Demand Shaping in Cellular Networks - arXiv
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
1 Demand Shaping in Cellular Networks Xinyang Zhou Lijun Chen Abstract— Demand shaping is a promising way to mitigate the wireless cellular capacity shortfall in the presence of ever- increasing wireless data demand. In this paper, we formulate demand shaping as an optimization problem that minimizes the variation in aggregate traffic. We design a distributed and randomized offline demand shaping algorithm under complete arXiv:1707.02503v2 [math.OC] 27 Mar 2018 traffic information and prove its almost surely convergence. We further consider a more realistic setting where the traffic information is incomplete but the future traffic can be predicted to a certain degree of accuracy. We design an online demand shaping algorithm that updates the schedules of deferrable applications (DAs) each time when new information is available, based on solving at each timeslot an optimization problem over a shrinking horizon from the current time to the end of the day. We compare the performance of the online algorithm against Fig. 1: North America smartphone web browsing activity in the optimal offline algorithm, and provide numerical examples one day [21]. to complement the theoretical analysis. Index Terms— Demand shaping, offline algorithm, online al- web browsing activity over a day. However, wireless capacity gorithm, steepest descent algorithm, supermartingale, deferrable needs to be provisioned to meet the peak demand rather than applications, cellular networks. the average. This means that the cellular network is usually stressed in peak hours while largely underutilized at other I. I NTRODUCTION times. If the demand profile can be shaped to reduce the peak We have witnessed in recent years rapid increase in demand and smooth the time variation, not only can more traffic be for wireless data, driven by the proliferation of smart mobile accommodated under limited existing capacity constraints, but devices. The global mobile traffic in 2016 has nearly reached also additional spectrum allocation and infrastructure upgrades 84 exabytes, more than 80 times greater than the entire global can be slowed down, which together greatly improve wireless Internet traffic in 2000; yet, this number is expected to be network efficiency and QoS, and yield huge savings for service increasing at a compound annual growth rate (CAGR) of 47% providers. in the coming five years, i.e., a seven-fold growth from 2016 In this paper, we focus on designing demand shaping to 2021 [20]. However, despite frequent upgrades of cellular algorithms for cellular networks. We divide wireless traffic into networks technology from 2G to 4G LTE and beyond, wireless two categories: non-deferrable traffic and deferrable traffic. service providers fall short of keeping up with this increasing Non-deferrable traffic refers to the traffic of those applications wireless data demand, leading to congestion in the network, such as online gaming that have no or low delay tolerance, and especially in areas of dense population. As a result, users’ data constitutes the base traffic whose profile cannot be shaped. rates have to be throttled to ease congestions [2], [6], [9], at Deferrable traffic refers to the traffic of those applications the cost of the degraded quality of service (QoS). such as file uploading/downloading that are flexible in time Admittedly, the capacity shortfall of cellular networks can and only require being served by a designated deadline, e.g., be mitigated by allocating more wireless spectrum and deploy- finishing photo backup on cellphone by 12 am. Deferrable ing more wireless infrastructures including more and smaller applications (DAs) are further divided into two major types: cells and WiFi networks offloading, etc. However, spectrum (1) continuous-rate interruptible applications such as photos allocation and infrastructure upgrading are not only costly but backup and applications update that allow any data rates— also time-consuming, while WiFi networks may not always be e.g., the delayed offloading in [27], [30], and (2) discrete-rate available and secure. A promising alternative, inspired by the non-interruptible applications such as online movie streaming similar problem of demand response in power networks, is to and video conference that usually require certain constant data improve spectrum and infrastructure efficiency through man- rate [3], [4] and should not be interrupted once started, e.g., aging wireless data traffic (i.e., demand). Notice that wireless one can schedule movie watching or video conference to the traffic or demand usually fluctuates with a large peak-to-valley “valley” time to enjoy better graphic quality and incur less ratio throughout a day; see Fig. 1 for a trace of smartphone data cost if he/she has the time flexibility. See Table I for a X. Zhou and L. Chen are with College of Engineering and Applied Science, summary of traffic types and examples. We seek to schedule University of Colorado, Boulder, CO 80309, USA (emails: {xinyang.zhou, the deferrable traffic to flatten the aggregate traffic profile over lijun.chen}@colorado.edu). a day. Preliminary result of this paper has been presented at the Allerton Confer- ence on Communication, Control, and Computing, Monticello, Illinois, 2014 Specifically, we formulate the cellular traffic demand shap- [39]. ing as an optimization problem that minimizes the (time)
2 Traffic/Application Type Examples Non-deferrable application Online gaming, web browsing future demand and renewable energy supply, and Parise et al Discrete-rate non-interruptible DA Movie streaming, video conference [31] that proposes a decentralized charging control for EVs to Continuous-rate interruptible DA Applications update, photos backup flatten the aggregate power demand profile. They all consider TABLE I: Traffic/Application types and examples. only continuous decision variables. To ease the stress from high demand in cellular networks, various demand-shaping-based methodologies as well as traffic variation in the aggregate traffic profile subject to the time and offloading strategies have been studied in existing literatures. rate specification on each DA. We first assume complete traffic Tadrous et al in [36] propose a paradigm to proactively information and design an offline demand shaping algorithm. serve peak-hour requests during the off-peak time based on There are two challenging issues in the offline algorithm de- prediction to smoothen the traffic demand over time without sign. First, the optimization problem is non-convex because of changing customers’ activity pattern. However, such strategy discrete-rate non-interruptible applications. We instead solve is limited to routine behaviors only. In [19] Hajiesmaili et its convex relaxation and design a randomized scheme based al introduce an online procurement auction framework to on the solution to the relaxed problem. Second, demand incentivize mobile devices to participate in device-to-device shaping involves potentially a huge number of applications load balancing to offload traffic from one heavy-loaded base and users. A centralized algorithm is not scalable. We instead station to adjacent idle ones. Besides, WiFi and femtocell design an iterative and distributed algorithm based on the offloading of cellular data is another major approach to easing descent method. We establish the almost surely convergence the congestion of cellular networks; see [10], [13], [22], [26], for the algorithm based on supermartingale theory. [27], [30] for related works. We then consider a more realistic setting with incomplete In this paper we have focused on designing demand shaping