Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

Minimizing Queue Length Regret Under Adversarial Network Models

Published: 03 April 2018 Publication History

Abstract

Stochastic models have been dominant in network optimization theory for over two decades, due to their analytical tractability. However, these models fail to capture non-stationary or even adversarial network dynamics which are of increasing importance for modeling the behavior of networks under malicious attacks or characterizing short-term transient behavior. In this paper, we focus on minimizing queue length regret under adversarial network models, which measures the finite-time queue length difference between a causal policy and an "oracle" that knows the future. Two adversarial network models are developed to characterize the adversary's behavior. We provide lower bounds on queue length regret under these adversary models and analyze the performance of two control policies (i.e., the MaxWeight policy and the Tracking Algorithm). We further characterize the stability region under adversarial network models, and show that both the MaxWeight policy and the Tracking Algorithm are throughput-optimal even in adversarial settings.

References

[1]
Matthew Andrews, Baruch Awerbuch, Antonio Fernández, Tom Leighton, Zhiyong Liu, and Jon Kleinberg. 2001. Universal-stability results and performance bounds for greedy contention-resolution protocols. Journal of the ACM (JACM) 48, 1 (2001), 39--69.
[2]
Matthew Andrews, Kyomin Jung, and Alexander Stolyar. 2007. Stability of the Max-weight Routing and Scheduling Protocol in Dynamic Networks and at Critical Loads. In Proceedings of the Thirty-ninth Annual ACM Symposium on Theory of Computing (STOC '07). ACM, 145--154.
[3]
M. Andrews and L. Zhang. 2002. Scheduling over a time-varying user-dependent channel with applications to high speed wireless data. In The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings. 293--302.
[4]
M. Andrews and L. Zhang. 2006. Scheduling Over Nonstationary Wireless Channels With Finite Rate Sets. IEEE/ACM Transactions on Networking 14, 5 (Oct 2006), 1067--1077.
[5]
Allan Borodin, Jon Kleinberg, Prabhakar Raghavan, Madhu Sudan, and David P. Williamson. 2001. Adversarial queuing theory. Journal of the ACM (JACM) 48, 1 (2001), 13--38.
[6]
Vicent Cholvi and Juan Echagüe. 2007. Stability of FIFO networks under adversarial models: State of the art. Computer Networks 51, 15 (2007), 4460--4474.
[7]
Rene L. Cruz. 1991. A calculus for network delay. I. Network elements in isolation. IEEE Transactions on information theory 37, 1 (1991), 114--131.
[8]
Subhashini Krishnasamy, Rajat Sen, Ramesh Johari, and Sanjay Shakkottai. 2016. Regret of Queueing Bandits. In Advances in Neural Information Processing Systems. 1669--1677.
[9]
Sungsu Lim, Kyomin Jung, and Matthew Andrews. 2014. Stability of the Max-weight Protocol in Adversarial Wireless Networks. IEEE/ACM Trans. Netw. 22, 6 (Dec. 2014), 1859--1872.
[10]
Nick McKeown, Adisak Mekkittikul, Venkat Anantharam, and Jean Walrand. 1999. Achieving 100% throughput in an input-queued switch. IEEE Transactions on Communications 47, 8 (1999), 1260--1267.
[11]
Michael J. Neely. 2010. Stability and capacity regions or discrete time queueing networks. arXiv preprint arXiv:1003.3396 (2010).
[12]
Michael J. Neely. 2010. Universal scheduling for networks with arbitrary traffic, channels, and mobility. In Decision and Control (CDC), 2010 49th IEEE Conference on. IEEE, 1822--1829.
[13]
Michael J. Neely and Hao Yu. 2017. Online Convex Optimization with Time-Varying Constraints. arXiv preprint arXiv:1702.04783 (2017).
[14]
George S. Paschos and Leandros Tassiulas. 2016. Sustainability of Service Provisioning Systems under Stealth DoS Attacks. IEEE Transactions on Control of Network Systems (2016).
[15]
Shai Shalev-Shwartz et al. 2012. Online learning and online convex optimization. Foundations and Trends in Machine Learning 4, 2 (2012), 107--194.
[16]
Leandros Tassiulas and Anthony Ephremides. 1992. Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks. IEEE transactions on automatic control 37, 12 (1992), 1936--1948.
[17]
Yulong Zou, Jia Zhu, Xianbin Wang, and Lajos Hanzo. 2016. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 104, 9 (2016), 1727--1765.

Cited By

View all
  • (2024)Adversarial Network Optimization under Bandit Feedback: Maximizing Utility in Non-Stationary Multi-Hop NetworksProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/37004138:3(1-48)Online publication date: 10-Dec-2024
  • (2023)Quantifying the cost of learning in queueing systemsProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3666407(6532-6544)Online publication date: 10-Dec-2023
  • (2023)Learning to Schedule in Non-Stationary Wireless Networks With Unknown StatisticsProceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing10.1145/3565287.3610258(181-190)Online publication date: 23-Oct-2023
  • Show More Cited By

Index Terms

  1. Minimizing Queue Length Regret Under Adversarial Network Models

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Measurement and Analysis of Computing Systems
    Proceedings of the ACM on Measurement and Analysis of Computing Systems  Volume 2, Issue 1
    March 2018
    603 pages
    EISSN:2476-1249
    DOI:10.1145/3203302
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 April 2018
    Published in POMACS Volume 2, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. adversarial networks
    2. maxweight
    3. queue length regret
    4. stability

    Qualifiers

    • Research-article

    Funding Sources

    • NSF
    • DARPA I2O and Raytheon BBN Technologies

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)84
    • Downloads (Last 6 weeks)14
    Reflects downloads up to 11 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Adversarial Network Optimization under Bandit Feedback: Maximizing Utility in Non-Stationary Multi-Hop NetworksProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/37004138:3(1-48)Online publication date: 10-Dec-2024
    • (2023)Quantifying the cost of learning in queueing systemsProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3666407(6532-6544)Online publication date: 10-Dec-2023
    • (2023)Learning to Schedule in Non-Stationary Wireless Networks With Unknown StatisticsProceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing10.1145/3565287.3610258(181-190)Online publication date: 23-Oct-2023
    • (2022)Optimal Control for Networks with Unobservable MaliciousNodesACM SIGMETRICS Performance Evaluation Review10.1145/3529113.352911949:3(18-19)Online publication date: 25-Mar-2022
    • (2022)Universal Policy Tracking: Scheduling for Wireless Networks with Delayed State Observation2022 58th Annual Allerton Conference on Communication, Control, and Computing (Allerton)10.1109/Allerton49937.2022.9929348(1-8)Online publication date: 27-Sep-2022
    • (2021)Learning Algorithms for Minimizing Queue Length RegretIEEE Transactions on Information Theory10.1109/TIT.2021.305485467:3(1759-1781)Online publication date: Mar-2021
    • (2021)Optimal control for networks with unobservable malicious nodesPerformance Evaluation10.1016/j.peva.2021.102230(102230)Online publication date: Sep-2021
    • (2019)Fundamental Limits of Volume-based Network DoS AttacksProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/33666983:3(1-36)Online publication date: 17-Dec-2019
    • (2018)Minimizing Queue Length Regret Under Adversarial Network ModelsACM SIGMETRICS Performance Evaluation Review10.1145/3292040.321963046:1(31-32)Online publication date: 12-Jun-2018
    • (2018)Minimizing Queue Length Regret Under Adversarial Network ModelsAbstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems10.1145/3219617.3219630(31-32)Online publication date: 12-Jun-2018

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media