SlideShare a Scribd company logo
Summer 2008 Internship
Report

    Advisor: Prof. Angela Y. Zhang
      The Chinese University of Hong Kong, Hong Kong




          Student: Pratik Poddar
        Indian Institute of Technology Bombay, India




    Topic: Non­Convex Optimization 
         Problems in Networks
                               
Introduction


3 topics to be discussed:
 1) Polyblock Algorithm for Monotonic Optimization
 2) Network Utility Maximization
 3) Internet Congestion Control Problem




                          
Basics of Optimization
    ●
        Standard Optimization problem
    ●
        Linear Optimization problem
    ●
        Convex Optimization problem
    ●
        Monotonic Optimization problem




                                
Polyblock Algorithm
    ●
        We have had two major events in the history of 
        optimization theory.
    ●
         The first was linear programming and simplex 
        method in late 1940s­ early 1950s.
    ●
        The second was convex optimization and interior 
        point method in late 1980s­ early 1990s. 



                                 
Polyblock Algorithm
    ●
        Convex optimization problems are known to be 
        solved, very reliably and efficiently.
    ●
        "..in fact, the great watershed in optimization isn't 
        between linearity and nonlinearity, but convexity 
        and nonconvexity" ­ R. Tyrrell Rockafellar, in  
        SIAM Review, 1993




                                   
Polyblock Algorithm
    ●
        Current research in optimization is mainly to have 
        that third event ­ Solving non­convex optimization 
        efficiently. Although solving convex optimization 
        problems is easy and non­convex optimization 
        problems is hard, but a variety of approaches have 
        been proposed to solve non­convex optimization 
        problems.



                                  
Polyblock Algorithm
    ●
        In 2000, H. Tuy proposed an algorithm to solve 
        optimization problems involving d.i functions under 
        monotonic constraints.
    ●
        This algorithm (Polyblock Algorithm) was inspired 
        by the idea of Polyhedral Outer Approximation 
        Method for maximizing a quasi­convex function 
        over a convex set.


                                 
Polyblock Algorithm
    ●
        What is a polyblock? 
    ●
        Then what is the difference between a polyblock and 
        a polyhedron?
    ●
        What are its properties?
    ●
        How is polyblock algorithm implemented?




                                    
Polyblock Algorithm as in
[1]




               
Implementation of Polyblock
Algorithm
    ●
        Consider the following optimization problem:            
                        minimize    x1 + x2                                         
                        such that     (x1­3)  + 9(x2­3) ≥ 0                  
                                               3


                                           5x1 + 6x2 – 36 ≤ 0                     
                                           (x1,x2) ∊ [0,6]2




                                            
Implementation of Polyblock
Algorithm
    ●
        Feasible region of the problem




                                 
Implementation of Polyblock
Algorithm




              
Introduction


3 topics to be discussed:
1) Polyblock Algorithm for Monotonic Optimization
2) Network Utility Maximization
3) Internet Congestion Control Problem




                         
Network Utility
Maximization
    ●
        The framework of Network Utility Maximization 
        (NUM) has found many applications in network rate 
        allocation algorithms and Internet Congestion 
        Control Protocols.




                                
Network Utility
Maximization
    ●
        Problem: Consider a network with L links, each with 
        a fixed capacity cl bps, and S sources (i.e. end 
        users), each transmitting at the rate of xs bps. Each 
        source s uses the set L(s) of links in its path and has 
        a utility function Us(xs). Each link l is shared by a set 
        S(l) of sources. So, Network Utility Maximization is 
        basically the problem of maximizing the total utility 
        of the system over source rates subject to congestion 
        constraints for all links.
                                    
Network Utility
Maximization

    Mathematically,




                       
Network Utility
Maximization
    ●
        Concave Utilities ­ Follows from Law of 
        Diminishing Marginal Utilities. Convex 
        Optimization Problem.
    ●
        U(x) = log (1+x)

        U(x)




                                       x

                                 
NUM for Concave Utilities
    ●
        The problem of Network Utility Maximization in 
        case of concave utilities is essentially a convex 
        optimization problem which is solvable efficiently 
        and exactly.




