses. In this work, we overcome these difficulties to rigorously establish the asymptotic optimality properties of Whittle's Index Policy in the limiting regime of many users. More specifically: (1) we prove the local optimality of Whittle's Index Policy, provided that the initial state of the system is within a certain neighborhood of a carefully selected state; (2) we then establish the global optimality of Whittle's Index Policy under a recurrence assumption that is verified numerically for our problem. These results establish that Whittle's Index Policy possesses analytically provable optimality characteristics for scheduling over heterogeneous and temporally-correlated channels., Comment: A shorter version of this paper will appear in INFOCOM 2012, Orlando, FL
- Published
- 2011
276. Queueing Analysis with Gaussian Inputs including SRD, LRD, and Self-similar Processes
- Author
-
Choe, Jinwoo and Shroff, Ness B.
- Abstract
In this paper we study the supremum distribution of a general class of Gaussian processes {Xt : t 2 0) having stationary increments. This distribution is directly related to the steady state queue length distribution of a queueing system, and hence its study is also important for various applications including communication network analysis. Our study is based on Extreme Value Theory and we show that logP({supt,, - Xt > x)) + m,/2 asymptotically grows at most (on the order of) logx, where m, corresponds to the reciprocal of' the maximum (normalized) variance of Xt. This result is considerably stronger than the existing results in the literature based on Large Deviation Theory. We further show that this improvement can be critical in characterizing the asyrnptotic behavior of P({sup,,, - Xt > x)). The types of Gaussian processes that our resu:lts cover also inelude a large class of processes that exhibit self-similarity and other types of long-range dependence.
- Published
- 1999
277. Novel Quantization Schemes for Very Low Bit Rate Video Coding Based on Sample Adaptation
- Author
-
Kim, Dong Sik and Shroff, Ness B.
- Abstract
In this report, we introduce a novel feed-forward adaptive quantization scheme called SAPQ (sampleadaptive product quantizer) as a structurally constrained vector quantizer. SAPQ is based on a concept of adaptive quantization to the varying samples of the source and is very different, from traditional adaptation techniques for non-stationary sources. SAPQ quantizes each source sample using a sequence of quantizers. Even when using scalar quantization in SAPQ, we can achieve perforrnance comparable to vector quantization (with the complexity still of the order of scalar quantization). We also show that important lattice based vector quantizers can be constructed using scalar quantization in SAPQ with several examples. We asymptotically analyze SAPQ and propose a simple algorithm to implement it. We numerically study SAPQ for independent, and identically distributed Gaussian and I;aplacian sources. Through our numerical study, we find that SAPQ using scalar quantizers achieves typical gains of 1 3 dB in distortions over the Lloyd-Max quantizer. By employing SAPQ, we have extensively conducted image compressions. We considered a uniform quantizer for the current H.263 standard and a nonuniform quantizer for the differential pulse code modulation for images. We also show that a generalized SAPQ can be used in conjunction with vector quantizers to further improve the gains, especially for high correlated image signals at large vector dimensions. Finally, the error-resilient aspect of SAPQ is also investigated. We find that SAPQ is robust to the channel noise, while achieving gains.
- Published
- 1999
278. Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting
- Author
-
Swapna, B. T., Eryilmaz, Atilla, Shroff, Ness B., Swapna, B. T., Eryilmaz, Atilla, and Shroff, Ness B.
- Abstract
In an unreliable single-hop broadcast network setting, we investigate the throughput and decoding-delay performance of random linear network coding as a function of the coding window size and the network size. Our model consists of a source transmitting packets of a single flow to a set of $n$ users over independent erasure channels. The source performs random linear network coding (RLNC) over $k$ (coding window size) packets and broadcasts them to the users. We note that the broadcast throughput of RLNC must vanish with increasing $n$, for any fixed $k.$ Hence, in contrast to other works in the literature, we investigate how the coding window size $k$ must scale for increasing $n$. Our analysis reveals that the coding window size of $\Theta(\ln(n))$ represents a phase transition rate, below which the throughput converges to zero, and above which it converges to the broadcast capacity. Further, we characterize the asymptotic distribution of decoding delay and provide approximate expressions for the mean and variance of decoding delay for the scaling regime of $k=\omega(\ln(n)).$ These asymptotic expressions reveal the impact of channel correlations on the throughput and delay performance of RLNC. We also show how our analysis can be extended to other rateless block coding schemes such as the LT codes. Finally, we comment on the extension of our results to the cases of dependent channels across users and asymmetric channel model.
