Optimal Scheduling For Fair Resource Allocation in Ad Hoc Networks With Elastic and Inelastic Traffic
Optimal Scheduling For Fair Resource Allocation in Ad Hoc Networks With Elastic and Inelastic Traffic
Abstract—This paper studies the problem of congestion control many contributions in these papers is a key modeling innovation
and scheduling in ad hoc wireless networks that have to support a whereby the network is studied in frames, where a frame is
mixture of best-effort and real-time traffic. Optimization and sto- a contiguous set of time slots of fixed duration. Packets with
chastic network theory have been successful in designing architec- deadlines are assumed to arrive at the beginning of a frame
tures for fair resource allocation to meet long-term throughput de-
mands. However, to the best of our knowledge, strict packet delay and have to be served by the end of the frame. In this paper,
deadlines were not considered in this framework previously. In this we explore this modeling paradigm further to study the design
paper, we propose a model for incorporating the quality-of-ser- of resource allocation algorithms for ad hoc networks. The
vice (QoS) requirements of packets with deadlines in the optimiza- frame-based model allows us to incorporate delay deadlines in
tion framework. The solution to the problem results in a joint con- the optimization framework for very general network models
gestion control and scheduling algorithm that fairly allocates re- and, somewhat surprisingly, allows us to design a common
sources to meet the fairness objectives of both elastic and inelastic
flows and per-packet delay requirements of inelastic flows.
framework for handling both elastic and inelastic flows.
The main contributions of the paper are as follows.
Index Terms—Ad hoc networks, best-effort traffic, congestion 1) We present an optimization framework for resource allo-
control, quality of service (QoS), real-time traffic, scheduling,
cation in a wireless network consisting of both best-effort
wireless networks.
flows and flows that generate traffic with per-packet delay
constraints. The framework allows for very general inter-
I. INTRODUCTION ference, channel, and arrival models.
2) We characterize the capacity region for wireless networks
the other hand, since elastic packets can be queued during mul- We will focus on maximizing the following objective for
tiple frames, we can schedule their transmission independent of some given vector :
the current queue length. Therefore is a valid
schedule. A similar analysis can be done to verify that (1) is also
satisfied for links 1 and 3. (3)
At the beginning of any frame, we must choose a feasible
schedule to serve all links and decide how many elastic packets subject to
are allowed to be injected in the network. Therefore, our goal
is to find a function that is the probability of using for all
schedule when the inelastic arrivals are given by for all
and the channel state is , subject to the constraint that the loss
probability at link due to deadline expiry cannot exceed The vector can be used to allocate additional bandwidth
. For elastic traffic, we want to select the vector such that we fairly to inelastic flows beyond what is required to meet their
maximize the network utility while keeping the queues stable. QoS needs. Other uses for will be explored in the simula-
To properly formulate the problem, let us first define tions section. We will assume that the inelastic arrivals and loss
to be the expected number of inelastic packets served if the probability requirements are feasible, and thus the optimization
number of packet arrivals is given by and the channel state problem has a solution .
is . Similarly, denotes the expected number of elastic
packets that can be served. Therefore, we have the following IV. SOLUTION USING DUAL DECOMPOSITION
constraints: Using the definition of the dual function [18], we have that
subject to
for all
The expected service for mixed traffic at link is then given
by Slater’s condition [19] states that since the objective is con-
cave and the constraints are affine functions, the duality gap is
zero, and therefore , where
Furthermore, to avoid trivialities, we will assume that we notice that the problem can be decomposed into the fol-
for all . lowing subproblems:
If we define the capacity region for fixed arrival and channel
states and as follows:
there exists
and
and
(4)
it is easy to see that Furthermore, since we are interested in solving the problem
, where is the convex hull of . for nonnegative values of and , it must be the case that
Similarly, if the overall capacity of the network is defined as and are as large as the constraints allow, and since the
upper bounds for and are expressed as a
convex combination and the objective function in (4) is linear,
there exists the problem can be decomposed into the following subproblems
for all and for fixed and :
for all
we have that .