information where we can only predict future traffic to a algorithms based on a general and simplified system model. certain degree of accuracy, and design an online and distributed We do not investigate the important practical issues such as the demand shaping algorithm that updates the schedules of DAs timescale and granularity at which we schedule and reschedule each timeslot when new information and updated prediction the DAs. We plan to develop a platform to enable automatic are available, based on the offline algorithm for an optimiza- demand shaping in the future, and will investigate various tion problem over a shrinking horizon from the current time to practical issues then. Also, demand shaping involves not only the end of the day. We compare the performance of the online the design of control algorithms but also the design of right algorithm against the optimal offline algorithm, and provide mechanisms to incentivize the users to move out of their numerical examples to complement the theoretical analysis. “comfortable zone” in wireless applications and data usage. The rest of the paper is organized as follows. Section II Incentive design for demand shaping is currently an active briefly reviews some related work and discusses some related research area; see, e.g., the smart data pricing in wireless issues. Section III describes the system model and problem for- networks [18], [35], [37], pricing design in general network mulation. Section IV presents an offline distributed algorithm service to remove congestions [23], [32], pricing/reward sig- for demand shaping under the assumption of complete traffic nals in power distribution system [28], [40], and the references information and characterizes its performance. Section V con- therein. siders a realistic setting of incomplete traffic information, and Some discussion on the practicality of demand shaping presents an online algorithm for demand shaping. Section VI is also in place. People tend to use mobile data services provides numerical examples to complement theoretical anal- whenever they want, regardless of whether it is at peak time ysis, and Section VII concludes the paper. or valley time for the cellular network. However, a survey [17] conducted in India and USA in 2012 shows that, given proper II. R ELATED W ORK AND I SSUES monetary incentive, many people are willing to postpone their Demand shaping in cellular networks is similar to demand mobile data usage, with acceptable postponement varying from response in power networks, in terms of design objectives, minutes to hours, depending on different types of services and problem formulation, and the associated algorithmic chal- different individual preferences [18]. For example, wireless lenges. Indeed, we borrow insights from demand response in service providers can motivate the users to shift their demand power networks; see, e.g., [12], [14], [15], [29]. In particular, by implementing the time-dependent pricing (TDP) strategy. our online demand shaping algorithm is motivated by the TDP is now applied as a simple two-period plan by many solution approach for online control of continuous load in wireless service providers around the world, in voice services reference [15], and mathematically can be seen as its exten- and data services; e.g., Verizon [8] and Sprint [5] in the US sion to incorporate discrete decision variables considered in have “happy hours” in the night and weekend for voice service, reference [14]. However, our model captures realistic cellular TelCom [7] in South Africa has “Night Surfer” plans giving traffic settings, as it includes both continuous and discrete de- free data from 11pm to 5am, and Airtel [1] in India provides cision variables. Moreover, the integration of discrete decision unlimited data in the night. More refined TDP strategies can variables into the online algorithm makes the performance be applied to maximize benefits for both wireless service analysis of the algorithm more challenging, compared to that providers and users, by dynamically adjusting prices according in [15]. Related work also includes Zhao et al [38] that designs to the data usage of the current time and predicted future. a centralized online EV charging algorithm to minimize the For instance, Ha et al [18] have worked on a TDP-based peak procurement from the grid under uncertain prediction of application named TUBE. Trials in cooperation with a local
3 t time index, t ∈ T := {1, . . . , T } n DA index, n ∈ N := {1, · · · , N } We assume that δb(t) has a mean of 0 and variance of δ 2 (t), N0 set of N 0 continuous DAs and may be temporally correlated. We further assume that we N 00 set of N 00 = N −N 0 discrete DAs can make better prediction for the timeslots that are closer N̂t00 set of discrete DAs started earlier to current time, modeled by a time-dependent deviation from Ñt set of DAs adjustable at time t b base traffic profile, b = {b(t); t ∈ T } the mean, i.e., the base traffic at some future time τ ∈ T is pn data rate profile of DA n, pn = {pn (t); t ∈ T } predicted at current time t by pn (t) upper bounds of DA n on the data rate at time t rn constant bit rate for DA n ∈ N 00 bt (τ ) = b̄(τ ) + δbt (τ ), (1) ln number of timeslots to finish transmission for DA n ∈ N 00 q virtual deferrable traffic profile where the subscript t represents the timeslot when the pre- d average traffic profile diction is made, and δbt (τ ) has a decreasing variance δt2 (τ ) dˆ average traffic profile of online ODS as t approaches τ . More concrete model for prediction will dˆ∗ average traffic profile of online relaxed ODS be introduced in Section VI. The parameters b̄ and δt will be d∗ average traffic profile of offline relaxed ODS Pn P total traffic required from DA n, Pn = t∈T pn (t) specified exogenously, and can be estimated from the historical Pn (t) remaining traffic to be served for DA n ∈ Nt0 traffic records. xkn change in traffic profile of DA n, xkn = pk+1 n − pkn tan arrival time of DA n tdn deadline of DA n B. Deferrable Applications An number of feasible profiles of DA n ∈ N 00 fn,a a-th feasible profile of DA n ∈ N 00 Assume that there are N DAs in the network, indexed un,a probability corresponding to fn,a by n ∈ N = {1, · · · , N }. Each DA n is characterized by Fn set of all feasible traffic profiles for discrete DAs, an arrival time tan when it is requested or after which it Fn = {fn,a ; 1 ≤ a ≤ An } V (d) objective value: (time) variance of d can be started, a deadline tdn by which its transmission must be done, and certain requirement or constraint on data rate TABLE II: Main notation. pn = {pn (t); t ∈ P T }. Let Pn denote the total traffic required by DA n, i.e., t∈T pn (t) = Pn . We can classify DAs wireless service provider shows its effectiveness in shaping the into two main categories: continuous-rate interruptible DAs traffic profile [24]. Also refer to [34] for a review of pricing (or continuous DAs for simplicity) that allow any data rates strategies. between certain upper and lower bounds and can be interrupted and resumed at any time before the deadline, and discrete- III. S YSTEM M ODEL AND P ROBLEM F ORMULATION rate non-interruptible DAs (or discrete DAs for simplicity) Consider a cellular network that serves users for different that require certain (roughly) constant data rate and cannot applications such as web browsing, file sharing, real-time be interrupted once they are started. For example, system entertainment, etc. The applications can be broadly divided backup is usually interruptible and allows any continuous data into two categories: deferrable applications (DAs) and non- rates, while video conference is usually preferred to be non- deferrable applications (non-DAs). DAs refer to those