SlideShare a Scribd company logo
Delay-Based Network Utility Maximization
ABSTRACT:
It is well known that max-weight policies based on a queue backlog index can be used to
stabilize stochastic networks, and that similar stability results hold if a delay index is used.
Using Lyapunov optimization, we extend this analysis to design a utility maximizing algorithm
that uses explicit delay information from the head-of-line packet at each user. The resulting
policy is shown to ensure deterministic worst-case delay guarantees and to yield a throughput
utility that differs from the optimally fair value by an amount that is inversely proportional to
the delay guarantee. Our results hold for a general class of 1-hop networks, including packet
switches
EXISTING SYSTEM:
The stability works all use backlog-based transmission rules, which treat joint stability and
utility optimization. However, work introduces an interesting delay-based Lyapunov function
for proving stability, where the delay of the head-of-line packet is used as a weight in the max-
weight decision. This approach intuitively provides tighter control of the actual queueing
delays.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
DISADVANTAGES OF EXISTING SYSTEM:
1. In an interesting delay-based Lyapunov function for proving stability, where the delay of
the head-of-line packet is used as a weight in the max-weight decision. This approach
intuitively provides tighter control of the actual queuing delays.
2. A single head-of-line packet is scheduled based on the delay it has experienced, rather
than on the amount of additional packets that arrived after it.
3. Use delay-based rules only in the context of queue stability. To our knowledge, there are
no prior works that use delay-based scheduling to address the important issue of joint
stability and utility optimization.
PROPOSED SYSTEM:
THIS paper considers the problem of scheduling for maximum throughput utility in a network
with random packet arrivals and time-varying channel reliability. We focus on 1-hop networks
where each packet requires transmission over only one link. At every slot, the network
controller assesses the condition of its channels and selects a set of links for transmission. The
success of each transmission depends on the collection of links selected and their corresponding
reliabilities. The goal is to maximize a concave and nondecreasing function of the time-average
throughput on each link.
In this paper we use a delay-based Lyapunov function and extend the analysis to treat joint
stability and performance optimization via the Lyapunov optimization technique from our prior
work. The extension is not obvious. Indeed, the flow control decisions in the prior work are
made immediately when a new packet arrives, which directly affects the drift of backlog-based
Lyapunov functions. However, such decisions do not directly affect the delay value of the head-
of-line packets, and hence do not directly affect the drift of delay-based Lyapunov functions.
We overcome this challenge with a novel flow control policy that queues all arriving data, but
makes packet dropping decisions just before advancing a new packet to the head-of-line. This
policy is structurally different from the utility optimization works. This new structure leads to
deterministic guarantees on the worst-case delay of any non dropped packet and provides
throughput utility that can be pushed arbitrarily close to optimal.
ADVANTAGES OF PROPOSED SYSTEM:
 It is important to analyze these delay-based policies because they improve our
understanding of network delay, and because the deterministic guarantees they offer are
useful for many practical systems.
 while our deterministic delay guarantees hold for general arrival sample paths, our utility
analysis assumes all arrival processes are independent of each other (possibly with
different rates for each process) and independent and identically distributed (i.i.d.) over
time-slots.
 The deterministic delay guarantees we obtain in this present paper are quite strong and
show the advantages of our new flow control structure.
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
REFERENCE:
Michael J. Neely, Senior Member, IEEE- “Delay-Based Network Utility Maximization”-
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1, FEBRUARY 2013.

More Related Content

DOCX
Delay based network utility maximization
DOC
Performance of a speculative transmission scheme for scheduling latency reduc...
PPTX
Minimum interference routing algorithm
DOCX
A distributed control law for load balancing in content delivery networks
PDF
Load Balancing traffic in OpenStack neutron
DOCX
A low complexity congestion control and scheduling algorithm for multihop wir...
PDF
Admission control
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
Delay based network utility maximization
Performance of a speculative transmission scheme for scheduling latency reduc...
Minimum interference routing algorithm
A distributed control law for load balancing in content delivery networks
Load Balancing traffic in OpenStack neutron
A low complexity congestion control and scheduling algorithm for multihop wir...
Admission control
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...