                                  
Network Utility
Maximization
    ●
        Non­Concave Utilities – In multimedia applications 
        on Internet, the utilities are non­concave. Non­
        convex optimization problem. 
    ●
        U(x) =  (1 + e­ax+b) ­1 


        U(x)




                                       x
                                    
NUM for Non-Concave
Utilities
    ●
        The problem is a non­convex optimization problem. 
        Three ways have been suggested to solve it.
    ●
        In [3],  a 'self­regulation' heuristic is proposed, 
        however it converges only to a sub­optimal solution.
    ●
        In [4], a set of sufficient and necessary conditions is 
        presented under which the canonical distributed 
        algorithm converges to a global optimal solution. 
        However, these conditions may not hold in most 
        cases.
                                   
NUM for Non-Concave
Utilities
    ●
        In [2], Using a family of convex SDP relaxations 
        based on the sum­of­squares method and 
        Positivestellensatz Theorem in real algebraic 
        geometry, a centralized computational method to 
        bound the total network utility in polynomial time is 
        proposed.
    ●
        This is effectively a centralized method to compute 
        the global optimum when the utilities can be 
        transformed into polynomial utilities.
                                  
NUM for Non-Concave
Utilities
    ●
        In summary, currently there is no theoretically 
        polynomial­time algorithm (distributed or 
        centralised) known for non­concave utility 
        maximization.
    ●
        We worked to find ways to convexify the above 
        problem. 




                                  
Idea and motivation
    ●
        The set may not be a convex set but if it can be 
        broken into a constant number of convex sets, we 
        can solve the problem in polynomial time.




                                 
Idea and motivation




              
Idea and motivation




              
Idea and motivation




              
Motivation
    ●
        By this method, we can solve NUM problem in 
        polynomial time. NUM finds applications in 
        network rate allocation algorithms and Internet 
        Congestion Control Protocol.




                                  
Introduction


Not so much related topics:
1) Polyblock Algorithm for Monotonic Optimization
2) Network Utility Maximization
3) Internet Congestion Control Problem




                         
Internet Congestion Control
    ●
        Internet relies on congestion control implemented in 
        the end­systems to prevent offered load exceeding 
        network capacity, as well as allocate network 
        resources to different users and applications.
    ●
        In the past, the applications (email, file transfer) had 
        concave utilities (i.e were elastic). As number of 
        multimedia applications are increasing, there are 
        various talks on different congestion controls.

                                    
Internet Congestion Control
    ●
        In [5], It has been argued that fairness congestion 
        control does not maximize the network's utility. 
        Infact, Admission control is shown to be better 
        control (in terms of both elastic and inelastic 
        utilities) than Fair Congestion Control in a 
        simplified case. 
    ●
        Let α be the desired rate of inelastic flows, m be the 
        number of inelastic flows and n be the number of 
        elastic flows. 
                                   
Fair Congestion Control
    ●
        Perform TCP­friendly congestion control. We model 
        it as the same fair congestion control as adopted for 
        elastic flows, with a slight difference. When the fair 
        share is smaller than α, then the fair share is used, 
        but when the fair share is greater than α, the 
        inelastic flow would still consume α.




                                  
Admission Control
    ●
        Perform admission control but no congestion control 
        once admitted. Assume the network already has n 
        elastic flows and m inelastic flows, a new inelastic 
        flow is admitted iff nε + (m­1)α <=1
    ●
        Here ε represents the minimum rate admission 
        control scheme tries to leave for elastic traffic. 
        Depending upon α, we can have two cases:


                                    
Aggressive Admission
Control
    ●
        ε <<< α – The arriving flow is admitted as long as it 
        is possible to allocate to it the desired rate of α, even 
        if this means all elastic flows have to run at their 
        minimum rate of ε.
    ●
        So, an inelastic flow is admitted iff (m+1)α ≤ 1 and 
        an elastic flow is always admitted.




                                    
Fair Admission Control
    ●
        ε = α – The arriving flow is admitted as long as its 
        desired rate is no greater than the prevailing fair 
        share for each elastic flow.
    ●
        So, an inelastic flow is admitted iff (m+n+1)α ≤ 1 
        and an elastic flow is always admitted.
    ●
        In [5], it is proved that Fair Admission control is 
        better than both Aggressive Admission contol and 
        Fair Congestion Control.

                                  
Idea
    ●
        Solving the optimization problem using the 
        polyblock algorithm would help us to prove (or 
        disprove) that admission control is better than fair 
        congestion control.
    ●
        Status: Coding to check it under progress.




                                   
Thank You...........




