On Power Efficient Communication over Multi-hop Wireless Networks: Joint Routing, Scheduling and Power Control

Size: px
Start display at page:

Download "On Power Efficient Communication over Multi-hop Wireless Networks: Joint Routing, Scheduling and Power Control"

Transcription

1 On Power Efficient Communication over Multi-hop Wireless Networks: Joint Routing, Scheduling and Power Control Randeep Bhatia Murali Kodialam Bell Laboratories Lucent Technologies 101 Crawfords Corner Road Holmdel, NJ 07733, USA {randeep, Abstract With increasing interest in energy constrained multi-hop wireless networks [], a fundamental problem is one of determining energy efficient communication strategies over these multi-hop networks. The simplest problem is one where a given source node wants to communicate with a given destination, with a given rate over a multi-hop wireless network, using minimum power. Here the power refers to the total amount of power consumed over the entire network in order to achieve this rate between the source and the destination. There are three decisions that have to be made (jointly) in order to minimize the power requirement. The path(s) that the data has to take between the source and the destination. (Routing) The power with with each link transmission is done. (Power Control). Depending on the interference or the MAC characteristics, the time slots in which specific link transmissions have to take place. (Scheduling) To the best of our knowledge, ours is the first attempt to derive a performance guaranteed polynomial time approximation algorithm for jointly solving these three problems. We formulate the overall problem as an optimization problem with non-linear objective function and non-linear constraints. We then derive a polynomial time 3-approximation algorithm to solve this problem. We also present a simple version of the algorithm, with the same performance bound, which involves solving only shortest path problems and which is quite efficient in practice. Our approach readily extends to the case where there are multiple sourcedestination pairs that have to communicate simultaneously over the multi-hop network. I. INTRODUCTION The problem of determining the achievable rate for a given power is a well studied problem in information theory [3]. For example, in the case of an Additive White Gaussian Noise (AWGN) channel the rate R, for a channel with bandwidth W, transmission power P and noise spectrum density N 0 is given by R = W log (1 + P N 0 W ) bits/second. This formula gives a theoretical upper bound on the rate that can be achieved for a given power level or equivalently a lower bound on the amount of power required to achieve a given rate. One generalization of this problem is to determine the capacity of a system where there are additional (relay) nodes that help transmission between the sender and the receiver. The capacity region even for one relay node is still an open problem [3]. In this paper, we consider a simpler variant of the problem, where information has to be sent from the source to the destination over a multi-hop network where the transmissions take place on point to point links. We do not consider the case where a node overhears the communication taking place between two other nodes in the network and uses this information to increase the capacity of the channel between the sender and the receiver. The fact that communication takes place on point to point links is generally true in networks where a routing algorithm is used to transmit information from the source to the destination. In this case, when an intermediate node receives traffic, the routing algorithm decides the next hop on the path to the destination and this node forwards traffic along to the next hop node. This is the mechanism that is generally used in ad-hoc and as well as sensor networks. Therefore, one can view this as communication along links in the network. Though the routing algorithm eliminates the broadcast aspect of the wireless channel, the multiple access aspect of the communication channel still remains. Each node along the path from the source to the destination has to ensure that when it is transmitting to the downstream node, that the downstream node is not transmitting to or receiving data from any other node. Given a particular source node, that wants to communicate at a given rate with a given destination node, the objective of this paper is to determine how this communication takes place across the multi-hop network in order to minimize the overall network power consumption. Given a particular node configuration, is it better to take many short hops on the way to the destination, or is it better to take fewer long hops? Is it more energy efficient to send all the data along a single path or is it preferable to split the data along multiple paths? result to derive a feasible solution to the problem with b paths? The problem becomes more complex when there are many sourcedestination pairs that have to communicate across the same multi-hop network. In general, there are three components that determine the power required to achieve a given rate. The routing problem of determining the paths along which flow is routed from the source to the destination. The scheduling problem of determining the time slots in

2 which communication takes place between the nodes in the network. The power control problem of determining the power with which the nodes communicate in a given time slot. A more general version of this problem is where given data rates have to be simultaneously achieved between many different source-destination pairs. The objective in this case is to determine the power required to achieve this given rate vector. With increasing interest in sensor networks where nodes are energy constrained, there has been a recent emphasis on energy efficient routing and scheduling in multi-hop networks []. Cruz and Santhanam [4] study the problem of joint routing, link scheduling and power control for wireless multi-hop networks. They present an algorithm to compute an optimal link scheduling and power control policy that minimizes the total average transmission power in the wireless multi-hop network, subject to given constraints regarding the minimum average data rate per link, as well as peak transmission power constraints per node, and multi-access signal interference constraints. In addition, the authors use the link costs obtained from the algorithm to design a joint routing, link scheduling and power control algorithm. Their algorithm although quite efficient has a worst case exponential complexity. Neely et al [8] consider dynamic routing and power allocation for a wireless network with time varying channels and power constrained nodes. They establish the capacity region of all rate matrices that the system can support and develop a joint routing and power allocation policy, for general arrival and channel state processes, which stabilizes the system and provides bounded average delay guarantees whenever the input rates are within this capacity region. The policy is developed by solving a hard optimization problem which can be nonlinear and non-convex in its most general formulation. Heuristics are presented to solve this problem for special cases. The work of ElBatt and Ephremides [5] considers the problem of joint scheduling and power control in multi-hop networks. They consider several general interference models and they develop algorithms for joint scheduling and power control. They do not consider the routing problem. In our work we consider the joint routing, scheduling and power control problem albeit on a simple interference model. There has also been some recent work on joint routing and power allocation in CDMA networks [13]. They approximate the problem as a convex optimization problem and develop techniques for solving this problem. To the best of our knowledge, this is the first performance guaranteed approximation algorithm for a joint routing-scheduling-power control problem. Though the algorithms developed in this paper are centralized, we believe that with some modifications it is possible to develop a distributed version of the algorithm. The main step in the algorithm is the solution of shortest path problems and there are standard ways of implementing Bellman-Ford algorithm in a distributed fashion. The scheduling algorithm can be solved as a greedy coloring problem. The power control portion of our algorithm is also a distributed algorithm. There are still non-trivial issues that have to be resolved before this algorithm can be implemented in a truly distributed fashion but the approach shows a lot of potential for distributed implementation. The rest of the paper is organized as follows: We outline the model and assumptions in Section II. In Section III we illustrate the technical challenges with the help of a simple example. In Section VI we consider a simpler problem of determining the minimum power schedule in the case the link flows are specified. This problem only considers the scheduling and the power control problem. Since there is no end-to-end flows to be achieved, there is no routing component to the problem. Instead of solving this problem exactly, we develop a -approximation algorithm for the problem. The structure of the (near) optimal solution to this problem is used to formulate and efficiently solve the general problem in Section VII. II. MODEL AND ASSUMPTIONS We consider a multi-hop wireless network with n nodes. The nodes communicate with each other via wireless links. Each node in the network can communicate directly with a subset of the other nodes in a network. Any time a node u can transmit directly to node v, we represent this fact by a directed edge (link) from node u to node v. We represent the nodes in the network and the possible communications between nodes by a directed graph G =(V,E). HereV represents the set of nodes in the network and E the set of directed edges (links) in the network. We assume that there are m links in the network. We do not require that the links be bidirectional. Given a link e E,weuset(e) to represent the transmission end of the link and r(e) to be the receiving end of the link e. We say that a link e is active to mean that there is a transmission from t(e) to r(e). We assume that system operates in a synchronous timeslotted mode. For a system that operates in an asynchronous mode, the results in this paper can provide upper bounds on its performance. Given a node v V,weuseN in (v) to denote the set of links that terminate at node v. In other words, N in (v) ={e E : r(e) =v}. Similarly, for a given node v V,weuseN out (v) to denote the set of edges that emanate from v, i.e, N out (v) ={e E : t(e) =v}. We use N(v) to denote N in (v) N out (v). Note that N(v) is the set of links incident on v. Letδ denote the maximum degree in the network, i.e., δ = max N(v). We assume that the length of each time slot is τ units. Let represent the path loss on link e. WeuseP (e, j) to denote the transmit power on link e in time slot j. In other words, we assume that node t(e) transmits with power P (e, j) in time slot j. Thus the received power at node r(e), in time slot j,

