capacity of wireless networks
play

Capacity of Wireless Networks Anil Kumar S. Vullikanti Network - PowerPoint PPT Presentation

Capacity of Wireless Networks Anil Kumar S. Vullikanti Network Dynamics and Simulation Science Laboratory, Virginia Bioinformatics Institute and Department of Computer Science, Virginia Tech Anil Vullikanti (Virginia Tech) Capacity of Wireless


  1. Upper bound 1 [Gupta, Kumar]: tighter upper bound of λ ( n ) = O ( √ n log n ) (discussed in Part II) Theorem (Yi et al., 2003) Expected per-connection throughput is O ( 1 √ n ) . Proof sketch Let L denote the average distance between the source and destination of a connection Each connection has rate of λ ⇒ transport capacity of n λ L per second. Consider the b th bit, where 1 ≤ b ≤ λ nT . Suppose it moves from its source to its destination in a sequence of h ( b ) hops, where the h th hop covers a distance of r h b units. We have: h ( b ) λ nT X X r h b = λ nTL b =1 h =1 Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 19 / 100

  2. Proof of upper bound (continued) Let indicator Γ( h , b , s ) be 1 if the h th h ( b ) λ nT Γ( h , b , s ) ≤ Wn hop of bit b occurs during slot s . We X X 2 have b =1 h =1 Summing over all slots over the T - λ nT h ( b ) ≤ WTn H . X = second period: 2 b =1 Because of Tx-model of interference, disks of radius (1 + ∆) times the lengths of hops centered at the trans- mitters are disjoint. λ nT h ( b ) b ) 2 ≤ W X X Γ( h , b , s ) π (1+∆) 2 ( r h b =1 h =1 Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 20 / 100

  3. Proof of upper bound (continued) λ nT h ( b ) X X π (1 + ∆) 2 ( r h b ) 2 ≤ WT b =1 h =1 λ nT h ( b ) 1 WT X X H ( r h b ) 2 ⇒ ≤ π (1 + ∆) 2 H b =1 h =1 2 0 1 h ( b ) h ( b ) λ nT λ nT 1 1 X X X X H ( r h H ( r h b ) 2 ( convexity) b ) ≤ @ A b =1 h =1 b =1 h =1 h ( b ) s λ nT 1 WT X X H ( r h ⇒ b ) ≤ π (1 + ∆) 2 · H b =1 h =1 Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 21 / 100

  4. Proof of upper bound (continued) s WTH λ nTL ≤ π (1 + ∆) 2 (1 + ∆) W √ n bit-meters / second 1 1 ⇒ λ nL ≤ √ 2 π O ( 1 ⇒ λ = √ n ) Tighter upper bound using cuts and flows (discussed later) Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 22 / 100

  5. Lower bound Theorem (Kulkarni et al., 2004) 1 Expected per-connection throughput is Ω( √ n log n ) . Proof strategy: reduction to permutation routing. Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 23 / 100

  6. Step 1: partition into grid 1 Grid formed by horizontal and vertical lines uniformly spaced s n apart: 1 n squarelets s 2 of area s 2 n . 2 Crowding factor : maximum number of nodes in any squarelet Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 24 / 100

  7. Reduction to permutation routing 1 ℓ × ℓ lattice of processors 2 Each processor can communicate with its adjacent vertical and horizontal neighbors in a single slot simultaneously (with one packet being a unit of communication with any neighbor during a slot). 3 Each processor is the source and destination of exactly k packets. 4 The k × k permutation routing problem: routing all the k ℓ 2 packets to their destinations. Lemma (Kauffman et al., 1994, Kunde, 1993) k × k permutation routing in a ℓ × ℓ mesh can be performed deterministically in k ℓ 2 + o ( k ℓ ) steps with maximum queue size at each processor equal to k. Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 25 / 100

  8. Step II: Reduction to permutation routing 1 Map nodes in each specific squarelet onto a particular 1 processor ( ℓ = s n ). 2 Each node has m packets and set k = mc n . Map to permutation routing on lattice. 3 Equivalence class for each squarelet s : squarelets whose vertical and horizontal separation from s is an integral multiple of K squarelets: K depends on ∆. 1 Transmissions only within squarelet, or to neighboring 2 squarelets ⇒ for any transmission on e = ( u , v ), √ d ( u , v ) ≤ 5 s n . Minimum distance between two transmitters in the 3 same equivalence class is ( K − 2) s n . By interference condition: 4 √ √ ( K − 2) s n > 2(1 + ∆) 5 s n , or K > 4 + 2 5∆. √ Thus, we could set K = 5 + ⌈ 2 5∆ ⌉ . Number of equivalence classes = K 2 (a fixed 5 constant dependent only on ∆). Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 26 / 100

  9. Step II: Reduction to permutation routing (contd.) 1 Construct schedule for packets on mesh. Each processor in the mesh can transmit and receive up to four packets in the same slot. 2 Serialize transmissions of the processors not in the same equivalence class: Expands the total number of steps in the mesh routing algorithm by a factor of K 2 (# 1 of equivalence classes). Serialize the transmissions of a single processor: increases the total number of steps in 2 the mesh routing by a further factor of 4. 2 = Θ( K 2 mc n 3 m packets from all nodes reach in time 4 K 2 k ℓ ) s n Lemma Assuming each squarelet has at least one node, the per-connection throughput for a network with squarelet size s n and crowding factor c n is Ω( s n c n ) . Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 27 / 100

  10. Step II: Reduction to permutation routing (contd.) q 3 log n 1 Set s n = n 2 With high probability, no squarelet is empty (union bound) 3 c n ≤ 3 e log n (Chernoff bound). Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 28 / 100