                 
Bibliography
    ●
        [1] H. Tuy, ”Monotonic Optimization: Problems and Solution Approaches”, 
        SIAM Journal on Optimization, 11:2(2000), 464­494
    ●
        [2]  M. Fazel, M. Chiang, ”Network Utility Maximization With Nonconcave 
        Utilities Using Sum­of­Squares Method”, Proc. IEEE CDC, December 2005
    ●
        [3] J.W.Lee, R.R. Mazumdar, N. Shroff, ”Non­convex optimization and rate 
        control for multi­class services in the Internet”, Proc. IEEE Infocom, March 
        2004 
    ●
        [4] M. Chiang, S. Zhang, P. Hande, ”Distributed rate allocation for inelastic 
        flows: Optimization framework, optimality conditions, and optimal 
        algorithms”, Proc. IEEE Infocom, March 2005 
    ●
        [5] D. M. Chiu, A. ­S. W. Tam, ”Fairness of traffic controls for inelastic 
        flows in the Internet”, Comput. Netw. (2007), doi:10.1016/j.comnet.
        2006.12.2006                         

More Related Content

What's hot

PRML 6.1章 カーネル法と双対表現
PRML 6.1章 カーネル法と双対表現PRML 6.1章 カーネル法と双対表現
PRML 6.1章 カーネル法と双対表現
hagino 3000
 
(研究会輪読) Weight Uncertainty in Neural Networks
(研究会輪読) Weight Uncertainty in Neural Networks(研究会輪読) Weight Uncertainty in Neural Networks
(研究会輪読) Weight Uncertainty in Neural Networks
Masahiro Suzuki
 
Maximum Likelihood Estimation
Maximum Likelihood EstimationMaximum Likelihood Estimation
Maximum Likelihood Estimationguestfee8698
 
20190609 bayes ml ch3
20190609 bayes ml ch320190609 bayes ml ch3
20190609 bayes ml ch3
Yoichi Tokita
 
Probability Density Function (PDF)
Probability Density Function (PDF)Probability Density Function (PDF)
Probability Density Function (PDF)
AakankshaR
 
Graph neural networks overview
Graph neural networks overviewGraph neural networks overview
Graph neural networks overview
Rodion Kiryukhin
 
001 lpp introduction
001 lpp introduction001 lpp introduction
001 lpp introduction
Victor Seelan
 
Outlier detection by Ueda's method
Outlier detection by Ueda's methodOutlier detection by Ueda's method
Outlier detection by Ueda's method
POOJA PATIL
 
Decision Trees
Decision TreesDecision Trees
Decision Trees
Student
 
Statistical Inference /Hypothesis Testing
Statistical Inference /Hypothesis Testing Statistical Inference /Hypothesis Testing
Statistical Inference /Hypothesis Testing
Dr Nisha Arora
 
Maximum likelihood estimation
Maximum likelihood estimationMaximum likelihood estimation
Maximum likelihood estimation
zihad164
 
Introduction to Generative Adversarial Networks (GANs)
Introduction to Generative Adversarial Networks (GANs)Introduction to Generative Adversarial Networks (GANs)
Introduction to Generative Adversarial Networks (GANs)
Appsilon Data Science
 
Bayesian Neural Networks
Bayesian Neural NetworksBayesian Neural Networks
Bayesian Neural Networks
Natan Katz
 
Stochastic Process and its Applications.
Stochastic Process and its Applications.Stochastic Process and its Applications.
Stochastic Process and its Applications.
Dr. Rahul Pandya
 
Gradient descent method
Gradient descent methodGradient descent method
Gradient descent method
Sanghyuk Chun
 
Introduction to principal component analysis (pca)
Introduction to principal component analysis (pca)Introduction to principal component analysis (pca)
Introduction to principal component analysis (pca)
Mohammed Musah
 
Pca
PcaPca
Dimensionality Reduction
Dimensionality ReductionDimensionality Reduction
Dimensionality Reduction
Saad Elbeleidy
 
Visual Explanation of Ridge Regression and LASSO
Visual Explanation of Ridge Regression and LASSOVisual Explanation of Ridge Regression and LASSO
Visual Explanation of Ridge Regression and LASSO
Kazuki Yoshida
 
Bayseian decision theory
Bayseian decision theoryBayseian decision theory
Bayseian decision theorysia16
 

What's hot (20)

PRML 6.1章 カーネル法と双対表現
PRML 6.1章 カーネル法と双対表現PRML 6.1章 カーネル法と双対表現
PRML 6.1章 カーネル法と双対表現
 
