Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks



Similar documents
On Adaboost and Optimal Betting Strategies

10.2 Systems of Linear Equations: Matrices

Sensitivity Analysis of Non-linear Performance with Probability Distortion

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

Math , Fall 2012: HW 1 Solutions

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

Web Appendices of Selling to Overcon dent Consumers

A Data Placement Strategy in Scientific Cloud Workflows

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

Firewall Design: Consistency, Completeness, and Compactness

Modelling and Resolving Software Dependencies

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

State of Louisiana Office of Information Technology. Change Management Plan

Web Appendices to Selling to Overcon dent Consumers

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

Unbalanced Power Flow Analysis in a Micro Grid

An Introduction to Event-triggered and Self-triggered Control

Search Advertising Based Promotion Strategies for Online Retailers

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES

Dynamic Network Security Deployment Under Partial Information

The most common model to support workforce management of telephone call centers is

Safety Stock or Excess Capacity: Trade-offs under Supply Risk

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection

Differentiability of Exponential Functions

Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik Trier, Germany

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Cost Efficient Datacenter Selection for Cloud Services

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014

Lecture L25-3D Rigid Body Kinematics

Option Pricing for Inventory Management and Control

Optimal Control Of Production Inventory Systems With Deteriorating Items And Dynamic Costs

HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014

Factoring Dickson polynomials over finite fields

CURRENCY OPTION PRICING II

How To Find Out How To Calculate Volume Of A Sphere

A Comparison of Performance Measures for Online Algorithms

Mathematics Review for Economists

A Universal Sensor Control Architecture Considering Robot Dynamics

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND

Introduction to Integration Part 1: Anti-Differentiation

Which Networks Are Least Susceptible to Cascading Failures?

BOSCH. CAN Specification. Version , Robert Bosch GmbH, Postfach , D Stuttgart

On Power Efficient Communication over Multi-hop Wireless Networks: Joint Routing, Scheduling and Power Control

Cross-Over Analysis Using T-Tests

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

How To Price Internet Access In A Broaban Service Charge On A Per Unit Basis

Net Neutrality, Network Capacity, and Innovation at the Edges

Enterprise Resource Planning

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH

Calibration of the broad band UV Radiometer

Optimal Energy Commitments with Storage and Intermittent Supply

The Quick Calculus Tutorial

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY

Tracking Control of a Class of Hamiltonian Mechanical Systems with Disturbances

View Synthesis by Image Mapping and Interpolation

zupdate: Updating Data Center Networks with Zero Loss

Exponential Functions: Differentiation and Integration. The Natural Exponential Function

Performance Analysis of Bandwidth Allocations for Multi-Services Mobile Wireless Cellular Networks *

How To Understand The Structure Of A Can (Can)

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud

Interference Mitigation Techniques for Spectral Capacity Enhancement in GSM Networks

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach

11 CHAPTER 11: FOOTINGS

The one-year non-life insurance risk

Answers to the Practice Problems for Test 2

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by,

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters

Inverse Trig Functions

A Tutorial on Cross-Layer Optimization in Wireless Networks

A New Evaluation Measure for Information Retrieval Systems

Digital barrier option contract with exponential random time

Rate control for communication networks: shadow prices, proportional fairness and stability

2.3 Convex Constrained Optimization Problems

On the Interaction and Competition among Internet Service Providers

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams

Supporting Adaptive Workflows in Advanced Application Environments

A Theory of Exchange Rates and the Term Structure of Interest Rates

Ch 10. Arithmetic Average Options and Asian Opitons

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Lost Sales

15.2. First-Order Linear Differential Equations. First-Order Linear Differential Equations Bernoulli Equations Applications

20. Product rule, Quotient rule

Product Differentiation for Software-as-a-Service Providers

RUNESTONE, an International Student Collaboration Project

Here the units used are radians and sin x = sin(x radians). Recall that sin x and cos x are defined and continuous everywhere and

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence

Transcription:

Low-Complexity an Distribute Energy inimization in ulti-hop Wireless Networks Longbi Lin, Xiaojun Lin, an Ness B. Shroff Center for Wireless Systems an Applications (CWSA) School of Electrical an Computer Engineering, Purue University West Lafayette, IN 47907, USA {llin, linx, shroff}@ecn.purue.eu Abstract In this work, we stuy the problem of minimizing the total power consumption in a multi-hop wireless network subject to a given offere loa. It is well-known that the total power consumption of multi-hop wireless networks can be substantially reuce by jointly optimizing power control, link scheuling, an routing. However, the known optimal crosslayer solution to this problem is centralize, an with high computational complexity. In this paper, we evelop a lowcomplexity an istribute algorithm that is provably powerefficient. In particular, uner the noe exclusive interference moel, we can show that the total power consumption of our algorithm is at most twice as large as the power consumption of the optimal (but centralize an complex) algorithm. Our algorithm is not only the first such istribute solution with provable performance boun, but its power-efficiency ratio is also tighter than that of another sub-optimal centralize algorithm in the literature. Inex Terms Energy Aware Routing, Duality, athematical Programming/Optimization, Cross-Layer Optimization, Simulations I. INTRODUCTION There has been significant recent interest in eveloping control protocols for multi-hop wireless networks. any applications can benefit from the eployment of these networks. For instance, sensors can form multi-hop wireless networks for such applications as habitat monitoring [], an the management of sewer overflow events []. Vehicles can form multihop wireless networks to exchange safety messages an traffic information [3]. Wireless LAN evices can form multi-hop mesh networks to provie wireless broaban access [4]. A key issue in eveloping control protocols for multihop wireless networks is to reuce the energy or power consumption. This is obviously an important issue for batterypowere networks since the power consumption often limits the lifetime of the network. Even for networks with access to power sources, the transmission power of the communication links may still nee to be properly controlle, e.g., ue to health or regulatory concerns. In this work, we are intereste in the problem of minimizing the total power consumption of a multi-hop wireless network, subject to a given offere loa. It is well-known that the total power consumption of multi-hop wireless networks can be substantially reuce by jointly optimizing power control, link scheuling, an routing. However, known optimal solutions require centralize computation an high computational complexity. In this paper, we propose a new low-complexity an istribute solution to this problem uner a wiely-use interference moel, calle the noe-exclusive interference moel. Using this moel, the work in [5] evelope a centralize solution that yiele a 3-approximation ratio (the resultant power consumption is within a factor of 3 from the optimal power consumption). In contrast, in this paper, we will obtain a ( + ε)-approximation algorithm that is fully istribute, where ε > 0 is an arbitrarily small constant. To the best of our knowlege, our propose algorithm is the first istribute solution in the literature with a provable performance boun. Our solution approach is inspire by the recent progress in using imperfect scheuling algorithms to evelop istribute cross-layer congestion control an scheuling algorithms in multi-hop wireless networks. We first formulate the energy minimization problem into a special form that naturally leas to a istribute solution. We then map the solution to corresponing components of the cross-layer control protocols, an rigorously establish the power-efficiency of the resulting algorithm. Our work is also relate to the stuy of energy-aware routing protocols for minimizing energy consumption an extening network lifetime [6] [0]. These works assume that the system capacity is battery-limite instea of interference-limite an therefore o not consier scheuling constraints. In contrast, our work explicitly consiers scheuling, jointly with power control an routing. The intellectual contribution of this work is summarize as follows: We evelop a low-complexity an istribute joint routing, power control, an scheuling algorithm for multihop wireless networks with provable power-efficiency ratio. Further, our algorithm can guarantee a better powerefficiency level than some existing centralize algorithms. Our solution cannot be obtaine by extening the known optimal solution in the literature [], []. Instea, we evelop an optimization approach to the energy minimization problem that naturally leas to istribute solutions. We also evelop rigorous techniques to ientify the

convergence properties an quantify the power-efficiency of the resulte control protocol. The rest of this paper is organize as follows: in Section II, we present the system moel an formulate the energy minimization problem. In Section III, we present our algorithm an iscuss its implications. In Section IV, we iscuss our main result on the convergence properties an the power-efficiency of the ual algorithm. Numerical results are provie in Section V. Concluing remarks are presente in Section VI. II. PROBLE FORULATION We moel a wireless multi-hop network by a irecte graph G(V, E), where V is the set of vertices representing the noes, an E is the set of eges representing the communication links. We use N o (v) an N i (v) to enote the sets of outgoing an incoming links of noe v, respectively. Their union N(v) forms the set of all links incient on noe v. The system is time-slotte. We aopt the following noeexclusive interference moel that is use to characterize FH- CDA an UWB system with perfect orthogonal spreaing coes an low power-spectrum ensity. Uner this moel, a noe can only receive from or transmit to at most one noe at any time-slot m. Further, each link is power-controlle. That is, if noe-exclusiveness is satisfie, we assume that the possible ata rate of link e is a result of its power assignment, p e. We use h( ) to enote the power consumption of supporting ata rate of. It is assume that h( ) is a nonecreasing, convex function satisfying h(0) = 0. An example of h( ) is the power-rate relationship in an Aitive White Gaussian Noise (AWGN) channel. Other interference moels can be incorporate in this formulation, an we will iscuss this in Section VI. Each packet may take multiple hops to be elivere from source to estination. Let T v enote the long-term average ata rate of the flow that nees to be supporte from source noe v to estination noe. We use D to enote the set of estinations. The joint energy minimization problem is now formulate as follows: (*) min f, R lim subject to h( (m)), () m= e E R(m) satisfies noe-exclusiveness, m, f e = lim (m), e, () m= fe fe T v 0,, an v, (3) where the quantity fe can be interprete as the average amount of ata rate on link e allocate for estination. The constraints in () require that the long-term average ata rate, etermine by the power allocation, shoul be able to support the total average ata rate ( f e ) on each link. The constraints in (3) require that the total outgoing flow of a noe shoul be able to support the total incoming an locally generate flow, for all estinations. Note that we use as a shorthan notation for all noes belonging to D, the set of estinations. We will refer to the above problem as Problem ( ). III. SOLUTION ETHODOLOGY A. Approximating the Energy inimization Problem The optimal solutions evelope in [], [] attempt to solve Problem ( ). However, their solutions contain a scheuling component with high computational complexity. In orer to compute at which power an at what time each link e shoul be activate, these solutions nee to solve a complex global optimization problem in each time-slot. In this paper, in orer to obtain a low-complexity an istribute solution, we take a ifferent approach. We first approximate ( ) by another optimization problem that is easier to solve. The following Lemma [5] provies the first step in this irection. Lemma : For all time-slot m when link e is activate, the instantaneous ata rate (m) is inepenent of m in any power-optimal scheme. It is worth noting that (m) = hols when link e is activate. As a result, lim m= (m) is equal to the prouct of an the frequency that link e is activate. Therefore, by (), the objective function of Problem ( ) can now be written as f e h( ), f e e E where is the fraction of time-slots that link e is activate. Further, using the results from low-complexity scheuling [3], we have Fact : In the optimal solution to ( ), we must have f e, v V. Fact : Uner the noe-exclusive interference moel, if f e η, v V, where η > 0 is an arbitrarily small number, then a maximal scheule can be compute such that each link is activate for f e fraction of time-slots [4], [5]. We will iscuss more about the role of maximal scheuling in our solution in Section III-D. Base on these two facts, in the rest of the paper, we will replace the scheuling constraints by f e β, v V. (4)