  11. Extensions: directional antennas β α Transmission beamwidth: α Reception beamwidth: β Lemma (Yi et al., 2007) The expected per-connection throughput in random networks with directed antennas with transmission and reception beamwidth α and β , respectively is: cW 8 (1+∆) 2 √ n log n , Omni Tx, Omni Rv > > 2 π cW > (1+∆) 2 √ n log n , Dir Tx, Omni Rv > < α λ ( n ) = 2 π cW (1+∆) 2 √ n log n , Omni Tx, Dir Rv β > > > 4 π 2 cW > (1+∆) 2 √ n log n , Dir Tx, Dir Rv : αβ Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 29 / 100

  12. Extensions: delays and mobility End-to-end delay D ( n ): average delay between packet arrival at source and delivery at destination v ( n ): speed of a node T ( n ): expected per-node throughput Delay-throughput tradeoffs How does T ( n ) vary with D ( n ) and v ( n )? Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 30 / 100

  13. Delay-throughput tradeoffs in mobile networks Theorem (El Gamal et al., 2004) In a mobile network with average delay D ( n ) and per-connection throughput T ( n ) , we have D ( n ) = Θ( nT ( n )) for T ( n ) = O (1 / √ n log n ) D ( n ) = O ( √ n / v ( n )) when T ( n ) = Θ(1) Several unrealistic assumptions, e.g., arbitrarily large packets and buffering Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 31 / 100

  14. Extensions: hybrid networks n nodes distributed randomly, each choosing a random destination m hybrid base stations distributed randomly hybrid nodes are all connected by high capacity wired links Theorem (Liu et al., 2003) In a hybrid network with n nodes and m base stations, the per-connection throughput λ ( m , n ) satisfies: 8 q q 1 n Θ( n log n W ) if m = O ( log n ) < λ ( m , n ) = q Θ( mW n n ) if m = ω ( log n ) : Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 32 / 100

  15. Part II: approximating the capacity of arbitrary networks Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 33 / 100

  16. Related work: algorithms for computing capacity Small sample of results... Formulation of rate region using LPs and conflict graphs: [Hajek, Sasaki, 1988], [Jain et al., 2003], [Kodialam and Nandagopal, 2003],... Constant factor approximation of the capacity under primary interference [Kodialam and Nandagopal, 2003] Constant factor approximation of the capacity for uniform power levels in disk graph models: [Lin, Schroff, 2005], [Kumar et al, 2005], [Kar, Sarkar, Chaporkar, 2005] Local multi-commodity flow algorithms [Awerbuch-Leighton, 1993] Stability based on Max-weight matching policy [Tassiulas-Ephrimedes, 1993] Convex programming methods for capacity [Low et al.] Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 34 / 100

  17. Feasible Schedules and link rates (recap) Assumption: synchronous time slots of uniform length τ Schedule S specifies the time slots when packets move on links: X ( e , t ) = 1 if packet moves on edge e in time slot t S is feasible if: ∀ t , X ( e , t ) = X ( e ′ , t ) = 1 ⇒ e , e ′ do not interfere Link utilization vector, ¯ x , corresponding to S is defined as P t ≤ T X ( e , t ) ∀ e : x ( e ) = lim T T →∞ Flow rate vector, ¯ f , corresponding to S is defined as ∀ e : f ( e ) = x ( e ) · cap ( e ) , where cap ( e ) is the capacity of edge e . Definition A rate vector ¯ f is feasible if it has a corresponding feasible/stable schedule S that achieves rate ¯ f and is able to schedule all the packets in bounded time. Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 35 / 100

  18. Example The flow vector � f with f 1 = 2 / 8, f 2 = 1 / 8 corresponds to periodic schedule S , and is feasible Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 36 / 100

  19. Example f 1 = f 2 = 1 / 5 for this schedule Goal : Given a network, and source-destination pairs, find a feasible flow vector � f with high total throughput Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 37 / 100

  20. General strategy Define suitable interference set ˆ N ( e ) for each link e Construct LP P ( λ ) with flow constraints, and congestion constraints of the form X x ( e ′ ) ≤ λ, x ( e ) + e ′ ∈ ˆ N ( e ) for each e Prove that P ( c 1 ) gives necessary conditions – any feasible solution � f ,� x satisfies the constraints of P ( c 1 ) Prove that P ( c 2 ) gives sufficient conditions – corresponding to any feasible solution � x of P ( c 2 ), we can construct a schedule S that corresponds to � f ,� f ,� x Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 38 / 100

  21. Summary: techniques used 1 Linearization of joint physical and MAC constraints: upper bounds on the rate region expressed by weaker linear constraints 2 Scheduling based on inductive ordering: packets on edge e scheduled after those on edges in N ≥ ( e ) - lower bounds on the optimum Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 39 / 100

  22. Characterizing the Rate Region e2 For any edge e : e1 P x ( e ) = lim T →∞ t ≤ T X ( e , t ) / T e3 Capacity Constraint: One Primary Interference: For any node, at most packet per edge one incident edge is used at a time ⇒ X ( e i , t ) ≤ 1 ⇒ ∀ t : X ( e 1 , t ) + X ( e 2 , t ) + X ( e 3 , t ) ≤ 1 ⇒ x ( e i ) ≤ 1 ⇒ x ( e 1 ) + x ( e 2 ) + x ( e 3 ) ≤ 1 Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 40 / 100

