Abstract
We study the problem of distributed scheduling in wireless networks, where each node makes individual scheduling decisions based on heterogeneously delayed network state information (NSI). This leads to inconsistency in the views of the network across nodes, which, coupled with interference, makes it challenging to schedule for high throughputs.
We characterize the network throughput region for this setup, and develop optimal scheduling policies to achieve the same. Our scheduling policies have a threshold-based structure and, moreover, require the nodes to use only the “smallest critical subset” of the available delayed NSI to make decisions. In addition, using Markov chain mixing techniques, we quantify the impact of delayed NSI on the throughput region. This not only highlights the value of extra NSI for scheduling, but also characterizes the loss in throughput incurred by lower complexity scheduling policies which use homogeneously delayed NSI.
Notes
This assumption is to ensure that the system state Markov chain (defined in Sect. 3.2) is irreducible and aperiodic, by suitably augmenting the state space.
These assumptions are to ensure that the system state Markov chain (defined in Sect. 3.2) is irreducible and aperiodic, by suitably augmenting the state space.
References
Reddy, A., Banerjee, S., Gopalan, A., Shakkottai, S., Ying, L.: Wireless scheduling with heterogeneously delayed network-state information. In: Proc. Ann. Allerton Conf. Communication, Control and Computing (2010)
Tassiulas, L., Ephremides, A.: Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks. IEEE Trans. Autom. Control, 1936–1948 (1992)
Andrews, M., Kumaran, K., Ramanan, K., Stolyar, A.L., Vijayakumar, R., Whiting, P.: CDMA data QoS scheduling on the forward link with variable channel conditions. Bell Labs Tech. Memo (2000)
Tassiulas, L., Ephremides, A.: Dynamic server allocation to parallel queues with randomly varying connectivity. IEEE Trans. Inf. Theory 39, 466–478 (1993)
Shakkottai, S., Stolyar, A.: Scheduling for multiple flows sharing a time-varying channel: the exponential rule. Ann. Math. Stat. 207, 185–202 (2001)
Stolyar, A.: Maximizing queueing network utility subject to stability: greedy primal–dual algorithm. Queueing Syst. 50, 401–457 (2005)
Eryilmaz, A., Srikant, R., Perkins, J.: Stable scheduling policies for fading wireless channels. IEEE/ACM Trans. Netw. 13, 411–424 (2005)
Neely, M.J., Modiano, E., Rohrs, C.E.: Power and server allocation in a multi-beam satellite with time varying channels. Proc. IEEE INFOCOM 3, 1451–1460 (2002)
Neely, M.J., Modiano, E., Li, C.: Fairness and optimal stochastic control for heterogeneous networks. Proc. IEEE INFOCOM 3, 1723–1734 (2005)
Lin, X., Rasool, S.: Constant-time distributed scheduling policies for ad HocWireless networks. In: Proc. Conf. on Decision and Control (2006)
Joo, C., Shroff, N.: Performance of random access scheduling schemes in multihop wireless networks. Proc. IEEE INFOCOM (2007)
Rajagopalan, S., Shin, J., Shah, D.: Network adiabatic theorem: an efficient randomized protocol for contention resolution. In: Proc. Ann. ACM SIGMETRICS Conf. (2009)
Jiang, L., Walrand, J.: A distributed CSMA algorithm for throughput and utility maximization in wireless networks. In: Proc. Ann. Allerton Conf. Communication, Control and Computing (2008)
Liu, J., Yi, Y., Proutiere, A., Chiang, M., Poor, H.V.: Maximizing utility via random access without message passing. Microsoft Research Technical Report (2008)
Rajagopalan, S., Shah, D., Shin, J.: Network adiabatic theorem: an efficient randomized protocol for contention resolution. In: Proc. Ann. ACM SIGMETRICS Conf., pp. 133–144 (2009)
Ni, J., Tan, B., Srikant, R.: Q-CSMA: Queue-length based CSMA/CA algorithms for achieving maximum throughput and low delay in wireless networks. In: Proceedings of IEEE INFOCOM Mini-Conference (2010)