(研究会輪読) Weight Uncertainty in Neural Networks
(研究会輪読) Weight Uncertainty in Neural Networks(研究会輪読) Weight Uncertainty in Neural Networks
(研究会輪読) Weight Uncertainty in Neural Networks
 
Maximum Likelihood Estimation
Maximum Likelihood EstimationMaximum Likelihood Estimation
Maximum Likelihood Estimation
 
20190609 bayes ml ch3
20190609 bayes ml ch320190609 bayes ml ch3
20190609 bayes ml ch3
 
Probability Density Function (PDF)
Probability Density Function (PDF)Probability Density Function (PDF)
Probability Density Function (PDF)
 
Graph neural networks overview
Graph neural networks overviewGraph neural networks overview
Graph neural networks overview
 
001 lpp introduction
001 lpp introduction001 lpp introduction
001 lpp introduction
 
Outlier detection by Ueda's method
Outlier detection by Ueda's methodOutlier detection by Ueda's method
Outlier detection by Ueda's method
 
Decision Trees
Decision TreesDecision Trees
Decision Trees
 
Statistical Inference /Hypothesis Testing
Statistical Inference /Hypothesis Testing Statistical Inference /Hypothesis Testing
Statistical Inference /Hypothesis Testing
 
Maximum likelihood estimation
Maximum likelihood estimationMaximum likelihood estimation
Maximum likelihood estimation
 
Introduction to Generative Adversarial Networks (GANs)
Introduction to Generative Adversarial Networks (GANs)Introduction to Generative Adversarial Networks (GANs)
Introduction to Generative Adversarial Networks (GANs)
 
Bayesian Neural Networks
Bayesian Neural NetworksBayesian Neural Networks
Bayesian Neural Networks
 
Stochastic Process and its Applications.
Stochastic Process and its Applications.Stochastic Process and its Applications.
Stochastic Process and its Applications.
 
Gradient descent method
Gradient descent methodGradient descent method
Gradient descent method
 
Introduction to principal component analysis (pca)
Introduction to principal component analysis (pca)Introduction to principal component analysis (pca)
Introduction to principal component analysis (pca)
 
Pca
PcaPca
Pca
 
Dimensionality Reduction
Dimensionality ReductionDimensionality Reduction
Dimensionality Reduction
 
Visual Explanation of Ridge Regression and LASSO
Visual Explanation of Ridge Regression and LASSOVisual Explanation of Ridge Regression and LASSO
Visual Explanation of Ridge Regression and LASSO
 
Bayseian decision theory
Bayseian decision theoryBayseian decision theory
Bayseian decision theory
 

Similar to Non-convex Optimization in Networks

Non concave network utility maximization - A distributed optimization approach
Non concave network utility maximization - A distributed optimization approachNon concave network utility maximization - A distributed optimization approach
Non concave network utility maximization - A distributed optimization approach
Wasif Hafeez
 
Introduction to algorithmic aspect of auction theory
Introduction to algorithmic aspect of auction theoryIntroduction to algorithmic aspect of auction theory
Introduction to algorithmic aspect of auction theory
Abner Chih Yi Huang
 
Green Optical Networks with Signal Quality Guarantee
Green Optical Networks with Signal Quality Guarantee Green Optical Networks with Signal Quality Guarantee
Green Optical Networks with Signal Quality Guarantee
Maria Stylianou
 
Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...
Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...
Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...
Tiziano De Matteis
 
Introduction to optimization Problems
Introduction to optimization ProblemsIntroduction to optimization Problems
Quantum Computing: Timing is Everything
Quantum Computing: Timing is EverythingQuantum Computing: Timing is Everything
Quantum Computing: Timing is Everything
inside-BigData.com
 
Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...
Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...
Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...
Ryo Takahashi
 
The Traveling Salesman Problem: A Neural Network Perspective
The Traveling Salesman Problem: A Neural Network PerspectiveThe Traveling Salesman Problem: A Neural Network Perspective
The Traveling Salesman Problem: A Neural Network Perspective
mustafa sarac
 
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...Cemal Ardil
 
N03430990106
N03430990106N03430990106
N03430990106
ijceronline
 
EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptx
EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptxEfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptx
EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptx
ssuser2624f71
 
Practical ML
Practical MLPractical ML
Practical ML
Antonio Pitasi
 
A White Paper On Neural Network Quantization
A White Paper On Neural Network QuantizationA White Paper On Neural Network Quantization
A White Paper On Neural Network Quantization
April Knyff
 