  23. Throughput capacity under Primary Interference Objective: max P i f i Subject to: Lemma (Kodialam and X Nandagopal, 2003) ∀ i , f i = f ( e ) e =( s i , v ) Any solution to the program P (2 / 3) can X ( P ( λ )) − f ( e ) be scheduled feasibly. e =( v , s i ) ∀ e , x ( e ) = f ( e ) / cap ( e ) Theorem (Kodialam and X ∀ v , x ( e ) ≤ λ (C) Nandagopal, 2003) e ∈ N ( v ) The optimum solution to the program ∀ e , f ( e ) ≥ 0 P (2 / 3) gives a 2 / 3 -approximation to the total throughput capacity, under Observation Any feasible link utilization primary interference constraints. vector ¯ x is a feasible solution to P (1). Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 41 / 100

  24. Effects of Secondary Interference Linearization e6 e3 X ( e , t ) + P 6 i =1 X ( e i , t ) ≤ 6 ⇒ x ( e ) + P 6 i =1 x ( e i ) ≤ 6 e1 e e5 Lemma Any feasible utilization vector ¯ x satisfies the e2 e4 congestion constraints: e ′ ∈ N ( e ) x ( e ′ ) ≤ λ . ∀ e = ( u , v ) , x ( e ) + P X ( e , t ) = 1 ⇒ X ( e i , t ) = 0 , ∀ e i N ( e ) = { e ′ = ( u ′ , v ′ ) : u ′ ∈ N ( u ) ∪ N ( v ) } . X ( e , t ) = 0 ⇒ all edges e i can simultaneously transmit ⇒ non-linear constraints Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 42 / 100

  25. Formulation P uniform ( λ ) : uniform disks Objective: max P i f i Subject to: X X ∀ i , f i = f ( e ) − f ( e ) e =( s i , v ) e =( v , s i ) ∀ e , x ( e ) = f ( e ) / cap ( e ) X x ( e ′ ) ∀ e , x ( e ) + ≤ λ (Congestion Constraints) e ′ ∈ N ( e ) ∀ e , f ( e ) ≥ 0 Lemma The constraints of program P uniform ( λ ) are necessary for some constant λ : every feasible utilization vector ¯ x is a feasible solution to the program P uniform ( λ ) . Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 43 / 100

  26. Capacity under Uniform Power Levels Lemma The optimum solution to the program P uniform (1) can be scheduled feasibly. The solution ¯ x to P uniform (1) can be scheduled using a periodic greedy schedule. Theorem Program P uniform (1) gives an O (1) -approximation to the total throughput capacity of a wireless network with uniform power levels. Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 44 / 100

  27. Non-uniform power levels: problem with P uniform (1) X ( e , t ) + P i X ( e i , t ) could be large e ′ ∈ N ( e ) x ( e ′ ) ≤ 1 could be highly ⇒ x ( e ) + P suboptimal Large number of edges e i can transmit simultaneously Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 45 / 100

  28. Non-uniform power levels Idea: Inductive ordering - ignore “small” edges in the constraint For e = ( u , v ), define r ( e ) = max { r ( u ) , r ( v ) } N ≥ ( e ) = { e ′ ∈ N ( e ) : r ( e ′ ) ≥ r ( e ) } Lemma e ′ ∈ N ≥ ( e ) X ( e ′ , t ) ≤ λ , for a constant λ . ∀ e , t, X ( e , t ) + P Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 46 / 100

  29. Non-uniform power levels: Formulation P non − uniform ( λ ) Objective: max P i f i Subject to: X X ∀ i , f i = f ( e ) − f ( e ) e =( s i , v ) e =( v , s i ) ∀ e , x ( e ) = f ( e ) / cap ( e ) X x ( e ′ ) ∀ e , x ( e ) + ≤ λ (Congestion Constraints) e ′ ∈ N ≥ ( e ) ∀ e , f ( e ) ≥ 0 Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 47 / 100

  30. Non-uniform power levels: Formulation P non − uniform ( λ ) Lemma e ′ ∈ N ≥ ( e ) x ( e ′ ) ≤ λ are There is a constant λ such that the constraints ∀ e , x ( e ) + P necessary: every feasible vector ¯ x is a feasible solution to program P non − uniform ( λ ) . Lemma e ′ ∈ N ≥ ( e ) x ( e ′ ) ≤ 1 are sufficient: the solution to The constraints ∀ e , x ( e ) + P P non − uniform (1) can be scheduled feasibly. Theorem The program P non − uniform (1) gives an O (1) -approximation to the total throughput capacity under non-uniform power levels. Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 48 / 100

  31. Necessary condition Lemma 1 e ∈ E ′ ⇒ | E ′ ∩ N ≥ ( e ) | = 1 For any edge e and any D-2 matching E ′ , | E ′ ∩ N ≥ ( e ) | ≤ λ 2 Let e �∈ E ′ Suppose e 1 = ( u 1 , v 1 ) , e 2 = ( u 2 , v 2 ) ∈ E ′ ∩ N ≥ ( e ) u 1 , v 1 �∈ D ( u 2 ) ∪ D ( v 2 ) D ( u ) ∪ D ( v ) can be partitioned into disjoint regions of area π r ( e ) 2 /λ 3 Let n ( e ) =# packets sent on e in time T 4 ∀ e , n ( e ) + P e ′ ∈ N ≥ ( e ) n ( e ′ ) ≤ λ T 5 Set x ( e ) = n ( e ) / T Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 49 / 100