3 1 Fig An example multi-hop wireless network. is P (e, j). Note that our model includes the special case where the underlying graph is a complete graph (every pair of nodes can directly communicate with each other) in which the path loss for nodes not in the range is set to zero. A. Interference Model The interference model that we consider is a synchronous time-slotted joint TDMA/CDMA system where the nodes use unique signal sequences. This is one of the systems considered in [5]. This has also been studied in [1] [6]. Another view of this system is to view the communication as taking place in a spread spectrum mode. We assume that the hopping sequences for different link transmissions in the same neighborhood is designed so that there is no interference between different link transmissions in the same time slot. However, we require that a given node can interact (either send or receive) with at most one node in any time slot. If a solution requires a node to interact with multiple nodes in the same time slot then we say that the solution has a primary conflict. Therefore we are required to construct primary conflict-free schedules. We assume that a total bandwidth of W Hertz is available for use in this multi-hop network. Since we assume that two links primary conflict-free link transmissions do not interfere with each other, we assume that each link transmission uses the entire bandwidth W. We also assume that each link can be modeled as an Additive White Gaussian Noise (AWGN) channel with a noise spectral density N 0. Therefore, if edge e is active in time slot j then τw log ( 1+ ) P (e, j) N 0 W bits of data will be transferred from t(e) to r(e) in time slot j. III. TECHNICAL CHALLENGES In this section we identify the technical challenges, for solving the minimum energy flow routing problem for multihop wireless network, with the help of a simple example. In this example which is shown in Fig 1 the nodes and 3 are each at distance 4d from both nodes 1 and node 4 while nodes 1 and 4 are distance 6d apart. In this example flow at the rate T needs to be routed from node 1 to 4. We assume a path loss model in which received power is inversely proportional to the square of the distance from the transmitter. In other 4 words for a link e of length (distance) d, the path loss function =1/d. The first issue is of determining the paths and their associated flows over which to route the flow from node 1 to 4. Here the constraints are flow conservation at intermediate nodes and the requirement that flow at the rate T needs to be routed from node 1 to 4. There are 3 possible 1 to 4 paths P 1=1, 4, P = 1,, 4 and P 3 = 1, 3, 4. We consider 3 solutions. Solution S 1 routes flow at the rate T on the path P 1. Solution S routes flow at the rate T on the path P and solution S 3 routes flows at the rate of T/ on paths P and P 3 each. The second issue is of determining the schedule for the links that support non zero flow. Here the constraints are that no two links that are scheduled simultaneously can belong to the same node, since a node can only be participating in a single operation (send/receive) with at most one other node at any given time slot. In solution S 1 link (1, 4) is scheduled in every time slot, with a frequency of 1. In solution S links (1, ) and (, 4) cannot be scheduled simultaneously and hence they are scheduled in alternate time slots, each with a frequency of 1/. In solution S 3 link (1, ) can only be scheduled with link (3, 4) and link (1, 3) can only be scheduled with link (, 4). Thus in S 3 links (1, ) and (3, 4) are scheduled together in slots that alternate with the slots in which links (1, 3) and (, 4) are scheduled together. Thus all links in schedule S 3 have a frequency of 1/. Note that in every solution for this example the sum of the frequencies of all the links that belong to a node is at most 1. This is not a coincidence but is required by the scheduling constraints. However in general the scheduling constraint are not necessarily satisfied even when the sum of the frequencies of all the links that belong to a node is at most 1. TherateR(e) of a link e (while it is active) is determined by its flow f(e) and its frequency h(e). More specifically h(e) =f(e)/r(e). Given the rate R(e) of link e the rate of energy consumption (power) for the node t(e) ) while link e is active is given by P (e) = N0W ( R(e) W 1. Thus the rate of energy consumption for the node t(e) for link e is h(e)p (e). Getting back to the example the rate of link (1, 4) in S 1 is T. Rate of both links (1, ) and (, 4) in S is T each. Finally in solution S 3 each of the links (1, ), (, 4) (1, 3) and (3, 4) has a rate of T each. We are now ready to compute the energy consumption for each solution. In the following we set total bandwidth W =4T. Thus the total rate of energy consumption (power) for solution S 1 is T ( ) T N 04T 36d T W 1 =7.5N 0 Td, for solution S is T ( ) T N 04T 16d T W 1 =6.51N 0 Td, and for solution S 3 is 4 T/ ( ) T N 04T 16d T W 1 =4.4N 0 Td. Thus solution S 3 is the best solution among the three solutions (for W = 4T ) for minimizing the energy consumption in