- Published
- 2010
279. Delay-Based Back-Pressure Scheduling in Multihop Wireless Networks
- Author
-
Ji, Bo, Joo, Changhee, Shroff, Ness B., Ji, Bo, Joo, Changhee, and Shroff, Ness B.
- Abstract
Scheduling is a critical and challenging resource allocation mechanism for multihop wireless networks. It is well known that scheduling schemes that favor links with larger queue length can achieve high throughput performance. However, these queue-length-based schemes could potentially suffer from large (even infinite) packet delays due to the well-known last packet problem, whereby packets belonging to some flows may be excessively delayed due to lack of subsequent packet arrivals. Delay-based schemes have the potential to resolve this last packet problem by scheduling the link based on the delay the packet has encountered. However, characterizing throughput-optimality of these delay-based schemes has largely been an open problem in multihop wireless networks (except in limited cases where the traffic is single-hop.) In this paper, we investigate delay-based scheduling schemes for multihop traffic scenarios with fixed routes. We develop a scheduling scheme based on a new delay metric, and show that the proposed scheme achieves optimal throughput performance. Further, we conduct simulations to support our analytical results, and show that the delay-based scheduler successfully removes excessive packet delays, while it achieves the same throughput region as the queue-length-based scheme., Comment: Accepted for publication in IEEE/ACM Transactions on Networking. A preliminary version of this work was presented at the IEEE INFOCOM 2011
- Published
- 2010
- Full Text
- View/download PDF
280. Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks
- Author
-
Ouyang, Wenzhuo, Murugesan, Sugumar, Eryilmaz, Atilla, Shroff, Ness B., Ouyang, Wenzhuo, Murugesan, Sugumar, Eryilmaz, Atilla, and Shroff, Ness B.
- Abstract
We address the problem of opportunistic multiuser scheduling in downlink networks with Markov-modeled outage channels. We consider the scenario in which the scheduler does not have full knowledge of the channel state information, but instead estimates the channel state information by exploiting the memory inherent in the Markov channels along with ARQ-styled feedback from the scheduled users. Opportunistic scheduling is optimized in two stages: (1) Channel estimation and rate adaptation to maximize the expected immediate rate of the scheduled user; (2) User scheduling, based on the optimized immediate rate, to maximize the overall long term sum-throughput of the downlink. The scheduling problem is a partially observable Markov decision process with the classic 'exploitation vs exploration' trade-off that is difficult to quantify. We therefore study the problem in the framework of Restless Multi-armed Bandit Processes (RMBP) and perform a Whittle's indexability analysis. Whittle's indexability is traditionally known to be hard to establish and the index policy derived based on Whittle's indexability is known to have optimality properties in various settings. We show that the problem of downlink scheduling under imperfect channel state information is Whittle indexable and derive the Whittle's index policy in closed form. Via extensive numerical experiments, we show that the index policy has near-optimal performance. Our work reveals that, under incomplete channel state information, exploiting channel memory for opportunistic scheduling can result in significant performance gains and that almost all of these gains can be realized using an easy-to-implement index policy., Comment: A shorter version of this report appeared in INFOCOM 2011, Shanghai, China
- Published
- 2010
281. Scheduling with Rate Adaptation under Incomplete Knowledge of Channel/Estimator Statistics
- Author
-
Ouyang, Wenzhuo, Murugesan, Sugumar, Eryilmaz, Atilla, Shroff, Ness B., Ouyang, Wenzhuo, Murugesan, Sugumar, Eryilmaz, Atilla, and Shroff, Ness B.
