Impact of Interference On Multi-Hop Wireless Network Performance
Impact of Interference On Multi-Hop Wireless Network Performance
Performance
ABSTRACT 1. INTRODUCTION
In this paper, we address the following question: given a Multi-hop wireless networks have been studied since the
specic placement of wireless nodes in physical space and a 70's [6]. Several new applications of such networks have
specic traÆc workload, what is the maximum throughput recently emerged. Community wireless networks [1, 3] are
that can be supported by the resultant network? Unlike multi-hop wireless networks that provide \last-mile" access
previous work that has focused on computing asymptotic to peoples' homes. This approach is an alternative to to
performance bounds under assumptions of homogeneity or cable modem and DSL technologies. In large networks of
randomness in the the network topology and/or workload, sensors [10] the scale and the environment are such that
we work with any given network and workload specied as a multi-hop wireless network is the only feasible means of
inputs. communication.
A key issue impacting performance is wireless interference A fundamental issue in multi-hop wireless networks is that
between neighboring nodes. We model such interference us- performance degrades sharply as the number of hops tra-
ing a con
ict graph, and present methods for computing versed increases. For example, in a network of nodes with
upper and lower bounds on the optimal throughput for the identical and omnidirectional radio ranges, going from a sin-
given network and workload. To compute these bounds, we gle hop to 2 hops halves the throughput of a
ow because
assume that packet transmissions at the individual nodes wireless interference dictates that only one of the 2 hops can
can be nely controlled and carefully scheduled by an omni- be active at a time.
scient and omnipotent central entity, which is clearly unreal- The performance challenges of multi-hop networks have
istic. Nevertheless, using ns-2 simulations, we show that the long been recognized and have led to a lot of research on
routes derived from our analysis often yield noticeably bet- the medium access control (MAC), routing, and transport
ter throughput than the default shortest path routes even layers of the networking stack. In recent years, there has
in the presence of uncoordinated packet transmissions and also been a focus on the fundamental question of what the
MAC contention. This suggests that there is opportunity for optimal capacity of a multi-hop wireless network is. The
achieving throughput gains by employing an interference- seminal paper by Gupta and Kumar [16] showed that in a
aware routing protocol. network comprising of n identical nodes, each of which is
communicating with1 another node, the throughput capacity
Categories and Subject Descriptors per node is ( p log ) assuming random node placement
n n
C.2.1 [Computer-Communication Networks]: Wireless and communication pattern and ( p1 ) assuming optimal
networks|multi-hop, interference node placement and communication pattern. Subsequent
n
But this result is under the assumption that nodes always (such as community wireless networks), mobility may be too
have data to send and are ready to transmit as fast as their infrequent (or even non-existent) to be exploitable.
wireless connection will allow. In a realistic setting, however, Gastpar and Vetterli [12] extend the work of Gupta and
sources tend to be bursty, so nodes will on average transmit Kumar [16] in a dierent direction. Instead of the simple
at a slower rate than the speed of their wireless link. In such point-to-point coding assumption made in [16] (which basi-
a setting, we nd that the addition of new nodes can actually cally treats each transmitter-receiver pair as being indepen-
improve the per-node throughput because the richer connec- dent of other pairs), they consider a network coding model
tivity provides increased opportunities for routing around where nodes could cooperate in arbitrary ways (for instance,
interference \hotspots" in the network. This more than o- to boost the transmit power). Further, they assume that
sets the increase in traÆc load caused by the new node. there is a single source and single destination picked at ran-
The rest of this paper is organized as follows. In Section 2, dom, and that the rest of the nodes act as relays. They show
we discuss related work. In Section 3, we present details of that the throughout capacity of the network under these
our con
ict graph model and methods for computing bounds conditions is O(log n) (compared to O(1) for the point-to-
on the optimal network throughput. In Section 4, we present point coding model of [16]). While the use of network coding
results obtained from applying our model to dierent net- in this context is a promising line of research, we note that
work and workload congurations. Section 5 concludes the the point-to-point coding model corresponds to current ra-
paper. dio technology such as 802.11.