PR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
PR-108: MobileNetV2: Inverted Residuals and Linear BottlenecksPR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
PR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
Jinwon Lee
 
Cosenza_MuleSoft_Meetup_1st.pptx
Cosenza_MuleSoft_Meetup_1st.pptxCosenza_MuleSoft_Meetup_1st.pptx
Cosenza_MuleSoft_Meetup_1st.pptx
AndreaCapolei2
 
Technical Trends_Study of Quantum
Technical Trends_Study of QuantumTechnical Trends_Study of Quantum
Technical Trends_Study of QuantumHardik Gohel
 
Hands on machine learning with scikit-learn and tensor flow by ahmed yousry
Hands on machine learning with scikit-learn and tensor flow by ahmed yousryHands on machine learning with scikit-learn and tensor flow by ahmed yousry
Hands on machine learning with scikit-learn and tensor flow by ahmed yousry
Ahmed Yousry
 
1801.06434
1801.064341801.06434
1801.06434
emil_laurence
 

Similar to Non-convex Optimization in Networks (20)

Non concave network utility maximization - A distributed optimization approach
Non concave network utility maximization - A distributed optimization approachNon concave network utility maximization - A distributed optimization approach
Non concave network utility maximization - A distributed optimization approach
 
Introduction to algorithmic aspect of auction theory
Introduction to algorithmic aspect of auction theoryIntroduction to algorithmic aspect of auction theory
Introduction to algorithmic aspect of auction theory
 
Green Optical Networks with Signal Quality Guarantee
Green Optical Networks with Signal Quality Guarantee Green Optical Networks with Signal Quality Guarantee
Green Optical Networks with Signal Quality Guarantee
 
Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...
Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...
Parallel Patterns for Window-based Stateful Operators on Data Streams: an Alg...
 
Introduction to optimization Problems
Introduction to optimization ProblemsIntroduction to optimization Problems
Introduction to optimization Problems
 
Quantum Computing: Timing is Everything
Quantum Computing: Timing is EverythingQuantum Computing: Timing is Everything
Quantum Computing: Timing is Everything
 
Parallel Algorithms
Parallel AlgorithmsParallel Algorithms
Parallel Algorithms
 
Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...
Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...
Quantization and Training of Neural Networks for Efficient Integer-Arithmetic...
 
The Traveling Salesman Problem: A Neural Network Perspective
The Traveling Salesman Problem: A Neural Network PerspectiveThe Traveling Salesman Problem: A Neural Network Perspective
The Traveling Salesman Problem: A Neural Network Perspective
 
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
 
N03430990106
N03430990106N03430990106
N03430990106
 
EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptx
EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptxEfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptx
EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks.pptx
 
Practical ML
Practical MLPractical ML
Practical ML
 
A White Paper On Neural Network Quantization
A White Paper On Neural Network QuantizationA White Paper On Neural Network Quantization
A White Paper On Neural Network Quantization
 
PR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
PR-108: MobileNetV2: Inverted Residuals and Linear BottlenecksPR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
PR-108: MobileNetV2: Inverted Residuals and Linear Bottlenecks
 
Cosenza_MuleSoft_Meetup_1st.pptx
Cosenza_MuleSoft_Meetup_1st.pptxCosenza_MuleSoft_Meetup_1st.pptx
Cosenza_MuleSoft_Meetup_1st.pptx
 
Technical Trends_Study of Quantum
Technical Trends_Study of QuantumTechnical Trends_Study of Quantum
Technical Trends_Study of Quantum
 
Hands on machine learning with scikit-learn and tensor flow by ahmed yousry
Hands on machine learning with scikit-learn and tensor flow by ahmed yousryHands on machine learning with scikit-learn and tensor flow by ahmed yousry
Hands on machine learning with scikit-learn and tensor flow by ahmed yousry
 
Power systemsilablri
Power systemsilablriPower systemsilablri
Power systemsilablri
 
1801.06434
1801.064341801.06434
1801.06434
 

More from Pratik Poddar

Guide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITiansGuide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITiansPratik Poddar
 
Art of Puzzle Solving
Art of Puzzle SolvingArt of Puzzle Solving
Art of Puzzle Solving
Pratik Poddar
 
Clipr rodinhood openhouse
Clipr rodinhood openhouseClipr rodinhood openhouse
Clipr rodinhood openhousePratik Poddar
 
