Elsevier

Applied Soft Computing

Volume 12, Issue 7, July 2012, Pages 1832-1846
Applied Soft Computing

Utility driven optimization of real time data broadcast schedules

https://doi.org/10.1016/j.asoc.2011.04.006Get rights and content

Abstract

Data dissemination in wireless environments is often accomplished by on-demand broadcasting. The time critical nature of the data requests plays an important role in scheduling these broadcasts. Most research in on-demand broadcast scheduling has focused on the timely servicing of requests so as to minimize the number of missed deadlines. However, there exists many environments where the utility of the received data is an equally important criterion as its timeliness. Missing the deadline may reduce the utility of the data but does not necessarily make it zero. In this work, we address the problem of scheduling real time data broadcasts with such soft deadlines. We investigate search based optimization techniques to develop broadcast schedulers that make explicit attempts to maximize the utility of data requests as well as service as many requests as possible within an acceptable time limit. Our analysis shows that heuristic driven methods for such problems can be improved by hybridizing them with local search algorithms. We further investigate the option of employing a dynamic optimization technique to facilitate utility gain, thereby eliminating the requirement of a heuristic in the process. An evolution strategy based stochastic hill-climber is investigated in this context.

Introduction

Wireless computing involves a network of portable computing devices thoroughly embedded in our day-to-day work and personal life. The devices interact with each other and with other computing nodes by exchanging rapid and continuous streams of data. To facilitate almost imperceptible human–computer interaction, data access times in such environments must be maintained within a specified quality-of-service (QoS) level. Challenges in doing so arise from the fact that wireless bandwidth is typically a limited resource, and thus it is not always possible to meet the quality requirements of every device. This constraint not only makes wireless data access a challenging problem, but also identifies “optimal resource allocation” as one of the major research problems in this domain.

A wireless environment encompasses both peer-to-peer and client-server modes of data dissemination. For example, a typical pervasive health care system may involve multiple sensor nodes disseminating data on the monitored vital signs of a patient to a personal digital assistant carried by the attending health care personnel. Data communication follows a peer-to-peer architecture in such a setting. On the other hand, a wireless environment designed to serve queries on flight information in an airport is based on a client-server mode of communication. Flight information usually reside in a database server from where data is disseminated based on the incoming queries. For an environment like an airport, it is appropriate to assume that the database will be queried more frequently for certain types of data. Similar situations can be imagined in a stock trading center, a pervasive traffic management system, or a pervasive supermarket. Such scenarios open up possibilities of adopting a broadcast based architecture to distribute data in a way that multiple queries for the same data item get served by a single broadcast. The focus of this paper is directed towards a combinatorial problem that arises in this approach.

Quality of service (QoS) is an important facet in wireless data access. Consider the following example application – a traffic management system for a big city. The city government implements a traffic pricing policy for all vehicles on all roads based on factors such as the distance traveled, the type of road traveled on, the time of day, vehicle category and customer type (for example, special fee paying, traveling salesman, and paramedic on-call) The system gathers real time traffic data via thousands of sensors, such as traffic cameras, magneto-resistive traffic sensors and radars spread throughout the city. To help drivers optimize their travel costs, the traffic management system provides various routing services to drivers to avoid roadblocks, construction delays, congestion, accidents, etc.1

A driver requests and gets routing services using smart GPS equipped devices as follows. A device periodically uploads the vehicle’s current location (based on GPS information), intended destination, time willing to spend for traveling to destination, a prioritized list of routing restrictions (for example, waypoints that the driver would like to visit if possible, rest stops, and scenic byways), vehicle category and customer type, and current speed. In response, the server replies with a set of route information. Each route information contains, among other things, information about road segments to travel on this route and traffic patterns on these road segments. The GPS equipped device uses this information and uses other parameters set by the driver to compute a good route to take. Note that since the response to many drivers will no doubt contain overlapping route segments and traffic information, it makes sense broadcasting this data.

