Maximum Throughput Scheduling in Time-Varying-Topology Wireless Ad-Hoc Networks
Maximum Throughput Scheduling in Time-Varying-Topology Wireless Ad-Hoc Networks
I. I NTRODUCTION
One of the fundamental characteristics of wireless ad-hoc networks
is the fact that the wireless medium is shared by multiple static or mobile
nodes. As simultaneous transmissions by neighboring nodes interfere
with each other and the transmitted signals get corrupted, the throughput
of the network degrades significantly.
For this reason, medium access control (MAC) schemes coordinate
the access of the various wireless nodes to the medium. Two major medium access control schemes have been widely used. On the
one hand, contention based schemes attempt to resolve collisions when
multiple nodes compete for access to the medium. On the other hand,
scheduling rules prevent collisions by restricting medium access to noninterfering nodes.
In dynamic environments, for example when the wireless nodes are
moving according to some mobility pattern, scheduling the wireless
transmissions is a challenging issue. Mobility affects the link availability at each time instant and the set of topologies the network may evolve
into during the course of time. Since the above information is necessary
to the scheduler, the scheduling decision process gets perplexed.
In our work, we consider scheduling in mobile wireless ad-hoc networks. Our objective is to find a centralized scheduling rule that maximizes the total stable throughput of the network. Our work is inspired
by the work of [3] and [5] and generalizes their results. In [3], the
authors focus on scheduling in a finite node, static multi-hop wireless
ad-hoc network. A centralized, optimal stable throughput stationary
scheduling policy is introduced and its corresponding stability region
is characterized. The authors show that non-stationary scheduling rules
do not achieve a better performance in terms of throughput, and conclude that it suffices to restrict attention to the set of stationary policies.
In [5], Tassiulas addresses the problem of scheduling in a finite node,
time-varying-topology ad-hoc network. However, his model does not
allow multi-hop forwarding of traffic.
In this paper, we generalize the results of [3] and [5] and identify
a family of optimal centralized stationary scheduling policies that all
maximize the network throughput in multi-hop time-varying-topology
networks. Policies within this family are parameterized by the preferential weight assigned to the respective customer classes.
This paper is organized as follows. In section II we introduce our
model. Then, in section III we present the proposed family of centralized scheduling policies. In section IV we give our optimality results.
Then, in section V we confirm our analytical results through a Monte
Carlo simulation. Finally, we conclude the paper in section VI.
II. M ODEL
We consider a slotted time, time-varying-topology wireless, ad-hoc
network, operating under a TDMA based medium access scheme. The
network is comprised of a finite number N of nodes, with mobile capability, each equipped with one transceiver (transmitter/receiver pair) and
an omni-directional antenna. Nodes share a common medium, hence it
is essential to properly coordinate their transmissions to avoid signal
interference and collisions from simultaneously transmitting neighboring nodes. Towards this end, a set of primary constraints is imposed
on the set of simultaneously transmitting neighbors. These constraints
dictate that:
1. A node cannot transmit and receive simultaneously.
2. A node cannot transmit simultaneously to multiple nodes.
3. A node cannot receive simultaneously from multiple nodes.
Nodes exchange datagram packets of constant packet lengths, that
can be transmitted in one time slot, in a unicast fashion. We consider J
distinct customer classes, each intended for a set of exit nodes Vj , j =
1, . . . , J. The set of exit nodes is such that whenever a packet of some
class reaches an exit node for this class, the packet leaves the network.
The different sets Vj are allowed to overlap.
Each node is modeled as a set of J infinite buffer queues, each holding separately the packets corresponding to different customer classes.
We denote by Xij (t) the non-negative integer queue size for class j at
node i at the end of time slot t. In addition, X(t) is a queue length
matrix defined as X(t) = (Xij (t), i = 1, 2, . . . N, j = 1, 2, . . . J) and
for each j {1, 2, . . . J} Xj (t) is a N 1 vector of all queue sizes of
class j at time t, that is, Xj (t) = (Xij (t), i = 1, 2, . . . N ). We denote
by X the space of all queue size vectors.