4 routing the given flow. Note that had we chosen W =T then solution S 1, where no intermediate hops are used, is a lower energy solution than solution S which requires going through a relay node. This example shows that in a multi-hop network lower energy may be consumed on longer paths if intermediate relay nodes are used. Also sometimes the lower energy solution requires spreading the flow over multiple paths rather than sending all the flow on a single path. The set of paths from the source to the destination will in general depend on the desired rate. We will show later that the problem for determining the minimum energy solution can be formulated as a non-linear optimization problem over non-linear constraints. One option is to attempt to solve this using a general purpose solver. (Though it is not clear these solvers can handle non-linear constraints.) The approach that we take is to exploit the combinatorial structure of the problem to develop an approximation algorithm to solve this problem. IV. OVERALL STRATEGY We now outline the overall strategy to obtain the minimum energy schedule. We obtain an approximation algorithm to this problem in three steps. In the following T denotes flow constraints, S denotes the scheduling constraints and g() is the energy function. 1) We first formulate the minimum energy problem over two sets of vectors f and R (both defined on the set of links). The vector f represents the achieved data rate flow on links and the vector R represents the rate at which data is transmitted in a given time slot on link e, when it is active. The minimum energy problem is formulated as the following optimization problem P 1 : min g(f,r) (f,r) S f T. Let (f,r ) be the optimal solution to this problem and let u denote the optimal solution value. ) We now consider a restriction of the original problem where we fix anyf = f T and consider the following optimization problem P in the R vector: min g( f,r) ( f,r) S Let θ( f) be the optimal solution value to this problem attained at R = γ( f). Note that if we set f = f, then u = θ(f ). Assume that we can determine a solution to P with total energy consumption given by ( f) such that ( f) ηφ( f) αθ( f), for some fixed (closed form) function φ(). In other words () is an α-approximate solution to P. Therefore, (f ) ηφ(f ) αθ(f )=αg(f,r )=αu. Therefore (f ) is an α-approximate solution for P 1. Thus if we knew f and if we are able to compute an α-approximate solution to P then we would have an α-approximate solution to P 1. 3) Assume that φ() defined in the previous step is a fixed function that can be computed in closed form. We now formulate the following optimization problem P 3. min φ(f) f T. Let f denote the optimal solution to this problem. Then, φ(f ) φ(f ) and therefore and thus (f ) ηφ(f ) ηφ(f ), (f ) αθ(f )=αg(f,r )=αu. Thus by solving problem P 3 and using its optimal solution f to compute an α-approximate solution to P, where f is takentobef, we get an α-approximate solution to P 1.This is the approach that we follow to determine an approximation algorithm for the problem. In Section V, we formulate the optimization problem P 1 and we define the constraint set S and the objective function. We formulate and solve problem P in Section VI. V. FORMULATION OF THE MIN-POWER PROBLEM In this section we formulate the minimum power problem. Assume that we are given a source node s and a destination node t and the objective is to determine the routing, scheduling and power control to minimize the total amount of power consumed to achieve a given information rate from s to t. Let P (e, j) denote the transmission power for link e in time slot j. The following lemma (whose proof is given in the Appendix) establishes the fact that it is optimal for a given link to transmit at the same power in every time slot in which it is active. Lemma 1: Let P (e, j) > 0 represent the transmission power for link e in some time slot j when link e is active. In any minimum power schedule P (e, j) is independent of j. Therefore we use P (e) to represent the transmission power on link e and use ( ) P (e) R(e) =W log 1+ N 0 W to represent the data rate that is achieved over link e in each time slot where link e is active. We now give the set of constraints that the rate vector has to satisfy. We classify these constraints as those imposed by routing and those imposed by scheduling.

5 A. Routing Constraints We are given a source node s and a destination node t and the objective is to route flow at rate T from the source node to the destination node. Let f(e) denote the flow on link e that results from routing this flow of T units from s to t. Then f has to satisfy the following constraints: f(e) = f(e) v s, t. e N in(v) e N out(v) e N out(s) f(e) =T. The first set of constraints enforces flow balance at the nodes in the network (except s and t). The last constraint ensures that a flow of T units is routed from the source to the destination. We let T denote these set of constraints. Thus, from the routing point of view, a flow vector f is feasible only if f T. B. Scheduling Constraints We now give conditions on R(e) (and hence P (e)) such that the actual flows are schedulable. The results are shown in [6]. Lemma : ([6]) Given a set of link flows f(e) and the set of R(e) a necessary condition for schedulability is f(e) R(e) 1 v V and the sufficient condition for schedulability is f(e) R(e) v V. 3 Note that there is a gap between the necessary and sufficient conditions. We can take one of two approaches. We can solve the problem with the necessary conditions and then check if this solution is feasible (schedulable). The schedulability can be checked by solving an edge coloring problem. Edge coloring is NP-hard, however, there are several well known approximations to this problem. In order to check if a solution is schedulable, assume that we use one such heuristic. If solution is schedulable then we are done. If not, we can solve the problem using the sufficient conditions that guarantee that the solution obtained is feasible. The alternate conservative approach is to bypass the first step and solve the problem using the sufficiency conditions. In order to keep our approach general, we assume that the constraint on the flow-rate vector satisfies f(e) R(e) β v V for some constant β. Note that setting β = 1 gives the necessary conditions and β = 3 gives the sufficient conditions. To simplify notation we write f(e) S(β) ={R : β v V }. R(e) Given a β, thesets(β) is the feasible set of rate vectors that are feasible. C. Overall Problem Formulation We now give the objective function and the the constraints that have to be satisfied. We write it in the same format as problem P 1 outlined in the overall strategy section. Each time link e is active, the rate of energy consumption (power) for node t(e) is: P (e) = N ) 0W ( R(e) W 1. Since the flow required on link e is f(e) and each time the link is used we get a rate R(e), link e is only active f(e) R(e) time. Therefore, the total rate of energy consumption for link e is f(e) R(e) P (e). e E Therefore the overall problem of minimizing the total power required to achieve the given link flows is given by ) ( R(e) W 1 f(e) N 0 W R(e) u = g(f,r) = min e E (f,r) S(β). f T. Since the problem is set up in the same format as P 1,we are now ready to formulate and solve problem P. For this purpose, we assume that we are given a fixed f T and we want to solve the problem in the R variables. VI. SOLVING THE FIXED FLOW PROBLEM In this section we assume the following: We are given a fixed f T and the problem is solved over the rate (R) variables. We also assume that the value of β is fixed. Therefore we suppress β from the set S(β). Consider the following problem (P ): θ( f) = min g( f,r) ( f,r) S Let θ( f) be the optimal solution value to this problem attained at R = γ( f). Weshowhowtofind an 3-approximate solution to P. Specifically, we find a set of rate vectors for which the value of the objective function of P is ( f) 3θ( f). From this it follows that (f ) 3θ(f )=3g(f,R )=3u. Therefore (f ) is a 3-approximate solution for P 1. Thus if we knew f then this would imply a 3-approximate solution for P 1. We compute the desired 3-approximation step in two steps. In the first step we find an intermediate solution with total power χ( f) which is not necessarily feasible (the rate vector may not be schedulable without primary conflicts). We however show that the solution is a -approximate (infeasible) solution to P and that this solution can be modified to a feasible solution with total power ( f) such that ( f) 3 χ( f). Thus implying that the latter is a feasible 3-approximate solution for P.