What's hot (19)

DOCX
Mobile projected trajectory algorithm with
PPTX
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
DOCX
Time sensitive utility-based single-copy
DOCX
Dcim distributed cache invalidation method for maintaining cache consistency ...
PDF
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
DOCX
Dcim distributed cache invalidation method for maintaining cache consistency ...
DOCX
Using fuzzy logic control to provide intelligent traffic management service f...
PDF
On modeling controller switch interaction in openflow based sdns
PPT
Congestion control and quality of service
DOCX
JOINT OPTIMAL DATA RATE AND POWER ALLOCATION IN LOSSY MOBILE AD HOC NETWORKS ...
PPT
PPTX
SwitchingTechniques (3).ppt
PPTX
Lecture14 1
PDF
A survey on SCTP
PPTX
Congestion control
PPT
Data link control
DOC
A traffic engineering
PDF
Mit6 02 f12_chap18
PPTX
Lifetime-Aware Scheduling and Power Control for MTC in LTE Networks
Mobile projected trajectory algorithm with
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Time sensitive utility-based single-copy
Dcim distributed cache invalidation method for maintaining cache consistency ...
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
Dcim distributed cache invalidation method for maintaining cache consistency ...
Using fuzzy logic control to provide intelligent traffic management service f...
On modeling controller switch interaction in openflow based sdns
Congestion control and quality of service
JOINT OPTIMAL DATA RATE AND POWER ALLOCATION IN LOSSY MOBILE AD HOC NETWORKS ...
SwitchingTechniques (3).ppt
Lecture14 1
A survey on SCTP
Congestion control
Data link control
A traffic engineering
Mit6 02 f12_chap18
Lifetime-Aware Scheduling and Power Control for MTC in LTE Networks
Ad

Similar to Delay based network utility maximization (20)

PDF
Soft Real-Time Guarantee for Control Applications Using Both Measurement and ...
PDF
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
PDF
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
PDF
A novel routing technique for mobile ad hoc networks (manet)
PDF
05688207
PDF
IEEE 2015 NS2 Projects
DOCX
Resource allocation for qo s support in wireless mesh networks
PDF
IEEE 2015 NS2 Projects
PDF
Congestion Control and QOS Improvement for AEERG protocol in MANET
PDF
Congestion Control and QOS Improvement for AEERG protocol in MANET
PDF
IEEE Networking 2016 Title and Abstract
PDF
Iisrt arunkumar b (networks)
PDF
Networking project list for java and dotnet
DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
DOCX
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Multicast capacity-in-manet-wi...
PDF
IRJET-A Survey on congestion control with TCP network
DOCX
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
PDF
ADVANCED DIFFUSION APPROACH TO DYNAMIC LOAD-BALANCING FOR CLOUD STORAGE
PDF
ADVANCED DIFFUSION APPROACH TO DYNAMIC LOAD-BALANCING FOR CLOUD STORAGE
PDF
ADVANCED DIFFUSION APPROACH TO DYNAMIC LOAD-BALANCING FOR CLOUD STORAGE
Soft Real-Time Guarantee for Control Applications Using Both Measurement and ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
A novel routing technique for mobile ad hoc networks (manet)
05688207
IEEE 2015 NS2 Projects
Resource allocation for qo s support in wireless mesh networks
IEEE 2015 NS2 Projects
Congestion Control and QOS Improvement for AEERG protocol in MANET
Congestion Control and QOS Improvement for AEERG protocol in MANET
IEEE Networking 2016 Title and Abstract
Iisrt arunkumar b (networks)
Networking project list for java and dotnet
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Multicast capacity-in-manet-wi...
IRJET-A Survey on congestion control with TCP network
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
ADVANCED DIFFUSION APPROACH TO DYNAMIC LOAD-BALANCING FOR CLOUD STORAGE
ADVANCED DIFFUSION APPROACH TO DYNAMIC LOAD-BALANCING FOR CLOUD STORAGE
ADVANCED DIFFUSION APPROACH TO DYNAMIC LOAD-BALANCING FOR CLOUD STORAGE
Ad

More from IEEEFINALYEARPROJECTS (20)

DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
DOCX
Reversible data hiding with optimal value transfer
DOCX
Query adaptive image search with hash codes
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
DOCX
Local directional number pattern for face analysis face and expression recogn...
DOCX
An access point based fec mechanism for video transmission over wireless la ns
DOCX
Towards differential query services in cost efficient clouds
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
DOCX
Privacy preserving back propagation neural network learning over arbitrarily ...
DOCX
Non cooperative location privacy
DOCX
Harnessing the cloud for securely outsourcing large
DOCX
Geo community-based broadcasting for data dissemination in mobile social netw...
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
DOCX
Utility privacy tradeoff in databases an information-theoretic approach
DOCX
Two tales of privacy in online social networks
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
Reversible watermarking based on invariant image classification and dynamic h...
Reversible data hiding with optimal value transfer
Query adaptive image search with hash codes
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Local directional number pattern for face analysis face and expression recogn...
An access point based fec mechanism for video transmission over wireless la ns
Towards differential query services in cost efficient clouds
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Secure and efficient data transmission for cluster based wireless sensor netw...
Privacy preserving back propagation neural network learning over arbitrarily ...
Non cooperative location privacy
Harnessing the cloud for securely outsourcing large
Geo community-based broadcasting for data dissemination in mobile social netw...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Dynamic resource allocation using virtual machines for cloud computing enviro...
A secure protocol for spontaneous wireless ad hoc networks creation
Utility privacy tradeoff in databases an information-theoretic approach
Two tales of privacy in online social networks