The requests arrive at the server with various priority levels and soft deadlines. For example, a higher fee paying customer gets a higher priority than a lesser fee paying customer. A VIP’s convoy may get a still higher priority. Emergency responders get the highest priority. A routing request that comes associated with a set of routing restrictions, for example, a list of waypoints that the driver would like to visit en route, automatically gets associated with a set of soft deadlines based on the speed of the driver. The requests from different drivers may also get re-prioritized at the server so as to meet a broader goal of reducing congestion and enabling smoother traffic flows.

In this example, the different data that the server needs to serve is associated with different utility values. Owing to the dynamic nature of the utility of responses to queries, the time criticality factor cannot be ignored altogether when disseminating data. The server would like to satisfy as many queries in a timely manner as possible. However, some queries may be delayed beyond their specified deadlines (for example, the query from the VIP’s convoy). The users, who hardly realize the broader goals of the traffic management system and various bottlenecks in the information infrastructure, would like to have their requests served at the earliest; however, it is reasonable to assume that delayed data still provide some utility even if received after a specified deadline. For example, a delayed route information may prevent a driver from visiting a particular waypoint en route or may require the driver to use the next gas station. Nonetheless, it may still allow the driver to choose a good route to the destination. An assumption of reduced data utility in the face of missed deadline enables data broadcasts to be tailored in such a way that total utility associated with a broadcast is maximized. This helps maintain a certain QoS level in the underlying infrastructure.

Note that the specific problem we are trying to address is by no means restricted only to the example application outlined above. Similar scenarios are witnessed in environments such as stock exchanges. Here stock brokers on the floor seek and receive periodic market data on wireless hand-held devices and notebooks and analyze them to determine which stocks are rewarding. They also buy and sell stocks using such devices. Popularity of stocks changes throughout the day, and it is important to analyze such trends along multiple dimensions in order to buy and sell stocks. Thus, although queries from brokers are implicitly associated with deadlines, these can be considered soft. The overall goal of the stock exchange still remains to satisfy as many requests as possible in a timely manner. To wrap up the scope of the problem domain we would like to point out that in order to make useful decisions, the stock broker may make a request for a group of data from the stock exchange (for example, stock prices of three different oil companies). A typical constraint on such a request is that all these data items must be received (not necessarily in any particular order) before the stock broker can perform the relevant local analysis of the market trends. Such a request can be considered as a transactional request (or simply a transaction). For scheduling in such cases, additional constraints must be placed for ensuring the validity of data received.

Wireless broadcast mechanisms have been extensively investigated earlier. However, very few of the proposed approaches give attention to the effective utility involved in the timely servicing of a request. Time criticality has been earlier addressed in a number of contexts with the assumption of a hard deadline [2], [3], [4]. Broadcast scheduling in these works mostly focus on the timely servicing of a request to minimize the number of missed deadlines. When the assumption of a soft deadline is appropriate, a broadcast schedule should not only try to serve as many requests as possible, but also make a “best effort” in serving them with higher utility values. Often, heuristics are employed in a dynamic setting to determine these schedules. However, their designs do not involve the QoS criteria explicitly. Heuristic based methods make local decisions w.r.t. a request or a broadcast, and often fail to capture the sought global QoS requirement. Much of this is due to the fact that real time decision making cannot span beyond an acceptable time limit, thereby restricting the usage of “full length” optimization techniques to the domain. It does become imperative to design hybrid strategies that can combine the fast real time performance of heuristics and the better solution qualities obtained from search based optimization.

Our contributions in this paper are summarized in the following points:

  • 1.

    We explore data broadcasting as a combinatorial problem defined with an objective of utility maximization. This utility driven optimization of broadcasts adds more value to a wireless system since the energy cycles used by the devices while retrieving a data item will presumably not be wasteful.

  • 2.

    We provide an extensive analysis of the search space involved in the problem and report the performance of multiple heuristics on a set of statistically generated synthetic requests. We argue that traditional heuristics usually generate solutions in a sub-optimal part of this space with respect to a given global utility measurement.

  • 3.

    We empirically demonstrate that “local search” can be used in real-time to boost the performance of naive heuristics such as EDF, with performance levels often at par with other elaborate heuristics. In addition, we propose an evolution strategy based light-weight stochastic hill-climber that explicitly searches the space of schedules to maximize utility. Results demonstrate that, in certain problem types, this explicit search strategy can generate higher objective values than a traditional heuristic based approach.