1128 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 4, AUGUST 2011
This suggests the following iterative algorithm to find the so- V. DYNAMIC ALGORITHM AND ITS CONVERGENCE ANALYSIS
lution to our optimization problem, where is the step index
and is a large enough parameter: A. Scheduler and Congestion Controller
To implement the algorithm online, we propose the following
congestion control algorithm in frame , where the queue length
at link is given by :
(5)
where
it and allows the extension to general ad hoc networks. Note that Lemma 1 also implies that the scheduling and congestion
is just the queue size for elastic packets at link . control algorithm fulfills all links’ inelastic requirements.
Corollary 2: If there exists a point for
B. Convergence Results some such that (7) and (8) hold true, then the online
algorithm fulfills all the inelastic constraints. That is
For readability, we present the main results in this section,
but the proofs are deferred to the appendixes. We start by noting
that defines an irreducible and aperiodic Markov
chain. We will first bound the expected drift of for
a suitable Lyapunov function.
Lemma 1: Consider the Lyapunov function
for all .
. If there exists a point for
The above corollary simply states that the arrival rate into the
some such that
deficit counter is less than or equal to the departure rate. This
result is an obvious consequence of the stability of the deficit
for all (7)
counters, and so a formal proof is not provided here.
To prove that our dynamic algorithm achieves the optimal
and solution to the static problem (3) in some average sense and
fulfills all links’ requirements, we first state a weaker result than
for all (8) Lemma 1.
Lemma 2: Consider the Lyapunov function
then . Then
VI. UNKNOWN CHANNEL STATE To avoid trivialities, we will assume that for all
.
The analysis for the unknown channel case is similar to the
If we define the capacity region for fixed arrival and channel
one we presented for the known channel case, so in this section
states and as follows:
we will only highlight the differences.
A feasible schedule is such that , there exists
respectively denote the number of inelastic and elastic packets
that can be scheduled for transmission at link and and
time without violating any interference
constraints. Assuming the inelastic arrivals are given by and
it is easy to check that
since we can only schedule at most one packet per link at every
, where is the convex hull of .
time slot, we have the following constraints:
Similarly, the overall capacity of the network can be defined
as
for all (9)
Fig. 5. Deficit size and queue length when w = 6. Fig. 7. Average service when w = 3.
Fig. 10. Dropping probability when w = 3. Fig. 13. Average service when w = 3.
Fig. 11. Dropping probability when w = 6. Fig. 14. Average service when w = 6.
The case when the channel state varies from time slot to time
slot is more challenging to solve since it involves a dynamic
programming solution. Similarly, our traffic model for inelastic
packets assumes that packets arrive at the beginning of the frame
and all have the same delay. Possible extensions include hetero-
geneous delays and arrivals at any time slot. These topics are
left for future work.
APPENDIX A
PROOF OF LEMMA 1
To prove Lemma 1, we start by first proving two auxiliary
lemmas and then stating a fact.
Lemma 3: Given that at frame we have the event
and and if there exists a point
Fig. 12. Average service when w = 0. for some such that (7) and (8) hold true, then
result is that, through the use of deficit counters, one can treat the
scheduling problem for elastic and inelastic flows in a common
framework. It is also interesting to note that the deficit coun-
ters introduced in [13]–[15] have the interpretation of Lagrange
multipliers. Simulations corroborate our results and show the
dependency of the performance of the algorithm on the auxil-
iary parameter and its role into assigning resources to both
elastic and inelastic traffic.
It must be noted that in the unknown channel state case, we as-
sume that the channel remains constant during the entire frame.
1134 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 4, AUGUST 2011
for some nonnegative constant and where for some constant , where and are the solutions
is given by the solution to (6). to (3) and (5), respectively.