  32. Sufficient condition Lemma e ′ ∈ N ≥ ( e ) x ( e ′ ) ≤ 1 are sufficient: the solution to The constraints ∀ e , x ( e ) + P P non − uniform (1) can be scheduled feasibly. Objective: Need to show existence of stable schedule that can send all packets Different approaches: 1 Periodic scheduling: stable, not necessarily polynomial time, in general 2 Randomized scheme: stable, centralized 3 Random access scheduling: completely local Lose a factor of 1 e for synchronous random access 1 Lose a factor of O ( 1 γ ), where γ is the ratio of the maximum transmission duration to 2 the minimum transmission duration 4 Distributed collision free scheduling: based on access hash functions Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 50 / 100

  33. Periodic Scheduling Step I: Choosing time slots 1 Choose W s.t. S ( e ) = Wx ( e ) integral for each e 2 Order edges so that r ( e 1 ) ≥ . . . ≥ r ( e m ) 3 (Inductive Scheduling) Choose time slots S ( e ) for edges in this order: • For edge e i choose any Wx ( e i ) slots from the set { 1 , . . . , W } \ ( ∪ j ≤ i − 1 , e j ∈ N ≥ ( e i ) S ( e j )) Step II: Periodic scheduling For each packet, move one edge in W steps Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 51 / 100

  34. Example W = 7 Need Wx ( e ) = 1 slot for all links other than (3 , 5); Wx (3 , 5) = 2 Assign slots: S (1 , 2) = { 1 } , S (2 , 3) = { 2 } , S (3 , 4) = { 3 } , S (3 , 5) = { 4 , 5 } ,... Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 52 / 100

  35. When does greedy fail? Consider the utilization vector: W = 8. Assign slots { 1 , . . . , 8 } Consider an ordering with link (3 , 5) in the end Suppose greedy assigns: S (1 , 2) = { 1 , 2 } , S (2 , 3) = { 3 , 4 } , S (3 , 4) = { 5 } , S (5 , 6) = { 1 , 2 } , S (6 , 7) = { 3 , 4 } Not enough free slots for (3 , 5) Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 53 / 100

  36. Periodic scheduling: proof Lemma For each edge e i , |{ 1 , . . . , W } \ ( ∪ j ≤ i − 1 , e j ∈ N ≥ ( e i ) S ( e j )) | ≥ Wx ( e i ) Proof. If not, X Wx ( e i ) + Wx ( e j ) > W j ≤ i − 1 , e j ∈ N ≥ ( e i ) which violates the congestion constraint in P non − uniform (1). ⇒ S ( e ) = W · x ( e ) slots can be allocated for each edge e Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 54 / 100

  37. Sufficient condition: proof (continued) Schedule is valid since N () is symmetric: Suppose e ∈ N ( e ′ ) , e ′ ∈ N ( e ), r ( e ′ ) ≥ r ( e ) ⇒ e ′ ∈ N ≥ ( e ) Suppose e ′ is scheduled at time t . Then, t ∈ S ( e ′ ). Since e ′ ∈ N ≥ ( e ), slot t is not assigned to edge e Schedule is stable (constant bit rate): in a frame of length W , number of packets required to flow through e is x ( e ) W , and exactly this many slots are assigned for this edge. Lyapunov technique for proving stability for stochastic arrivals Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 55 / 100

  38. Adding additional constraints: fairness Objective: max P i f i Subject to: X X ∀ i , f i = f ( e ) − f ( e ) e =( s i , v ) e =( v , s i ) ∀ e , x ( e ) = f ( e ) / cap ( e ) X x ( e ′ ) ∀ v , x ( e ) + ≤ 1 e ′ ∈ N ≥ ( e ) ∀ e , f ( e ) ≥ 0 ∀ i , j , f i ≤ f j /γ Fairness constraints Fairness: γ = 1 ⇒ completely fair γ = 0 ⇒ throughput maximization Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 56 / 100

  39. Adding additional constraints: fairness Same approximation ratio holds Can quantify the relationship between fairness and capacity Maximum throughput vs Number of flows Throuput vs. Fairness 5 3 4.5 2.8 Maximum throughput 2.6 4 2.4 3.5 Throughput 2.2 3 2 2.5 1.8 k=2 2 k=5 1.6 k=7 1.5 1.4 k=9 k=11 1 single run 1.2 averaged 0.5 1 0 5 10 15 20 25 30 35 40 0.001 0.01 0.1 1 Number of flows Fairness index Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 57 / 100

  40. Extensions: SINR model SINR model: If pairs ( v 1 , v ′ 1 ), ( v 2 , v ′ 2 ), . . . communicate P 1 d ( v 1 , v ′ 1 ) α ≥ β P i N + P d ( v i , v ′ 1 ) α i > 1 ∀ e : N ( e ) = E ∀ e = ( u , v ) : N ≥ ( e ) = { e ′ = ( u ′ , v ′ ) : ℓ ( e ′ ) ≥ max { ℓ ( e ) , a · d ( u , u ′ ) } Assumptions: Power levels for all links are fixed, For each edge e , cap ( e ) is fixed under an additive white Gaussian noise assumption Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 58 / 100

  41. Extensions: SINR model ∆ = max e { ℓ ( e ) } / min e ′ { ℓ ( e ′ ) } Lemma The program P non − uniform ( λ ) gives necessary conditions for a constant λ , while the program P non − uniform (1 / log ∆) gives sufficient conditions. Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 59 / 100

  42. Extensions: power constraints Setting: S has to determine which edges e to use at time t , and what power level to use Capacity of link e at power level p p cap ( e , p ) = W log 2 (1 + d ( u , v ) α N 0 W ) Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 60 / 100