applica- interruptible and runs at a constant (thus discrete) data rate tions that are flexible in the starting time and/or data rate, while once it is started. the non-DAs refer to those that should be served immediately Among the total N DAs, we assume there are N 0 continuous and often have stringent data rate requirement. Please refer DAs, indexed by n ∈ N 0 = {1, · · · , N 0 }. For each continuous to the third paragraph of Section I and TABLE I for more DA, denote by pn (t) and pn (t) the lower and upper bounds detailed description and examples of DAs and non-DAs. on its data rate at time t ∈ T , i.e., This work aims to schedule the traffic of DAs so as to flatten pn (t) ≤ pn (t) ≤ pn (t), t ∈ T . (2) the aggregate traffic profile over a day, subject to the time Naturally, 0 ≤ pn (t) ≤ pn (t). The lower bounds pn (t) are constraints and rate constraints of each application. We use a usually zero, and the upper bounds pn (t) can be set according discrete-time model where one day is divided equally into T to, e.g., the available bandwidth. The arrival time tan and the timeslots, indexed by t ∈ T = {1, 2, · · · , T }. The duration of deadline tdn can be integrated into the rate constraints (2) by a timeslot can be, e.g., 30 minutes or 1 hour [18], depending setting pn (t) = 0 for t < tan and t > tdn , i.e., no traffic is on the time resolution of scheduling decisions. transmitted before arrival time or after deadline. Index the rest N 00 = N −N 0 discrete DAs by n ∈ N 00 = A. Non-Deferrable Applications {N 0 + 1, · · · , N }. For a discrete DA such as a streaming Non-DAs include web browsing, online gaming, and real- application, a constant bit rate rn corresponds to a certain time chatting with multimedia, etc. The latency tolerated by graphic quality, e.g., rn = 3 Mbps for a SD quality movie these applications usually varies from hundreds of millisec- on Netflix [4], and rn = 1.2 Mbps for a HD video call on onds to seconds. Since these applications should be served Skype [3]. As the graphic quality usually (preferrably) does immediately upon request, their traffic is inelastic and consti- not change during those applications, this seemingly over- tutes the base traffic whose profile cannot be shaped. Denote simplified assumption of a single discrete rate is reasonable. the base traffic profile by b = {b(t); t ∈ T }. As we can only For each DA n ∈ N 00 with its total traffic Pn and the rate predict the base traffic to a certain accuracy, we model it as rn , it takes ln = Pn /rn consecutive timeslots (or equivalently a random vector with mean b̄ = {b̄(t); t ∈ T } and random the other way around, i.e., we calculate Pn = ln ∗ rn based derivation δb = {δb(t); t ∈ T } from the mean, i.e., b = b̄+δb. on ln and rn ). Therefore, the number of its feasible traffic
4 profiles is An = tdn − tan − ln + 1, wherein the a-th feasible constraint (3e). Consider the convex hull of Fn , defined as profile is denoted as n An X n rn , if tan + a − 1 ≤ t ≤ tan + a + ln o conv(Fn ) := pn | pn = un,a · fn,a , ua,n ≥ 0 fn,a = pn pn (t) = . a=1 0, otherwise An X o 00 and un,a = 1 , (4) We denote the set of all feasible traffic profiles of DA n ∈ N by Fn = {fn,a : 1 ≤ a ≤ An }, i.e., pn ∈ Fn , ∀n ∈ N 00 . a=1 Remark 1: All the modeled traffic parameters can be rea- where un := {un,1 , . . . , un,An } is the convex combination sonably accessed or estimated in practice. For example, infor- coefficients, and will be interpreted as probability distribution mation regarding total required traffic Pn and video streaming in the randomized algorithm to be introduced soon. We will rate rn is available from metadata of traffic to be transmitted, instead solve the convex relaxation of the ODS problem by parameters like tan and tdn are specified by the users in advance replacing (3e) with the following constraint: (and Fn can then be calculated accordingly), whereas data rate pn ∈ conv(Fn ), n ∈ N 00 . (5) bounds pn (t) and pn (t) can be either determined by available We call the relaxed problem (3a)–(3d)(5) the R-ODS problem. bandwidth or designated by the users. See, e.g., [18] for an However, a solution p∗n ∈ conv(Fn ), n ∈ N 00 to the R-ODS example system involving similar information requirement and problem might not be feasible for original ODS, i.e., p∗n ∈ / Fn . implemented with real users and service provider. 2 solution p∗n can always be written But since by definition (4) aP An as the convex combination a=1 un,a fn,a we will randomly C. Problem Formulation pick a traffic profile pn = fn,a ∈ Fn with corresponding We aim to schedule the traffic of DAs, so as to flatten probability un,a . That said, we will design a randomized the aggregate traffic profile as much as possible. Denote the algorithm for the offline ODS problem, based on the solution “average” traffic profile by d = {d(t); t ∈ T } := N1 (b + to the R-ODS problem. We will integrate it into a distributed algorithm next. P n∈N pn ). Traffic flattening can be achieved by minimizing the time variance of d, formulated as the following optimal demand shaping (ODS) problem: ODS: 1 X 1 X 2 min V (d) = d(t) − d(τ ) (3a) p,d T T B. Distributed Algorithm t∈T τ ∈T 1 X s.t. d(t) = b(t) + pn (t) , t ∈ T , (3b) N n∈N Solving the R-ODS problem (and the offline ODS problem) pn (t) ≤ pn (t) ≤ pn (t), t ∈ T , n ∈ N 0 , (3c) directly in a centralized way requires collecting information on X pn (t) = Pn , n ∈ N 0 , (3d) all DAs, which may incur too much communication overhead t∈T and is impractical in the real network. Moreover, the users may pn ∈ Fn , n ∈ N 00 . (3e) not be willing to reveal information on DAs due to privacy Notice that the constraints (3e) for discrete DAs are non- concern. Therefore, we seek to solve it in a distributed way. convex. In next section, we will investigate an offline algorithm Noticing that R-ODS problem has decoupled constraints, we together with a randomized scheme for solving the ODS attempt to design an iterative and distributed algorithm based problem under the assumption of complete information on the on the decent method [11]. base traffic and DAs. Then in Section V, we will study an Before deriving the algorithm, we establish the following online algorithm for demand shaping under a more realistic useful results. At k-th iteration, let pk = k P{pn ; nk ∈ N } be the k 1 setting of incomplete information where we can only predict traffic profiles of all DAs, d = N (b + n∈N pn ) the average the future traffic to a certain degree of accuracy. The offline traffic profile, and xkn = pk+1 n − pkn , n ∈ N the change in ODS problem and algorithm will later serve as a benchmark traffic profile of DA n from iteration k to k + 1. We have: to characterize the performance of the online algorithm. X k 2 X X 2 E xn 2 = V ar(xkn ) + E[xkn ] 2 , (6) n∈N n∈N n∈N IV. O FFLINE D EMAND S HAPING A LGORITHM where the variance V ar(xkn ) := E kxn k2 − kE[xkn ]k22 , k 2 and 1 In this section, we assume complete traffic information, i.e., E[·] denotes the average. By Jensen’s inequality, the base traffic and arrival of DAs are accurately known, and k X E[xkn ]k22 ≤ N X 2 E[xkn ] 2 . (7) study how to solve the resulting offline ODS problem. The n∈N n∈N offline problem and algorithm will provide insights into the Therefore, one has online algorithm design for a realistic setting of incomplete X k 2 X X 2 information that will be considered in Section V. E k xn k2 ≤ V ar(xkn ) + N E[xkn ] 2 . (8) n∈N n∈N n∈N A. Convex Relaxation and Randomized Scheme The offline ODS problem is non-convex, as each discrete 1 Notice that we consider a randomized scheme only for discrete DAs. That DA has to pick a traffic profile from a discrete set; see said, for continuousDAs there is no randomness and their variance is zero.