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Spectroscopy.pptx food analysis technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
cuic standard and advanced reporting.pdf
PPT
Teaching material agriculture food technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
MYSQL Presentation for SQL database connectivity
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Spectroscopy.pptx food analysis technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
cuic standard and advanced reporting.pdf
Teaching material agriculture food technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectral efficient network and resource selection model in 5G networks
Diabetes mellitus diagnosis method based random forest with bat algorithm
Digital-Transformation-Roadmap-for-Companies.pptx
The AUB Centre for AI in Media Proposal.docx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Dropbox Q2 2025 Financial Results & Investor Presentation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Per capita expenditure prediction using model stacking based on satellite ima...
MYSQL Presentation for SQL database connectivity

Delay based network utility maximization

  • 1. Delay-Based Network Utility Maximization ABSTRACT: It is well known that max-weight policies based on a queue backlog index can be used to stabilize stochastic networks, and that similar stability results hold if a delay index is used. Using Lyapunov optimization, we extend this analysis to design a utility maximizing algorithm that uses explicit delay information from the head-of-line packet at each user. The resulting policy is shown to ensure deterministic worst-case delay guarantees and to yield a throughput utility that differs from the optimally fair value by an amount that is inversely proportional to the delay guarantee. Our results hold for a general class of 1-hop networks, including packet switches EXISTING SYSTEM: The stability works all use backlog-based transmission rules, which treat joint stability and utility optimization. However, work introduces an interesting delay-based Lyapunov function for proving stability, where the delay of the head-of-line packet is used as a weight in the max- weight decision. This approach intuitively provides tighter control of the actual queueing delays. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. DISADVANTAGES OF EXISTING SYSTEM: 1. In an interesting delay-based Lyapunov function for proving stability, where the delay of the head-of-line packet is used as a weight in the max-weight decision. This approach intuitively provides tighter control of the actual queuing delays. 2. A single head-of-line packet is scheduled based on the delay it has experienced, rather than on the amount of additional packets that arrived after it. 3. Use delay-based rules only in the context of queue stability. To our knowledge, there are no prior works that use delay-based scheduling to address the important issue of joint stability and utility optimization. PROPOSED SYSTEM: THIS paper considers the problem of scheduling for maximum throughput utility in a network with random packet arrivals and time-varying channel reliability. We focus on 1-hop networks where each packet requires transmission over only one link. At every slot, the network controller assesses the condition of its channels and selects a set of links for transmission. The success of each transmission depends on the collection of links selected and their corresponding reliabilities. The goal is to maximize a concave and nondecreasing function of the time-average throughput on each link. In this paper we use a delay-based Lyapunov function and extend the analysis to treat joint stability and performance optimization via the Lyapunov optimization technique from our prior work. The extension is not obvious. Indeed, the flow control decisions in the prior work are made immediately when a new packet arrives, which directly affects the drift of backlog-based Lyapunov functions. However, such decisions do not directly affect the delay value of the head- of-line packets, and hence do not directly affect the drift of delay-based Lyapunov functions. We overcome this challenge with a novel flow control policy that queues all arriving data, but makes packet dropping decisions just before advancing a new packet to the head-of-line. This policy is structurally different from the utility optimization works. This new structure leads to
  • 3. deterministic guarantees on the worst-case delay of any non dropped packet and provides throughput utility that can be pushed arbitrarily close to optimal. ADVANTAGES OF PROPOSED SYSTEM:  It is important to analyze these delay-based policies because they improve our understanding of network delay, and because the deterministic guarantees they offer are useful for many practical systems.  while our deterministic delay guarantees hold for general arrival sample paths, our utility analysis assumes all arrival processes are independent of each other (possibly with different rates for each process) and independent and identically distributed (i.i.d.) over time-slots.  The deterministic delay guarantees we obtain in this present paper are quite strong and show the advantages of our new flow control structure. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 4. SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above. REFERENCE: Michael J. Neely, Senior Member, IEEE- “Delay-Based Network Utility Maximization”- IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 1, FEBRUARY 2013.