6 A. Intermediate solution In this section, we describe an approximation algorithm to solve the minimum power problem that gets a solution that uses at most twice the amount of power that is used by the optimal solution. However this solution may not have any link schedules that are free of primary conflicts. We define an auxiliary set of minimum power problems, one for each node. The minimum power problem at node v is defined as follows. Let φ(v, f) = min c(e) β. R(e) P (e). Here node v s minimum power problem is solved independent of all other nodes in the network resulting in the optimal solution φ(v, f). For now we assume that this problem can be solved optimally for each node. Later on in Section VI-B we show how to do this. Let R v(e) denote the rate allocated to link e N(v) when the minimum power problem is solved for node v. Note that R v(e) is only defined if e N(v). Note that each link gets two rate allocation, from the optimal solution of the minimum power problem for each of the two nodes that are incident on the link. The overall power allocation algorithm MIN POWER shown below is used to select one rate value for each of the link and is shown later to yield a good solution to problem P : For each node v solve its min-power problem and determine the value of φ(v, f). Compute R v(e) for all e N(v). Set R (e) = max{r t(v) (e),r r(v) (e)}. ) Compute P (e) =N 0 W ( R (e) W 1. Output χ( f) = e E R (e) P (e) as an approximate solution. In the next theorem, we show that χ( f) is at most twice the optimal solution value for the problem P. Theorem 3: Algorithm MIN POWER computes a (infeasible) solution χ( f) for P that is at most θ( f). Proof: Let R (e) and P (e) represent the optimal rate and power allocation, for problem P,forthefixed f T. Since φ(v, f) is the optimal solution to the optimization problem at node v, for problem P,forthefixed f T, we have R (e) P (e) φ(v, f) v V. Summing these equations over all v V, we get R (e) P (e) φ(v, f). v Note that v R (e) P (e) = e E R (e) P (e) =θ( f). Therefore θ( f) φ(v, f). However by construction φ(v, f) >χ( f). Therefore, θ( f) φ(v, f) χ( f) and the result follows. Note that the above proof just uses the fact that each link gets rate allocation from exactly two node problems. It does not even require any convexity conditions. However, convexity is needed for solving the individual nodes optimal allocation problem. We now deal with this problem of determining the value of φ(v, f) for all nodes v in the network. B. Solving the Node Problem The problem that each node has to solve in order to determine the value of φ(v, f) is the following: min ) ( R(e) W 1 N 0 W R(e) R(e) β. This is a convex optimization problem and can be solved by writing the Karush-Kuhn-Tucker conditions for optimality and solving the problem. The derivative of the objective function with respect to R(e) is not necessarily invertible in closed form. However, it is easy to solve the problem numerically. Since our main objective is to solve the end-to-end flow problem, we approximate the objective function in order to solve the problem in closed form. This approximation is based on the following observation. Consider the expression R(e) R(e) W W. Note that is the spectral efficiency of the system in bits/hertz. In most practical systems the spectral efficiency is less than one. This is especially true in multi-hop systems where the nodes are not particularly sophisticated. Therefore we expand the expression in a Taylors series and take the first three terms in the series. We write R(e) W 1+ln R(e) W + 1 ln R (e) W. We substitute this approximation in the objective function of the optimization problem to get N 0 ln + N ln 0 Wβ R(e).

7 Ignoring the first term which is independent of R(e) and the constant factors in the second term, we solve the following optimization problem: min R(e) R(e) β. Associating a dual multiplier λ>0 with the constraint, the optimality conditions are λ R (e) =0 We can now solve for R(e). R(e) = 1 β e N(v).. Substituting this value of R(e) in the objective function, we get that each φ(v, f) equals N 0 ln + N 0 ln. βw As mentioned earlier the solution of the individual nodes problems is used by algorithm MIN POWER to construct a solution to problem P. In the next section, we outline how to schedule the given solution. C. Power Control and Scheduling In the previous sections we showed how to compute a (not necessarily feasible) solution for P with total power χ( f) such that it is a -approximate solution. In this section we show how to modify this solution to yield a feasible solution to P with total power ( f) 3 χ( f). Assume that the current solution (with total power χ( f)) has been determined for β =1. There may be no feasible solution with β =1since this is only a necessary condition. An alternate approach is to be conservative and set β = 3 and solve MIN POWER. This solution can be scheduled without any primary conflict as shown in Lemma. The approach that we take is the following: We solve MIN POWER assuming β =1to get the solution with total power χ( f). LetR (e) be the rate assigned to edge e by this solution. Next we choose the length of the time slot τ such that all values of R (e)τ are integral for all e E. Note that the value of R (e) might be irrational since it involves. However, choosing τ sufficiently small will suffice in practice. We now introduce R (e)τ edges between t(e) and r(e) and compute an edge coloring of this graph. Let be the maximum degree of the graph and ξ be the number of colors used to color the graph. Note that ξ 3. (See Shannon [11] for a proof of this result). Thus 3 ξ 1. We scale the values of R (e) in order to make the schedule feasible. Note that R (e) is linear in β, therefore we can set R(e) =R (e) ξ and compute the corresponding power. Taking this approach guarantees us that the maximum amount of scaling that we have to do is by a factor of 3. If we take the more conservative approach of setting β = 3 ensures that the scaling factor is 3.Wenow summarize the joint power control and scheduling algorithm POW SCHED as follows: Solve MIN POWER using β =1. Form the scheduling graph and determine the number of colors ξ. Compute the ratio ξ. Scale all the rates by this ratio to obtain the rates for the new solution. Output ( f) as the total power used by this solution. Theorem 4: The algorithm POW SCHED obtains a solution to P that is not more than a factor of three from the optimal solution. Proof: If there are ξ colors in the solution to the problem, we assume that system operates in a cycle with period ξ. In each time slot, all links having the same color are scheduled for transmission. Since the coloring ensures that there are no primary conflict, all these transmissions will be successful. For β =1, let the (not necessarily feasible) -approximate solution for P (obtained in the previous section) have total power χ( f). Here we scale down all the rate values for this solution by at most a factor of 3 to yield a new (feasible) solution with total power ( f). As shown earlier in the previous section that the total power is proportional to v R(e). Thus the new solution may use at most 3 more power. Hence ( f) 3 χ( f). Together with the proof of Theorem 3 this yields ( f) 3 χ( f) 3 φ(v, f) 3θ( f). Thus establishing the desired result. VII. ROUTING END-TO-END FLOWS In this section we develop an efficient 3-approximation algorithm for the generalized routing, scheduling and power control problem. Theorem 5: There exists an efficient 3-approximation algorithm for the generalized routing, scheduling and power control problem. Proof: Recall that in Section VI we fix af = ˆf T, and solve the following optimization problem for the fixed f: θ( ˆf) = min g( ˆf,R)