  • 4.

    We perform the analysis indicated in the above points in the context of two problem types, namely at the data item level and at the transaction level. In the former type, requests involve a single data item, while multiple unordered data items are involved in a request of the latter type. Besides the local search and evolution strategy based approaches, we present the performance of heuristics such as EDF, HUF, R × W, SIN-α, NPRDS and ASETS* on one or more of these problem types. Transaction level scheduling induces an exponentially large search space and has been observed to demonstrate very different dynamics than a data item level problem.

The rest of the paper is organized as follows. Section 2 summarizes the related work in this domain. The broadcast model and the scheduling problem are discussed in Section 3. The explored solution methods are described in Section 4. Section 5 discusses the scheduling problem at the transaction level. The experimental setup followed by results and discussions are summarized in Sections 6 Experimental setup, 7 Results and discussion, respectively. Finally, Section 8 concludes the paper.

Section snippets

Related work

Data broadcasting has been extensively studied in the context of wireless communication systems. Su and Tassiulas [5] study the problem in the context of access latency and formulate a deterministic dynamic optimization problem, the solution to which provides a minimum access latency schedule. Acharya and Muthukrishnan propose the stretch metric [6] to account for differences in service times arising in the case of variable sized data items. They propose the MAX heuristic to optimize the worst

Broadcast scheduling

Wireless data broadcasting is an efficient approach to address data requests, particularly when similar requests are received from a large user community. Broadcasting in such cases alleviate the requirement for repeated communication between the server and the different clients interested in the same data item. Push-based architectures broadcast commonly accessed data at regular intervals. Contrary to this, on-demand architectures allow the clients to send their requests to the server.

Solution methodology

An implicit constraint in real time data broadcasting is the time factor involved in making a scheduling decision. Data requests usually arrive more frequently than they can be served, which in turn leads to the generation of a long request queue. Any scheduling method must be fast enough to generate a good schedule without adding much to the access time of requests. Latencies induced between broadcasts because of the scheduling time is also a detrimental factor to resource utilization.

Transaction scheduling

The aforementioned problem assumes that requests are made at the data item level. A client interested in multiple data items would make independent requests for the individual items. As an extension of this problem, we next consider the case of transaction level requests. As mentioned in Section 1, a transaction level request differs from a data item level request in the sense that a request involves more than one data item. The order of retrieval of the data items is not important, but

Experimental setup

The data sets used in our experiments are generated using various popular distributions that are known to capture the dynamics of a public data access system. The different parameters of the experiment are tabulated in Table 1 and discussed below. We generate two different data sets with these parameter settings, one involving data item level requests and another involving transaction level requests. Experiments are run independently on the two data sets using the corresponding heuristics and

Results and discussion

We first present the overall performance results obtained for the different solution methodologies on the data item level data set. Although, the data item level scheduling problem can be viewed as a special case of the transaction level scheduling, we observed that a method’s performance can be quite different in these two problem classes.

Conclusions

In this paper, we address the problem of time critical data access in wireless environments where the time criticality can be associated with a QoS requirement. To this end, we formulate an utility metric to evaluate the performance of different scheduling methods. The earliest deadline first (EDF) and highest utility first (HUF) heuristics are used in two problem domains – data item level scheduling and transaction level scheduling. In the data item level domain, our initial observation on

Acknowledgments

This work was partially supported by the U.S. Air Force Office of Scientific Research under contract FA9550-07-1-0042. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing official policies, either expressed or implied, of the U.S. Air Force or other federal government agencies.

Rinku Dewri is an Assistant Professor in the Computer Science Department at University of Denver. He obtained his Ph.D. in Computer Science from Colorado State University. His research interests are in the area of information security and privacy, risk management, data management and multi-criteria decision making. He is a member of the IEEE and the ACM.

References (31)

  • S. Hameed et al.

    Efficient algorithms for scheduling data broadcast

    Wireless Networks

    (1999)
  • K.C.K. Lee et al.