- Abstract
In time-varying wireless networks, the states of the communication channels are subject to random variations, and hence need to be estimated for efficient rate adaptation and scheduling. The estimation mechanism possesses inaccuracies that need to be tackled in a probabilistic framework. In this work, we study scheduling with rate adaptation in single-hop queueing networks under two levels of channel uncertainty: when the channel estimates are inaccurate but complete knowledge of the channel/estimator joint statistics is available at the scheduler; and when the knowledge of the joint statistics is incomplete. In the former case, we characterize the network stability region and show that a maximum-weight type scheduling policy is throughput-optimal. In the latter case, we propose a joint channel statistics learning - scheduling policy. With an associated trade-off in average packet delay and convergence time, the proposed policy has a stability region arbitrarily close to the stability region of the network under full knowledge of channel/estimator joint statistics., Comment: 48th Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sept. 2010
- Published
- 2010
282. Multiuser Scheduling in a Markov-modeled Downlink using Randomly Delayed ARQ Feedback
- Author
-
Murugesan, Sugumar, Schniter, Philip, Shroff, Ness B., Murugesan, Sugumar, Schniter, Philip, and Shroff, Ness B.
- Abstract
We focus on the downlink of a cellular system, which corresponds to the bulk of the data transfer in such wireless systems. We address the problem of opportunistic multiuser scheduling under imperfect channel state information, by exploiting the memory inherent in the channel. In our setting, the channel between the base station and each user is modeled by a two-state Markov chain and the scheduled user sends back an ARQ feedback signal that arrives at the scheduler with a random delay that is i.i.d across users and time. The scheduler indirectly estimates the channel via accumulated delayed-ARQ feedback and uses this information to make scheduling decisions. We formulate a throughput maximization problem as a partially observable Markov decision process (POMDP). For the case of two users in the system, we show that a greedy policy is sum throughput optimal for any distribution on the ARQ feedback delay. For the case of more than two users, we prove that the greedy policy is suboptimal and demonstrate, via numerical studies, that it has near optimal performance. We show that the greedy policy can be implemented by a simple algorithm that does not require the statistics of the underlying Markov channel or the ARQ feedback delay, thus making it robust against errors in system parameter estimation. Establishing an equivalence between the two-user system and a genie-aided system, we obtain a simple closed form expression for the sum capacity of the Markov-modeled downlink. We further derive inner and outer bounds on the capacity region of the Markov-modeled downlink and tighten these bounds for special cases of the system parameters., Comment: Contains 22 pages, 6 figures and 8 tables; revised version including additional analytical and numerical results; work submitted, Feb 2010, to IEEE Transactions on Information Theory, revised April 2011; authors can be reached at sugumar.murugesan@asu.edu/schniter@ece.osu.edu/shroff@ece.osu.edu
- Published
- 2010
- Full Text
- View/download PDF
283. Node Weighted Scheduling
- Author
-
Gupta, Gagan Raj, Sanghavi, Sujay, Shroff, Ness B., Gupta, Gagan Raj, Sanghavi, Sujay, and Shroff, Ness B.
- Abstract
This paper proposes a new class of online policies for scheduling in input-buffered crossbar switches. Our policies are throughput optimal for a large class of arrival processes which satisfy strong-law of large numbers. Given an initial configuration and no further arrivals, our policies drain all packets in the system in the minimal amount of time (providing an online alternative to the batch approach based on Birkhoff-VonNeumann decompositions). We show that it is possible for policies in our class to be throughput optimal even if they are not constrained to be maximal in every time slot. Most algorithms for switch scheduling take an edge based approach; in contrast, we focus on scheduling (a large enough set of) the most congested ports. This alternate approach allows for lower-complexity algorithms, and also requires a non-standard technique to prove throughput-optimality. One algorithm in our class, Maximum Vertex-weighted Matching (MVM) has worst-case complexity similar to Max-size Matching, and in simulations shows slightly better delay performance than Max-(edge)weighted-Matching (MWM)., Comment: To appear in Sigmetrics 2009
- Published
- 2009
284. On the Construction of a Maximum-Lifetime Data Gathering Tree in Sensor Networks: NP-Completeness and Approximation Algorithm
- Author
-
PURDUE UNIV LAFAYETTE IN DEPT OF COMPUTER SCIENCES, Wu, Yan, Fahmy, Sonia, Shroff, Ness B., PURDUE UNIV LAFAYETTE IN DEPT OF COMPUTER SCIENCES, Wu, Yan, Fahmy, Sonia, and Shroff, Ness B.