8 ( ˆf,R) S(β). This is just the minimum power problem for the given set of link flows ˆf. From Theorem 4, we know that we can find a solution to this problem of total power ( ˆf) where ( ˆf) 3 φ(v, ˆf) 3θ( ˆf). Note that θ(f )=g(f,r ). Therefore when f = f is used to setup the same optimization problem. (f ) 3 φ(v, f ) 3g(f,R ). Of course, we cannot evaluate this problem since we do not know the value of f. However, since we know φ(v, f) in closed form, we now formulate the following optimization problem. γ = min φ(v, f) f T. Let f be an optimal solution to this problem. We show later that we can compute f efficiently. Note that by the definition of f φ(v, f) φ(v, f ). Thus ( f) 3 φ(v, f) 3 φ(v, f ) 3g(f,R ). implying that by using f as the flow vector for routing the s to t flow, and by using the results developed in Section VI we get the desired 3-approximation algorithm. In order to simplify some notation we let A = N 0 ln and B = N 0 ln Wβ. We now show how to solve f in Theorem 5 efficiently. Therefore we solve the following optimization problem (see Section VI): min A f(e) + B f(e) f(e) = f(e) v s, t. e N in(v) e N out(v) e N out(s) f(e) =T. This is a convex (non-separable) optimization problem over linear constraints. Also, note that this is a Quadratically Constrained Quadratic Programmming problem [9], [14], since the objective function can be written as (Xf) T (Xf)+y f, for a matrix X, a vector y and the flow vector f (whose components are f(e)). This also shows that the above is also a Semidefinite Programming Problem [14]. Thus the above problem can be solved efficiently in polynomial time [9], [14]. This establishes that our overall algorithm runs in polynomial time. The interior point algorithms that are used to solve convex Quadratic Programmming or Semidefinite Programming problems although have a worst case polynomial running time tend to ignore the underlying (network) structure of the problem. We therefore, present an alternative practical approach to solving the above problem which may have worst case exponential complexity, but is efficient in practice. This approach is based on the Frank-Wolfe method [7]. This is an iterative method which solves the non-linear problem via a sequence of linear programs. Let the link flow vector, f k, where f k (e) is the flow on link e, represent the solution at the end of iteration k of the algorithm. We now linearize the objective function by expanding it in a Taylor s Series about the current solution and using only the linear term. Let and H = A w k (v) = 4N 0 ln Wβ f(e) + B f(e) f k (e). Therefore, the objective function in iteration k is e E [ ( ) ] H f(e). f(e) f=f k 1 We now solve this linear programming problem over the constraint set T.Letg k+1 denote the optimal solution vector to this problem. We now determine f k+1 such that it minimizes the objective function in the interval [f k,g k+1 ].Thisisan optimization problem in a single variable. This method is particularly well suited for our problem because: With the linear objective function, the flow problem between the source and the destination in iteration k reduces to solving a shortest path problem between the source and the destination with cost of on link e. H f(e) = A + w k(t(e)) + w k (r(e)), Since the objective function is quadratic, determining f k+1 given f k and g k+1 can be done in closed form. Therefore, the method just boils down to solving a sequence of shortest path problems. We outline this algorithm more formally below:

9 Set k =1and f 1 (e) =0 e. For k =1,,... ( ) Compute w(v) = N0 ln f k (e) Wβ v Compute l(e) = + w k (t(v)) + w k (r(v)). N0 ln Compute the shortest path P between s and t using link length l(e). Set g k (e) =T f k (e) e P and g k (e) = f k (e) otherwise. Solve for λ = min λ [0,1] H(f k + λg k ). Set f k+1 (e) =f k (e)+λ g k (e) end For e E Fig Illustrative Example Feasible Solution Lower Bound 10 The for loop is repeated until the value of f k and f k+1 are close to each other. In most practical cases the algorithm converges after very few iterations. A. Deriving a Feasible Solution Once we have this flow from the approximation algorithm, it is easy to construct a feasible solution to the original optimization problem as follows: Using the flows given by the Frank-Wolfe method as the link flows use the result in Section VI to derive the optimum rates for all the links. Given these link rates, we can formulate the link coloring problem to get the schedule for these links in order to derive the feasible rates for all the links. Once the rate and the flow on the links are known, it is easy to get the power that is needed at the links. We will elaborate more on this procedure in the full version of the paper. VIII. MULTIPLE SOURCE DESTINATION PAIRS In the case where there are multiple source destination pairs, then all the results in the paper carry through directly. The only difference is that when we use the Frank-Wolfe method, we have to solve one shortest path problem for each source-destination pair. The rest of the algorithm as well as the approximation results remain the same as before. Therefore, we can now compute the routing, scheduling and power control for the case where different sources have to send traffic to different destinations. IX. ILLUSTRATIVE EXAMPLE We now show the execution of the algorithm on an illustrative example. The example is shown in Figure. The number next to the links represents the channel gain on the link scaled by a factor of For example, the channel gain on link 1 is We assume that N 0 = mw/hz and the total bandwidth W =1MHz. The source is node Total Power (mw) Desired Rate between 1 and 5 (Kb/s) Fig. 3. Rate versus Power 1 and the destination is node 5. Figure 3 shows the ratepower curve for the example in Figure. The x-axis of the graph is the rate from node 1 to 4 and the y-axis is the minimum power required to achieve this rate. In the graph we show both the lower bound on the power requirement and the power requirement of a feasible solution. The solution shows interesting characteristics. If the desired rate is below about 60 kbps, then the optimal path is and if the desired rate is above 60 Kbps then part of the rate is achieved on the path 1 5 and part of the rate is achieved along This example illustrates two points. First it shows the performance of the algorithm and second it illustrates the complexity of the joint routing-scheduling-power control problem. X. CONCLUSIONS In this paper we studied the joint routing, scheduling and power control problem for multi-hop wireless networks. To the best of our knowledge this is the first attempt at determining the most energy efficient way of communicating data at a given rate, over point to point links in a multi-hop wireless network. The problem is a complex interplay of its three individual components. We formulated the overall problem as an opti-