Problem ( ) can then be reformulate as the following problem: (A) min f e f, R h( ), (5) e E subject to (3) an (4) ( f, R) X, where X = {( f, R) : 0, f e 0, e, }. The formulation in (A) is not only easier to solve, but it also prouces natural bouns for proving the power efficiency ratio of our solution. Inee, solving (A) with β = provies a lower boun on the minimum power of ( ), while β = η provies an upper boun. Remark: This problem appears in the formulation of [5]. However, our solution is ifferent from this point on. As we mentione earlier, their solution is a centralize one with an approximation ratio of 3, while our solution is a istribute one with a better approximation ratio. B. Hanling the Non-Convexity In Problem (A), the objective function an constraints (4) are non-convex. Problems of this type are consiere to be ifficult in general. To overcome this ifficulty, the following change of variable is performe: t e = f e, e E. The physical meaning of t e is the fraction of time-slots that link e is activate. It can also be interprete as the loa on link e. The latter interpretation seems more appropriate when we eal with t e (m) for each time-slot in the ual solution. Note that t e = 0 implies that fe = 0 for any estination an any link e: if a link is not activate (or the loa is zero), it cannot support any non-zero ata rate. The long-term average power consumption Θ from link e can therefore be efine as { 0, Θ( f te = 0, e, t e ) = t e h( f (6) e t e ), t e > 0. Using the above notation, Problem (A) can be transforme into (B) min f, t subject to Θ( f e, t e ), (7) e E t e β, v V, (8) f e f e T v 0,, an v, (9) ( f, t) Y, where Y = {( f, t) : fe 0, e, ; 0 t e, f e at e, e, for some a 0}. Remark: The conition f e at e, for some a 0, in the efinition of Y is require to guarantee that the optimal solution from Problem (B) can be transforme to the optimal solution of Problem (A). Without this conition, Problem (B) can be trivially solve by setting t = 0 an f large enough for the flow constraint. Such a solution cannot be transforme to an optimal solution of Problem (A), since the instantaneous ata rate R must be finite. To show that there is no uality gap in solving Problem (B), we nee the following Lemma: Lemma : Let θ(f, t) = { 0, t = 0, th( f t ), t > 0. (0) If h( ) is a convex function on R +, then θ(f, t) is also convex on C = a [0,+ ) {(f, t) : 0 f at, t 0}. In our online technical report [6], we have inclue a proof of Lemma. Remark: A function of the form g(f, t) = th( f t ), where t > 0 is known as the perspective of function h(f). As shown in [7, p89], the perspective operation is one of the transformations that preserve convexity. The transformation in the above Lemma inclues the t = 0 case, an therefore can be viewe as a slightly generalize version of the perspective operation. Our proof in [6] takes a ifferent approach than [7]. Note that θ is non-convex over the entire R + R +. However, the convexity of θ over C is enough for our purpose, since ( f, t) Y in Problem (B). Due to Lemma, the objective function Θ( f, t) of (B) is convex, an the entire problem is a convex program. We can then use the uality approach to solve the problem. C. Distribute Algorithm Base on Lagrange Duality To use the uality approach to solve the above problem, we first form the Lagrangian: L( f, t, µ, q) µ v = Θ( f e, t e ) + e E v V qv fe v, t e β fe T v, where µ 0 an q 0 are the Lagrange multipliers, an f e = {fe } D. For ease of notation, we efine q = 0, for all. By rearranging the orer of summation, the above equation can be transforme into the following: = e E L( f, t, µ, q) c e ( f e, t e ) β v µ v + v, (q vt v ),