- Abstract
Energy efficiency is critical for wireless sensor networks. The data gathering process must be carefully designed to conserve energy and extend the network lifetime. For applications where each sensor continuously monitors the environment and periodically reports to a base station, a tree-based topology is often used to collect data from sensor nodes. In this work, we study the construction of a data gathering tree to maximize the network lifetime, which is defined as the time until the first node depletes its energy. The problem is shown to be NP-complete. We design an algorithm which starts from an arbitrary tree and iteratively reduces the load on bottleneck nodes (nodes likely to soon deplete their energy due to high degree or low remaining energy). We show that the algorithm terminates in polynomial time and is provably near optimal., The original document contains color images. Supported in part by NSF under grants 0207728.
- Published
- 2008
285. On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast
- Author
-
PURDUE UNIV LAFAYETTE IN SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING, Kim, Joohwan, Lin, Xiaojun, Shroff, Ness B., Sinha, Prasun, PURDUE UNIV LAFAYETTE IN SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING, Kim, Joohwan, Lin, Xiaojun, Shroff, Ness B., and Sinha, Prasun
- Abstract
Sleep-wake scheduling is an effective mechanism to prolong the lifetime of energy-constrained wireless sensor networks. However, it incurs an additional delay for packet delivery when each node needs to wait for its next-hop relay node to wake up, which could be unacceptable for delay-sensitive applications. Prior work in the literature has proposed to reduce this delay using anycast, where each node opportunistically selects the first neighboring node that wakes up among multiple candidate nodes. In this paper, we study the joint control problem of how to optimally control the sleep-wake schedule, the anycast candidate set of next-hop neighbors, and anycast priorities, to maximize the network lifetime subject to a constraint on the expected end-to-end delay. We provide an efficient solution to this joint control problem. Our numerical results indicate that the proposed solution can substantially outperform prior heuristic solutions in the literature, especially under the practical scenarios where there are obstructions in the coverage area of the wireless sensor network., The original document contains color images. Supported in part by NSF under contract CNS-0721477, CNS-0721434 and CCF-0635202.
- Published
- 2008
286. Sample-Adaptive Coding Scheme (SACS): A Structurally Constrained Vector Quantizer
- Author
-
Kim, Dong Sik and Shroff, Ness B.
- Subjects
Quantitative Biology::Tissues and Organs - Abstract
In this paper, we propose a novel feed-forward adaptive coding scheme called SACS (sample adaptive coding scheme) for the lossy compression of a discrete-time memoryless stationary source. SACS is based on a concept of adaptive quantization to the varying samples of the source and is very different from traditional adaptation techniques for non-stationary sources. SACS quantizes each solirce sample using a sequence of quantizers. Even when using scalar quantization in SACS, we can ach.ieve performance comparablse to vector quantization (with the complexity still of the order of scalar quantization). We also show tihat important lattice based vector quantizers can be constructed using scalar quantization in SACS. We mathematically analyze SACS and propose a simple algorithm to implemeint it. We numerically study SACS for independent and identically distributed Gaussian sources. Through our numerical study, we :find that SACS using scalar quantizers achieves typical gains of 1-2 dB signal to noise ratio over the non-adaptive scheme based on the Lloyd-Max quantizer. We also show that SACS can be used in conjuncfion with vector quantizers to further improve the gains.
- Published
- 1998
287. A Central Limit Theorem Based Approach for Analyzing Queue Behavior in High-Speed Networks
- Author
-
Choe, Jinwoo and Shroff, Ness B.
- Abstract
Statistical multiplexing is very important in high-speed networks, since it allows network applications to efficiently share network resources. However, statistical multiplexing can also lead to congestion which must be properly controlled in order to provide users with a satisfactory level of quality of service. In this report we study P({Q > x)), the tail of the steady state queue length distribution at a highspeed multiplexer. The tail distribution P({Q > x)) is a fundamental measure of network congestion and thus i.mportant for the efficient design and control of these networks. In partic:ular, we focus on the case when the aggregate traffic to the multiplexer can be characterized by a stationary Gaussian process. In our approach, a multiplexer is modeled by a fluid queue serving a large number of input processes. We propose a lower bound and two asymptotic upper bounds for P({Q > x)), and provide several numerical examples to illustrate the tightness of these bounds. We also us: these bounds to study important properties of the tail probability. Further, we apply these bounds for a large number of non-Gaussian input sources, and validate their performance via simulations. Wherever possible, we have condilcted our simulation study using Importance Sampling in order to improve its reliability and to effectively capture rare events. Our analytical study is based on Extreme Value Theory, and therefore different from the approaches using traditional Markovian and Large Deviations techniques.
