SlideShare une entreprise Scribd logo
1  sur  37
Télécharger pour lire hors ligne
Summer 2008 Internship
Report

    Advisor: Prof. Angela Y. Zhang
      The Chinese University of Hong Kong, Hong Kong




          Student: Pratik Poddar
        Indian Institute of Technology Bombay, India




    Topic: Non­Convex Optimization 
         Problems in Networks
                               
Introduction


3 topics to be discussed:
 1) Polyblock Algorithm for Monotonic Optimization
 2) Network Utility Maximization
 3) Internet Congestion Control Problem




                          
Basics of Optimization
    ●
        Standard Optimization problem
    ●
        Linear Optimization problem
    ●
        Convex Optimization problem
    ●
        Monotonic Optimization problem




                                
Polyblock Algorithm
    ●
        We have had two major events in the history of 
        optimization theory.
    ●
         The first was linear programming and simplex 
        method in late 1940s­ early 1950s.
    ●
        The second was convex optimization and interior 
        point method in late 1980s­ early 1990s. 



                                 
Polyblock Algorithm
    ●
        Convex optimization problems are known to be 
        solved, very reliably and efficiently.
    ●
        "..in fact, the great watershed in optimization isn't 
        between linearity and nonlinearity, but convexity 
        and nonconvexity" ­ R. Tyrrell Rockafellar, in  
        SIAM Review, 1993




                                   
Polyblock Algorithm
    ●
        Current research in optimization is mainly to have 
        that third event ­ Solving non­convex optimization 
        efficiently. Although solving convex optimization 
        problems is easy and non­convex optimization 
        problems is hard, but a variety of approaches have 
        been proposed to solve non­convex optimization 
        problems.



                                  
Polyblock Algorithm
    ●
        In 2000, H. Tuy proposed an algorithm to solve 
        optimization problems involving d.i functions under 
        monotonic constraints.
    ●
        This algorithm (Polyblock Algorithm) was inspired 
        by the idea of Polyhedral Outer Approximation 
        Method for maximizing a quasi­convex function 
        over a convex set.


                                 
Polyblock Algorithm
    ●
        What is a polyblock? 
    ●
        Then what is the difference between a polyblock and 
        a polyhedron?
    ●
        What are its properties?
    ●
        How is polyblock algorithm implemented?




                                    
Polyblock Algorithm as in
[1]




               
Implementation of Polyblock
Algorithm
    ●
        Consider the following optimization problem:            
                        minimize    x1 + x2                                         
                        such that     (x1­3)  + 9(x2­3) ≥ 0                  
                                               3


                                           5x1 + 6x2 – 36 ≤ 0                     
                                           (x1,x2) ∊ [0,6]2




                                            
Implementation of Polyblock
Algorithm
    ●
        Feasible region of the problem




                                 
Implementation of Polyblock
Algorithm




              
Introduction


3 topics to be discussed:
1) Polyblock Algorithm for Monotonic Optimization
2) Network Utility Maximization
3) Internet Congestion Control Problem




                         
Network Utility
Maximization
    ●
        The framework of Network Utility Maximization 
        (NUM) has found many applications in network rate 
        allocation algorithms and Internet Congestion 
        Control Protocols.




                                
Network Utility
Maximization
    ●
        Problem: Consider a network with L links, each with 
        a fixed capacity cl bps, and S sources (i.e. end 
        users), each transmitting at the rate of xs bps. Each 
        source s uses the set L(s) of links in its path and has 
        a utility function Us(xs). Each link l is shared by a set 
        S(l) of sources. So, Network Utility Maximization is 
        basically the problem of maximizing the total utility 
        of the system over source rates subject to congestion 
        constraints for all links.
                                    
Network Utility
Maximization

    Mathematically,




                       
Network Utility
Maximization
    ●
        Concave Utilities ­ Follows from Law of 
        Diminishing Marginal Utilities. Convex 
        Optimization Problem.
    ●
        U(x) = log (1+x)

        U(x)




                                       x

                                 
NUM for Concave Utilities
    ●
        The problem of Network Utility Maximization in 
        case of concave utilities is essentially a convex 
        optimization problem which is solvable efficiently 
        and exactly.