where c e ( f e, t e ) = Θ( f e, t e ) + (µ x(e) + µ r(e) )t e (q x(e) q r(e) )f e, () an x(e) an r(e) are the transmission noe an reception noe of link e, respectively. The ual objective function is = min D( µ, q) ( f, t) Y = e E [ L( f, t, µ, q), min c e ( f e, t e ) ( f e,t e) Y e ] β v µ v + v, (q vt v ), () where Y e enotes the constraint set on link e, namely Y e = {( f e, t e ) : 0 fe H, ; 0 t e ; fe at e, for some a 0}. (3) To ensure convergence, we have ae fe H, where H is a large constant to be etermine later. See the proof of Theorem 4 (in Appenix) for etails. The minimization of the Lagrangian can now be ecompose into a minimization on each link. Note that all the information neee in minimizing c e ( f e, t e ) is local to link e. The ual optimization problem is (C) max D( µ, q). (4) µ 0, q 0 As mentione before, the convexity of Θ( f, t) can be inferre from Lemma. Base on this, the following Theorem [6] establishes the relationship between the primal problem (B) an the ual problem (C) above. Due to space constraint, we state it without proof. Theorem 3: (Strong Duality) Problem (B) is feasible an its optimal value Θ is finite. Further, there is no uality gap: Θ can be foun by solving its ual optimization problem. The next step is to solve the ual problem in a istribute fashion. We can show that D( µ, q) is convex an its subgraient is given by D µ v = D q v = t e β, f e fe T v. We can then use the following subgraient metho to solve the ual problem. Distribute Energy inimization Algorithm At each iteration m, ) At link e, the ata rate f e an the link assignment t e are etermine by: ( f e (m), t e (m)) = argmin c e ( f e, t e, m) ( f e,t e) Y e = argmin ( f e,t e) Y e [ Θ( f e, t e ) + (µ x(e) (m) + µ r(e) (m))t e (q x(e) (m) q r(e) (m))f e ]. (5) ) At noe v, the ual variables are upate by: µ v (m + ) = µ v(m) + α m t e (m) β qv(m + ) = q v(m) α m f e (m) fe (m) T v + + (6). (7) Remark: At each iteration m, the ata rate an scheule are chosen to minimize the total cost c e, given the current implicit costs ( µ, q). To maximize the ual objective function, the ual variables are upate accoring to the subgraient ascent proceure in (6) an (7), where {α m } are the stepsizes. In the above algorithm, we use the same stepsize for µ an f at each iteration. This is simply for ease of notation: the stepsizes can be ifferent for each ual variable. Since the primal cost function is not strictly convex, the ual function may not be ifferentiable. The stepsizes nee to be chosen carefully to guarantee the convergence of the ual variables. We will iscuss this issue in the Section IV. The above exercise of using Lagrange uality is stanar. Nonetheless, there are some questions that are not answere by the above algorithm alone. One of them is how the algorithm maps to ifferent protocol components. We will now stuy this problem. D. apping to Network Protocol Components To ecie the routing an scheuling, each link solves (5) by minimizing c e ( f e, t e, m). Note that there are three components in c e ( f e, t e, m): The term Θ( f e, t e ) is the power cost, i.e., the power consumption of supporting an average ata rate of f e while link e being activate for t e fraction of time. The term (µ x(e) (m) + µ r(e) (m))t e is the scheuling cost. We will show that t e (m) will either be 0 or in orer for link e to minimize c e ( f e, t e ). If t e (m) is chosen to be, then µ x(e) (m + ) µ x(e) (m) from (6): scheuling the transmission on link e gives rise to increase (or at least the same) scheuling costs on the