A link ` is said to exist between nodes i1 and i2 , if node i2 is within
transmission range of node i1 . We model each link as a server. In
particular, a link ` that originates from node s(`) and terminates at node
d(`) is a server that serves a customer from queue s(`) and upon service
X(t 1) as well as the current topology T (t) are available to the scheduler at the beginning of each time slot t. Based on this information, the
scheduler takes a scheduling decision in a centralized fashion. Accordingly, we define a deterministic, stationary scheduling policy , to be
a map X T E such that, (x, T ) is a valid multi-class activation
vector for the current topology, as this vector is defined previously.
Clearly, the queue size at node i for class j at the end of the next time
slot equals its value at the end of the current time slot, plus the external
arrivals for this class at this node during the next time slot, modified by
internal arrivals or departures for class j that involve node i. Arrivals
and departures are determined by the next multi-class activation vector and by whether or not service completes during the next time slot.
Hence, the queue size process for class j in vector form is:
Xj (t + 1) = Xj (t) + Rj M(t + 1)Ej (t + 1) + Aj (t + 1)
(1)
if d(`) = i, with i
/ Vj
1
j
(2)
ri`
= 1 if s(`) = i
0
otherwise
Matrix M(t) is a diagonal matrix, of dimensions |L| |L|, that captures the link quality. Its `th diagonal element (M (t))` represents the
binary random variable that corresponds to the successful service completion of a customer served by server ` during time slot t. If a customer
completes service and moves from queue s(`) to queue d(`) (or exits
the system if the node where queue d(`) resides belongs to the class
of the exit nodes for the particular customer class), then (M (t))` = 1,
otherwise (M (t))` = 0. The latter case may occur if the `th link is
not present in the current topology at time slot t or when although it is
present, a customer did not receive full service and its service is being
deferred.
Note that rule 1 in the definition of a valid multi-class activation
vector, E(t), guarantees that the elements of X(t), evolving according
to Equation 1, are non-negative at all times.
B Assumptions
Throughout this paper, we make the following assumptions.
Assumption 1 The topology process is a stationary and ergodic process, that is varying in an i.i.d. fashion. In particular pk = P [T (t) =
Tk ], k 1, . . . , NT does not depend on t.
Assumption 2 The process {M (t)}
t=0 of link qualities is an i.i.d process. In addition, for all t, t0 , M (t) and T (t0 ) are independent. Furthermore, E[M(t)|T (t) = Tk ] is independent of t, k {1, . . . , NT }.
We will call this expected value Mk .
Assumption 3 The arrival process {Aij (t)}
t=0 is independent of
the topology process {T (t)}
t=1 and of the service rates process
{M(t)}
t=0 . Also, for a given node i and customer class j the arrival
2
process {Aij (t)}
t=0 is an i.i.d process. Finally, E[Aij (t)] < .
SUPPORTING WEIGHTS
(3)
We also define the weight vector of each link ` that is present under
topology Tk as:
P [y < ] = 1,
y Y
,
if X(t) Y, t > 0
min{t > 0 : X(t)
/ Y }, otherwise
w
Dw
k (x) = {(Dk (x))` : ` = 1, . . . , |L|}
0,
otherwise,
Optimality of 0w
Let us define the following sets of arrival rates. Initially, we define the
=
A
k (x))` is given by
where c
T
k (x) = arg max{Dw
c
k (x) c}
cSk
(5)
|L|
J
j
a RN
+ : fk R+ ,
aj =
NT
X
Rj fkj pk ,
k=1
and
(jk (x))` = arg max
j=1,...,J
Dkw (x) `j .
(6)
Ties in obtaining a solution for Equations 5 and 6 are resolved by selecting one of the solutions.