                                  
Network Utility
Maximization
    ●
        Non­Concave Utilities – In multimedia applications 
        on Internet, the utilities are non­concave. Non­
        convex optimization problem. 
    ●
        U(x) =  (1 + e­ax+b) ­1 


        U(x)




                                       x
                                    
NUM for Non-Concave
Utilities
    ●
        The problem is a non­convex optimization problem. 
        Three ways have been suggested to solve it.
    ●
        In [3],  a 'self­regulation' heuristic is proposed, 
        however it converges only to a sub­optimal solution.
    ●
        In [4], a set of sufficient and necessary conditions is 
        presented under which the canonical distributed 
        algorithm converges to a global optimal solution. 
        However, these conditions may not hold in most 
        cases.
                                   
NUM for Non-Concave
Utilities
    ●
        In [2], Using a family of convex SDP relaxations 
        based on the sum­of­squares method and 
        Positivestellensatz Theorem in real algebraic 
        geometry, a centralized computational method to 
        bound the total network utility in polynomial time is 
        proposed.
    ●
        This is effectively a centralized method to compute 
        the global optimum when the utilities can be 
        transformed into polynomial utilities.
                                  
NUM for Non-Concave
Utilities
    ●
        In summary, currently there is no theoretically 
        polynomial­time algorithm (distributed or 
        centralised) known for non­concave utility 
        maximization.
    ●
        We worked to find ways to convexify the above 
        problem. 




                                  
Idea and motivation
    ●
        The set may not be a convex set but if it can be 
        broken into a constant number of convex sets, we 
        can solve the problem in polynomial time.




                                 
Idea and motivation




              
Idea and motivation




              
Idea and motivation




              
Motivation
    ●
        By this method, we can solve NUM problem in 
        polynomial time. NUM finds applications in 
        network rate allocation algorithms and Internet 
        Congestion Control Protocol.




                                  
Introduction


Not so much related topics:
1) Polyblock Algorithm for Monotonic Optimization
2) Network Utility Maximization
3) Internet Congestion Control Problem




                         
Internet Congestion Control
    ●
        Internet relies on congestion control implemented in 
        the end­systems to prevent offered load exceeding 
        network capacity, as well as allocate network 
        resources to different users and applications.
    ●
        In the past, the applications (email, file transfer) had 
        concave utilities (i.e were elastic). As number of 
        multimedia applications are increasing, there are 
        various talks on different congestion controls.

                                    
Internet Congestion Control
    ●
        In [5], It has been argued that fairness congestion 
        control does not maximize the network's utility. 
        Infact, Admission control is shown to be better 
        control (in terms of both elastic and inelastic 
        utilities) than Fair Congestion Control in a 
        simplified case. 
    ●
        Let α be the desired rate of inelastic flows, m be the 
        number of inelastic flows and n be the number of 
        elastic flows. 
                                   
Fair Congestion Control
    ●
        Perform TCP­friendly congestion control. We model 
        it as the same fair congestion control as adopted for 
        elastic flows, with a slight difference. When the fair 
        share is smaller than α, then the fair share is used, 
        but when the fair share is greater than α, the 
        inelastic flow would still consume α.




                                  
Admission Control
    ●
        Perform admission control but no congestion control 
        once admitted. Assume the network already has n 
        elastic flows and m inelastic flows, a new inelastic 
        flow is admitted iff nε + (m­1)α <=1
    ●
        Here ε represents the minimum rate admission 
        control scheme tries to leave for elastic traffic. 
        Depending upon α, we can have two cases:


                                    
Aggressive Admission
Control
    ●
        ε <<< α – The arriving flow is admitted as long as it 
        is possible to allocate to it the desired rate of α, even 
        if this means all elastic flows have to run at their 
        minimum rate of ε.
    ●
        So, an inelastic flow is admitted iff (m+1)α ≤ 1 and 
        an elastic flow is always admitted.




                                    
Fair Admission Control
    ●
        ε = α – The arriving flow is admitted as long as its 
        desired rate is no greater than the prevailing fair 
        share for each elastic flow.
    ●
        So, an inelastic flow is admitted iff (m+n+1)α ≤ 1 
        and an elastic flow is always admitted.
    ●
        In [5], it is proved that Fair Admission control is 
        better than both Aggressive Admission contol and 
        Fair Congestion Control.