Proof: Proof:
(11)
(13)
(14)
(12)
and (14) follows from the fact that is the optimal point
of (5).
Fact 1: The optimization in (6) can be performed over
Lemma 4: Given that at frame we have the event
, the convex hull of ; that is
and and if there exists a point
for some such that (7) and (8) hold true, then
JARAMILLO AND SRIKANT: OPTIMAL SCHEDULING FOR FAIR RESOURCE ALLOCATION IN AD HOC NETWORKS 1135
The reason for this comes from the fact that the objective where ; (15) follows from the definition of
function is linear, and therefore there must be an optimal point , , , and Fact 1. Thus, we have the
. following:
Proof of Lemma 1: From the definition of , we
know that means that there exist
for all , and
,
for all . For the rest of the proof, we define ,
to be such set of values associated to .
From Lemmas 3 and 4, we have
where
and
APPENDIX B
PROOF OF THEOREM 1
From Lemma 2, we know that
(15) (16)
1136 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 4, AUGUST 2011
where (16) follows from the fact that the Lyapunov function [9] S. Shakkottai and R. Srikant, “Scheduling real-time traffic with dead-
is nonnegative. Using Jensen’s inequality [19], we get lines over a wireless channel,” Wireless Netw., vol. 8, no. 1, pp. 13–26,
Jan. 2002.
[10] V. Raghunathan, V. Borkar, M. Cao, and P. R. Kumar, “Index policies
for real-time multicast scheduling for wireless broadcast systems,”
in Proc. IEEE INFOCOM, Phoenix, AZ, Apr. 13–18, 2008, pp.
1570–1578.
[11] A. Dua and N. Bambos, “Downlink wireless packet scheduling
with deadlines,” IEEE Trans. Mobile Comput., vol. 6, no. 12, pp.
1410–1425, Dec. 2007.
[12] Q. Liu, X. Wang, and G. B. Giannakis, “A cross-layer scheduling al-
gorithm with QoS support in wireless networks,” IEEE Trans. Veh.
Technol., vol. 55, no. 3, pp. 839–847, May 2006.
[13] I.-H. Hou, V. Borkar, and P. R. Kumar, “A theory of QoS for wireless,”
in Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, Apr. 19–25, 2009,
pp. 486–494.
[14] I.-H. Hou and P. R. Kumar, “Admission control and scheduling for QoS
guarantees for variable-bit-rate applications on wireless channels,” in
Proc. 10th ACM MobiHoc, New Orleans, LA, May 18–21, 2009, pp.
175–184.
[15] I.-H. Hou and P. R. Kumar, “Scheduling heterogeneous real-time traffic
over fading wireless channels,” in Proc. IEEE INFOCOM, San Diego,
Assuming , we get the following limit CA, Mar. 15–19, 2010, pp. 1–9.
expression: [16] L. Tassiulas and A. Ephremides, “Stability properties of constrained
queueing systems and scheduling policies for maximum throughput in
multihop radio networks,” IEEE Trans. Autom. Control, vol. 37, no. 12,
pp. 1936–1948, Dec. 1992.
[17] M. J. Neely, “Delay-based network utility maximization,” in Proc.
IEEE INFOCOM, San Diego, CA, Mar. 15–19, 2010, pp. 1–9.
[18] D. G. Luenberger, Linear and Nonlinear Programming, 2nd ed. Nor-
well, MA: Kluwer, 2003.
[19] S. Boyd and L. Vandenberghe, Convex Optimization, 1st ed. New
York: Cambridge Univ. Press, 2004.
where .
Juan José Jaramillo (S’06–M’11) received the B.S.
degree (summa cum laude) from Universidad Ponti-
ACKNOWLEDGMENT ficia Bolivariana, Medellin, Colombia, in 1998, and
This paper is a revised version of an earlier paper that ap- the M.S. and Ph.D. degrees from the University of
Illinois at Urbana–Champaign in 2005 and 2010, re-
peared in [1]. The main differences between this version and spectively, all in electrical engineering.
the previous one are that the proofs have been rewritten to make From 1999 to 2003, he was with Empresas
the results more general and simulations have been extensively Publicas de Medellin, Medellin, Colombia. He is
expanded. currently with Iowa State University, Ames, where
he is a Post-Doctoral Research Associate with the
Department of Electrical and Computer Engineering.
