Results 1  10
of
237
Optimization Flow Control, I: Basic Algorithm and Convergence
 IEEE/ACM TRANSACTIONS ON NETWORKING
, 1999
"... We propose an optimization approach to flow control where the objective is to maximize the aggregate source utility over their transmission rates. We view network links and sources as processors of a distributed computation system to solve the dual problem using gradient projection algorithm. In thi ..."
Abstract

Cited by 518 (55 self)
 Add to MetaCart
We propose an optimization approach to flow control where the objective is to maximize the aggregate source utility over their transmission rates. We view network links and sources as processors of a distributed computation system to solve the dual problem using gradient projection algorithm. In this system sources select transmission rates that maximize their own benefits, utility minus bandwidth cost, and network links adjust bandwidth prices to coordinate the sources' decisions. We allow feedback delays to be different, substantial and timevarying, and links and sources to update at different times and with different frequencies. We provide asynchronous distributed algorithms and prove their convergence in a static environment. We present measurements obtained from a preliminary prototype to illustrate the convergence of the algorithm in a slowly timevarying environment.
Distributed Algorithmic Mechanism Design: Recent Results and Future Directions
 In Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications
, 2002
"... Distributed Algorithmic Mechanism Design (DAMD) combines theoretical computer science's traditional focus on computational tractability with its more recent interest in incentive compatibility and distributed computing. The Internet's decentralized nature, in which distributed computation and autono ..."
Abstract

Cited by 239 (17 self)
 Add to MetaCart
Distributed Algorithmic Mechanism Design (DAMD) combines theoretical computer science's traditional focus on computational tractability with its more recent interest in incentive compatibility and distributed computing. The Internet's decentralized nature, in which distributed computation and autonomous agents prevail, makes DAMD a very natural approach for many Internet problems. This paper first outlines the basics of DAMD and then reviews previous DAMD results on multicast cost sharing and interdomain routing. The remainder of the paper describes several promising research directions and poses some specific open problems.
A Duality Model of TCP and Queue Management Algorithms
 IEEE/ACM Trans. on Networking
, 2002
"... We propose a duality model of congestion control and apply it to understand the equilibrium properties of TCP and active queue management schemes. Congestion control is the interaction of source rates with certain congestion measures at network links. The basic idea is to regard source rates as p ..."
Abstract

Cited by 239 (34 self)
 Add to MetaCart
We propose a duality model of congestion control and apply it to understand the equilibrium properties of TCP and active queue management schemes. Congestion control is the interaction of source rates with certain congestion measures at network links. The basic idea is to regard source rates as primal variables and congestion measures as dual variables, and congestion control as a distributed primaldual algorithm carried out over the Internet to maximize aggregate utility subject to capacity constraints. The primal iteration is carried out by TCP algorithms such as Reno or Vegas, and the dual iteration is carried out by queue management such as DropTail, RED or REM. We present these algorithms and their generalizations, derive their utility functions, and study their interaction.
On Designing Improved Controllers for AQM Routers Supporting TCP Flows
 IN PROCEEDINGS OF IEEE INFOCOM
, 2000
"... In this paper we study a previously developed linearized model of TCP and AQM. We use classical control system techniques to develop controllers well suited for the application. The controllers are shown to have better theoretical properties than the well known RED controller. We present guidelines ..."
Abstract

Cited by 219 (15 self)
 Add to MetaCart
In this paper we study a previously developed linearized model of TCP and AQM. We use classical control system techniques to develop controllers well suited for the application. The controllers are shown to have better theoretical properties than the well known RED controller. We present guidelines for designing stable controllers subject to network parameters like load level, propogation delay etc. We also present simple implementation techniques which require a minimal change to RED implementations. The performance of the controllers are verified and compared with RED using ns simulations. The second of our designs, the Proportional Integral (PI) controller is shown to outperform RED significantly.
Endtoend congestion control schemes: Utility functions, random losses and ECN marks
 In Proceedings of IEEE Infocom
, 2000
"... We present a framework for designing endtoend congestion control schemes in a network where each user may have a different utility function and may experience noncongestionrelated losses. We first show that there exists an additive increasemultiplicative decrease scheme using only endtoend me ..."
Abstract

Cited by 178 (1 self)
 Add to MetaCart
We present a framework for designing endtoend congestion control schemes in a network where each user may have a different utility function and may experience noncongestionrelated losses. We first show that there exists an additive increasemultiplicative decrease scheme using only endtoend measurable losses such that a sociallyoptimal solution can be reached. We incorporate roundtrip delay in this model, and show that one can generalize observations regarding TCPtype congestion avoidance to more general window flow control schemes. We then consider explicit congestion notification (ECN) as an alternate mechanism (instead of losses) for signaling congestion and show that ECN marking levels can be designed to nearly eliminate losses in the network by choosing the marking level independently for each node in the network. While the ECN marking level at each node may depend on the number of flows through the node, the appropriate marking level can be estimated using only aggregate flow measurements, i.e., perflow measurements are not required. 1
EndtoEnd Congestion Control for the Internet: Delay and Stability
, 2001
"... Under the assumption that queueing delays will eventually become small relative to propagation delays, we derive stability results for a fluid flow model of endtoend Internet congestion control. The theoretical results of the paper are intended to be decentralized and locally implemented: each end ..."
Abstract