  43. Extensions: power constraints Setting: S has to determine which edges e to use at time t , and what power level to use Capacity of link e at power level p p cap ( e , p ) = W log 2 (1 + d ( u , v ) α N 0 W ) J = set of possible choices of power levels; need not be finite Define T ( J ) = { ( e , p ) ∈ E × J } Define N ( e , p ) = { ( e ′ = ( u ′ , v ′ ) , p ′ ) : e ′ ∈ V 2 , p ′ ∈ J , d ( u , u ′ ) ≤ (1 + ∆)( range ( p ) + range ( p ′ )) } Define N ≥ ( e , p ) = { ( e ′ = ( u ′ , v ′ ) , p ′ ) ∈ N ( e , p ) : p ′ ≥ p } Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 60 / 100

  44. Program P pctm ( λ ) X max f i s.t.: i X X ∀ i , f i = f ( e , p ) − f ( e , p ) ( e =( s i , v ) , p ) ∈T ( e =( v , s i ) , p ) ∈T ∀ ( e , p ) ∈ T , x ( e , p ) = f ( e , p ) / cap ( e , p ) X ∀ ( e , p ) ∈ T , x ( e , p ) + x ( e , p ) ≤ λ ( e ′ , p ′ ) ∈ N ≥ ( e , p ) X X ∀ i , ∀ u � = s i , t i f ( e , p ) = f ( e , p ) e ∈ N out ( u ) e ∈ N in ( u ) X x ( e , p ) · p ≤ B ( e , p ) ∈T B = total bound on power usage Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 61 / 100

  45. Joint power and throughput capacity optimization: special case Lemma Any feasible rate vector and power assignment must satisfy the constraints of P ( c ) for a constant c. Further, any solution to P (1) is feasible. Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 62 / 100

  46. Joint power and throughput capacity optimization: special case Lemma Any feasible rate vector and power assignment must satisfy the constraints of P ( c ) for a constant c. Further, any solution to P (1) is feasible. Assumption: | J | ≤ poly ( n ) ⇒ |P pctm | is polynomial sized. Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 62 / 100

  47. Joint power and throughput capacity optimization: general case Let p max = max { p ∈ J } and p min = min { p ′ ∈ J } Assumption: p max / p min ≤ poly ( n ) J ′ = { p min , (1 + ǫ ) p min , . . . , p max } Lemma The program P pctm (1) defined using set J ′ (instead of set J) gives a constant factor approximation to throughput capacity under a given bound on total power consumption. Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 63 / 100

  48. Extension: capacity with random access scheduling T id : idle slot length T xmit ( ℓ ): length of transmission on link ℓ N pri ( ℓ ): links within primary interference of ℓ N sec ( ℓ ) = N ( ℓ ) \ N pri ( ℓ ) Node v attempts to transmit on link e = ( v , w ) only if no neighbor of v is Probability of accessing the link ℓ : τ ( ℓ ) = 1 − e − x ( ℓ ) currently transmitting If channel free, v transmits on e with probability τ ( e ) Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 64 / 100

  49. Synchronous Random Access Networks Lemma x be a feasible solution to the program P (1) . Then, 1 Let ¯ e ¯ x can be achieved by synchronous random access scheduling. Proof: Choose τ ( ℓ ) = 1 − e − x ( ℓ ) /λ , for each ℓ . Probability of collision free transmission on edge ℓ : Π ℓ ′ ∈ I ( ℓ ) (1 − τ ( ℓ ′ )) η ( ℓ ) = ℓ ′∈ I ( ℓ ) − x ( ℓ ′ ) P = e e x ( ℓ ) − 1 ≥ Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 65 / 100

  50. Synchronous Random Access Networks Successful flow through ℓ = cap ( ℓ ) · τ ( ℓ ) · η ( ℓ ) cap ( ℓ ) · (1 − e − x ( ℓ ) ) · e x ( ℓ ) − 1 ≥ cap ( ℓ ) · ( e x ( ℓ ) − 1 − e − 1 ) = „ 1 + x ( ℓ ) « − 1 ≥ cap ( ℓ ) · e e f ( ℓ ) = e e ¯ 1 ⇒ f is stable Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 66 / 100

  51. Random Access Scheduling in an Asynchronous Network T id : idle slot length T xmit ( ℓ ): transmission duration on ℓ max ℓ T xmit ( ℓ ) γ = min ℓ ′ T xmit ( ℓ ′ ) ∆: max #simultaneous transmissions possible in N ( ℓ ) (interference degree) Theorem Let � x be a feasible solution to P (1) . The random access protocol with channel access probability − x ( ℓ ) Tid ∆( ℓ ) · Txmit ( ℓ )(1+ γ ) , τ ( ℓ ) = 1 − e achieves a link utilization of � 1 h ≥ e ( γ +1)∆ � x. Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 67 / 100

  52. Asynchronous Random Access: effect of packet sizing policies Random access is more competitive when the packet sizes on links are non-uniform, and are proportional to the link capacity Flow 1 = 6Mbps, Flow 2 = 24Mbps 14 500B 750B 12 1000B Flow 2’s rate (Mbps) 1250B 10 1500B 1750B 8 2000B 6 4 2 0 0 0.5 1 1.5 2 2.5 Flow 1’s rate (Mbps) ℓ 1 and ℓ 2 : hidden interfering links c ( ℓ 1 )= 6Mbps, c ( ℓ 2 )=24Mbps packet size on ℓ 1 : 500 Bytes packet size on ℓ 2 varied from 500 Bytes to 2000 Bytes Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 68 / 100

  53. Limits on the competitive ratio of asynchronous random access scheduling ℓ 1 ℓ 0 � f = � 1 / 2 , . . . , 1 / 2 � is feasible for greedy ℓ 2 scheduling ℓ ∆ Lemma λ� f is feasible for random access scheduling only if λ ≤ c log ∆ γ ∀ i ≥ 1, ℓ i ∈ hidden ( ℓ 0 ) ∆ γ ∀ i ≥ 1, ℓ 0 ∈ hidden ( ℓ i ) Assume T xmit ( ℓ i ) = T xmit = a 1 T id and T xmit ( ℓ 0 ) = γ T xmit Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 69 / 100