5 And it follows that algorithm is not only preserving privacy of the users, but also 2 T N E[V (d k+1 k )|p ] − V (d ) k scalable and thus capable of quick response, which is crucial X k 2 X especially in real-time implementation in Section V. xn k2 + 2hN dk , xkn i = E k The computational complexity of the Off-DS algorithm is X n∈N X n∈N X estimated as follows for completeness. Given certain accuracy ≤ V ar(xkn ) + N kE[xkn ]k22 + 2 E[hN dk , xkn i] requirement > 0 in the objective function value, the n∈N n∈N n∈N X descent method requires O(log(1/)) iterations [11]. At each X = 2hN dk , xkn i + N kxkn k22 + 2hN dk , E[xkn ]i iteration, DAs solves an easy quadratic programming with a n∈N 0 n∈N 00 polynomial complexity of O(T O(1) ) [33]. On the other hand, + N kE[xkn ]k22 + V ar(xkn ) . (9) the coordinator calculates the average traffic profile which Denote by W1 the first term in (9) and W2 the second. For requires O(N ) complexity each iteration. As a result, the Off- n ∈ N 0 , we choose pk+1 so as to minimize W1 , i.e., to solve DS algorithm requires overall computational complexity of n O (N + T O(1) ) log(1/) . min 2hdk , pn − pkn i + kpn − pkn k22 (10a) pn Remark 2: For simpler expression, we use pn as the deci- s.t. (3c) − (3d). (10b) sion variable for DA n ∈ N 00 in algorithm design and analysis, On the other hand, after some mathematical manipulations, while in real implementation, it is more convenient to use we have probability distribution un as the equivalent decision variable. X Also notice that, if there is no continuous DA, Algorithm 1 2N hdk − pkn , E[pk+1 k+1 2 k W2 = n ]i+(N −1)kE[pn ]k2 +Π , reduces to the stochastic algorithm in [14]. We expect that n∈N 00 the solution approach—randomized algorithm based on the where Π is a constant given pkn . For n ∈ N 00 , we choose k “steepest” descent method for the convex relaxed problem— pn∗k+1 so as to minimize W2 , i.e., to solve that we lay out in Sections IV-A and IV-B will find broad N −1 application in designing efficient algorithms for optimization min 2hdk − pkn , pn i + kpn k22 . (11) pn ∈conv(Fn ) N problems that involve both continuous and discrete decision In essence, what we have done is to maximize the expected variables. 2 incremental decrease in the objective value V (d) at each iteration (i.e., steepest descent). This motivates a distributed demand shaping algorithm with the collaboration of a coor- dinator; see Algorithm 1. The wireless service provider can implement a logical coordinator at the base station. C. Convergence Algorithm 1 Offline Demand Shaping (Off-DS) Algorithm Before showing the convergence of the Off-DS algorithm, we first establish two useful relations. For each DA n ∈ N 0 , At k-th iteration: since pk+1 n solves the problem (10), we have the first-order 1) Upon gathering traffic profiles pkn from DAs, the coordi- optimality condition nator calculates the average traffic profile dk = N1 (b + P k hpk+1 − pkn + dk , pn − pk+1 n i≥0 (12) n∈N pn ) and announces it to DAs (or the end users) n over a signaling or control channel. for any feasible pn . Set pn = pkn to obtain 2) Upon receiving the average traffic profile dk , hd k , pk+1 − pkn i ≤ −kpk+1 − pkn k22 . (13) 0 n n • DA n ∈ N updates its traffic profile by 00 2 For each DA n ∈ N , recalling that = p∗k+1 n E[pk+1 n ], by the pk+1 n = arg min pn − pkn + dk 2 first-oder optimality condition, we have pn s.t. (3c)–(3d), N h (dk − pkn ) + p∗k+1 n , pn − p∗k+1 n i≥0 (14) and submits it to the coordinator. N −1 • DA n ∈ N 00 calculates the average traffic profile by for any feasible pn . Set pn = pkn to get N 2 hN dk , p∗k+1 n − pkn i ≤ −(N − 1)kp∗k+1n − pkn k22 pn∗k+1 = arg min pn − (pkn − dk ) , pn ∈conv(Fn ) N −1 2 + hpkn , p∗k+1 n − pkn i. (15) ∗k+1 PAn k+1 which is pn = a=1 un,a fn,a , and then ran- Now, construct a filtration Σ∗ of the probability space domly chooses a traffic profile pk+1 n = fn,a with {Ω, Σ, P}, where the sample space Ω is the feasible set probability uk+1 n,a and submits it to the coordinator. specified by the constraints (3c)–(3e), the σ-algebra Σk = Ω, k ≥ 0, and P(Σk ) = {δ(pn − pkn ), n ∈ N 0 ; ukn,a , 1 ≤ a ≤ An , n ∈ N 00 }, i.e., determined by the k-th iteration of The Off-DS algorithm is a distributed algorithm wherein the Off-DS algorithm. each DA solves its own simple optimization problem based on its previous decision, the average traffic profile dk , and local Theorem 1: The pair (V (d), Σ∗ ) is a supermartingale. 2 constraints, while the coordinator collects the proposed traffic Proof: First, notice that V (d) is bounded from below. So, profiles and updates the average traffic profile. Therefore, this E[− min{0, V (d)}] < ∞. Second, applying relations (13)–
6 (15) to equation (9), we obtain discrete DAs increases, i.e., 2 k+1 k k lim Goff T N E[V (d )|p ] − V (d ) r = 0. (18) N 00 →∞ 2 X X k 2 ≤ −N kxn k2 + V ar(xkn ) P n∈N 0 n∈N 00 Proof: For notational simplicity, let cd := t∈T d(t)/T , 2 + 2hpkn , pn∗k+1 − pkn i E[xkn ] 2 + (−N + 2) which is a constant given the total amount of traffic. The X X 2 objective value can be written as = −N kxkn k22 + (−N + 1) E[xkn ] 2 1 1 n∈N 0 n∈N 00 V (d) = kd − cd · 1k22 = (kdk22 + c2d k1k22 − 2hd, 1i) ≤ 0, T T 1 i.e., E[V (dk+1 )|pk ] ≤ V (dk ). By definition, (V (d), Σ∗ ) is a = (kdk22 + T · c2d − 2T · cd ), T supermartingale [16]. where only the part kdk22 contains decision variables. We can Notice that (V (d), Σ∗ ) is a nonnegative supermartingale. thus write the gap Goff as By the martingale convergence theorem [16], the following 1 Goff = V (d∞ ) − V (d∗ ) = kd∞ k22 − kd∗ k22 result is immediate. T Corollary 1: V (d∞ ) = limk→∞ V (dk ) exists almost = 1 − kd∞ − d∗ k22 + h2d∞ , d∞ − d∗ i surely, where V (d∞ ) is some random variable. 2 T Theorem 2: Denote by P ∞ an “equilibrium” distribution 1 ≤ h2d∞ , d∞ − d∗ i over traffic profiles that (V (d), Σ∗ ) converges to. The support T X 2 ∞ ∞ ∗ X ∞ ∞ ∗ of P ∞ is a singleton. 2 = hN d , p n − pn i + hN d , p n − p n i N2 Proof: When (V (d), Σ∗ ) converges, E[V (dk+1 )|pk ] = n∈N 0 2 X ∞ ∞ n∈N 00 ∗ V (dk ). This requires E[xkn ] = E[xkn0 ], n, n0 ∈ N , pk+1 n = ≤ hpn , pn − pn i TN2 pkn , n ∈ N 0 , and pn∗k+1 = pkn , n ∈ N 00 for (8), (13), and n∈N 00 2 X (15) to hold with equality. Notice that p∗k+1n = pkn implies ≤ kp∞ 2 n k2 , pn = pn , as different feasible traffic profiles of DA n ∈ N 00 k+1 k TN2 00 n∈N are linearly independent. Thus, pk+1 n = pkn , n ∈ N . So, the where the second inequality follows from (16). Note that ∞ support of P contains only one point. kp∞ 2 00 n k2 is a constant for n ∈ N . Then the relative gap Gr off Denote by p∞ an “equilibrium” traffic profile of the Off-DS can be bounded as algorithm, i.e., if pk = p∞ , then pk+1 = p∞ . Obviously the 2 X Goff r ≤ kp∞ 2 ∗ n k2 /V (d ) set of equilibrium profiles is not empty, as an optimum of the TN2 00 n∈N offline ODS problem is an equilibrium. The following result ∞ 2 P n∈N 00 kpn k2 follows immediately from Theorem 2 and Corollary 1. = ,(19) kb + n∈N p∗n k22 + N 2 (T · c2d − 2T · cd ) P Theorem 3: The Off-DS algorithm converges almost surely whose numerator increases linearly with N 00 and denominator to an equilibrium traffic profile. 