10 mization problem with non-linear objective function and nonlinear constraints. We designed an efficient 3-approximation algorithm for the optimization problem, which yields not only a lower bound on the total energy consumption, but also computes a feasible solution to the joint routing, scheduling and power control problem. REFERENCES [1] Baker, D.J., Wieselthier, J.E., and Ephremides, A., A Distributed Algorithm for Scheduling the Activation of Links in a Self-Organizing Mobile Radio Networks, IEEE Int. Conference Communications, 198, pp. F6.1-F6.5. [] Bambos, N., Toward Power-sensitive Network Architectures in Wireless Communications: Concepts, Issues and Design Aspects, IEEE Personal Communications, 5(3), pp , Elements of Information Theory, John-Wiley and Sons, Inc., [3] Cover, T., and Thomas, J.A., Elements of Information Theory, John- Wiley and Sons, Inc., [4] Cruz, R.L. and Santhanam, A.V., Optimal Routing, Link Scheduling and Power Control in Multi-hop Wireless Networks, IEEE INFOCOM 003. [5] ElBatt, T., and Ephremides, A., Joint Scheduling and Power Control for Wireless Ad-hoc Networks, IEEE INFOCOM 00. [6] Hajek, B., and Sasaki, G., Link Scheduling in Polynomial Time, IEEE Transactions on Information Theory, 34(5), pp , [7] Minoux, M., Mathematical Programming: Theory and Algorithms, John- Wiley and Sons, Inc., [8] Neely, M.J., Modiano, E. and Rohrs, C.E., Dynamic Power Allocation and Routing for Time Varying Wireless Networks, IEEE INFOCOM 003. [9] Nesterov, Y. and Nemirovskii, A., Interior-Point Polynomial Algorithms in Convex Programming, SIAM Studies in Applied Mathematics,SIAM, [10] Post,M.J, Kershenbaum, A.S. and Sarachik, P.E., Scheduling Multihop CDMA Networks in the Presence of Secondary Conflicts, Algorithmica, 1989, pp [11] Shannon, C.E., A Theorem on Coloring the Lines of a Network, J. of Math. Physics, 8, pp , [1] Wieselthier, J.E., Barnhart, C.M., and Ephremides, A., A Neural Network Approach to Routing Without Interference in Multihop Networks, IEEE Transactions on Communications, [13] Xiao, M., Johansson, M., and Boyd, S.P., Simultaneous Routing and Resource Allocation via Dual Decomposition, boyd/srra.html [14] Vandenberghe L. and Boyd. S. Semidefnite programming, SIAM Review, Vol 38, pp 49-95, XI. APPENDIX Lemma 6: Let P (e, j) > 0 represent the transmission power for link e in some time slot j when link e is active. In any minimum power schedule P (e, j) is independent of j. Proof: Consider two time slots j and k when edge e is active. Let P (e, j) and P (e, k) P (e, j) be the transmission power in these two time slots. We want to show that by setting the powers to some P (e) = P (e, j) = P (e, k) we can satisfy all the constraints while reducing the power consumption. This follows directly from the fact that the rate is a concave function of the power. More formally Let R(e, j) and R(e, k) represent the rates on link e in time slots j and k with transmission powers P (e, j) and P (e, k) respectively. Then and R(e, j) =Wτ log ( 1+ R(e, k) =Wτ log ( 1+ P (e, j) N 0 W ) ) P (e, k). N 0 W The power consumed over the two time slots is 0.5(P (e, j)+p (e, k)) and the average rate over the two time slots is 0.5(R(e, j) + R(e, k)). By Jensen s inequality (since the rate is a concave function of the power), it is easy to show that transmitting at the average power 0.5(P (e, j)+p (e, k)) in both time slots j and k results in a mean rate greater than 0.5(R(e, j)+r(e, k)). This implies that it is possible to achieve the same mean rate using less power.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

NEW applications of wireless multi-hop networks, such

NEW applications of wireless multi-hop networks, such 870 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Delay Aware Link Scheduling for Multi-Hop TDMA Wireless Networks Petar Djukic, Member, IEEE, and Shahrokh Valaee, Senior Member, IEEE

More information

WIRELESS communication channels have the characteristic

WIRELESS communication channels have the characteristic 512 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 3, MARCH 2009 Energy-Efficient Decentralized Cooperative Routing in Wireless Networks Ritesh Madan, Member, IEEE, Neelesh B. Mehta, Senior Member,

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

Characterizing Achievable Rates in Multi-hop Wireless Networks: The Joint Routing and Scheduling Problem

Characterizing Achievable Rates in Multi-hop Wireless Networks: The Joint Routing and Scheduling Problem Characterizing Achievable Rates in Multi-hop Wireless Networks: The Joint Routing and Scheduling roblem Murali Kodialam Thyaga Nandagopal Bell Laboratories, Lucent Technologies 0 Crawfords Corner Road

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks

On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks 1 Technion - Computer Science Department - Tehnical Report CS-01-0 - 01 On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks Abstract Software Defined Networking

More information

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan

More information

Impact Of Interference On Multi-hop Wireless Network Performance

Impact Of Interference On Multi-hop Wireless Network Performance Impact Of Interference On Multi-hop Wireless Network Performance Kamal Jain Jitendra Padhye Venkata N. Padmanabhan Lili Qiu Microsoft Research One Microsoft Way, Redmond, WA 98052. {kamalj, padhye, padmanab,

More information

On the Interaction and Competition among Internet Service Providers

On the Interaction and Competition among Internet Service Providers On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach

Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach Patrik Björklund, Peter Värbrand and Di Yuan Department of Science and Technology, Linköping University SE-601

More information

Power Control is Not Required for Wireless Networks in the Linear Regime

Power Control is Not Required for Wireless Networks in the Linear Regime Power Control is Not Required for Wireless Networks in the Linear Regime Božidar Radunović, Jean-Yves Le Boudec School of Computer and Communication Sciences EPFL, Lausanne CH-1015, Switzerland Email:

More information

Frequency Assignment in Mobile Phone Systems

Frequency Assignment in Mobile Phone Systems Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany MARTIN GRÖTSCHEL Frequency Assignment in Mobile Phone Systems ZIB-Report 00-58 (Dezember 2000) Frequency Assignment