Cited by 144 (1 self)
 Add to MetaCart
Under the assumption that queueing delays will eventually become small relative to propagation delays, we derive stability results for a fluid flow model of endtoend Internet congestion control. The theoretical results of the paper are intended to be decentralized and locally implemented: each end system needs knowledge only of its own roundtrip delay. Criteria for local stability and rate of convergence are completely characterized for a single resource, single user system. Stability criteria are also described for networks where aH users share the same roundtrip delay. Numerical experiments investigate extensions to more general networks. Through simulations, we are able to evaluate the relative importance of queueing delays and propagation delays on network stability. Finally, we suggest how these results may be used to design network resources.
Tsitsiklis. Efficiency loss in a network resource allocation game
 Mathematics of Operations Research
"... We consider a resource allocation problem where individual users wish to send data across a network to maximize their utility, and a cost is incurred at each link that depends on the total rate sent through the link. It is known that as long as users do not anticipate the effect of their actions on ..."
Abstract

Cited by 144 (10 self)
 Add to MetaCart
We consider a resource allocation problem where individual users wish to send data across a network to maximize their utility, and a cost is incurred at each link that depends on the total rate sent through the link. It is known that as long as users do not anticipate the effect of their actions on prices, a simple proportional pricing mechanism can maximize the sum of users’ utilities minus the cost (called aggregate surplus). Continuing previous efforts to quantify the effects of selfish behavior in network pricing mechanisms, we consider the possibility that users anticipate the effect of their actions on link prices. Under the assumption that the links’ marginal cost functions are convex, we establish existence of a Nash equilibrium. We show that the aggregate surplus at a Nash equilibrium is no worse than a factor of 4 √ 2 − 5 times the optimal aggregate surplus; thus, the efficiency loss when users are selfish is no more than approximately 34%. The current Internet is used by a widely heterogeneous population of users; not only are different types of traffic sharing the same network, but different end users place different values on their perceived network performance. This has led to a surge of interest in congestion pricing, where
Fair resource allocation in wireless networks using queuelengthbased scheduling and congestion control
 In Proceedings of IEEE Infocom
, 2005
"... We consider the problem of allocating resources (time slots, frequency, power, etc.) at a base station to many competing flows, where each flow is intended for a different receiver. The channel conditions may be timevarying and different for different receivers. It is wellknown that appropriately ..."
Abstract

Cited by 128 (22 self)
 Add to MetaCart
We consider the problem of allocating resources (time slots, frequency, power, etc.) at a base station to many competing flows, where each flow is intended for a different receiver. The channel conditions may be timevarying and different for different receivers. It is wellknown that appropriately chosen queuelength based policies are throughputoptimal while other policies based on the estimation of channel statistics can be used to allocate resources fairly (such as proportional fairness) among competing users. In this paper, we show that a combination of queuelengthbased scheduling at the base station and congestion control implemented either at the base station or at the end users can lead to fair resource allocation and queuelength stability.
CongestionDependent Pricing of Network Services
 IEEE/ACM Transactions on Networking
, 1998
"... Weconsider a service provider (SP) who provides access to a communication network or some other form of online services. Users access the network and initiate calls that belong to a set of diverse service classes, differing in resource requirements, demand pattern, and call duration. ..."
Abstract

Cited by 123 (0 self)
 Add to MetaCart
Weconsider a service provider (SP) who provides access to a communication network or some other form of online services. Users access the network and initiate calls that belong to a set of diverse service classes, differing in resource requirements, demand pattern, and call duration.
Distributed connection acceptance control for a connectionless network
, 1999
"... We describe how a packet network with a simple pricing mechanism and no connection acceptance control may be used to carry a telephonylike service with low packet loss and some call blocking. The packet network uses packet marking to indicate congestion and endsystems are charged a fixed small amou ..."
Abstract

Cited by 104 (1 self)
 Add to MetaCart
We describe how a packet network with a simple pricing mechanism and no connection acceptance control may be used to carry a telephonylike service with low packet loss and some call blocking. The packet network uses packet marking to indicate congestion and endsystems are charged a fixed small amount per mark received. The endsystems are thus provided with the information and the incentive to use the packet network efficiently. We demonstrate that algorithms embedded in the endsystems are able to synthesize a telephonylike service by blocking calls at times when the load in the packet network is high. 1.