2 increases linearly with the square of N 00 . Equation (18) By equations (12)–(14), we have the following optimality follows. conditions at equilibrium p∞ : for any feasible pn , X Remark 3: We use the relaxed problem R-ODS for compar- hb + p∞ ∞ m , pn − pn i ≥ 0, n ∈ N , 0 (16a) ison instead of the ODS problem for two reasons. First, it is m∈N X difficult to characterize the optimum of the non-convex ODS hb + p∞ ∞ m , pn − pn i ≥ 0, n ∈ N . 00 (16b) problem, and thus evaluating the gap between the equilibrium m6=n of the Off-DS algorithm and the optimum of ODS problem is mathematically hard. Second, R-ODS achieves an optimal ob- jective value that is not greater than ODS, resulted from convex D. Performance Analysis of the Offline Algorithm relaxation for the discrete decision variables. Therefore, Goff We now characterize the performance of Off-DS algorithm provides an upper bound for the “actual” sub-optimality, i.e., with respect to the relaxed problem R-ODS that at optimum the gap between the equilibrium of Off-DS and the optimum may attain a lower objective value than the ODS problem. of ODS. 2 Specifically, denote by p∗ the solution of R-ODS, we bound the gap between the equilibrium of the Off-DS algorithm and V. O NLINE D EMAND S HAPING A LGORITHM the solution of the R-ODS P problem as: Goff := V (d∞ ) − ∗ ∞ ∞ ∗ In this section, we consider a realistic setting with incom- V (d ), where d = (b + n∈N pn )/N and d = (b + ∗ ∞ ∗ plete information where we can only predict future traffic off ))/V (d∗ ) P n∈N n p )/N . Denote by Gr := (V (d ) − V (d to a certain degree of accuracy, and study online demand the relative gap achieved by the Off-DS algorithm. shaping that makes decisions based on the prediction of future Theorem 4: For the Off-DS algorithm, the gap Goff is traffic and updates the decision as new information becomes bounded as follows: 2 X available. Goff ≤ kp∞ 2 n k2 . (17) A typical algorithm used in this setting is the receding TN2 00 n∈N horizon control; see, e.g., [25]. However, as the objective Moreover, the relative gap diminishes as the number N 00 of function (3a) does not have a nice additive structure, receding
7 horizon control algorithm does not admit an easy analysis. Algorithm 2 Online Demand Shaping (On-DS) Algorithm We will instead extend a shrinking horizon control algorithm, At each timeslot t ∈ T : (t−1) which is used in [15] that studies mathematically the same 1) Denote by pn , n ∈ Nt−1 the schedules determined problem with only continuous DAs, to include discrete DAs, by time t − 1, and by N̂t00 ⊆ Nt00 the set of discrete and apply it to our online demand shaping (online DS) DAs that has been started before time t. For each DA problem. n ∈ N̂t00 , set its schedule pn (t; T ) = {pn (τ ); t ≤ τ ≤ T } (t−1) as pn (τ ) = pn (τ ), t ≤ τ ≤ T . A. Online Algorithm 2) Solve the ODSt problem iteratively: at k-th iteration, We assume that the number mt of DAs arriving at time t a) Upon gathering traffic profiles pkn (t : T ) = {pkn (τ ); t ≤ is randomly distributed with a mean λt and variance (δλt )2 , τ ≤ T } from DAs n ∈ Ñt , the coordinator solves and the total amount of traffic of each DA is randomly XT X X 2 distributed with a mean P and variance (δP )2 . Denote by min bt (τ ) + q(τ ) + pn (τ ) + pkn (τ ) q(t+1:T ) Nt0 = {1, · · · , Nt0 } the set of continuous DAs and Nt00 = τ =t+1 n∈N̂t00 n∈Ñt {N 0 + 1, · · · , Nt } the set of discrete DAs that have arrived s.t. (20f), by time t ∈ T , and let Nt = Nt0 ∪ Nt00 and Nt00 = Nt − Nt0 . to obtain a virtual deferrable traffic {q k (τ ); t + 1 ≤ k Notice that we cannot reschedule the remaining traffic of a τ ≤ T }, and then calculates P traffickd (τ) = the average discrete DA that has already started. Denote by Ñt00 ⊆ Nt00 1 k P Nt bt (τ )+q (τ )+ p n∈N̂t00 n (τ )+ n∈Ñt n ) for p (τ the set of discrete DAs that have not been started by time t. τ ≥ t and announces it to DA n ∈ Ñt over a signaling For DA n ∈ Ñt00 , denote by Fn (t) = {fn,a ; 1 ≤ a ≤ An (t)} or control channel. the set of feasible traffic profiles at time t. Let Ñt = Nt0 ∪ Ñt00 b) Upon receiving the average traffic profile dk , be the set of DAs whose profiles are still adjustable at time t 0 k+1 • DA n ∈ Nt obtains pn (t : T ) by (i.e., all the continuous DAs and the discrete DAs that have 2 not started by time t). min pn (t : T ) − pkn (t : T ) + dk (t : T ) 2 pn (t:T ) At time t, we make a prediction bt (t : T ) of base traffic for s.t. (20c)–(20d), the rest timeslots of the day, and we also have the information and submits the updated profile to the coordinator. on DAPn ∈ Nt and the expected total future deferrable • DA n ∈ Ñt00 calculates p∗k+1 (t : T ) by T n traffic τ =t+1 P λτ . Following [15], we introduce a virtual 2 Nt deferrable trafficPprofile q(t : TP ) = {q(τ ); t ≤ τ ≤ T } with min pn (t : T ) − (pkn (t : T ) − dk (t : T )) q(t) = 0 and T q(τ ) = T pn (t:T ) Nt − 1 2 τ =t τ =t+1 P λτ , to emulate the s.t. pn (t : T ) ∈ conv(Fn (t)), n ∈ Ñt00 , impact of the future deferrable traffic upon the current demand shaping decision. With the afore setup, we aim to schedule and represents it as a convex combination p∗k+1 n = PAn (t) k+1 reschedule the DAs, so as to solve the following problem at a=1 u f n,a n,a , and randomly chooses a traffic each timeslot t ∈ T . profile pk+1 n = fn,a with probability uk+1 n,a and ODSt : submits it to the coordinator. T PT 1 X d(s) 2 min V (d) = d(τ ) − s=t (20a) T −t+1 τ =t T −t+1 B. Performance Analysis of the Online Algorithm over p(t : T ), d(t : T ), q(t : T ) We now characterize the performance of On-DS algorithm P bt (τ )+q(τ )+ n∈Nt pn (τ ) with respect to the result of Off-DS algorithm which serves s.t. d(τ ) = , τ ≥ t, (20b) Nt as a benchmark. We will make the following assumptions to pn (τ ) ≤ pn (τ ) ≤ pn (τ ), τ ≥ t, n ∈ Nt0 , (20c) simplify the analysis and obtain insights into how uncertainties T X affect the performance of On-DS algorithm. pn (τ ) = Pn (t), n ∈ Nt0 , (20d) Assumption 1: The amount of deferrable traffic is large and τ =t flexible enough so that a valley-filling schedule exists at every pn ∈ Fn (t), n ∈ Ñt00 , (20e) time t = 1, . . . , T , i.e., there exists some constant C(t) ≥ T T X X bt (τ ), ∀τ = t, . . . , T such that q(τ ) = P λτ , (20f) τ =t τ =t+1 N d(t) = C(t) T T Nt where p(t : T ) = {pn (τ ); t ≤ τ ≤ T, nP∈ Ñt }, d(t : T ) = 1 X X X = bt (τ ) + P λτ + Pn (t) . (21) t−1 {d(τ ); t ≤ τ ≤ T }, and Pn (t) = Pn − τ =1 pn (τ ), n ∈ Nt0 T − t + 1 τ =t τ =t+1 n=1 is the amount of traffic to be served at or after time t. 2 We can solve the ODSt problem at each timeslot the same Remark 4: Assumption 1 looks a strong assumption, and way as we solve the offline ODS problem (3), constituting an we do not have empirical evidence to support it as demand online demand shaping algorithm; see Algorithm 2, wherein shaping has not being widely adopted in current cellular the convergence (and computational complexity) of Step networks. However, with increasing penetration of deferrable 2) can be established (and analyzed) in the same way as traffics and users, this assumption expects to hold. One purpose Algorithm 1. of algorithm design as in this paper and incentive design