REFERENCES He is the recipient of a Fulbright fellowship. His research interests include
[1] J. J. Jaramillo and R. Srikant, “Optimal scheduling for fair resource communication networks and game theory.
allocation in ad hoc networks with elastic and inelastic traffic,” in Proc.
IEEE INFOCOM, San Diego, CA, Mar. 15–19, 2010, pp. 1–9.
[2] A. Eryilmaz and R. Srikant, “Fair resource allocation in wireless net-
works using queue-length-based scheduling and congestion control,” R. Srikant (S’90–M’91–SM’01–F’06) received
in Proc. IEEE INFOCOM, Miami, FL, Mar. 13–17, 2005, vol. 3, pp. the B.Tech. degree from the Indian Institute of
1794–1803. Technology, Madras, India, in 1985, and the M.S.
[3] X. Lin and N. B. Shroff, “Joint rate control and scheduling in multihop and Ph.D. degrees from the University of Illinois at
wireless networks,” in Proc. 43rd IEEE CDC, Atlantis, Bahamas, Dec. Urbana–Champaign in 1988 and 1991, respectively,
14–17, 2004, vol. 2, pp. 1484–1489. all in electrical engineering.
[4] M. J. Neely, E. Modiano, and C.-P. Li, “Fairness and optimal He was a Member of Technical Staff with AT&T
stochastic control for heterogeneous networks,” in Proc. IEEE IN- Bell Laboratories, Holmdel, NJ, from 1991 to 1995.
FOCOM, Miami, FL, Mar. 13–17, 2005, vol. 3, pp. 1723–1734. He is currently with the University of Illinois at Ur-
[5] A. Stolyar, “Maximizing queueing network utility subject to stability: bana-Champaign, where he is the Fredric G. and Eliz-
Greedy primal-dual algorithm,” Queue. Syst., vol. 50, no. 4, pp. abeth H. Nearing Endowed Professor with the De-
401–457, Aug. 2005. partment of Electrical and Computer Engineering and a Research Professor in
[6] A. Eryilmaz and R. Srikant, “Joint congestion control, routing and mac the Coordinated Science Laboratory. His research interests include communi-
for stability and fairness in wireless networks,” IEEE J. Sel. Areas cation networks, stochastic processes, queueing theory, information theory, and
Commun., vol. 24, no. 8, pp. 1514–1524, Aug. 2006. game theory.
[7] L. Chen, S. H. Low, M. Chiang, and J. C. Doyle, “Cross-layer con- Prof. Srikant was an Associate Editor of Automatica and the IEEE
gestion control, routing and scheduling design in ad hoc wireless TRANSACTIONS ON AUTOMATIC CONTROL and is currently an Associate Editor
networks,” in Proc. IEEE INFOCOM, Barcelona, Spain, Apr. 23–29, of the IEEE/ACM TRANSACTIONS ON NETWORKING. He has also served on the
2006, pp. 1–13. Editorial Boards of special issues of the IEEE JOURNAL ON SELECTED AREAS
[8] X. Lin, N. B. Shroff, and R. Srikant, “A tutorial on cross-layer opti- IN COMMUNICATIONS and IEEE TRANSACTIONS ON INFORMATION THEORY.
mization in wireless networks,” IEEE J. Sel. Areas Commun., vol. 24, He was the Chair of the 2002 IEEE Computer Communications Workshop in
no. 8, pp. 1452–1463, Aug. 2006. Santa Fe, NM, and was a Program Co-Chair of IEEE INFOCOM 2007.