|
||||||
|
||||||
Our focus in this work is on dynamic pricing of network resources for cellular networks. The work is characterized by four aspects:
Our goal is use pricing to dynamically allocate radio resources (power, codes, and/or data rate) to competing users to optimize an overall network objective criterion while satisfying Quality of Service constraints. We explicitly consider the effect of load-based interference between neighboring cells..
The first paper presents some of the earliest work in the field of wireless pricing. We consider here only voice service in a single cell, and show how pricing of power and codes can be used to dynamically allocate resources in a distributed fashion.
The second set of papers explicitly considers the effect of neighboring cells upon each other. We characterize when coordination is required between the two cells to achieve the system-wide optimum allocation, and how this coordination can be achieved through exchange of a price per unit power representing the externality.
The third set of papers considers data rather than voice service. Data applications are assumed to have utility that increases concavely with SINR. Prices are associated with power in each cell. We prove that if the power budget is low, then no coordination is required between neighboring cells. However, if the power budget is high, then not only is coordination required, but it can not be accomplished through exchange of an externality price.
The next paper considers the effect of dynamic arrivals and departures of data users upon allocation of power. Utility is associated with the time required for file transfer. Pricing is used to allocate power to competing data streams.
The next set of papers consider applications which are in between the extremes of inelastic real-time and elastic best-effort. Here, we attempt to provide QoS to such interactive applications. In the first paper, interactive users can specify a target througput to be achieved over the duration of the connection. We propose a packet scheduler that balances efficiency with fairness by combining a max-min policy with a policy of serving users with relatively good channels. In the second paper, interactive users can specify both a minimum throughput and a maximum rate variance. We characterize the power and rate control policy that minimizes the peak total transmit power. In the third paper, users can specify thresholds on short term throughputs. We present algorithms that maximize the probability of satisfying these thresholds.
The next set of papers continues the focus on applications which are in between the extremes of inelastic real-time and elastic best-effort. However, unlike the papers above, these applications are now explicitly modeled using sigmoid (s-shaped) utility functions. Whereas elastic applications only require rate scheduling, we find that semi-elastic applications require both rate scheduling and connection access control. The first paper considers the case in which utility is a semi-elastic function of the rate achieved in each time slot. We propose a near-optimal algorithm that iteratively finds optimal shadow prices for power and rates. The second paper considers the case in which utility is a sigmoid function of the average bit rate over multiple time slots. We are particularly motivated here by video conferencing. We show that greedy allocation to maximize incremental utility in the current time slot can be implemented in a distributed fashion by an exchange of price and demand amongst users, the network, and an intermediate power allocation module. We then propose resource allocation that considers both the average rate achieved so far and the future expected rate, and show how future expected rate can be estimated by modeling the probability that a user will be allocated a subcarrier in a future time slot.
Portions of this work were supported by DARPA and NSF. Any opinions, findings, conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation, DARPA, or IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. One print or electronic copy may be made for personal use only. Permission must be obtained from the copyright holder for systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplication of any material in these papers for a fee or for commercial purposes, modification of the content of these papers, reprinting or republishing of this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, and to reuse any copyrighted component of this work in other works. |
||||||
Scott Jordan | UCI CS Networked Systems |