More information

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS 1. Bandwidth: The bandwidth of a communication link, or in general any system, was loosely defined as the width of

More information

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,

More information

A Practical Scheme for Wireless Network Operation

A Practical Scheme for Wireless Network Operation A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Performance Evaluation of The Split Transmission in Multihop Wireless Networks Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

17.3.1 Follow the Perturbed Leader

17.3.1 Follow the Perturbed Leader CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.

More information

Path Selection Methods for Localized Quality of Service Routing

Path Selection Methods for Localized Quality of Service Routing Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

Algorithms for Interference Sensing in Optical CDMA Networks

Algorithms for Interference Sensing in Optical CDMA Networks Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern

More information

Offline sorting buffers on Line

Offline sorting buffers on Line Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341 Multinode Cooperative Communications in Wireless Networks Ahmed K. Sadek, Student Member, IEEE, Weifeng Su, Member, IEEE, and K.

More information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Lawrence Ong School of Electrical Engineering and Computer Science, The University of Newcastle, Australia Email: lawrence.ong@cantab.net

More information

The Gravity Model: Derivation and Calibration

The Gravity Model: Derivation and Calibration The Gravity Model: Derivation and Calibration Philip A. Viton October 28, 2014 Philip A. Viton CRP/CE 5700 () Gravity Model October 28, 2014 1 / 66 Introduction We turn now to the Gravity Model of trip

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

Adaptive Linear Programming Decoding

Adaptive Linear Programming Decoding Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006

More information

Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing

Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing Pietro Belotti, Antonio Capone, Giuliana Carello, Federico Malucelli Tepper School of Business, Carnegie Mellon University, Pittsburgh

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

How To Find An Optimal Search Protocol For An Oblivious Cell

How To Find An Optimal Search Protocol For An Oblivious Cell The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,

More information

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Jasper Goseling IRCTR/CWPC, WMC Group Delft University of Technology The Netherlands j.goseling@tudelft.nl Abstract Jos H. Weber

More information

Duality in General Programs. Ryan Tibshirani Convex Optimization 10-725/36-725

Duality in General Programs. Ryan Tibshirani Convex Optimization 10-725/36-725 Duality in General Programs Ryan Tibshirani Convex Optimization 10-725/36-725 1 Last time: duality in linear programs Given c R n, A R m n, b R m, G R r n, h R r : min x R n c T x max u R m, v R r b T

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks*

Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Abhishek Kashyap, Anuj Rawat and Mark Shayman Department of Electrical and Computer Engineering, University

More information

A New Method for Estimating Maximum Power Transfer and Voltage Stability Margins to Mitigate the Risk of Voltage Collapse

A New Method for Estimating Maximum Power Transfer and Voltage Stability Margins to Mitigate the Risk of Voltage Collapse A New Method for Estimating Maximum Power Transfer and Voltage Stability Margins to Mitigate the Risk of Voltage Collapse Bernie Lesieutre Dan Molzahn University of Wisconsin-Madison PSERC Webinar, October

More information

Optimization of IP Load-Balanced Routing for Hose Model

Optimization of IP Load-Balanced Routing for Hose Model 2009 21st IEEE International Conference on Tools with Artificial Intelligence Optimization of IP Load-Balanced Routing for Hose Model Invited Paper Eiji Oki Ayako Iwaki The University of Electro-Communications,

More information

Channel Assignment for Maximum Throughput in Multi-Channel Access Point Networks

Channel Assignment for Maximum Throughput in Multi-Channel Access Point Networks Channel Assignment for Maximum Throughput in Multi-Channel Access Point Networks Xiang Luo, Raj Iyengar and Koushik Kar Abstract We consider the uplink channel assignment problem in a multi-channel access

More information

Optimizing the Placement of Integration Points in Multi-hop Wireless Networks

Optimizing the Placement of Integration Points in Multi-hop Wireless Networks Optimizing the Placement of Integration Points in Multi-hop Wireless Networks Lili Qiu, Ranveer Chandra, Kamal Jain, and Mohammad Mahdian ABSTRACT Efficient integration of a multi-hop wireless network

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

MAC Scheduling for High Throughput Underwater Acoustic Networks

MAC Scheduling for High Throughput Underwater Acoustic Networks MAC Scheduling for High Throughput Underwater Acoustic Networks Yang Guan Chien-Chung Shen Department of Computer and Information Sciences University of Delaware, Newark, DE, USA {yguan,cshen}@cis.udel.edu

More information

Nonlinear Programming Methods.S2 Quadratic Programming

Nonlinear Programming Methods.S2 Quadratic Programming Nonlinear Programming Methods.S2 Quadratic Programming Operations Research Models and Methods Paul A. Jensen and Jonathan F. Bard A linearly constrained optimization problem with a quadratic objective

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Weakly Secure Network Coding

Weakly Secure Network Coding Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Balancing by MPLS in Differentiated Services Networks Riikka Susitaival, Jorma Virtamo, and Samuli Aalto Networking Laboratory, Helsinki University of Technology P.O.Box 3000, FIN-02015 HUT, Finland

More information

An Optimization Approach for Cooperative Communication in Ad Hoc Networks

An Optimization Approach for Cooperative Communication in Ad Hoc Networks An Optimization Approach for Cooperative Communication in Ad Hoc Networks Carlos A.S. Oliveira and Panos M. Pardalos University of Florida Abstract. Mobile ad hoc networks (MANETs) are a useful organizational

More information

Multi-Dimensional OFDMA Scheduling in a Wireless Network with Relay Nodes

Multi-Dimensional OFDMA Scheduling in a Wireless Network with Relay Nodes Multi-Dimensional OFDMA Scheduling in a Wireless Network with Relay Nodes Reuven Cohen Guy Grebla Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel Abstract LTE-advanced

More information

Duality of linear conic problems

Duality of linear conic problems Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least

More information

A THEORETICAL FRAMEWORK FOR OPTIMAL COOPERATIVE NETWORKING IN MULTIRADIO MULTICHANNEL WIRELESS NETWORKS

A THEORETICAL FRAMEWORK FOR OPTIMAL COOPERATIVE NETWORKING IN MULTIRADIO MULTICHANNEL WIRELESS NETWORKS USER C OOPERATION IN WIRELESS N ETWORKS A THEORETICAL FRAMEWORK FOR OPTIMAL COOPERATIVE NETWORKING IN MULTIRADIO MULTICHANNEL WIRELESS NETWORKS YU CHENG, HONGKUN LI, AND PENG-JUN WAN, ILLINOIS INSTITUTE