  54. Characterizing the capacity region for random access protocols New formulation to approximate the throughput capacity of an asynchronous random access network within an O (∆)-factor: Theorem (Necessary Conditions) � x is feasible for asynchronous random access protocol only if: x ( ℓ ′ ) · (1 + T xmit ( ℓ ) − T id X x ( ℓ ′ ) + X ∀ ℓ : x ( ℓ ) + ) ≤ ∆ T xmit ( ℓ ′ ) ℓ ′ ∈ exposed ( ℓ ) ℓ ′ ∈ hidden ( ℓ ) Theorem (Sufficient Conditions) � x is feasible for asynchronous random access protocol if: x ( ℓ ′ ) · (1 + T xmit ( ℓ ) − T id ) ≤ 1 X x ( ℓ ′ ) + X ∀ ℓ : x ( ℓ ) + T xmit ( ℓ ′ ) e ℓ ′ ∈ exposed ( ℓ ) ℓ ′ ∈ hidden ( ℓ ) Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 70 / 100

  55. Extension: multi-channel multi-radio networks Graph G = ( V , E ) Induced Radio Network G = ( V , L ): V is the set ∪ u Radios ( u ) and L = For each node u ∈ V , Radios ( u ): set ∪ e =( u , v ) ∈ E Radios ( u ) × Radios ( v ) of wireless interfaces associated with it. For link ℓ = ( ρ, ρ ′ ), Set Ψ of channels available parent ( ℓ ) = ( u , v ) if ρ ∈ Radios ( u ) Schedule + channel assignment: at and ρ ′ ∈ Radios ( v ) each time t , choose links e = ( u , v ) Consider set which will transmit, which radio T = { ( ℓ, ψ ) : ℓ ∈ L , ψ ∈ Ψ } interfaces to use at u , v and which channel to use Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 71 / 100

  56. Necessary conditions for scheduling For link ℓ = ( ρ, ρ ′ ) in induced radio network G = ( V , L ): Pri ( ℓ ) = { ℓ ′ sharing a radio with ℓ } Pri ≻ ( ℓ ) = { ℓ ′ ∈ Pri ( ℓ ) : parent ( ℓ ′ ) ≻ parent ( ℓ ) } Sec ( ℓ ) = { ℓ ′ : parent ( ℓ ′ ) ∈ Pri ( parent ( ℓ )) } ∪ { ℓ ′ : parent ( ℓ ′ ) ∈ Sec ( parent ( ℓ )) } Sec ≻ ( ℓ ) = { ℓ ′ ∈ Succ ( ℓ ) : parent ( ℓ ′ ) ≻ parent ( ℓ ) } Theorem Flow constraints with the following congestion constraints are necessary for any feasible flow+utilization vector: X X X x ( ℓ, ψ ) + x ( ℓ, ρ ) + x ( f , χ ) ρ ∈ Ψ \{ ψ } χ ∈ Ψ f ∈ Pri ≻ ( ℓ ) X + x ( g , ψ ) ≤ λ + 2 g ∈ Sec ≻ ( ℓ ) Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 72 / 100

  57. Sufficient conditions Theorem The rate vector satisfying the following conditions can be scheduled feasibly: X X X ∀ ( ℓ, ψ ) , x ( ℓ, ψ ) + x ( ℓ, ρ ) + x ( f , χ ) ρ ∈ Ψ \{ ψ } χ ∈ Ψ f ∈ Pri ( ℓ ) x ( g , ψ ) ≤ 1 X + e − ǫ g ∈ Sec ( ℓ ) Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 73 / 100

  58. Random Access Hash Functions Need access-hash function H ( ℓ, ψ, t ) such that:  1 with probability 1 − e − e · x ( ℓ,ψ ) H ( ℓ, ψ, t ) = with probability e − e · x ( ℓ,ψ ) 0 Key Property : Value of H ( ., ., ) fixed no matter who invokes it with the same arguments Also known as random oracles in Cryptography SHA-1 works well in practice Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 74 / 100

  59. Algorithm PLDS Executed by each radio ρ : 1 ∀ ℓ incident on ρ : compute H ( ℓ, ψ, t ), for each ψ , t . 2 Randomly pick a pair ( ℓ, ψ ) s.t. H ( ℓ, ψ, t ) = 1 • if no such pair exists, sleep during time t 3 If selected link ℓ ∈ L out ( ρ ), then schedule an outgoing transmission across ℓ on channel ψ at time t 4 if selected link ℓ ∈ L in ( ρ ), then tune to channel ψ and await an incoming transmission across ℓ on channel ψ at time t Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 75 / 100

  60. Extensions: Bounding Delays Goal : choose flow vector � f so that: P i f i is maximized For each session i such that f i > 0, average delay for each packet is at most D Our Result Careful choice of paths plus random access scheduling to get joint bounds on throughput and delays. Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 76 / 100

  61. Choosing routes and flows Choose flow � f that maximizes P i f i subject to: X ∀ i , f ( p ) cost ( p ) ≤ Df i p ∈ P ( i ) X ∀ ( e , i ) , x ( e , i ) = f ( p ) / cap ( e ) p ∈ P ( i ): e ∈ p X X X x ( e ′ , i ) ∀ e , x ( e , i ) + ≤ 1 i e ′ ∈ N ( e ) i (Filter) Drop flows on paths longer than 2 D for each i (Round) Choose a subset S of sessions and a path p i for each i ∈ S by iterative rounding (Choose flows) Choose flow f ( p i ) = K log log D / log D Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 77 / 100