transmission/reception noes. If t e (m) is chosen to be 0, then µ x(e) (m + ) µ x(e) (m): an ile link gives the system more flexibility in scheuling other links, which leas to a potential ecrease in the scheuling costs on the transmission/reception noes. The term (q x(e) (m) q r(e) (m))f e is the utility of supporting the total ata rate on link e. The term q v can be interprete as an approximation of the scale version of the queue length at noe v for estination if constant stepsizes are use [4], [8]. As in (7), if f e (m) > 0, it helps to reuce the workloa at the transmission noe, but a to the workloa at the reception noe. The following transformation leas to a better unerstaning of the minimization of c e ( f e, t e ): f e (m) = R e(m)t e (m), (8) where R e(m) is the instantaneous ata rate allocate on link e for estination, an f e (m) is the resultant average ata rate when transmitting for t e (m) fraction of the time. Substitute the above equation into c e ( f e, t e, m), we have (all time inex roppe for ease of notation): where l e ( ) is efine as l e ( ) = h( c e ( f e, t e ) = t e l e ( ), (9) R e) + (µ x(e) + µ r(e) ) [ ] (qx(e) q r(e) ). (0) Since t e 0, to minimize (9), we shoul first minimize l e ( ) as a function of. Note that function h( ) takes as input parameter the sum of the ata rates allocate for all the estinations on this link. In other wors, from the viewpoint of power consumption, it is inifferent which estination the ata rate is allocate for, as long as the total ata rate is the same. As a result, the minimum of l e ( ) is attaine when all the ata rates are allocate to the estination with the maximum positive backlog ifference. Let ˆ = argmax(qx(e) q r(e) ), () then R ˆ > 0 if (q ˆ x(e) q ˆ r(e) ) > 0, an R e = 0 for all ˆ. With this observation, the minimization of l e ( ) is relatively simple. For example, if h(x) = e x, an max (q x(e) qr(e) ) > 0, then R ˆ e = [log(q ˆ x(e) q ˆ r(e) )] +, an Re = 0 for all other estination. Now that R e has been chosen to minimize l e ( R e ) in (0), the next step is to etermine the value of t e over the interval [0, ] to minimize c e ( f e, t e ) = t e l e ( R e ). Clearly, the optimal t e value is ˆt e = {, if min Re l e ( R e ) 0, 0, if min Re l e ( R e ) > 0. () Remark: There are two possible scenarios where ˆt e = 0 (no loa is assigne in this time-slot): All backlog ifferences (qx(e) q r(e) ) are negative, which means the utility oes not increase by transporting ata to next hop on this link for any estination. Although some backlog ifferences (qx(e) q r(e) ) are positive, as in (0), the utility of transporting ata to next hop is not large enough to outweigh the importance of saving more energy (the h( ) term) an/or the nee to gain more flexibility in scheuling (the (µ x(e) + µ r(e) ) term). As a result, optimal l e ( R e ) is non-negative, an no loa is assigne to this link. To summarize, the minimization of c e ( f e, t e ) on each link naturally translates into the following protocol components: ) Routing: Choose only the flow ˆ with maximum positive backlog ifference (cf. ()). This is the flow that shoul receive service. ) Power control: Choose R e to minimize l e ( R e ). This is the power link e shoul use. 3) Link assignment: Choose t e to minimize t e l e ( R e ) in such a way that t e takes its maximum value if the optimal l e ( R e ) is less than or equal to 0; an 0 otherwise. This etermines the amount of time link e shoul be on. 4) aximal Scheuling: As mentione before, given the fraction of up-time, or loa, on each link, a scheuling component is neee to etermine the exact time-slots link e shoul be on. In other wors, the link assignment from previous step may have scheuling conflicts, an therefore cannot be use as a transmission scheule as it is. A scheuling component can resolve such conflicts by elaying the transmission by a certain number of time-slots. Clearly, given the link assignment t(m), the elay can be ifferent for ifferent links. With the noeexclusive interference moel, by choosing β = η, it can be shown that a scheuling policy base on maximal matching can stabilize the system (i.e., the elay of transmission mentione above is boune) [4], [5], [9] []. aximal scheules such as this can be implemente in a istribute fashion. We refer reaers to [3] for more etails on the istribute implementation of maximal scheules. As we have seen thus far, the uality approach exploits the problem structure an ecomposes the primal problem into sub-problems on each link that are much simpler. In aition, some of the quantities prouce/monitore by this algorithm actually help network engineering. For instance, the Lagrange multiplier qv can also be interprete as the shaow price of the corresponing constraint. If a small change occurs in the amount of supporte traffic from noe v to noe, qv measures the sensitivity of the optimal power consumption with respect to this perturbation. In a ifferent networking setting where the network has some control over the traffic matrix T, information such as q can be use as guielines to optimize power consumption.