8 rem 4, we have ˆ − V (dˆ∗ ) ≤ 2 X kp̂n k22 , 0 ≤ E V (d) (25) TN2 n∈N 00 2 X kp̂n k2 ≤ E V (d ) − V (d∞ ) ≤ 0. 2 ∗ − (26) TN2 n∈N 00 For the second term of (23), under Assumptions 1–2, following [15], we get T T −1 Fig. 2: Strategy to calculate the gap between the equilibrium (δλ)2 X 1 δ2 X 2 T − t − 1 E V (dˆ∗ )−V (d∗ ) = of the On-DS algorithm and that of Off-DS algorithm. + 2 F (t) . T t=2 t T t=0 t+1 (27) Combine (25)–(27) to obtain (24). as in [18] is to facilitate and incentivize wide adoption of Theorem 5 indicates that, the size of the gap between online demand shaping. On the other hand, valley-filling represents and offline algorithms changes monotonically with prediction the scenario where demand shaping is most useful and presents error of both base traffic and future arrival of deferrable traffic. a benchmark for the potential of demand shaping. Mathe- Accordingly we can improve the result of On-DS algorithm matically, it is very difficult to analyze the performance of by implementing better prediction mechanism, e.g., On-DS the online algorithm under more general assumption than algorithm which updates its prediction to keep the value of Assumption 1. However, notice that in numerical examples in prediction error small. Also, if the impulse response f is Section VI, we do not impose Assumption 1 while the results chosen to fade quickly enough, then as we have finer time still fall into the bound specified in Theorem 5. 2 granularity, we have T → ∞, and Gon → 0, which intuitively Assumption 2: The base traffic prediction at t is modeled indicates that, with infinitely small timeslot, we can update as the following causal filter our decisions frequently enough to mitigate prediction errors, T X and therefore have a negligible performance gap. bt (τ ) = b̄(τ ) + e(s)f (τ − s), τ = 1, . . . , T, (22) Lastly, similar to Theorem 4, define a relative gap Gon r := s=1 G /V (d∞ ). The following result is immediate. on where e = {e(s)}Ts=1 is an uncorrelated sequence of indepen- Theorem 6: The relative gap Gon r diminishes as the number dent and identically distributed random variables with mean of discrete DAs N 00 increases, i.e., 0 and variance δ 2 , and f = {f (τ )}∞ τ =−∞ is the impulse t lim Gon r = 0. (28) 2 P response with f (0) = 1. Let F (t) := s=0 f (s). N 00 →∞ We denote by Gon the gap defined as the expected difference 2 Remark 5: It is worth noting that equation (28) does not between the results of On-DS algorithm and Off-DS algo- ˆ − V (d∞ )], where E denotes the necessarily imply a monotone decreasing of Gon r with respect rithm, i.e., Gon = E[V (d) ˆ ∞ to N 00 . This can be seen from Fig. 6 in Section VI that does expectation, and d and d denote the average traffic profiles not show a decreasing Gon 00 r as N increases. 2 achieved by the On-DS algorithm and the offline-DS algorithm By equations (25) and (27), it is straightforward to obtain respectively. It turns out that direct calculation of this gap is the following result. difficult. We therefore utilize two intermediate variables: d∗ , Corollary 2: The expected difference between the On-DS the average traffic profile achieved by the R-ODS problem, algorithm and the optimum of the R-ODS problem is bounded and dˆ∗ , the average traffic profile achieved by the relaxed as follows: online DS, i.e., the counterpart of R-ODS problem in the ˆ − V (d∗ )] ≤ 2 X online scenario. Similar notations are applied to individual E[V (d) kp̂n k22 TN2 traffic profile pn . With the relation shown in Fig. 2, we can T n∈N 00 T −1 write online gap as (δλ)2 X 1 δ2 X 2 T − t − 1 + + 2 F (t) . Gon = E V (d)−V ˆ (dˆ∗ )+V (dˆ∗ )−V (d∗ )+V (d∗ )−V (d∞ ) T t=2 t T t=0 t+1 ˆ − V (dˆ∗ ) + E V (dˆ∗ ) − V (d∗ ) 2 = E V (d) + E V (d∗ ) − V (d∞ ) . (23) VI. N UMERICAL E XAMPLES Theorem 5: The gap, i.e., the expected difference between In this section, we provide numerical examples to evaluate the results of On-DS algorithm and Off-DS algorithm is the performance of the On-DS algorithm. We use certain bounded as follows: composite traffic traces to drive simulations to show the impact of base traffic prediction errors, deferrable traffic prediction ˆ − V (d∞ )] ≤ 2 X Gon = E[V (d) kp̂n k22 errors, and deferrable traffic penetration levels. We expect the TN2 00 n∈N conclusions obtained to hold for real traffic. T T −1 (δλ)2 X 1 δ2 X 2 T − t − 1 + + 2 F (t) . (24) T t=2 t T t=0 t+1 A. Experimental Setup 2 Consider a 48-hour period of time starting from 4:00 pm to Proof: Applying the approach and results from Theo- 3:59 pm two days later. We divide the 48 hours equally into
9 15.13 1100 average base traffic 1000 "real" base traffic 15.125 objective function value 900 aggregate traffic 800 15.12 700 15.115 600 500 15.11 400 15.105 300 1 10 20 30 40 16:00 22:00 04:00 10:00 16:00 time of day number of iterations Fig. 4: Repetitive experiments show that a number of 20 to Fig. 3: Base traffic: the average (blue/dotted) and a “real” trace 30 iterations give a satisfying result in terms of convergence. (red/solid). 3) Benchmarks for Comparison: We compare the perfor- 96 timeslots, each 30 minutes long. We consider scheduling mance of the On-DS algorithm with a few typical benchmarks traffic that arrives within the first 24 hours only, which may to evaluate the impact of base traffic prediction error, the be allocated to the second 24 hours. benefit of updating the prediction in real time, and the impact 1) Non-deferrable Traffic: The “real” trace we use for non- of deferrable traffic’s penetration level. We thus consider the deferrable traffic, or base traffic, is shown in Fig. 3 (red line). It followings five cases in our experiments: is constructed by random fluctuation around the average base (0) Offline demand shaping w/ Off-DS algorithm. We use traffic trace (blue line) composed based on North American “real” trace for future base traffic and use arrival infor- mobile web browsing activity by time of day in 2013 [21], mation recorded from case (1) below for DAs. Applied shown in Fig. 1. As modeled in Section III-A, the prediction with Off-DS algorithm, this case gives the optimal per- of base traffic follows (1), consisting of average base traffic formance used as benchmark to characterize the gap of b̄(τ ) and random deviation δbt (τ ) from the average value. other cases. Following [15], at time t, δbt (τ ) is modeled as (1) Online demand shaping w/ On-DS algorithm. We make τ X prediction for both DAs’ arrival and base traffic in the δbt (τ ) = ωs (τ ), t < τ ≤ T, (29) future. Prediction is updated at each