Ahmad, S., Mingyan, L., Javidi, T., Zhao, Q., Krishnamachari, B.: Optimality of myopic sensing in multichannel opportunistic access. IEEE Trans. Inf. Theory 55, 4040–4050 (2009)
Guha, S., Munagala, K., Sarkar, S.: Performance guarantees through partial information based control in multichannel wireless networks (2006). http://www.seas.upenn.edu/~swati/report.pdf
Chang, N., Liu, M.: Optimal channel probing and transmission scheduling for opportunistic spectrum access. In: ACM Int. Conf. on Mobile Computing and Networking (MobiCom) (2007)
Gopalan, A., Caramanis, C., Shakkottai, S.: On wireless scheduling with partial channel state information. IEEE Trans. Inf. Theory (2011)
Chaporkar, P., Proutiere, A., Asnani, H., Karandikar, A.: Scheduling with limited information in wireless systems. In: ACM Mobihoc, pp. 75–84 (2009)
Pantelidou, A., Ephremides, A., Tits, A.: Joint scheduling and routing for ad-hoc networks under channel state uncertainty. In: Intl. Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt), pp. 1–8 (2007)
Kar, K., Luo, X., Sarkar, S.: Throughput-optimal scheduling in multichannel access point networks under infrequent channel measurements. In: Proceedings of IEEE INFOCOM (2007)
Chen, J., Berry, R.A., Honig, M.L.: Limited feedback schemes for downlink OFDMA based on sub-channel groups. IEEE J. Sel. Areas Commun. 26, 1451–1461 (2008)
Ouyang, M., Ying, L.: On scheduling in multi-channel wireless downlink networks with limited feedback. In: Proc. Ann. Allerton Conf. Communication, Control and Computing, pp. 455–469 (2009)
Ouyang, M., Ying, L.: On optimal feedback allocation in multichannel wireless downlinks. In: ACM Mobihoc (2010)
Ying, L., Shakkottai, S.: On throughput optimality with delayed network-state information. Technical report (2008)
Ying, L., Shakkottai, S.: Scheduling in mobile ad hoc networks with topology and channel-state uncertainty. In: Proc. IEEE INFOCOM, pp. 2347–2355 (2009)
Billingsley, P.: Probability and Measure. Wiley, New York (1994)
Asmussen, S.: Applied Probability and Queues. Springer, New York (2003)
Acknowledgements
This work was partially supported by NSF grants CNS-0721380, CNS-0831756, CNS-1017549, the DARPA ITMANET program, and DTRA grant HDTRA1-09-1-0055. We thank the anonymous reviewers for their valuable comments and suggestions.
Author information
Authors and Affiliations
Corresponding author
Additional information
An earlier version of this work has appeared in the Proceedings of the 48th Annual Allerton Conference on Communication, Control, and Computing, 2010 [1].
Appendix
Appendix
Proof of Lemma 4.1
First, assume that the arrival rates E[A[t]] are such that \(\tilde{\lambda} := (1 + \epsilon)E[\mathbf {A}[t]] \in \varLambda\) for some ϵ>0. Then, by the definition of the region Λ, it follows that we can construct a set of channel state dependent policies (i.e., f l ’s) and “time-share” over those policies to get a long-term service rate of \(\tilde{\lambda}\) (analogous to the proof of Theorem 1 in [3]). This, in turn, ensures that the network is stochastically stable.
Now for the other direction, given A[t] is supportable, by definition, there exists a scheduling algorithm \(\mathcal{F}\) which makes the network stable. Since the system state Markov chain \(\mathbf{Y}^{\mathcal{F}}[t]\) is positive recurrent, it exhibits a stationary distribution. Let us denote the scheduling decision under policy \(\mathcal{F}\) as \(S^{\mathcal{F}}(\mathbf{Y}[t])\). We will now construct a time-sharing scheduling policy \(\mathcal{F}_{s}\) that depends on the steady state distribution of queue lengths and channel states (denoted as π(y), y={q(0:τ max),c(0:τ max)}) under policy \(\mathcal{F}\). Let r(y)=Pr(q|c), computed using π(y).
At each time, when delayed channel state information C[t](0:τ max)=c, the policy \(\mathcal{F}_{s}\) probabilistically selects the scheduling decision \(S^{\mathcal{F}}(\mathbf{q},\mathbf{c})\) with probability r(y=(q,c)). We observe that the time-sharing policy \(\mathcal{F}_{s}\) allocates the same amount of service to each link as \(\mathcal{F}\). Since A[t] can be supported by the time sharing policy, we have that E[A[t]]∈Λ. □
Proof of Theorem 4.2
The proof is split into two parts. Part one proves the threshold property of optimal solution and part two shows that optimal solution depends only up on the critical set of NSI. In other words, part two shows that the optimizing solution is independent of extra channel state NSI available at each node other than the critical NSI. (Proof: Part 1) We first show the following threshold property for the optimal solution to the optimization problem defined in Eq. (3),
Let us assume that we partly know the optimal solution. In particular, we assume that we are given the entire \(\{F_{l}^{*}(\mathcal{P}_{l}(\mathbf{C}[t](0:\tau_{\max})))\}_{l\in \mathcal{L}}\) except \(F_{k}^{*}(\mathcal{P}_{k}(\mathbf{C}[t](0:\tau_{\max})))\) at two different values of NSI (\(\mathcal{P}_{k}(\mathbf{C}[t](0:\tau_{\max}))\) = {(C k [t]=c i ,r),(C k [t]=c j ,r)}) available at transmitter k.
To find \(F_{k}^{*}(C_{k}[t]=c_{i},\mathbf {r}), F_{k}^{*}(C_{k}[t]=c_{j},\mathbf {r})\), we can solve the optimization (3) with other variables being fixed to the optimal solution. Consider the function that needs to be optimized:
Expanding this, we can write this as
Note that \(\mathbf {z} \in \mathcal{ C}^{L\tau_{\max}}\) corresponds to one particular realization of channel states of the network for the past τ max slots. Since the variables in the above optimization are only F k (C k [t]=c i ,r) and F k (C k [t]=c j ,r), we ignore the terms in the summation that do not involve these variables (as they are constant and do not affect the arg max). Let A i denote the set \(\{\mathbf {z} : \mathbf {z} \in \mathcal{ C}^{L\tau_{\max}}, \mathcal{P}_{k}(\mathbf {z}) = (c_{i},\mathbf {r})\}\). The new function we now have is
From the above expression, we observe that the above optimization for finding two variables F k (c i ,r),F k (c j ,r) splits into two independent optimization problems. First, let us consider the function that needs to be optimized to get F k (c i ,r):
From the above equation, we observe that the optimization function is linear in the variable F k (c i ,r). Using the fact that channels are independent across links, we have the above function of the form Pr(C[t]=c i |r)(ac i F k (c i ,r)+b(1−F k (c i ,r))), where parameters a and b are independent of value of c i . Similarly, we can show that the function that needs to be optimized for variable F k (c j ,r) is of form ac j F k (c j ,r)+b(1−F k (c i ,r)). Thus, the optimal solution is of the form
The above solution implies that if c j ≥c i and \(F_{k}^{*}(c_{i},\mathbf {r}) = 1\), then \(F_{k}^{*}(c_{j},\mathbf {r}) = 1\). This proves the threshold nature of optimal solution.
(Proof: Part 2) Let us consider the original function that needs to be optimized (3)
Expanding the above expression, we have
First, observe that each variable in the above expression has a unique notation. In particular, a variable that is associated with link l and a particular value of channel state \(\mathbf {z} \in \mathcal{ C}^{L\tau_{\max}}\) is denoted by F l (z) and more specifically \(F_{l}(\mathcal{P}_{k}(\mathbf {z}))\). Consider a τ(≠τ 1(l)∀l) and let the set \(B(\tau) = \{ \mathbf {z} \in \mathcal{ C}^{L\tau_{\max}} : C_{1}[\tau] = c1 \, \mathrm{or} \, C_{1}[\tau] = c2 \}\) denote the set of variables whose optimal values are not known. In other words, assume that the optimal values of all the variables are known to us except those in set B.
We define the sets \(B1 = \{ \mathbf {z} \in \mathcal{ C}^{L\tau_{\max}} : C_{1}[\tau] = c1 \} \) and \(B2 = \{ \mathbf {z} \in \mathcal{ C}^{L\tau_{\max}} : C_{1}[\tau] = c2 \}\). The sets B1 and B2 satisfy B=B1∪B2. We now observe that the optimization functions that depend on variables in sets B1 and B2 are exactly identical up to a scaling factor. Therefore, the optimal solutions are also equal, and thus we have that optimal solution is independent of channel state information that is not critical NSI. □
Proof of Lemma 4.3
Consider the following Lyapunov function V[t], of the system state \(\mathbf{Y}^{\mathcal{F}}[t]\), as follows:
We thus have
where ΔQ l [t] is the difference Q l [t+1]−Q l [t]. Using the fact that arrivals and services are bounded in each time slot, we have
Using the queue update equation, we have
Since \((1+\epsilon) \mathbf {\lambda} \in \varLambda\), there exists \(\{\bar{\eta}(\mathbf{c})\}_{\mathbf{c}}\) such that
From the scheduling algorithm optimization, we also have that
Taking the expectation on both sides of inequality (6) over C[t−τ max], we have that
It now follows from the standard Foster–Lyapunov drift criterion [30] that the network is stochastically stable. □
Proof of Lemma 5.3
From Eq. (5), we have
Let us denote the summation \(\sum_{i = 1}^{M} c_{i} P_{.i}^{\tau_{1}} 1_{c_{i} \geq T_{2,l}^{*}}\) by f l (τ 1) and the summation \(\sum_{i = 1}^{M} P_{.i}^{\tau_{1}} 1_{c_{m} \geq T_{2,l}^{*}}\) by g m (τ 1). Thus, we have
Expanding the terms with γ l and (1−γ l ), we have
Using the triangle inequality, we have the following inequality,
By adding and subtracting the term \(f_{l}(\tau_{2}) \prod_{m \in I_{l}} g_{m}(\tau_{1})\), we have
Using the triangle inequality results in
Let the set I l be expressed as {m 1,m 2,m 3,…,m l }. By iterating the above idea of adding and subtracting terms on the second component of the above expression and using the triangle inequality, we have
Using the following upper bounds, |f l (τ 1)−f l (τ 2)|≤∑c i β(τ 1,τ 2), |g l (τ 1)−g l (τ 2)|≤Mβ(τ 1,τ 2) and |f l (τ 1)|≤∑c i , we have
where the last inequality follows from definition of γ=minγ l . □
Proof of Corollary 5.4
From Eq. (4), we have
It is sufficient to prove that \(\beta(\tau_{1}, \infty) \leq (1-M\delta)^{\tau_{1}} \) and \(\beta(\tau_{1}, \tau_{2}) \leq 2(1-M\delta)^{\tau_{1}}\) ∀τ 2≥τ 1. Consider the following difference:
Let us denote \({\min}_{u} P_{uj}^{\tau}\) by \(m_{j}^{\tau}\) and \(\max_{u} P_{uj}^{\tau}\) by \(M_{j}^{\tau}\). We now bound the above difference using \(m_{j}^{\tau}\) and \(M_{j}^{\tau}\), we have
By noticing that \(\sum_{u : P_{iu} < P_{ku}} (P_{iu} - P_{ku}) + \sum_{u : P_{iu} \geq P_{ku}} (P_{iu} - P_{ku}) = 0\), we have
where the last inequality follows from the definition of δ.
Using the definition of \(M_{j}^{\tau}\) and \(m_{j}^{\tau}\), we have that
Using the fact that \(m_{j}^{\tau}\) monotonically increases with τ, \(M_{j}^{\tau}\) monotonically decreases with τ, and both have a common limit π j , we have
Consider the following difference:
Using (7) in the above inequality, we have the desired corollary. □
Rights and permissions
About this article
Cite this article
Reddy, A.A., Banerjee, S., Gopalan, A. et al. On distributed scheduling with heterogeneously delayed network-state information. Queueing Syst 72, 193–218 (2012). https://doi.org/10.1007/s11134-012-9312-z
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11134-012-9312-z