                                  
Idea
    ●
        Solving the optimization problem using the 
        polyblock algorithm would help us to prove (or 
        disprove) that admission control is better than fair 
        congestion control.
    ●
        Status: Coding to check it under progress.




                                   
Thank You...........




                 
Bibliography
    ●
        [1] H. Tuy, ”Monotonic Optimization: Problems and Solution Approaches”, 
        SIAM Journal on Optimization, 11:2(2000), 464­494
    ●
        [2]  M. Fazel, M. Chiang, ”Network Utility Maximization With Nonconcave 
        Utilities Using Sum­of­Squares Method”, Proc. IEEE CDC, December 2005
    ●
        [3] J.W.Lee, R.R. Mazumdar, N. Shroff, ”Non­convex optimization and rate 
        control for multi­class services in the Internet”, Proc. IEEE Infocom, March 
        2004 
    ●
        [4] M. Chiang, S. Zhang, P. Hande, ”Distributed rate allocation for inelastic 
        flows: Optimization framework, optimality conditions, and optimal 
        algorithms”, Proc. IEEE Infocom, March 2005 
    ●
        [5] D. M. Chiu, A. ­S. W. Tam, ”Fairness of traffic controls for inelastic 
        flows in the Internet”, Comput. Netw. (2007), doi:10.1016/j.comnet.
        2006.12.2006                         

Contenu connexe

Tendances

Model selection and cross validation techniques
Model selection and cross validation techniquesModel selection and cross validation techniques
Model selection and cross validation techniquesVenkata Reddy Konasani
 
Bayesian Networks - A Brief Introduction
Bayesian Networks - A Brief IntroductionBayesian Networks - A Brief Introduction
Bayesian Networks - A Brief IntroductionAdnan Masood
 
ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...
ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...
ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...Ajay Kumar
 
Introduction to Tree-LSTMs
Introduction to Tree-LSTMsIntroduction to Tree-LSTMs
Introduction to Tree-LSTMsDaniel Perez
 
Ridge regression, lasso and elastic net
Ridge regression, lasso and elastic netRidge regression, lasso and elastic net
Ridge regression, lasso and elastic netVivian S. Zhang
 
Markov Chain Monte Carlo Methods
Markov Chain Monte Carlo MethodsMarkov Chain Monte Carlo Methods
Markov Chain Monte Carlo MethodsFrancesco Casalegno
 
Particle Swarm Optimization.pptx
Particle Swarm Optimization.pptxParticle Swarm Optimization.pptx
Particle Swarm Optimization.pptxNatiTilahun1
 
Machine Learning and Causal Inference
Machine Learning and Causal InferenceMachine Learning and Causal Inference
Machine Learning and Causal InferenceNBER
 
Multi-Armed Bandit and Applications
Multi-Armed Bandit and ApplicationsMulti-Armed Bandit and Applications
Multi-Armed Bandit and ApplicationsSangwoo Mo
 
Particle swarm optimization
Particle swarm optimization Particle swarm optimization
Particle swarm optimization Ahmed Fouad Ali
 
Machine Learning lecture4(logistic regression)
Machine Learning lecture4(logistic regression)Machine Learning lecture4(logistic regression)
Machine Learning lecture4(logistic regression)cairo university
 
Binary Class and Multi Class Strategies for Machine Learning
Binary Class and Multi Class Strategies for Machine LearningBinary Class and Multi Class Strategies for Machine Learning
Binary Class and Multi Class Strategies for Machine LearningPaxcel Technologies
 
Machine Learning lecture6(regularization)
Machine Learning lecture6(regularization)Machine Learning lecture6(regularization)
Machine Learning lecture6(regularization)cairo university
 
Multi-armed bandit by Joni Turunen
Multi-armed bandit by Joni TurunenMulti-armed bandit by Joni Turunen
Multi-armed bandit by Joni TurunenFrosmo
 

Tendances (20)

Regularization
RegularizationRegularization
Regularization
 
Model selection and cross validation techniques
Model selection and cross validation techniquesModel selection and cross validation techniques
Model selection and cross validation techniques
 
Bayesian Networks - A Brief Introduction
Bayesian Networks - A Brief IntroductionBayesian Networks - A Brief Introduction
Bayesian Networks - A Brief Introduction
 
GMM
GMMGMM
GMM
 
ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...
ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...
ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...
 