IV. PERFORANCE ANALYSIS In this section, first we are intereste in the following question: Uner what conition o the ual variables in the Distribute Energy inimization algorithm converge? Furthermore, as we have seen in Section III, there is no guarantee that ( f(m), t(m)) will converge, even if the ual variables converge. For example, t e (m) is either 0 or from the istribute ual algorithm. A natural question to ask then is the following: In what sense is the primal solution optimal? The two Theorems below answer both of the above questions from two ifferent perspectives. A. Convergence Result with Constant Stepsizes The following theorem establishes the stability an the optimality of the propose ual algorithm. Theorem 4: (Stability an Optimality) Let the stepsizes in the Distribute Energy inimization algorithm be constant, i.e., α m = h, for all m. Let Φ be the set of ( µ, q) that maximizes D( µ, q), an (( µ, q), Φ) = min ( µ, q ) Φ ( µ, q) ( µ, q ). Given any ε > 0, there exists some h 0 > 0 such that, for any h h 0 an any initial implicit costs ( µ 0, q 0 ), there exists a time 0 such that for all m > 0, (( µ(m), q(m)), Φ) < ε, (3) an lim sup m m m Θ( f e (τ), t e (τ)) < Θ + ε. (4) τ= e E The proof of Theorem 4 is inclue in the Appenix. The above Theorem shows that, when stepsizes are small, the ual variables eventually converge to within a small neighborhoo of the optimal ual solution. Further, the power consumption from the istribute algorithm is asymptotically optimal: although the primal variables ( f(m), t(m)) may not converge, by using ( f(m), t(m)) for each time-slot m, the long-term average of the resultant power consumption is arbitrarily close to the optimal power consumption. B. Optimality of Primal Variables As shown in Theorem 4, with constant stepsizes, the ual variables eventually converge to within a small neighborhoo of the optimal ual solution. When appropriate iminishing stepsizes are use in the ual algorithm, the following Theorem shows that the entire sequence of the ual variables converges to one point. In this case, we also obtain a ifferent interpretation of the primal optimality. Theorem 5: (Primal Optimality with Diminishing Stepsizes) (a) Let the stepsizes {α m } in the Distribute Energy inimization algorithm satisfy the following conitions: αm < +, α m = +. (5) m= m= Then for any nonnegative starting point ( µ 0, q 0 ), the ynamics of the Distribute Energy inimization algorithm converges to the optimal value of Problem (B): lim m ( µ, q ), (6) lim m Θ, (7) where ( µ, q ) is a maximum point of D( µ, q). (b) Let the stepsizes {α m } be chosen as α m = κ m + ρ, (8) where κ an ρ are some positive scalars (note that the above efinition of {α m } satisfies the conitions (5)). If the longterm average of the vector ( f(m), t(m)) converges, i.e., lim f(m) = f, m= lim t(m) = t, (9) m= then the time-average version of ( f(m), t(m)) is the optimal solution to Problem (B): e E Θ( f e, t e) = Θ. The proof of Theorem 5 is inclue in our online technical report [6]. Remark: In the Distribute Energy inimization algorithm, t e (m), for example, can only be 0 or. From this perspective, our solution carries the same flavor as some of the relate work [], [4], namely, in the optimal solution, the resource, be it power or fraction of up-time, is use to the maximum extent, if the link is activate for the current time-slot. However, one woul expect the optimal solution of t e to Problem (B) to be a number anywhere from 0 to β for most of the links in a typical setting (cf. (8)). Theorem 5 reconciles the ifference between these two viewpoints. Although ( f(m), t(m)) is not a continuous mapping from the unerlying converging implicit costs (ual variables ( µ, q)), as long as the long-term average of primal variables ( f(m), t(m)) converges, the limit is an optimal solution to the primal problem. C. Power-Efficiency Ratio Setting β = or β = η in (4) gives necessary or sufficient conitions for scheulability, in terms of stabilizing the overall queueing system [4], [3]. From the necessary conition of β =, it is evient that the maximum loss in throughput uner the noe exclusive interference moel is η. This is the throughput loss ratio in approximating ( ) using Problem (B) with β = η. To erive the approximation ratio of our algorithm, the throughput loss nees to be translate into power loss. We apply the same first orer approximation of the rate-power function as in [5]. ore specifically, in an AWGN channel, the total power consumption can be approximate as B e e t e, where B e is a flow-relate constant inepenent of t e. Let ( f, t) be the optimal solution to Problem (B) with β =. It is evient that ( f, t +ε ), where ε is a small positive constant, is a feasible solution to Problem (B) with β = η. This feasible solution results in a power consumption that is at most (+ε)

TABLE I THE TWO FLOWS SUPPORTED BY THE NETWORK source estination ata rate paths flow 7 50 kbps -7, --7 flow 3 6 500 kbps 3--6, 3-4-5-6 3 4 Total Power (mw)..8.6.4. 0.8 0.6 0.4 Distribute Algorithm Offline Computation 0. 0 000 4000 6000 8000 0000 000 Time (secon) 7 6 5 Power consumption from istribute algorithm an offline computa- Fig.. tion Fig.. Network topology that of the optimal value with β =. Since the optimal value of Problem (B) with β = is a lower boun on the minimum power from ( ), we conclue that the power-efficiency ratio of our algorithm is upper-boune by ( + ε). V. NUERICAL RESULTS In this illustrative example, we consier a 7-noe network, whose topology is epicte in Figure. The power-rate function is of the following form: [ = W log + σ ] ep e, N 0 W where W =.0 Hz is the available banwith, σ e =.6 0 3 is the channel gain of link e, N 0 =.6 0 8 mw/hz is the noise spectral ensity, p e is the transmission power, an is the resultant instantaneous ata rate of link e. This network supports two flows, as shown in Table I. The noe-exclusive interference moel is consiere, an β = (0.5 0 4 ) in Problem (A). The length of each timeslot is secon. The results reporte in this section are the average over a moving time winow of length 0 secons. To show that the joint energy minimization algorithm can aapt to variations in the input parameters, we apply the following changes in the system setting. At time t = 4000s, the channel gain σ (,7) of the irect link between noe an noe 7 is ecrease from.6 0 3 to 0.4 0 3. At time t = 8000s, the ata rate of flow (from noe 3 to noe 6) is reuce from 500 kbps to 50 kbps. For each setting, offline computation is carrie out to fin the optimal value of Problem (A), which is given by the ashe line in Figure. The power consumption from the propose algorithm is shown as the soli line in the same figure. This simulation result shows that the Distribute Energy inimization algorithm is capable of computing the optimal solution to Problem (A) in a istribute manner, an Average Data Rate (kbps) Fig. 3. 450 400 350 300 50 00 50 00 50 Link (,7): flow Link (,): flow Link (3,): flow Link (3,4): flow 0 0 000 4000 6000 8000 0000 000 Time (secon) Average ata rates for ifferent flows on four links automatically tracking the optimal operating point once the system parameters change. Figure 3 shows the average ata rates f e for ifferent flows on four links. We now take a closer look at the routing of the flows. In the initial state, flow concentrates on the minimum energy path, namely, link (, 7). At t = 4000s, the channel gain σ (,7) reuces by 75%, an part of flow is shifte to path 7. Since the scheuling capacity of noe is saturate, a larger percentage of flow is then route through path 3 4 5 6. At t = 8000s, the traffic that the network has to support between noe 3 an noe 6 reuces (flow is reuce to 50 kbps). As a consequence, part of the scheuling capacity of noe is free, an more of flow takes path 7 to reuce the overall power consumption. The above example shows that the interaction between routing, scheuling, an power control is relatively complex even in a wireless network of small size. The correct way to eal with such interaction is ifficult to summarize into general approaches such as minimum energy approach or loa balancing approach. In our Distribute Energy inimization algorithm, as shown in Figure an Figure 3, low-complexity