The recent work of De Couto et al. [9], based on two exper-
2. RELATED WORK iments in a 802.11b-based multi-hop wireless testbeds shows
A number of papers have been published on the problem that minimizing the hop count of an end-to-end path is not
of estimating the capacity of a multi-hop wireless network. suÆcient for achieving good performance. The reason they
Here, we consider the work that is most closely related to point out is that link quality can vary widely and that the
long hops that may be included in \short" paths may in- Physical Model: Suppose node n wants to transmit to
i
cur a high packet error rate. In our work, we also reach node n . We can calculate the signal strength, SS , of
j ij
the same conclusion regarding the limitations of the hop n 's transmission as received at n . The transmission is
i j
count metric, but for a somewhat dierent reason | be- successful if SNR SNR
ij , where SNR denotes
thresh ij
cause of wireless interference limits capacity, a circuitous the signal-to-noise ratio at the node n for transmissions j
but less interference-prone route, say along the periphery of received from node n . The total noise, N , at n consists
i j j
a network, may perform better than the shortest hop count of the ambient noise, N , plus the interference due to other
a
Note that the second requirement implies that a node may to the wireless links (L ) between the nodes. There is a di-
C
not send and receive at the same time nor transmit to more rected link l from node n to n if d R and i 6= j . We
ij i j ij i
than one other node at the same time. Note also that this use the terms \node" and \link" in reference to the connec-
model diers from the popular 802.11 MAC in an important tivity graph while reserving the terms \vertex" and \edge"
way | it requires only the receiver to be free of interference, for the con
ict graph presented in Section 3.2.1.
instead of requiring that both the sender and the receiver Let us rst consider communication between a single source,
be free of interference. We discuss how to adapt the model n , and a single destination, n . In the absence of wireless
s d
for an 802.11-style MAC in Section 3.5. interference (e.g., on a wired network), nding the maxi-
mum achievable
ow between the source and the destina- Theorem 1. Given a network and a set of source and
tion, given the
exibility of using multiple paths, can be destination nodes, it is NP-hard to nd the optimal through-
formulated as a linear program corresponding to a max-
ow put under the protocol interference model. Moreover, it is
problem, as shown in Figure 1. Here, f denotes the amount ij NP-hard to approximate the optimal throughput.
of
ow on link l , Cap denote the capacity of link l , and
It can be shown that the problem of nding the inde-
ij ij ij
max
X fsi
to approximate) can be reduced to the optimal throughput
problem. Moreover, this reduction is approximation pre-
si 2 C serving. Hence the above hardness result. We discuss the
X to X reduction brie
y in the Appendix.
l L
subject
fij = fji 8n 2 N n fn ; n g <1> Since it is NP-hard to approximate the optimal through-
put, we now look at heuristics for obtaining lower and upper
Xf
i C s d
l ij 2LC ji 2LC
l
bounds on the throughput. For this, we need to dene some
= 0 <2> more terms. An independent set of a graph H can be char-
isX
is
l 2 C
L acterized using an independence vector, which is a vector of
f = 0 <3> size jV j. This vector is denoted by x , where I is an in-
H I
di 2 C
th
fij 0 8l 2 L
ij C <5>
I
ow on a link cannot exceed the capacity of the link. The sets, and ; 0 1 denote the fraction of time allo-
i i
nal constraint restricts the amount of
ow on each link to cated to the independent set I (i.e., the time during which
i
be non-negative. The above formulation does not take into the links in I can be active). If we add the schedule restric-
i
account wireless interference, which may impose additional tions imposed by the independent sets to the original linear
constraints on when the individual wireless links may be program (Figure 1), the resulting throughput always has a
active. We turn to this issue next. feasible schedule, and therefore constitutes a lower bound
on the maximum achievable throughput.
3.2.1 Conflict Graph We formalize our above observation as follows. Given a
To incorporate wireless interference into our problem for- con
ict graph F , we dene a usage vector, U , of size jV j,
F
mulation, we dene a con
ict graph, F , whose vertices cor- where U denotes the fraction of time that the link i can be
i
respond to the links in the connectivity graph, C . There is active. A usage vector is schedulable if the corresponding
an edge between the vertices l and l in F if the links l links can be scheduled, con
ict free, for the fraction of the
ij
tocol interference model described in Section 3.1, we draw vector as a point in an jV j-dimensional space, we have the
F
such an0 edge if any of the following is true: d R0 or following theorem, the proof for which is not included due
d R . This encompasses the case where a con
ict arises
pj
iq i
to space constraints.
because links l and l have a node in common (i.e., i == p
p
ij pq
or i == q or j == p or j == q). Note, however, that we Theorem 2. A usage vector is schedulable if and only
if it lies within the independent set polytope of the con
ict
do not draw an edge from a vertex to itself in the con
ict graph.
graph.
Theorem 2 implies that the optimal network throughput
3.2.2 Hardness Result problem is a linear program, no matter how many sender-
Next, we present a hardness result for computing the opti- receiver pairs we have. In fact, the problem is one of max-
mal throughput under the protocol interference model. We imizing a linear objective function over a feasible polytope.
begin with a few denitions, Given a graph H (with ver- This feasible polytope can be described as the intersection
tex set V ), an independent set is a set of vertices, such
H of two polytopes | the
ow polytope and the independent
that there is no edge between any two of the vertices. The set polytope of the con
ict graph. The
ow polytope is the
independence number of graph H is the size of the largest collection of feasible points described by the
ow constraints
independent set in H . Then, we have the following hardness (Figure 1), ignoring wireless con
icts. The
ow polytope is
result. a simple structure on which a linear objective function can
easily be optimized. Independent set polytope, on the other 1 1
dent sets).