Introduction to Tree-LSTMs
Introduction to Tree-LSTMsIntroduction to Tree-LSTMs
Introduction to Tree-LSTMs
 
Change Point | Statistics
Change Point | StatisticsChange Point | Statistics
Change Point | Statistics
 
Ridge regression, lasso and elastic net
Ridge regression, lasso and elastic netRidge regression, lasso and elastic net
Ridge regression, lasso and elastic net
 
Markov Chain Monte Carlo Methods
Markov Chain Monte Carlo MethodsMarkov Chain Monte Carlo Methods
Markov Chain Monte Carlo Methods
 
Particle Swarm Optimization.pptx
Particle Swarm Optimization.pptxParticle Swarm Optimization.pptx
Particle Swarm Optimization.pptx
 
Machine Learning and Causal Inference
Machine Learning and Causal InferenceMachine Learning and Causal Inference
Machine Learning and Causal Inference
 
Multi-Armed Bandit and Applications
Multi-Armed Bandit and ApplicationsMulti-Armed Bandit and Applications
Multi-Armed Bandit and Applications
 
Change Point Analysis
Change Point AnalysisChange Point Analysis
Change Point Analysis
 
Optmization techniques
Optmization techniquesOptmization techniques
Optmization techniques
 
Particle swarm optimization
Particle swarm optimization Particle swarm optimization
Particle swarm optimization
 
Machine Learning lecture4(logistic regression)
Machine Learning lecture4(logistic regression)Machine Learning lecture4(logistic regression)
Machine Learning lecture4(logistic regression)
 
Binary Class and Multi Class Strategies for Machine Learning
Binary Class and Multi Class Strategies for Machine LearningBinary Class and Multi Class Strategies for Machine Learning
Binary Class and Multi Class Strategies for Machine Learning
 
Machine Learning lecture6(regularization)
Machine Learning lecture6(regularization)Machine Learning lecture6(regularization)
Machine Learning lecture6(regularization)
 
Bayesian statistics
Bayesian statisticsBayesian statistics
Bayesian statistics
 
Multi-armed bandit by Joni Turunen
Multi-armed bandit by Joni TurunenMulti-armed bandit by Joni Turunen
Multi-armed bandit by Joni Turunen
 

Similaire à Non-convex Optimization in Networks

Non concave network utility maximization - A distributed optimization approach
Non concave network utility maximization - A distributed optimization approachNon concave network utility maximization - A distributed optimization approach
Non concave network utility maximization - A distributed optimization approachWasif Hafeez
 
Introduction to algorithmic aspect of auction theory
Introduction to algorithmic aspect of auction theoryIntroduction to algorithmic aspect of auction theory
Introduction to algorithmic aspect of auction theoryAbner Chih Yi Huang
 
Green Optical Networks with Signal Quality Guarantee
Green Optical Networks with Signal Quality Guarantee Green Optical Networks with Signal Quality Guarantee
Green Optical Networks with Signal Quality Guarantee Maria Stylianou
 
Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...
Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...
Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...Tiziano De Matteis
 
Quantum Computing: Timing is Everything
Quantum Computing: Timing is EverythingQuantum Computing: Timing is Everything
Quantum Computing: Timing is Everythinginside-BigData.com
 
Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...
Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...
Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...Ryo Takahashi
 
The Traveling Salesman Problem: A Neural Network Perspective
The Traveling Salesman Problem: A Neural Network PerspectiveThe Traveling Salesman Problem: A Neural Network Perspective
The Traveling Salesman Problem: A Neural Network Perspectivemustafa sarac
 
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...Cemal Ardil
 
EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptx
EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptxEfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptx
EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptxssuser2624f71
 
A White Paper On Neural Network Quantization
A White Paper On Neural Network QuantizationA White Paper On Neural Network Quantization
A White Paper On Neural Network QuantizationApril Knyff
 
PR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
PR-108: MobileNetV2: Inverted Residuals and Linear BottlenecksPR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
PR-108: MobileNetV2: Inverted Residuals and Linear BottlenecksJinwon Lee
 