Thus, policies 0w preferentially activate links ` (Equation 5) and
customer classes j (Equations 4 and 6) for which the weighted difference of queue sizes at the source and destination is largest; here the
weights are the products of the probabilities (mk )` of successful transmissions and of the assigned weights, wj . By selecting the links with
the higher differences in queue sizes this family of policies achieves a
load balancing in the network queues: whenever a queue size increases
enough, one of its outgoing links will be activated, thus reducing the
queue sizes.
J
X
fkj co(Mk Sk ) ,
j=1
A? =
|L|
J
j
j
a RN
+ : fk R+ , a =
NT
X
Rj fkj pk
k=1
J
X
j=1
Let C be the set of arrival rates for which the stationary scheduling
policy stabilizes the system. In addition, define C to be the set of
arrival rates for which there exists some stationary policy that stabilizes
the system,i.e
C = C
Then, we have proved the following theorem.
Theorem 2 The following properties hold:
is a convex polytope.
1. A
C and C0 are related
2. For every w with wj > 0, j, A? , A,
through the following set inequality:
A? Cw C A
= C w
relint(A)
0
0
(7)
90
2
180
45
(t)
V. S IMULATION RESULTS
In this section, we will consider a simple example of a time-varying
topology network and characterize its stability region under the proposed scheduling scheme. We will observe that under a policy 0w although the total throughput under any of the individual topologies the
network takes is zero, the throughput of the time-varying network that
evolves through each one of them with non-zero probability is strictly
positive. Hence, mobility increases the maximum stable throughput that
the network can sustain under 0w .
We assume that the servers are perfect, implying that M (t) is the
identity matrix for all t. The policy that is simulated is 01 , in other
words for each customer class wj = 1, j = 1, . . . , J. Our graphs are
obtained through a Monte Carlo simulation. The arrivals are Bernoulli.
We start by selecting an arrival rate vector randomly according to the
uniform distribution, within the interval (0, 1]. We then run the simulation for 10, 000 time slots. We decide instability on a threshold based
criterion, i.e. if any of the network queues exceeds a threshold under
some multi-class arrival vector, this rate vector is said to be unstable.
If the rate vector is deemed unstable, we decrease some element of this
vector by a step = 0.05 and start the simulation again. However, if it
is a stable arrival rate vector, then we mark it by a dot (Figure 5) and
a new arrival rate is again selected randomly according to the uniform
distribution in (0, 1].
4 nodes on a ring
270
V1
10
41
12p
10
41
Figure 3: Topology T2 is present. All network nodes are disconnected from each other.
the fact that relaying through intermediate nodes can be used to create
paths from source nodes to their corresponding exit nodes.
R EFERENCES
10
[1] Pierre Bremaud. Markov Chains: Gibbs Fields, Monte Carlo Simulation
and Queues. Springer, 1999.
41
0.9
[3] L. Tassiulas and A. Ephremides. Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop
radio networks. IEEE Transactions on Automatic Control, 37(12), December 1992.
[4] Leandros Tassiulas. Dynamic link Activation Scheduling in Multihop Radio
Networks with Fixed or Changing Connectivity. PhD thesis, University of
Maryland-College Park, 1991.
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.1
0.2
0.3
0.4
0.5
0.6
0.7
stable arrival rates of customer class 0 (pkts/slot)
0.8
0.9
VI. C ONCLUSIONS
In this paper, we introduced a family of centralized stationary
scheduling policies applied on time-varying-topology wireless ad-hoc
network. We characterized the common set of stable arrival rates that all
of these policies achieve. In addition, we proved optimality of all policies in this family in terms of maximizing the total stable throughput of
the network. We did that by showing that the set of rates that are stable
under any member of this family is essentially identical to the union of
the sets of stable arrival rates achieved by all stationary policies. Finally, we confirmed through simulations that mobility at the nodes may
indeed increase the total stable throughput of the network. This is due to