  62. Joint Delay-Throughput Tradeoffs Theorem The flow vector � f along with random access scheduling ensures that P i f i = Ω( OPT · log log D / log D ) , and at least (1 − 1 / n ) -fraction of the packets for each session i are delivered within a delay of O ( D · (log D / log log D ) · log n ) . Adaptive channel switching delays can be incorporated into the framework in terms of cost ( p ) to quantify the throughput gains of adaptive channel switching Similar tradeoffs for adaptive power switching Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 78 / 100

  63. Summary: General strategy Define suitable interference set ˆ N ( e ) for each link e Construct LP P ( λ ) with flow constraints, and congestion constraints of the form X x ( e ′ ) ≤ λ, x ( e ) + e ′ ∈ ˆ N ( e ) for each e Prove that P ( c 1 ) gives necessary conditions – any feasible solution � f ,� x satisfies the constraints of P ( c 1 ) Prove that P ( c 2 ) gives sufficient conditions – corresponding to any feasible solution � x of P ( c 2 ), we can construct a schedule S that corresponds to � f ,� f ,� x Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 79 / 100

  64. Summary Two techniques for cross-layer formulation of the end-to-end capacity of wireless networks Linearization of interference constraints Inductive ordering to deal with non-uniform power levels Framework extends to a number of models, constraints and objective functions Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 80 / 100

  65. Part III: Dynamic control for network stability Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 81 / 100

  66. Outline for Part III Background: arrival processes, queuing Backpressure algorithm and its analysis Approximate version of backpressure algorithm Random access approach Summary of related research Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 82 / 100

  67. Background “Arrivals at all sources are well-behaved” Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 83 / 100

  68. Background “Arrivals at all sources are well-behaved” 1 Let A i ( t ) be the exogenous arrival process for connection i with rate λ i 2 An arrival process A i ( t ) is admissible with rate λ i if The time averaged expected arrival rate satisfies: 1 t − 1 1 X E [ A i ( τ )] = λ lim t →∞ t τ =0 Let H ( t ) represent the history until time t There exists A max such that 2 E [( A i ( t )) 2 | H ( t )] ≤ A 2 max for t . For any δ > 0, there exists an interval size T , possibly dependent on δ , such that for 3 any initial time t 0 : " T − 1 # 1 X A i ( t 0 + k ) | H ( t 0 ) E ≤ λ + δ T k =0 Other models: adversarial arrivals Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 83 / 100

  69. Background (continued) Each node v maintains queues for each link ( v , w ) and each connection i Assume unbounded buffer sizes – no packet drops because of buffer overflows Let U i v ( t ) denote the queue at node v for connection i at time t ; let U ( t ) = � U i v ( t ) � µ i ( u , v ) ( t ) ≤ c ( u , v ): data rate allocated to commodity i during slot t across the link ( u , v ) by the network controller. Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 84 / 100

  70. Capacity region revisited I ⊂ E is a conflict free subset if for every e , e ′ ∈ I , e and e ′ are conflict-free. Let I denote the set of all possible conflict-free subsets I ⊂ E Let µ ( I ) denote the vector of transmission rates for each e ∈ I . Let Γ . = Conv ( { � µ ( I ) | I ∈ I} ) denote the convex hull of all transmission-rate matrices Let inflow i ( w , v ) ∈ E µ i v ,µ ( t ) = P ( w , v ) ( t ) denote the flow of commodity i into node v for policy µ at time t Let outflow i ( v , w ) ∈ E µ i v ,µ ( t ) = P ( v , w ) ( t ) denote the flow of commodity i out of node v for policy µ at time t Let netflow i v ,µ ( t ) = outflow i v ,µ ( t ) − inflow i v ,µ ( t ) denote the total flow of commodity i out of node v for policy µ at time t Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 85 / 100

  71. Example Assume primary interference: edges Traffic matrix corresponding to with common end-point conflict µ = 2 3 I 1 + 1 3 I 2 Two connections ( s 1 , t 1 ) and ( s 2 , t 2 ) inflow 1 2 ,µ ( t ) = µ 1 (1 , 2) = 2 / 3 Γ = { α I 1 + β I 2 : α + β ≤ 1 } Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 86 / 100

  72. Capacity region Theorem (Grigoriadis et al., 2006) The connection rate vector � λ i � is within the network-layer capacity region Λ if and only if there exists a randomized network control algorithm that makes valid µ i ( u , v ) ( t ) decisions, and yields: ∀ i , E [ netflow i s i ,µ ( t )] = λ i ∈ { s i , t i } , E [ netflow i ∀ i , ∀ w / w ,µ ( t )] = 0 Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 87 / 100

  73. Backpressure algorithm At each time t For each link ( v , w ): let i = i ∗ be the commodity with maximum differential backlog ∆ U i v − U i w For each link ( v , w ), define weight ( v , w ) to be the maximum differential backlog Choose independent set I with maximum weight wt ( I ) = P e ∈ I wt ( e ) Schedule all links in I simultaneously, and send as much as possible Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 88 / 100