Cosenza_MuleSoft_Meetup_1st.pptx
Cosenza_MuleSoft_Meetup_1st.pptxCosenza_MuleSoft_Meetup_1st.pptx
Cosenza_MuleSoft_Meetup_1st.pptxAndreaCapolei2
 
Technical Trends_Study of Quantum
Technical Trends_Study of QuantumTechnical Trends_Study of Quantum
Technical Trends_Study of QuantumHardik Gohel
 
Hands on machine learning with scikit-learn and tensor flow by ahmed yousry
Hands on machine learning with scikit-learn and tensor flow by ahmed yousryHands on machine learning with scikit-learn and tensor flow by ahmed yousry
Hands on machine learning with scikit-learn and tensor flow by ahmed yousryAhmed Yousry
 

Similaire à Non-convex Optimization in Networks (20)

Non concave network utility maximization - A distributed optimization approach
Non concave network utility maximization - A distributed optimization approachNon concave network utility maximization - A distributed optimization approach
Non concave network utility maximization - A distributed optimization approach
 
Introduction to algorithmic aspect of auction theory
Introduction to algorithmic aspect of auction theoryIntroduction to algorithmic aspect of auction theory
Introduction to algorithmic aspect of auction theory
 
Green Optical Networks with Signal Quality Guarantee
Green Optical Networks with Signal Quality Guarantee Green Optical Networks with Signal Quality Guarantee
Green Optical Networks with Signal Quality Guarantee
 
Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...
Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...
Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...
 
Introduction to optimization Problems
Introduction to optimization ProblemsIntroduction to optimization Problems
Introduction to optimization Problems
 
Quantum Computing: Timing is Everything
Quantum Computing: Timing is EverythingQuantum Computing: Timing is Everything
Quantum Computing: Timing is Everything
 
Parallel Algorithms
Parallel AlgorithmsParallel Algorithms
Parallel Algorithms
 
Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...
Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...
Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...
 
The Traveling Salesman Problem: A Neural Network Perspective
The Traveling Salesman Problem: A Neural Network PerspectiveThe Traveling Salesman Problem: A Neural Network Perspective
The Traveling Salesman Problem: A Neural Network Perspective
 
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
 
N03430990106
N03430990106N03430990106
N03430990106
 
EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptx
EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptxEfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptx
EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptx
 
Practical ML
Practical MLPractical ML
Practical ML
 
A White Paper On Neural Network Quantization
A White Paper On Neural Network QuantizationA White Paper On Neural Network Quantization
A White Paper On Neural Network Quantization
 
PR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
PR-108: MobileNetV2: Inverted Residuals and Linear BottlenecksPR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
PR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
 
Cosenza_MuleSoft_Meetup_1st.pptx
Cosenza_MuleSoft_Meetup_1st.pptxCosenza_MuleSoft_Meetup_1st.pptx
Cosenza_MuleSoft_Meetup_1st.pptx
 
Technical Trends_Study of Quantum
Technical Trends_Study of QuantumTechnical Trends_Study of Quantum
Technical Trends_Study of Quantum
 
Hands on machine learning with scikit-learn and tensor flow by ahmed yousry
Hands on machine learning with scikit-learn and tensor flow by ahmed yousryHands on machine learning with scikit-learn and tensor flow by ahmed yousry
Hands on machine learning with scikit-learn and tensor flow by ahmed yousry
 
Power systemsilablri
Power systemsilablriPower systemsilablri
Power systemsilablri
 
1801.06434
1801.064341801.06434
1801.06434
 

Plus de Pratik Poddar

Guide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITiansGuide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITiansPratik Poddar
 
Art of Puzzle Solving
Art of Puzzle SolvingArt of Puzzle Solving
Art of Puzzle SolvingPratik Poddar
 
Clipr rodinhood openhouse
Clipr rodinhood openhouseClipr rodinhood openhouse
Clipr rodinhood openhousePratik Poddar
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?Pratik Poddar
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and SteganographyPratik Poddar
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based EncryptionPratik Poddar
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSAPratik Poddar
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony OptimizationPratik Poddar
 

Plus de Pratik Poddar (10)

Guide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITiansGuide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITians
 
Art of Puzzle Solving
Art of Puzzle SolvingArt of Puzzle Solving
Art of Puzzle Solving
 