Theorem 2 implies that any convex combination of in-
dependence vectors is schedulable. In general, however, an
arbitrary point inside the independent set polytope will be a 3 4 3
vectors. To get around this computational problem, we only Figure 2: A pentagon and its complement
want to pick \easy" points in the independent set polytope. graph. The former is an odd hole, and the
An obvious notion of \easy" is that the point picked should latter is an odd anti-hole.
be a convex combination of a small number of (i.e., polyno-
mially many) independence vectors. We will be using this
notion explicitly in the algorithm as follows. We derive a
lower bound on the optimal throughput by nding K 0 in-
dependence vectors in the con
ict graph F , and adding the
following constraints to the LP formulation shown in Fig-
ure 1.
P
=1 1 (because only one maximal independent
K
0
i Figure 3: An example that shows it is
set can be active at a time)
i
ij
P
f ij 2 i Cap (because the fraction of time for
l I i ij
not suÆcient even if we add all clique,
hole, anti-hole constraints.
which a link may be active is constrained by the sum
of the activity periods of the independent sets it is a corresponding to odd holes and odd anti-holes. An odd hole
member of). is a circle (i.e., loop) formed by an odd number of edges,
Note the solution produced by solving this linear program without a chord in between. (The pentagon in Figure 2 is
is always feasible (i.e., schedulable). This is due to the fact an odd hole.) The sum of the link utilization in an odd hole
that all links belonging to independent set I can be simulta- containing k vertices can be no more than b 2 c. An odd anti-
k
the cliques, and even if we could nd them all, there is still SNR exceeds the threshold at least in the presence of just
no guarantee that our upper bound will be tight. This can the ambient noise).
be illustrated by the following example. Suppose the con
ict Using the connectivity graph, we can write an LP formu-
graph is the pentagon depicted in Figure 2. As we can see, lation to optimize network throughput for a wired network.
the only cliques in the graph are formed by the adjacent As discussed before, the solution to the linear program, as
pairs of nodes. Adding the clique constraints alone to the shown in Figure 1, provides an upper bound on network
LP would suggest that a sum of link utilization equal to 2.5 throughput. However, this bound is not very useful since it
is achievable. But actually at most 2 links can be active does not take interference eects into account.
at a time. This suggests that we need to add constraints To take interference eects into account, we construct a
con
ict graph F . Unlike in the protocol model, con
icts in U1 + U2 + :::Ut + Ua t, where as before U denotes the i
the physical model are not binary. Rather, the interference fraction of time for which physical link l (corresponding
i
gradually increases as more neighboring nodes transmit, and to vertex v in the con
ict graph) is active. By adding as
i
becomes intolerable when the noise level reaches a thresh- many such constraints as possible, we can tighten the upper
old. This gradual increase in interference suggests that we bound. Still, the bound is not guaranteed to converge to the
should have a weighted con
ict graph, where the weight of optimal even if we include all such sets.
a directed edge from vertices l to vertices l (denoted by
pq ij
n of transmissions from nodes p and i, respectively, and nation is by adding the following additional constraints to
j
ij
SS
N is the maximum permissible interference
the LP problem for the wired network (shown in Figure 1):
thresh a
noise at node n that would still allow successful reception For each link l , f Cap z , where z 2 f0; 1g
SN R
P
j
At each node n , z 1
i
3.3.1 Lower Bound Here z is a 0{1 variable that indicates whether or not
ij
In the protocol model, we derive a lower bound on the net- link l is used for transmissions, and f is the amount of
ij ij
work throughput by nding independent sets in the con
ict
ow on the link. The basic intuition for these constraints is
graph F , and adding the constraints associated with the in- that in a single-path routing, at any node in the network,
dependent sets to the LP for the wired network. Analogous there is at most one out-going edge that has a non-zero
ow.
to independent sets, we introduce the notion of schedulable The rst and the third condition ensure that at node n at i
sets in the physical model. A schedulable set H is dened most one z will have a value of 1.