timeslot. We run s=t+1 On-DS algorithm to schedule traffic. where ωs (τ ) are random variables of Gaussian distribution (2) Online demand shaping w/ exact information for base with 0 mean and variances traffic and w/o exact information for DAs. We use “real” σ2 trace for base traffic and prediction for DAs. We apply E[ωs2 (τ )] = , 1 ≤ s ≤ τ ≤ T. (30) τ −s+1 On-DS algorithm. Comparison of case (2) with case (1) In this way, δbt (τ ) has decreasing variance as t approaches τ , shows the impact of uncertainty in base traffic. simulating a gradually improving prediction for some future (3) Demand shaping w/ updating prediction of base traffic timeslot τ as one gets closer to it. In simulation, we take the and w/ exact information for DAs. We use DAs arrival values of σ 2 in (30) from 0 to 100 with increment of 10, information recorded from case (1). Instead of applying corresponding to a root-mean-square prediction error (RMSE) virtual deferrable traffic, we schedule traffic profiles for ranging from 0% to 32%, looking 48 timeslots (24 hours) all the future deferrable traffic. Since the exact base ahead. traffic information is not available, we updated base 2) Deferrable Traffic: We assume that the number of DAs traffic prediction at each timeslot. Comparison of case (3) arriving at each timeslot follows a “shifted” Poisson process and (1) shows the impact of uncertainty in DAs arrival m + poissrnd(λp ), with m ≥ 0 and poissrnd(λp ) denoting a prediction. Poisson process with rate λp . Here, we set λp = 4, while each (4) Demand shaping w/o updating prediction of base traffic DA has a 50-50 chance to require continuous- or discrete-rate and w/ exact information for DAs. We use prediction of traffic. The total traffic Pn of each DA is uniformly distributed the base traffic at the beginning (t = 1) without further in [P , P ] where we set P = 12 and P = 24. The deadline for updating, and use arrival information recorded from case DA n is uniformly distributed in [tan + ln + D, tan + ln + D], (1) for DAs. This case shows how the online algorithm where ln = pPn /pn q is the minimum number of timeslots benefits from updating prediction at each timeslot. required by the DA calculated by ceiling function p·q. We set We use the metric of relative gap Gr (d) = (V (d) − D = 6, D = 14, and a universal bit rate upper bound pn = 3. V (d0 ))/V (d0 ) to evaluate the performance, where d0 is the
10 2 Fig. 5: Base traffic prediction error has little impact on online Fig. 6: Increasing penetration level of deferrable traffic does algorithms with updated base traffic prediction. not influence the relative gap of online algorithms. results obtained from case (0). Also notice that when d is cal- VII. C ONCLUSION culated based on case (1), Gr (d) becomes Gon r in Theorem 6. We have formulated demand shaping in cellular networks as an optimization problem that minimizes the time variation in aggregate traffic subject to the rate and time requirements B. Experiment Results of the applications. We design a distributed and randomized Considering randomness in DAs’ arrivals, base traffic pre- offline demand shaping algorithm under complete traffic in- diction, and deciding traffic profiles for discrete DAs, we run formation and prove its almost surely convergence. We then simulation for 10 times, and take the average as the final result consider a realistic setting with incomplete information where to present. we can only predict future traffic to a certain degree of 1) Convergence Speed: We first run a case of randomly accuracy, and design an online demand shaping algorithm generated 143 continuous DAs and 150 discrete DAs by Off- that updates the schedules of deferrable applications each DS algorithm with different numbers of iterations ranging time new information is available, based on solving at each from 1 to 40 for 10 times. Because of the random process timeslot an optimization problem over a shrinking horizon in choosing traffic profiles for discrete DAs, we observe from the current time to the end of the day. We compare oscillation in objective function values for each individual the performance of the online algorithm against the optimal run. However, the oscillation has a trend of diminishing as offline algorithm analytically and numerically. As future work, the more iterations are implemented, with satisfying enough we are investigating to integrate the incentive mechanisms results generated from running 20 to 30 iterations. See Fig.4 such as the smart data pricing into the demand shaping for the results. We will implement a number of 30 iterations algorithm design. We also plan to develop a platform to enable to make each decision for the rest of simulation. automatic demand shaping in cellular networks and investigate 2) Impact of Base Traffic Prediction Error: As described the related practical issues. in Section VI-A, we can tune the variance σ 2 to emulate situations with different prediction errors in base traffic. As ACKNOWLEDGEMENT Fig. 5 shows, with updated prediction, case (1)’s performance We would like to thank Seungil You for help with simula- is barely affected by the increasing prediction error, keeping its tions and Lingwen Gan for careful comments. relative gap under 5%. This is almost as good as that of case (2) with perfect base traffic information. We can also see from R EFERENCES the performance of case (3) the pure impact from prediction [1] Airtel launches unlimited-usage night plans for calls, internet. errors, while case (4) gives an example showing what happens http://businesstoday.intoday.in/story/airtel-night-plans-unlimited-usage if there is no updated prediction. -for-calls-internet/1/205272.html. 3) Impact of Penetration Level of Discrete DAs: In this [2] AT&T still throttles “unlimited data”—even when network not con- gested. https://arstechnica.com/information-technology/2014/12/att-still case, we fix the prediction error in base traffic at σ 2 = 40 and -throttles-unlimited-data-even-when-network-not-congested/. the average number of DAs’ arrival at each timeslot at λp = 4. [3] How much bandwidth does Skype need? https://support.skype.com/en/f We then tune the penetration level of discrete DAs from 25% aq/FA1417/how-much-bandwidth-does-skype-need. [4] Netflix internet connection speed recommendations. https://help.netflix. to 75% with granularity of 5%. As shown in Fig. 6, the relative com/en/node/306. gap maintains relatively unaffected by the changes of discrete [5] Sprint night and weekend minutes. http://shop2.sprint.com/en/stores/p DAs whose penetration has increased by three times. Here, we opups/voice nights weekends 7pm popup.shtml. [6] T-mobile now throttling mobile hotspots when network is con- do not observe a decreasing relative gap mainly because the gested. https://arstechnica.com/information-technology/2016/10/t-mobil gap is not monotonically decreasing with number of N 00 . e-now-throttling-mobile-hotspots-when-network-is-congested/.