Grad School101
Grad School101Grad School101
Grad School101
Pratik Poddar
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
Pratik Poddar
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
Pratik Poddar
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
Pratik Poddar
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
Pratik Poddar
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony Optimization
Pratik Poddar
 

More from Pratik Poddar (10)

Guide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITiansGuide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITians
 
Art of Puzzle Solving
Art of Puzzle SolvingArt of Puzzle Solving
Art of Puzzle Solving
 
Clipr Introduction
Clipr IntroductionClipr Introduction
Clipr Introduction
 
Clipr rodinhood openhouse
Clipr rodinhood openhouseClipr rodinhood openhouse
Clipr rodinhood openhouse
 
Grad School101
Grad School101Grad School101
Grad School101
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony Optimization
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 

Non-convex Optimization in Networks

  • 1. Summer 2008 Internship Report Advisor: Prof. Angela Y. Zhang The Chinese University of Hong Kong, Hong Kong Student: Pratik Poddar Indian Institute of Technology Bombay, India Topic: Non­Convex Optimization  Problems in Networks    
  • 3. Basics of Optimization ● Standard Optimization problem ● Linear Optimization problem ● Convex Optimization problem ● Monotonic Optimization problem    
  • 4. Polyblock Algorithm ● We have had two major events in the history of  optimization theory. ●  The first was linear programming and simplex  method in late 1940s­ early 1950s. ● The second was convex optimization and interior  point method in late 1980s­ early 1990s.     
  • 5. Polyblock Algorithm ● Convex optimization problems are known to be  solved, very reliably and efficiently. ● "..in fact, the great watershed in optimization isn't  between linearity and nonlinearity, but convexity  and nonconvexity" ­ R. Tyrrell Rockafellar, in   SIAM Review, 1993    
  • 6. Polyblock Algorithm ● Current research in optimization is mainly to have  that third event ­ Solving non­convex optimization  efficiently. Although solving convex optimization  problems is easy and non­convex optimization  problems is hard, but a variety of approaches have  been proposed to solve non­convex optimization  problems.    
  • 7. Polyblock Algorithm ● In 2000, H. Tuy proposed an algorithm to solve  optimization problems involving d.i functions under  monotonic constraints. ● This algorithm (Polyblock Algorithm) was inspired  by the idea of Polyhedral Outer Approximation  Method for maximizing a quasi­convex function  over a convex set.    
  • 8. Polyblock Algorithm ● What is a polyblock?  ● Then what is the difference between a polyblock and  a polyhedron? ● What are its properties? ● How is polyblock algorithm implemented?    
  • 9. Polyblock Algorithm as in [1]    
  • 10. Implementation of Polyblock Algorithm ● Consider the following optimization problem:                             minimize    x1 + x2                                                          such that     (x1­3)  + 9(x2­3) ≥ 0                   3                                    5x1 + 6x2 – 36 ≤ 0                                                         (x1,x2) ∊ [0,6]2    
  • 11. Implementation of Polyblock Algorithm ● Feasible region of the problem    
  • 14. Network Utility Maximization ● The framework of Network Utility Maximization  (NUM) has found many applications in network rate  allocation algorithms and Internet Congestion  Control Protocols.    
  • 15. Network Utility Maximization ● Problem: Consider a network with L links, each with  a fixed capacity cl bps, and S sources (i.e. end  users), each transmitting at the rate of xs bps. Each  source s uses the set L(s) of links in its path and has  a utility function Us(xs). Each link l is shared by a set  S(l) of sources. So, Network Utility Maximization is  basically the problem of maximizing the total utility  of the system over source rates subject to congestion  constraints for all links.    
  • 16. Network Utility Maximization Mathematically,    
  • 17. Network Utility Maximization ● Concave Utilities ­ Follows from Law of  Diminishing Marginal Utilities. Convex  Optimization Problem. ● U(x) = log (1+x) U(x) x    
  • 18. NUM for Concave Utilities ● The problem of Network Utility Maximization in  case of concave utilities is essentially a convex  optimization problem which is solvable efficiently  and exactly.    
  • 19. Network Utility Maximization ● Non­Concave Utilities – In multimedia applications  on Internet, the utilities are non­concave. Non­ convex optimization problem.  ● U(x) =  (1 + e­ax+b) ­1  U(x) x    