an istribute operation on each link accomplishes this joint optimization even in networks with non-stationarity. VI. CONCLUSION In this paper, we propose a joint power control, link scheuling, an routing algorithm to minimize the power consumption in multi-hop wireless networks. The known crosslayer solution to this problem is centralize, an with high computational complexity. In contrast, our algorithm is istribute, an with low computational complexity. We establish the power efficiency ratio of our istribute solution, an show that it is provably tighter than the power efficiency ratio of a centralize solution in the literature. We map our solution to corresponing components of the cross-layer control protocols, an iscuss the implication of our result on network protocol esign. The stability an optimality of our solution is verifie via simulations. In this work, we focus on the well-stuie noe exclusive interference moel. In a more general interference moel, we can efine Γ e to be the set of links that interfere with link e. (The noe-exclusive moel can be viewe as a special case with Γ e = N(x(e)) N(r(e)).) Let ω e enote the maximum number of links that can be scheule simultaneously in Γ e, an ωmax = max e ω e. It can be shown that a istribute maximal scheule can stabilize the system while the throughput is reuce by at most a factor of /ωmax. In this case, the left han sie of the scheuling constraint (8) in our problem formulation nee to be moifie accoringly [9] []. Nonetheless, the general methoology presente in this paper can be carrie through to this type of interference moel. APPENDIX Proof of Theorem 4: The proof technique here is similar to []. We first show the bouneness of the subgraient of the ual objective function. In (3), we choose H V max v T v, where V is the number of noes in the network. Let Ȳ enote the Cartesian prouct of all Y e in (3). It is clear that Ȳ Y, where Y is efine in Problem (B). Note that the introuction of H oes not change the solution. The optimal solution ( f, t ) to Problem (B) is in Ȳ for the following reason: Θ is a non-ecreasing function of fe, an therefore any ( f, t) with fe > H for some an e is clearly suboptimal even if all the traffic is route through link e. So the solution generate from the Distribute Energy inimization algorithm coincies with the optimal solution to Problem (B). The benefit from enforcing such an upper boun on fe is that the subgraient of the ual objective function is then boune. Given the subgraient of the ual objective function is boune, it can be shown [4] that, given any ε > 0, there exists some h > 0 such that, for any h h an any initial implicit costs ( µ 0, q 0 ), there exists a time 0 such that (3) hols for all m > 0. Therefore, as time inex m increases, ( µ(m), q(m)) converges to within a small neighborhoo of the set of the maximizer of D( µ, q) if the constant stepsize is chosen to be small enough. This implies that the sequence {( µ(m), q(m))} m is boune. To show (4), we consier the following Lyapunov function: V ( µ(m), q(m)) = [q v(m)] + µ v(m). v, The subgraient of D( µ, q) at time-slot m can be written as µ v (m) = t e (m) β, qv(m) = f e (m) v fe (m) T v. Using the above notation, the one-step rift of the Lyapunov function can be calculate as follows: V ( µ(m + ), q(m + )) V ( µ(m), q(m)) = { [ (µ v (m) + h µ v (m)) +] } µ v(m) v + { [(q v(m) + h qv(m) ) ] + [ q v (m) ] } v, (from (6) an (7)) { } [µ v (m) + h µ v (m)] µ v(m) v + { [q v (m) + h qv(m) ] [ q v (m) ] } h v v, µ v (m) µ v (m) + h v, q v(m) q v(m) + h W, where W is a constant large enough to guarantee the last inequality. It is possible to choose such a constant since the subgraient of D( µ, q) is boune. Aing h e E Θ( f e (m), t e (m)) to both sies of the above formula, we have V ( µ(m + ), q(m + )) V ( µ(m), q(m)) +h e E Θ( f e (m), t e (m)) h [ Θ( f e (m), t e (m)) + e E v + v, qv(m) q v(m) + h W = hd( µ(m), q(m)) + h W (from () an (5)) hd + h W = hθ + h W, µ v (m) µ v (m) where D is the maximum ual value, which is also equal to the minimum power Θ from the primal problem.