ij
P
f ij 2 x Cap
destination pair to multiple source-destination pairs using a
multi-commodity
ow formulation [8] augmented with con-
straints derived from the con
ict graph. We assign a connec-
ij x ij
l H
To tighten the bound, we should consider using maximal tion identier to each source-destination pair. Instead of the
schedulable sets in graph F (i.e., a schedulable set such that
ow variables f , we introduce the variable f to denote
ij ijk
adding additional vertices to the set will violate the schedu- the amount of ow for connection k on link l . Referring ij
lable property). We have the following theorem, which is to Figure 1, the
ow conservation constraints at each node
similar to the Theorem 2 in the protocol model. apply on a per-connection basis (constraint <1>); the total
incoming
ow into a source node is zero only for the connec-
Theorem 3. A usage vector is schedulable if and only if tion(s) originating at that node (constraint <2>); likewise,
it lies in the schedulable set polytope of the con
ict graph. the total outgoing
ow from a sink node is zero only for the
connection(s) terminating at that node (constraint <3>);
3.3.2 Upper Bound and the capacity constraints apply to the sum of the
ow
To derive an upper bound, we consider maximal sets of levels of all connections traversing a link (constraint <4>).
vertices in F such that for any pair of vertices l and l , pq ij This generalization is applicable to all variants of the
w 1. These correspond to the cliques in the protocol
pq
problem.
interference model. Therefore for each such set, we add a Multiple wireless channels: It may be the case that in-
ij
constraint that the sum of their utilization has to be no more stead of just one channel, each node can tune to one of M
than 1. channels, M 1. This can be easily modeled by introducing
These constraints may result in a loose bound since there M links between nodes i and j , instead of just 1. In gen-
may not be very many cliques. To tighten the upper bound, eral, links corresponding to dierent channels do not con
ict
we further augment the linear program with the following with each other, re
ecting the fact that the channels do not
additional constraints. After we nd a maximal schedula- mutually interfere. However, the links emanating from the
ble set, say vertices v1 , v2 , ..., v , adding any additional
t same node do con
ict, re
ecting the constraint that the sin-
vertex, denoted as v , to the set will make the set un-
a gle radio at each node can transmit only on one channel at
schedulable. Therefore we have the following constraint: a time.
Multiple radios per node: Each wireless node may be 6 16
equipped with more than one radio. If each node has M 2 5 8
radios, this can be modeled by introducing M links between 14 22
each pairs of nodes. If we assume that each of these radios
is tuned to a separate channel, and that a node can commu- 3 5 12 15 21 23
pair of nodes. 1 4 7
Directional antennas: We can combine the use of direc- 10 19
tional antennas with the basic protocol model of communica- 11 18 20
tion. Instead of specifying a range for each node, we simply 0 2 8
1000
Bidirectional MAC Houses
750
0.8
Throughput bound
0.6
Meters
500
0.4
250
0.2
Upper Bound
Lower Bound
0
0 20 40 60 80 100 0
0 250 500 750 1000
Effort Meters
500
0.6
80
optimal route selection, and how much is due to the opti-
mal scheduling. Motivated by this question, we empirically
60
examine four scenarios shown in Figure 10. They corre-
spond to (i) optimal routing with optimal scheduling, (ii)
shortest-path routing with optimal scheduling, (iii) optimal
routing under 802.11 MAC, and (iv) shortest-path routing
40
odd hole is one for which this constraint is not satised.
i H
and VWXYZ are examples of odd holes in the cor- Before attempting to nd a violated odd hole, we may as-
responding con
ict graph, assuming an 802.11-style sume that the given satises all the edge constraints, i.e.,
MAC, communication range equal to the lateral spac- + 1 for every edge in G, because if it does not then
ing between neighbors, and interference range equal to i j
dius we mean that two links con
ict if and only if they share odd cycle is less than 1 then the cycle is a violated odd hole.
i C
an endpoint. In this simple and somewhat unrealistic set- If the weight of the lightest odd cycle is 1 or more then there
ting, the con
ict graph is nothing but the line graph of the is no violated odd hole.
underlying grid network. (The line graph, L(G), of a graph, Now we come to the question of eÆciently nding the
G, is a graph on the edges of G, i.e., the vertices of L(G) lightest odd cycle. Let G be the graph in which we need to
correspond to the edges of G. There is an edge between nd the lightest odd cycle. We construct a bipartite graph,
two vertices of L(G) if the corresponding edges in G have a B , as follows. For every vertex v in G we put two vertices
vertex in common.) Our network in this case is a grid. A v and v in B (the subscripts l and r can conceptually be
l r
grid is a bipartite graph, and bipartite graphs are perfect. thought of as representing the left and right \halves" of the
The line graph of a perfect graph is perfect too. Hence the the bipartite graph B ). For every edge uv in G we put two
con
ict graph of a grid graph with a zero con
ict radius is a edges u v and u v in B . Now an odd cycle in G becomes
l r r l
perfect graph. A perfect graph has the property that its set an odd length path in B e.g., uvwu becomes u v w u . So l r l r
of clique constraints dene its independent set polytope. So for every vertex u in G we nd the shortest path from u to l
if we write a linear program with all the clique constraints u in B . The shortest such path in B yields the lightest odd
r