- Published
- 1998
288. Energy trading in the smart grid: From end-user's perspective
- Author
-
Chen, Shengbo, primary, Shroff, Ness B., additional, and Sinha, Prasun, additional
- Published
- 2013
- Full Text
- View/download PDF
289. Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting
- Author
-
Swapna, B. T., primary, Eryilmaz, Atilla, additional, and Shroff, Ness B., additional
- Published
- 2013
- Full Text
- View/download PDF
290. Delay-Based Back-Pressure Scheduling in Multihop Wireless Networks
- Author
-
Ji, Bo, primary, Joo, Changhee, additional, and Shroff, Ness B., additional
- Published
- 2013
- Full Text
- View/download PDF
291. On the Critical Delays of Mobile Networks Under Lévy Walks and Lévy Flights
- Author
-
Lee, Kyunghan, primary, Kim, Yoora, additional, Chong, Song, additional, Rhee, Injong, additional, Yi, Yung, additional, and Shroff, Ness B., additional
- Published
- 2013
- Full Text
- View/download PDF
292. Secrecy Outage Capacity of Fading Channels
- Author
-
Gungor, Onur, primary, Tan, Jian, additional, Koksal, Can Emre, additional, El-Gamal, Hesham, additional, and Shroff, Ness B., additional
- Published
- 2013
- Full Text
- View/download PDF
293. Achieving Full Secrecy Rate with Low Packet Delays: An Optimal Control Approach
- Author
-
Mao, Zhoujia, primary, Koksal, C. Emre, additional, and Shroff, Ness B., additional
- Published
- 2013
- Full Text
- View/download PDF
294. Distributed greedy approximation to maximum weighted independent set for scheduling with fading channels
- Author
-
Joo, Changhee, primary, Lin, Xiaojun, additional, Ryu, Jiho, additional, and Shroff, Ness B., additional
- Published
- 2013
- Full Text
- View/download PDF
295. Heterogeneous Delay Tolerant Task Scheduling and Energy Management in the Smart Grid with Renewable Energy
- Author
-
Chen, Shengbo, primary, Shroff, Ness B., additional, and Sinha, Prasun, additional
- Published
- 2013
- Full Text
- View/download PDF
296. Maximizing Information in Unreliable Sensor Networks Under Deadline and Energy Constraints
- Author
-
Hariharan, Srikanth, primary, Zheng, Zizhan, additional, and Shroff, Ness B., additional
- Published
- 2013
- Full Text
- View/download PDF
297. DSS: Distributed SINR-Based Scheduling Algorithm for Multihop Wireless Networks
- Author
-
Ryu, Jiho, primary, Joo, Changhee, additional, Taekyoung Kwon, Ted, additional, Shroff, Ness B., additional, and Choi, Yanghee, additional
- Published
- 2013
- Full Text
- View/download PDF
298. Distributed CSMA Algorithms for Link Scheduling in Multihop MIMO Networks Under SINR Model
- Author
-
Qian, Dajun, primary, Zheng, Dong, additional, Zhang, Junshan, additional, Shroff, Ness B., additional, and Joo, Changhee, additional
- Published
- 2013
- Full Text
- View/download PDF
299. Distributed Power Allocation for Coordinated Multipoint Transmissions in Distributed Antenna Systems
- Author
-
Zhang, Xiujun, primary, Sun, Yin, additional, Chen, Xiang, additional, Zhou, Shidong, additional, Wang, Jing, additional, and Shroff, Ness B., additional
- Published
- 2013
- Full Text
- View/download PDF
300. On distributed computation rate optimization for deploying cloud computing programming frameworks
- Author
-
Liu, Jia, primary, Xia, Cathy H., additional, Shroff, Ness B., additional, and Zhang, Xiaodong, additional
- Published
- 2013
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.