Clipr Introduction
Clipr IntroductionClipr Introduction
Clipr Introduction
 
Clipr rodinhood openhouse
Clipr rodinhood openhouseClipr rodinhood openhouse
Clipr rodinhood openhouse
 
Grad School101
Grad School101Grad School101
Grad School101
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony Optimization
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Dernier (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Non-convex Optimization in Networks

  • 1. Summer 2008 Internship Report Advisor: Prof. Angela Y. Zhang The Chinese University of Hong Kong, Hong Kong Student: Pratik Poddar Indian Institute of Technology Bombay, India Topic: Non­Convex Optimization  Problems in Networks    
  • 3. Basics of Optimization ● Standard Optimization problem ● Linear Optimization problem ● Convex Optimization problem ● Monotonic Optimization problem    
  • 4. Polyblock Algorithm ● We have had two major events in the history of  optimization theory. ●  The first was linear programming and simplex  method in late 1940s­ early 1950s. ● The second was convex optimization and interior  point method in late 1980s­ early 1990s.     
  • 5. Polyblock Algorithm ● Convex optimization problems are known to be  solved, very reliably and efficiently. ● "..in fact, the great watershed in optimization isn't  between linearity and nonlinearity, but convexity  and nonconvexity" ­ R. Tyrrell Rockafellar, in   SIAM Review, 1993    
  • 6. Polyblock Algorithm ● Current research in optimization is mainly to have  that third event ­ Solving non­convex optimization  efficiently. Although solving convex optimization  problems is easy and non­convex optimization  problems is hard, but a variety of approaches have  been proposed to solve non­convex optimization  problems.    
  • 7. Polyblock Algorithm ● In 2000, H. Tuy proposed an algorithm to solve  optimization problems involving d.i functions under  monotonic constraints. ● This algorithm (Polyblock Algorithm) was inspired  by the idea of Polyhedral Outer Approximation  Method for maximizing a quasi­convex function  over a convex set.    
  • 8. Polyblock Algorithm ● What is a polyblock?  ● Then what is the difference between a polyblock and  a polyhedron? ● What are its properties? ● How is polyblock algorithm implemented?    
  • 9. Polyblock Algorithm as in [1]    
  • 10. Implementation of Polyblock Algorithm ● Consider the following optimization problem:                             minimize    x1 + x2                                                          such that     (x1­3)  + 9(x2­3) ≥ 0                   3                                    5x1 + 6x2 – 36 ≤ 0                                                         (x1,x2) ∊ [0,6]2    
  • 11. Implementation of Polyblock Algorithm ● Feasible region of the problem    
  • 14. Network Utility Maximization ● The framework of Network Utility Maximization  (NUM) has found many applications in network rate  allocation algorithms and Internet Congestion  Control Protocols.    
  • 15. Network Utility Maximization ● Problem: Consider a network with L links, each with  a fixed capacity cl bps, and S sources (i.e. end  users), each transmitting at the rate of xs bps. Each  source s uses the set L(s) of links in its path and has  a utility function Us(xs). Each link l is shared by a set  S(l) of sources. So, Network Utility Maximization is  basically the problem of maximizing the total utility  of the system over source rates subject to congestion  constraints for all links.    
  • 16. Network Utility Maximization Mathematically,    
  • 17. Network Utility Maximization ● Concave Utilities ­ Follows from Law of  Diminishing Marginal Utilities. Convex  Optimization Problem. ● U(x) = log (1+x) U(x) x    
  • 18. NUM for Concave Utilities ● The problem of Network Utility Maximization in  case of concave utilities is essentially a convex  optimization problem which is solvable efficiently  and exactly.    
  • 19. Network Utility Maximization ● Non­Concave Utilities – In multimedia applications  on Internet, the utilities are non­concave. Non­ convex optimization problem.  ● U(x) =  (1 + e­ax+b) ­1  U(x) x    
  • 20. NUM for Non-Concave Utilities ● The problem is a non­convex optimization problem.  Three ways have been suggested to solve it. ● In [3],  a 'self­regulation' heuristic is proposed,  however it converges only to a sub­optimal solution. ● In [4], a set of sufficient and necessary conditions is  presented under which the canonical distributed  algorithm converges to a global optimal solution.  However, these conditions may not hold in most  cases.    