11 [7] Telkom night surfer plan. http://www.telkommobile.co.za/plans/prepaid [33] F. A. Potra and S. J. Wright. Interior-point methods. Journal of -data/60gbpromo/. Computational and Applied Mathematics, 124(1):281–302, 2000. [8] Verizon nationwide for business plans. http://business.verizonwireless.c [34] S. Sen, C. Joe-Wong, S. Ha, and M. Chiang. Pricing data: A look om/content/b2b/en/shop-business-products/business-plans/nationwide-f at past proposals, current plans, and future trends. arXiv preprint or-business.html. arXiv:1201.4197, 2012. [9] Verizon wireless to slow down users with unlimited 4G LTE [35] S. Sen, C. Joe-Wong, S. Ha, and M. Chiang. Smart data pricing (SDP): plans. https://arstechnica.com/information-technology/2014/07/verizo Economic solutions to network congestion. SIGCOMM eBook on Recent n-wireless-to-slow-down-users-with-unlimited-4g-lte-plans/. Advances in Networking, 2013. [10] A. Balasubramanian, R. Mahajan, and A. Venkataramani. Augmenting [36] J. Tadrous, A. Eryilmaz, and H. El Gamal. Proactive resource allocation: mobile 3G using WiFi. Proceedings of International Conference on Harnessing the diversity and multicast gains. IEEE Transactions on Mobile Systems, Applications, and Services, pages 209–222, 2010. Information Theory, 59(8):4833–4854, 2013. [11] S. Boyd and L. Vandenberghe. Convex Optimization. Cambridge [37] L. Zhang. Smart Data Pricing in Wireless Data Networks: An Economic University Press, 2004. Solution to Congestion. PhD thesis, The Hong Kong Polytechnic [12] L. Chen, L. Jiang, N. Li, and S. H. Low. Optimal demand response: University, 2016. Problem formulation and deterministic case. Control and Optimization [38] S. Zhao, X. Lin, and M. Chen. Peak-minimizing online EV charging: Theory for Electric Smart Grids, 2012. Price-of-uncertainty and algorithm robustification. Proceedings of IEEE [13] M. H. Cheung, F. Hou, J. Huang, and R. Southwell. Congestion-aware Conference on Computer Communications (INFOCOM), pages 2335– distributed network selection for integrated cellular and Wi-Fi networks. 2343, 2015. IEEE Journal on Selected Areas in Communications, 35(6):1269 –1281, [39] X. Zhou and L. Chen. Demand shaping in cellular networks. Proceed- 2017. ings of Annual Allerton Conference on Communication, Control, and [14] L. Gan, U. Topcu, and S. H. Low. Stochastic distributed protocol for Computing (Allerton), pages 621–628, 2014. electric vehicle charging with discrete charging rate. Proceedings of [40] X. Zhou, E. Dall’Anese, L. Chen, and A. Simonetto. An incentive-based Power and Energy Society General Meeting, pages 1–8, 2012. online optimization framework for distribution grids. IEEE Transactions [15] L. Gan, A. Wierman, U. Topcu, N. Chen, and S. H. Low. Real- on Automatic Control, 2017. time deferrable load control: Handling the uncertainties of renewable generation. Proceedings of International Conference on Future Energy Systems, pages 113–124, 2013. [16] G. R. Grimmett and D. R. Stirzaker. Probability and Random Process. Oxford University Press, third edition, 2001. [17] S. Ha, S. Sen, C. Joe-Wong, Y. Im, and M. Chiang. Tube survey questions and demographics. http://www.princeton.edu/∼cjoe/TUBE S urvey.pdf, Jan 2012. [18] S. Ha, S. Sen, C. Joe-Wong, Y Im, and M. Chiang. Tube: Time- dependent pricing for mobile data. ACM SIGCOMM Computer Com- munication Review, 42(4):247–258, 2012. [19] M. H. Hajiesmaili, L. Deng, M. Chen, and Z. Li. Incentivizing device-to- device load balancing for cellular networks: An online auction design. IEEE Journal on Selected Areas in Communications, 35(2):265–279, 2017. [20] Cisco Visual Networking Index. Global mobile data traffic forecast update, 2016–2021. 2017. [21] Chitika Insights. Hour-by-hour examination: Smartphone, tablet, and desktop usage rates, 2013. [22] G. Iosifidis, L. Gao, J. Huang, and L. Tassiulas. A double-auction mechanism for mobile data-offloading markets. IEEE/ACM Transactions on Networking (TON), 23(5):1634–1647, 2015. [23] L. Jiang, S. Parekh, and J. Walrand. Time-dependent network pricing and bandwidth trading. Proceedings of IEEE Network Operations and Management Symposium Workshops, pages 193–200, 2008. [24] C. Joe-Wong, S. Ha, and M. Chiang. Time-dependent broadband pricing: Feasibility and benefits. Proceedings of International Conference on Distributed Computing Systems (ICDCS), pages 288–298, 2011. [25] W. H. Kwon and A.E. Pearson. A modified quadratic cost problem and feedback stabilization of a linear system. IEEE Transactions on Automatic Control, 22(5):838–842, Oct 1977. [26] J. Lee, Y. Yi, S. Chong, and Y. Jin. Economics of WiFi offloading: Trading delay for cellular capacity. IEEE Transactions on Wireless Communications, 13(3):1540–1554, 2014. [27] K. Lee, J. Lee, Y. Yi, I. Rhee, and S. Chong. Mobile data offloading: How much can WiFi deliver? IEEE/ACM Transactions on Networking, 21(2):536–550, 2013. [28] N. Li. A market mechanism for electric distribution networks. Pro- ceedings of IEEE Annual Conference on Decision and Control (CDC), pages 2276–2282, 2015. [29] N. Li, L. Chen, and S. H. Low. Optimal demand response based on utility maximization in power networks. Proceedings of IEEE Power Engineering Society General Meeting, July 2011. [30] F. Mehmeti and T. Spyropoulos. Is it worth to be patient? Analysis and optimization of delayed mobile data offloading. Proceedings of IEEE INFOCOM, pages 2364–2372, 2014. [31] F. Parise, M. Colombino, S. Grammatico, and J. Lygeros. Mean field constrained charging policy for large populations of plug-in electric vehicles. Proceedings of IEEE Annual Conference on Decision and Control (CDC), pages 5101–5106, 2014. [32] I. C. Paschalidis and J. N. Tsitsiklis. Congestion-dependent pricing of network services. IEEE/ACM Transactions on Networking, 8(2):171– 184, 2000.
You can also read