    Pervasive data access in wireless and mobile computing environments

    Wireless Communications and Mobile Computing

    (2008)
  • P. Xuan et al.

    Broadcast on demand: efficient and timely dissemination of data in mobile environments

  • J. Fernandez et al.

    Adaptive dissemination of data in time-critical asymmetric communication environments

    Mobile Networks and Applications

    (2004)
  • J. Chang et al.

    Broadcast scheduling: algorithms and complexity

  • Cited by (9)

    • Dynamic priority scheduling of periodic queries in on-demand data dissemination systems

      2017, Information Systems
      Citation Excerpt :

      In [22], by taking data urgency, data size and the number of pending requests into consideration, Lee et al. proposed a pyramid preemptive algorithm namely PRDS. Apart from the above firm deadline scheduling, Dewri et al. [14] studied the soft deadline broadcast scheduling problem and proposed an evolution strategy based stochastic hill-climber. One thing to note is that all the studies mentioned above are focused on single item requests, single channel real-time broadcast scheduling.

    • On-demand data broadcast with deadlines for avoiding conflicts in wireless networks

      2015, Journal of Systems and Software
      Citation Excerpt :

      Lv et al. (2012) introduced the concepts of “profit” and “opportunity cost” to on-demand data broadcast for solving data scheduling problem on a single channel and multiple channels, and proved its NP-hard. Dewri et al. (2012) scheduled real time requests with deadlines to reduce the miss ratio, and the proposed scheduler attempts to maximize the utility of requests and serves the requests in their deadlines as far as possible. Yi and Shin (2012) proposed a hybrid scheduling scheme based on semantic relationship and access probabilities.

    • A bandwidth sourcing and task allocation model in telecommunications under stochastic QoS guarantees

      2014, Applied Soft Computing Journal
      Citation Excerpt :

      The QoS parameters (bandwidth, packet loss rate, delay and jitter) are extensively studied and they have been modeled in different domains as well as on different levels. One branch of research considers the design and implementation of network infrastructure and operating policies including QoS issues [39–44]. The main concern addressed in this line of research is guaranteeing a promised level of quality through bandwidth allocation, buffer management and scheduling.

    • Set-based broadcast scheduling for minimizing the worst access time of multiple data items in wireless environments

      2012, Information Sciences
      Citation Excerpt :

      There exist several schemes that improved access time for data broadcast in wireless environments. Research [1,6,7,10,15,20,25,32,39,40] considered employing multiple channels or allowing multiple data-item queries to reduce access time. In their problems, each item’s access probability was assumed to be available and they aimed to minimize the average access time.

    View all citing articles on Scopus

    Rinku Dewri is an Assistant Professor in the Computer Science Department at University of Denver. He obtained his Ph.D. in Computer Science from Colorado State University. His research interests are in the area of information security and privacy, risk management, data management and multi-criteria decision making. He is a member of the IEEE and the ACM.

    Indrakshi Ray is an Associate Professor in the Computer Science Department at Colorado State University. She obtained her Ph.D. from George Mason University. Her research interests include security and privacy, database systems, e-commerce and formal methods in software engineering. She served as the Program Chair for SACMAT 2006 and IFIP WG 11.3 DBSEC 2003. She has also been a member of several program committees such as for EDBT, SACMAT, ACM CCS and EC-Web. She is a member of the IEEE and the ACM.

    Indrajit Ray is an Associate Professor in the Computer Science Department at Colorado State University. His main research interests are in the areas of computer and network security, database security, security and trust models, privacy and computer forensics. He is on the editorial board of several journals, and has served or is serving on the program committees of a number of international conferences. He is a member of IEEE, IEEE CS, ACM, ACM SIGSAC, IFIP WG 11.3 and IFIP WG 11.9.

    Darrell Whitley is Professor and Chair of the Computer Science Department at Colorado State University. He also currently serves as Chair of ACM SIGEVO. He was chair of the governing board for International Society for Genetic Algorithm from 1993 to 1997, and was Editor-in-Chief of the MIT Press journal Evolutionary Computation from 1997 to 2002.

    View full text