  • 20. NUM for Non-Concave Utilities ● The problem is a non­convex optimization problem.  Three ways have been suggested to solve it. ● In [3],  a 'self­regulation' heuristic is proposed,  however it converges only to a sub­optimal solution. ● In [4], a set of sufficient and necessary conditions is  presented under which the canonical distributed  algorithm converges to a global optimal solution.  However, these conditions may not hold in most  cases.    
  • 21. NUM for Non-Concave Utilities ● In [2], Using a family of convex SDP relaxations  based on the sum­of­squares method and  Positivestellensatz Theorem in real algebraic  geometry, a centralized computational method to  bound the total network utility in polynomial time is  proposed. ● This is effectively a centralized method to compute  the global optimum when the utilities can be  transformed into polynomial utilities.    
  • 22. NUM for Non-Concave Utilities ● In summary, currently there is no theoretically  polynomial­time algorithm (distributed or  centralised) known for non­concave utility  maximization. ● We worked to find ways to convexify the above  problem.     
  • 23. Idea and motivation ● The set may not be a convex set but if it can be  broken into a constant number of convex sets, we  can solve the problem in polynomial time.    
  • 27. Motivation ● By this method, we can solve NUM problem in  polynomial time. NUM finds applications in  network rate allocation algorithms and Internet  Congestion Control Protocol.    
  • 29. Internet Congestion Control ● Internet relies on congestion control implemented in  the end­systems to prevent offered load exceeding  network capacity, as well as allocate network  resources to different users and applications. ● In the past, the applications (email, file transfer) had  concave utilities (i.e were elastic). As number of  multimedia applications are increasing, there are  various talks on different congestion controls.    
  • 30. Internet Congestion Control ● In [5], It has been argued that fairness congestion  control does not maximize the network's utility.  Infact, Admission control is shown to be better  control (in terms of both elastic and inelastic  utilities) than Fair Congestion Control in a  simplified case.  ● Let α be the desired rate of inelastic flows, m be the  number of inelastic flows and n be the number of  elastic flows.     
  • 31. Fair Congestion Control ● Perform TCP­friendly congestion control. We model  it as the same fair congestion control as adopted for  elastic flows, with a slight difference. When the fair  share is smaller than α, then the fair share is used,  but when the fair share is greater than α, the  inelastic flow would still consume α.    
  • 32. Admission Control ● Perform admission control but no congestion control  once admitted. Assume the network already has n  elastic flows and m inelastic flows, a new inelastic  flow is admitted iff nε + (m­1)α <=1 ● Here ε represents the minimum rate admission  control scheme tries to leave for elastic traffic.  Depending upon α, we can have two cases:    
  • 33. Aggressive Admission Control ● ε <<< α – The arriving flow is admitted as long as it  is possible to allocate to it the desired rate of α, even  if this means all elastic flows have to run at their  minimum rate of ε. ● So, an inelastic flow is admitted iff (m+1)α ≤ 1 and  an elastic flow is always admitted.    
  • 34. Fair Admission Control ● ε = α – The arriving flow is admitted as long as its  desired rate is no greater than the prevailing fair  share for each elastic flow. ● So, an inelastic flow is admitted iff (m+n+1)α ≤ 1  and an elastic flow is always admitted. ● In [5], it is proved that Fair Admission control is  better than both Aggressive Admission contol and  Fair Congestion Control.    
  • 35. Idea ● Solving the optimization problem using the  polyblock algorithm would help us to prove (or  disprove) that admission control is better than fair  congestion control. ● Status: Coding to check it under progress.    
  • 37. Bibliography ● [1] H. Tuy, ”Monotonic Optimization: Problems and Solution Approaches”,  SIAM Journal on Optimization, 11:2(2000), 464­494 ● [2]  M. Fazel, M. Chiang, ”Network Utility Maximization With Nonconcave  Utilities Using Sum­of­Squares Method”, Proc. IEEE CDC, December 2005 ● [3] J.W.Lee, R.R. Mazumdar, N. Shroff, ”Non­convex optimization and rate  control for multi­class services in the Internet”, Proc. IEEE Infocom, March  2004  ● [4] M. Chiang, S. Zhang, P. Hande, ”Distributed rate allocation for inelastic  flows: Optimization framework, optimality conditions, and optimal  algorithms”, Proc. IEEE Infocom, March 2005  ● [5] D. M. Chiu, A. ­S. W. Tam, ”Fairness of traffic controls for inelastic  flows in the Internet”, Comput. Netw. (2007), doi:10.1016/j.comnet.   2006.12.2006