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

MIMO CHANNEL CAPACITY

MIMO CHANNEL CAPACITY MIMO CHANNEL CAPACITY Ochi Laboratory Nguyen Dang Khoa (D1) 1 Contents Introduction Review of information theory Fixed MIMO channel Fading MIMO channel Summary and Conclusions 2 1. Introduction The use

More information

Algebra I Credit Recovery

Algebra I Credit Recovery Algebra I Credit Recovery COURSE DESCRIPTION: The purpose of this course is to allow the student to gain mastery in working with and evaluating mathematical expressions, equations, graphs, and other topics,

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Notes from Week 1: Algorithms for sequential prediction

Notes from Week 1: Algorithms for sequential prediction CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking

More information

A Simple Model for Calculating SIP Signalling Flows in 3GPP IP Multimedia Subsystems

A Simple Model for Calculating SIP Signalling Flows in 3GPP IP Multimedia Subsystems A Simple Model for Calculating SIP Signalling Flows in 3GPP IP Multimedia Subsystems Alexander A. Kist and Richard J. Harris RMIT University, BOX 2476V, Victoria 3001, Australia {kist,richard}@catt.rmit.edu.au

More information

Throughput Optimal Distributed Power Control of Stochastic Wireless Networks Yufang Xi, Student Member, IEEE, and Edmund M.

Throughput Optimal Distributed Power Control of Stochastic Wireless Networks Yufang Xi, Student Member, IEEE, and Edmund M. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Throughput Optimal Distributed Power Control of Stochastic Wireless Networks Yufang Xi, Student Member, IEEE, and Edmund M. Yeh, Member, IEEE Abstract The maximum

More information

Capacity Limits of MIMO Channels

Capacity Limits of MIMO Channels Tutorial and 4G Systems Capacity Limits of MIMO Channels Markku Juntti Contents 1. Introduction. Review of information theory 3. Fixed MIMO channels 4. Fading MIMO channels 5. Summary and Conclusions References

More information

Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks

Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks Rahul Urgaonkar IBM TJ Watson Research Center Yorktown Heights, NY 10598 Email: rurgaon@us.ibm.com Prithwish Basu and Saikat Guha

More information

By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

By choosing to view this document, you agree to all provisions of the copyright laws protecting it. This material is posted here with permission of the IEEE Such permission of the IEEE does not in any way imply IEEE endorsement of any of Helsinki University of Technology's products or services Internal

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

THE problems of characterizing the fundamental limits

THE problems of characterizing the fundamental limits Beamforming and Aligned Interference Neutralization Achieve the Degrees of Freedom Region of the 2 2 2 MIMO Interference Network (Invited Paper) Chinmay S. Vaze and Mahesh K. Varanasi Abstract We study

More information

Factoring & Primality

Factoring & Primality Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Call Admission Control and Routing in Integrated Service Networks Using Reinforcement Learning

Call Admission Control and Routing in Integrated Service Networks Using Reinforcement Learning Call Admission Control and Routing in Integrated Service Networks Using Reinforcement Learning Peter Marbach LIDS MIT, Room 5-07 Cambridge, MA, 09 email: marbach@mit.edu Oliver Mihatsch Siemens AG Corporate

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are

More information

Competitive Analysis of On line Randomized Call Control in Cellular Networks

Competitive Analysis of On line Randomized Call Control in Cellular Networks Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising

More information

Joint Optimization of Routing and Radio Configuration in Fixed Wireless Networks

Joint Optimization of Routing and Radio Configuration in Fixed Wireless Networks Joint Optimization of Routing and Radio Configuration in Fixed Wireless Networks David Coudert, Napoleão Nepomuceno, Hervé Rivano Projet Mascotte, I3S(CNRS-UNSA) INRIA Réunion Mascotte, March 2009 MASCOTTE

More information

The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT

The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT The Effect of Network Cabling on Bit Error Rate Performance By Paul Kish NORDX/CDT Table of Contents Introduction... 2 Probability of Causing Errors... 3 Noise Sources Contributing to Errors... 4 Bit Error

More information

Nonlinear Optimization: Algorithms 3: Interior-point methods

Nonlinear Optimization: Algorithms 3: Interior-point methods Nonlinear Optimization: Algorithms 3: Interior-point methods INSEAD, Spring 2006 Jean-Philippe Vert Ecole des Mines de Paris Jean-Philippe.Vert@mines.org Nonlinear optimization c 2006 Jean-Philippe Vert,

More information

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Thomas Lindh #1, Ibrahim Orhan #2 # School of Technology and Health, KTH Royal Institute of Technology Marinens vag 30,

More information

8.1 Min Degree Spanning Tree

8.1 Min Degree Spanning Tree CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree

More information

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,

More information

T = 1 f. Phase. Measure of relative position in time within a single period of a signal For a periodic signal f(t), phase is fractional part t p

T = 1 f. Phase. Measure of relative position in time within a single period of a signal For a periodic signal f(t), phase is fractional part t p Data Transmission Concepts and terminology Transmission terminology Transmission from transmitter to receiver goes over some transmission medium using electromagnetic waves Guided media. Waves are guided

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University E-mail:

More information

Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling

Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling Praveen K. Muthusamy, Koushik Kar, Sambit Sahu, Prashant Pradhan and Saswati Sarkar Rensselaer Polytechnic Institute

More information

Nonlinear Iterative Partial Least Squares Method

Nonlinear Iterative Partial Least Squares Method Numerical Methods for Determining Principal Component Analysis Abstract Factors Béchu, S., Richard-Plouet, M., Fernandez, V., Walton, J., and Fairley, N. (2016) Developments in numerical treatments for

More information

5.1 Bipartite Matching

5.1 Bipartite Matching CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson

More information

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,

More information

Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel

Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 2, FEBRUARY 2002 359 Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel Lizhong Zheng, Student

More information

Big Ideas in Mathematics

Big Ideas in Mathematics Big Ideas in Mathematics which are important to all mathematics learning. (Adapted from the NCTM Curriculum Focal Points, 2006) The Mathematics Big Ideas are organized using the PA Mathematics Standards

More information

Multiobjective Multicast Routing Algorithm

Multiobjective Multicast Routing Algorithm Multiobjective Multicast Routing Algorithm Jorge Crichigno, Benjamín Barán P. O. Box 9 - National University of Asunción Asunción Paraguay. Tel/Fax: (+9-) 89 {jcrichigno, bbaran}@cnc.una.py http://www.una.py

More information