  • 21. NUM for Non-Concave Utilities ● In [2], Using a family of convex SDP relaxations  based on the sum­of­squares method and  Positivestellensatz Theorem in real algebraic  geometry, a centralized computational method to  bound the total network utility in polynomial time is  proposed. ● This is effectively a centralized method to compute  the global optimum when the utilities can be  transformed into polynomial utilities.    
  • 22. NUM for Non-Concave Utilities ● In summary, currently there is no theoretically  polynomial­time algorithm (distributed or  centralised) known for non­concave utility  maximization. ● We worked to find ways to convexify the above  problem.     
  • 23. Idea and motivation ● The set may not be a convex set but if it can be  broken into a constant number of convex sets, we  can solve the problem in polynomial time.    
  • 27. Motivation ● By this method, we can solve NUM problem in  polynomial time. NUM finds applications in  network rate allocation algorithms and Internet  Congestion Control Protocol.    
  • 29. Internet Congestion Control ● Internet relies on congestion control implemented in  the end­systems to prevent offered load exceeding  network capacity, as well as allocate network  resources to different users and applications. ● In the past, the applications (email, file transfer) had  concave utilities (i.e were elastic). As number of  multimedia applications are increasing, there are  various talks on different congestion controls.    
  • 30. Internet Congestion Control ● In [5], It has been argued that fairness congestion  control does not maximize the network's utility.  Infact, Admission control is shown to be better  control (in terms of both elastic and inelastic  utilities) than Fair Congestion Control in a  simplified case.  ● Let α be the desired rate of inelastic flows, m be the  number of inelastic flows and n be the number of  elastic flows.     
  • 31. Fair Congestion Control ● Perform TCP­friendly congestion control. We model  it as the same fair congestion control as adopted for  elastic flows, with a slight difference. When the fair  share is smaller than α, then the fair share is used,  but when the fair share is greater than α, the  inelastic flow would still consume α.    
  • 32. Admission Control ● Perform admission control but no congestion control  once admitted. Assume the network already has n  elastic flows and m inelastic flows, a new inelastic  flow is admitted iff nε + (m­1)α <=1 ● Here ε represents the minimum rate admission  control scheme tries to leave for elastic traffic.  Depending upon α, we can have two cases:    
  • 33. Aggressive Admission Control ● ε <<< α – The arriving flow is admitted as long as it  is possible to allocate to it the desired rate of α, even  if this means all elastic flows have to run at their  minimum rate of ε. ● So, an inelastic flow is admitted iff (m+1)α ≤ 1 and  an elastic flow is always admitted.    
  • 34. Fair Admission Control ● ε = α – The arriving flow is admitted as long as its  desired rate is no greater than the prevailing fair  share for each elastic flow. ● So, an inelastic flow is admitted iff (m+n+1)α ≤ 1  and an elastic flow is always admitted. ● In [5], it is proved that Fair Admission control is  better than both Aggressive Admission contol and  Fair Congestion Control.    
  • 35. Idea ● Solving the optimization problem using the  polyblock algorithm would help us to prove (or  disprove) that admission control is better than fair  congestion control. ● Status: Coding to check it under progress.    
  • 37. Bibliography ● [1] H. Tuy, ”Monotonic Optimization: Problems and Solution Approaches”,  SIAM Journal on Optimization, 11:2(2000), 464­494 ● [2]  M. Fazel, M. Chiang, ”Network Utility Maximization With Nonconcave  Utilities Using Sum­of­Squares Method”, Proc. IEEE CDC, December 2005 ● [3] J.W.Lee, R.R. Mazumdar, N. Shroff, ”Non­convex optimization and rate  control for multi­class services in the Internet”, Proc. IEEE Infocom, March  2004  ● [4] M. Chiang, S. Zhang, P. Hande, ”Distributed rate allocation for inelastic  flows: Optimization framework, optimality conditions, and optimal  algorithms”, Proc. IEEE Infocom, March 2005  ● [5] D. M. Chiu, A. ­S. W. Tam, ”Fairness of traffic controls for inelastic  flows in the Internet”, Comput. Netw. (2007), doi:10.1016/j.comnet.   2006.12.2006