Summing the above inequality over m =,,...,, an iviing both sies by, we have V ( µ( + ), q( + )) V ( µ(), q()) + h Θ( f e (m), t e (m)) m= e E hθ + h W. (30) Note that all V ( ) is boune since the sequence {( µ(m), q(m))} m is boune. For any given ε > 0, the first term on the LHS of (30) can be boune by ε/ for large enough: Θ( f e (m), t e (m)) Θ + hw + ε. m= e E For any given ε > 0, there exist some h > 0 such that hw < ε/ for all h < h. Uner this conition, the following is evient: lim sup Θ( f e (m), t e (m)) < Θ + ε. m= e E Let h 0 = min(h, h ), an Theorem 4 follows. REFERENCES [] Intel Research Laboratory at Berkeley, Habitat monitoring on great uck islan, 00, available on http://www.greatuckislan.net/. [] T. P. Ruggaber an J. W. Talley, Detection an control of combine sewer overflow events using embee sensor network technology, in Worl Water Congress, Anchorage, Alaska, ay 005. [3] J. Luo an J.-P. Hubaux, A survey of inter-vehicle communication, EPFL, Lausanne, Switzerlan, Tech. Rep., 004. [4] I. F. Akyiliz, X. Wang, an W. Wang, Wireless mesh networks: a survey, Computer Networks, vol. 47, no. 4, pp. 445 487, 005. [5] R. Bhatia an. Koialam, On power efficient communication over multi-hop wireless networks: Joint routing, scheuling an power control, in IEEE INFOCO 04, Hong Kong, ar. 004. [6] K. Kar,. Koialam, T. V. Lakshman, an L. Tassiulas, Routing for network capacity maximization in energy-constraine a-hoc networks, IEEE INFOCO 03, 003. [7] Q. Li, J. A. Aslam, an D. Rus, Online power-aware routing in wireless a-hoc networks, in Proc. the Seventh Annual International Conference on obile Computing an Networking (AC obicom 0), 00, pp. 97 07. [8] L. Lin, N. B. Shroff, an R. Srikant, Energy-aware routing in sensor networks: A large systems approach, in the Thir Annual Conference on Wireless On eman Network Systems an Services (WONS), Les enuires, France, Jan. 006. [9] C.-K. Toh, aximum battery life routing to support ubiquitous mobile computing in wireless a hoc networks, IEEE communications agazine, vol. 39, no. 6, pp. 38 47, June 00. [0] Y. Xue, Y. Cui, an K. Nahrstet, A utility-base istribute maximum lifetime routing algorithm for wireless networks, in QSHINE, Los Alamitos, CA, USA, 005. [] R. L. Cruz an A. V. Santhanam, Optimal Routing, Link Scheuling an Power Control in ulti-hop Wireless Networks, in Proceeings of IEEE INFOCO, San Francisco, April 003. []. J. Neely, Energy Optimal Control for Time Varying Wireless Networks, IEEE Transactions on Information Theory, vol. 5, no., pp. 95 934, July 006. [3] X. Lin, N. B. Shroff, an R. Srikant, A Tutorial on Cross-Layer Optimization in Wireless Networks, IEEE Journal on Selecte Areas in Communications, vol. 4, no. 8, pp. 45 463, Aug. 006. [4] X. Lin an N. B. Shroff, The Impact of Imperfect Scheuling on Cross- Layer Rate Control in ultihop Wireless Networks, in Proceeings of IEEE INFOCO, iami, FL, arch 005. [5], The Impact of Imperfect Scheuling on Cross-Layer Congestion Control in Wireless Networks, IEEE/AC Transactions on Networking, vol. 4, no., pp. 30 35, 006. [6] L. Lin, X. Lin, an N. B. Shroff, Low-complexity an istribute energy minimization in multi-hop wireless networks, Purue University, Tech. Rep., 006, available on http://web.ics.purue.eu/ llin/paper/ tech06.pf. [7] S. Boy an L. Vanenberghe, Convex Optimization. New York, NY, USA: Cambrige University Press, 004. [8] X. Lin an N. B. Shroff, Joint Rate Control an Scheuling in ultihop Wireless Networks, in Proceeings of the IEEE Conference on Decision an Control, Paraise Islan, Bahamas, December 004. [9] P. Chaporkar, K. Kar, an S. Sarkar, Throughput Guarantees in aximal Scheuling in Wireless Networks, in Proceeings of 43 Annual Allerton Conference on Communication, Control an Computing, onticello, IL, September 005. [0], Achieving Queue Length Stability Through aximal Scheuling in Wireless Networks, in Proceeings of Information Theory an Applications Inaugural Workshop, University of California, San Diego, February 006. [] X. Wu an R. Srikant, Bouns on the Capacity Region of ultihop Wireless Networks Uner Distribute Greey Scheuling, in Proceeings of IEEE INFOCO, Barcelona, Spain, April 006. [] X. Wu, R. Srikant, an J. R. Perkins, Queue-Length Stability of aximal Greey Scheules in Wireless Network, in Proceeings of Information Theory an Applications Inaugural Workshop, University of California, San Diego, February 006. [3] B. Hajek an G. Sasaki, Link Scheuling in Polynomial Time, IEEE Transactions on Information Theory, vol. 34, no. 5, pp. 90 97, September 988. [4] D. Bertsekas, A. Neic, an A. E. Ozaglar, Convex Analysis an Optimization. Nashua, NH: Athena Scientific, 003.