  74. Example ∆ U 1 (1 , 2) = 5, ∆ U 2 (1 , 2) = − 35 ⇒ i ∗ (1 , 2) = 1 , W ∗ (1 , 2) = 5 ∆ U 1 (2 , 3) = 15, ∆ U 2 (2 , 3) = 5 ⇒ i ∗ (2 , 3) = 1 , W ∗ (2 , 3) = 15 Assume primary interference: edges ∆ U 1 (3 , 4) = 0, ∆ U 2 (3 , 4) = 30 with common end-point conflict ⇒ i ∗ (3 , 4) = 2 , W ∗ (3 , 4) = 30 Two connections ( s 1 , t 1 ) and ( s 2 , t 2 ) wt ( I 1 ) = 5 + 30 = 35, Γ = { α I 1 + β I 2 : α + β ≤ 1 } wt ( I 2 ) = 15 Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 89 / 100

  75. Backpressure algorithm At each time t For each link ( v , w ): let i ∗ ( v , w ) ( t ) denote the connection which maximizes the differential backlog i ∗ i ∗ ( v , w ) ( t ) ( v , w ) ( t ) W ∗ ( v , w ) ( t ) = U ( t ) − U ( t ). v w Choose conflict-free link set I ∗ ∈ I which maximizes ( u , v ) ∈ I ∗ W ∗ P ( u , v ) ( t ) · c ( u , v ) The network controlled chooses links e = ( u , v ) ∈ I ∗ and connection i ∗ ( u , v ) ( t ) if W ∗ ( u , v ) ( t ) > 0 (if there is not enough backlogged data, i.e., i ∗ ( u , v ) ( t ) U ( t ) < c ( u , v ) use dummy bits) ( u , v ) Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 90 / 100

  76. Analysis µ i Consider any valid resource allocation policy that assigns a rate of ˜ ( u , v ) ( t ) to commodity i across link ( u , v ) at time t . Let µ i ( u , v ) ( t ) denote the corresponding values for the dynamic backpressure algorithm. By construction: X X µ i ( u , v ) ( t )[ U i u ( t ) − U i X X µ i ( u , v ) ( t ) W ∗ ˜ v ( t )] ≤ ˜ ( u , v ) ( t ) ( u , v ) i ( u , v ) i X W ∗ ≤ ( u , v ) ( t ) · µ ( u , v ) ( u , v ) Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 91 / 100

  77. Analysis (continued) Rearranging the terms: “ P v of queue-size at v · netflow( v ) = P e flow( e ) · backlog( e )” Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 92 / 100

  78. Analysis (continued) Rearranging the terms: “ P v of queue-size at v · netflow( v ) = P e flow( e ) · backlog( e )” X X U i X µ i X µ i v ( t ) · [ ( v , w ) ( t ) − ( u , v ) ( t )] i v w u X X µ i ( u , v ) ( t )[ U i u ( t ) − U i = v ( t )] ( u , v ) i Lemma (Property) µ i ( u , v ) ( t ) denotes any resource allocation policy, and µ i If ˜ ( u , v ) ( t ) denotes the resource allocation for the Backpressure scheme, we have: X X X X U i µ i µ i v ( t )[ ˜ ( v , w ) ( t ) − ˜ ( u , v ) ( t )] v i w u "X # X X U i µ i X µ i ≤ v ( t ) ( v , w ) ( t ) − ( u , v ) ( t ) v i w u Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 92 / 100

  79. Lyapunov functions Define: X X ( U i v ( t )) 2 L ( U ( t )) = i v Theorem (Grigoriadis et al., 2006) If there exist constants B > 0 and ǫ > 0 such that for all slots t: X X U i E [ L ( U ( t + 1)) − L ( U ( t )) | U ( t )] ≤ B − ǫ v ( t ) (1) v i then, the network is strongly stable. Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 93 / 100

  80. Analysis of backpressure Theorem Let � λ denote the vector of arrival rates; if there exists an ǫ > 0 such that � λ + � ǫ ∈ Λ (where � ǫ is the vector such that ǫ i = 0 if λ i = 0 , and ǫ i = ǫ otherwise), then the dynamic backpressure algorithm stably services the arrivals. Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 94 / 100

  81. Analysis of backpressure If V , U , µ, A ≥ 0 and V ≤ max { U − µ, 0 } + A , then, V 2 ≤ U 2 + µ 2 + A 2 − 2 U ( µ − A ) Since U i v ( t + 1) ≤ max { U i e =( v , w ) µ i i A i ( t ) + P e =( u , v ) µ i v ( t ) − P e ( t ) , 0 } + P e ( t ), we have: ´ 2 + ´ 2 − v ( t + 1) 2 ≤ U i v ( t ) 2 + U i `P w µ i ` A i u µ i ( v , w ) ( t ) v ( t ) + P ( u , v ) ( t ) 2 U i w µ i ( v , w ) ( t ) − A i u µ i `P v ( t ) − P ´ v ( t ) · ( u , v ) ( t ) Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 95 / 100

  82. Analysis (continued) j z 2 j z j ) 2 , if z j ≥ 0, Summing over all indices ( v , i ) and since P j ≤ ( P X X U i L ( U ( t + 1)) − L ( U ( t )) ≤ 2 BN − 2 v ( t ) · v i X ! µ i ( v , w ) ( t ) − A i X µ i v ( t ) − ( u , v ) ( t ) , w u where B . v [(max w µ ( v , w )) 2 + (max i A i + max u µ ( u , v )) 2 ]. 1 2 N · P = X U i s i ( t ) · E [ A i ⇒ E [ L ( U ( t + 1)) − L ( U ( t )) | U ( t )] ≤ 2 BN + 2 · s i ( t ) | U ( t )] − i 0 1 X X @X X U i µ i A | U ( t )] 2 E [ v ( t ) · ( v , w ) ( t ) − µ ( u , v ) ( t ) v w i ( u , v ) Anil Vullikanti (Virginia Tech) Capacity of Wireless Networks 96 / 100

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend