• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

A distributed CSMA algorithm for throughput and utility maximization in wireless networks. (2010)

by L Jiang, J Walrand
Venue:IEEE/ACM Trans. Netw.,
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 181
Next 10 →

Network Adiabatic Theorem: An Efficient Randomized Protocol for Contention Resolution

by Shreevatsa Rajagopalan, Devavrat Shah, Jinwoo Shin
"... The popularity of Aloha(-like) algorithms for resolution of contention between multiple entities accessing common resources is due to their extreme simplicity and distributed nature. Example applications of such algorithms include Ethernet and recently emerging wireless multi-access networks. Despit ..."
Abstract - Cited by 88 (10 self) - Add to MetaCart
The popularity of Aloha(-like) algorithms for resolution of contention between multiple entities accessing common resources is due to their extreme simplicity and distributed nature. Example applications of such algorithms include Ethernet and recently emerging wireless multi-access networks. Despite a long and exciting history of more than four decades, the question of designing an algorithm that is essentially as simple and distributed as Aloha while being efficient has remained unresolved. In this paper, we resolve this question successfully for a network of queues where contention is modeled through independent-set constraints over the network graph. The work by Tassiulas and Ephremides (1992) suggests that an algorithm that schedules queues so that the summation of “weight ” of scheduled queues is maximized, subject to constraints, is efficient. However, implementing such an algorithm using Aloha-like mechanism has remained a mystery. We design such an algorithm building upon a Metropolis-Hastings sampling mechanism along with selection of“weight” as an appropriate function of the queue-size. The key ingredient in establishing the efficiency of the algorithm is a novel adiabatic-like theorem for the underlying queueing network, which may be of general interest in the context of dynamical systems.
(Show Context)

Citation Context

..., it requires solving an optimization problem in a distributed manner every time! This can lead to a lot of information exchange per time step. We take note of a very recent work by Jiang and Walrand =-=[16]-=- that employs a similar approach for determining the access probabilities using arrival rate information. They also speculate an intuitively pleasing connection between their rate-aware approach with ...

On Combining Shortest-Path and Back-Pressure Routing Over Multihop Wireless Networks

by Lei Ying, Sanjay Shakkottai, Aneesh Reddy , 2008
"... Abstract—Back-pressure based algorithms based on the algorithm by Tassiulas and Ephremides have recently received much attention for jointly routing and scheduling over multihop wireless networks. However a significant weakness of this approach has been in routing, because the traditional back-press ..."
Abstract - Cited by 65 (5 self) - Add to MetaCart
Abstract—Back-pressure based algorithms based on the algorithm by Tassiulas and Ephremides have recently received much attention for jointly routing and scheduling over multihop wireless networks. However a significant weakness of this approach has been in routing, because the traditional back-pressure algorithm explores and exploits all feasible paths between each source and destination. While this extensive exploration is essential in order to maintain stability when the network is heavily loaded, under light or moderate loads, packets may be sent over unnecessarily long routes and the algorithm could be very inefficient in terms of end-to-end delay and routing convergence times. This paper proposes new routing/scheduling back-pressure algorithms that not only guarantees network stability (throughput optimality), but also adaptively selects a set of optimal routes based on shortest-path information in order to minimize average path-lengths between each source and destination pair. Our results indicate that under the traditional back-pressure algorithm, the end-to-end packet delay first decreases and then increases as a function of the network load (arrival rate). This surprising low-load behavior is explained due to the fact that the traditional back-pressure algorithm exploits all paths (including very long ones) even when the traffic load is light. On the otherhand, the proposed algorithm adaptively selects a set of routes according to the traffic load so that long paths are used only when necessary, thus resulting in much smaller end-to-end packet delays as compared to the traditional back-pressure algorithm. I.
(Show Context)

Citation Context

...o queue {3, 4, 1} at node 3. Note that the optimization problem defined by (4) is a centralized problem. There has been a lot of recent work on distributed solutions, e.g., [18], [19], [21]–[23], and =-=[26]-=-–[28]. These distributed algorithms can be used in step 2 of the proposed algorithm. Distributed implementation, however, is not the focus of this paper. The next theorem shows that the shortest-path-...

Q-CSMA: Queue-length based CSMA/CA algorithms for achieving maximum throughput and low delay in wireless networks

by Jian Ni, Bo (Rambo) Tan, R. Srikant - IN IEEE INFOCOM , 2010
"... Recently, it has been shown that CSMA-type random access algorithms can achieve the maximum possible throughput in wireless ad hoc networks. However, the delay performance of these algorithms can be quite bad. On the other hand, although some simple heuristics (such as distributed approximations of ..."
Abstract - Cited by 64 (6 self) - Add to MetaCart
Recently, it has been shown that CSMA-type random access algorithms can achieve the maximum possible throughput in wireless ad hoc networks. However, the delay performance of these algorithms can be quite bad. On the other hand, although some simple heuristics (such as distributed approximations of greedy maximal scheduling) can yield much better delay performance for a large set of arrival rates, they may only achieve a fraction of the capacity region in general. In this paper, we propose a discrete-time version of the CSMA-type random access algorithm that allows us to incorporate simple heuristics which lead to very good delay performance while retaining the throughput-optimality property. Central to our results is a discrete-time distributed randomized algorithm that generates data transmission schedules according to a product-form distribution, a counterpart of similar results obtained earlier for continuous-time models under the perfect CSMA assumption where collisions can never occur. An appealing feature of this algorithm is that it explicitly takes collisions into account during the exchange of control packets.
(Show Context)

Citation Context

...sues in wireless ad hoc networks. The insensitivity properties of such a CSMA algorithm have been recently studied in [16]. Based on the results in [3], [25], a distributed algorithm was developed in =-=[11]-=- to adaptively choose the CSMA parameters to meet the traffic demand without explicitly knowing the arrival rates. The results in [11] make a time-scale separation assumption, whereby the CSMA Markov ...

Routing Without Routes: The Backpressure Collection Protocol

by Scott Moeller, Avinash Sridharan, Bhaskar Krishnamachari, Omprakash Gnawali
"... Current data collection protocols for wireless sensor networks are mostly based on quasi-static minimum-cost routing trees. We consider an alternative, highly-agile approach called backpressure routing, in which routing and forwarding decisions are made on a per-packet basis. Although there is a con ..."
Abstract - Cited by 58 (6 self) - Add to MetaCart
Current data collection protocols for wireless sensor networks are mostly based on quasi-static minimum-cost routing trees. We consider an alternative, highly-agile approach called backpressure routing, in which routing and forwarding decisions are made on a per-packet basis. Although there is a considerable theoretical literature on backpressure routing, it has not been implemented on practical systems to date due to concerns about packet looping, the effect of link losses, large packet delays, and scalability. Addressing these concerns, we present the Backpressure Collection Protocol (BCP) for sensor networks, the first ever implementation of dynamic backpressure routing in wireless networks. In particular, we demonstrate for the first time that replacing the traditional FIFO queue service in backpressure routing with LIFO queues reduces the average end-to-end packet delays for delivered packets drastically (75 % under high load, 98 % under low load). Further, we improve backpressure scalability by introducing a new concept of floating queues into the backpressure framework. Under static network settings, BCP shows a more than 60 % improvement in max-min rate over the state of the art Collection Tree Protocol (CTP). We also empirically demonstrate the superior delivery performance of BCP in highly dynamic network settings, including conditions of extreme external interference and highly mobile sinks. 1.
(Show Context)

Citation Context

...ver diversity techniques, and network coding. Finally, a direction of interest is to undertake a theoretical analysis of BCP over the TinyOS MAC for performance comparison with an optimized CSMA MAC (=-=[18]-=-, [28]) to obtain bounds and guarantees on performance. 8. ACKNOWLEDGEMENTS The authors thank Professor Michael Neely for numerous discussions on backpressure. This work was funded in part by NSF thro...

Back-of-the-Envelope Computation of Throughput

by Soung Chang Liew, Caihong Kai, Jason Leung, Bill Wong - Distributions in CSMA Wireless Networks,” Technical Report available at http://arxiv.org/pdf/0712.1854.pdf , 2007
"... Abstract — This paper presents a simple method for computing throughputs of links in a CSMA network. We call our method back-of-the-envelop (BoE) computation, because for many network configurations, very accurate results can be obtained by simple hand computation. BoE beats prior methods in terms o ..."
Abstract - Cited by 45 (8 self) - Add to MetaCart
Abstract — This paper presents a simple method for computing throughputs of links in a CSMA network. We call our method back-of-the-envelop (BoE) computation, because for many network configurations, very accurate results can be obtained by simple hand computation. BoE beats prior methods in terms of both speed and accuracy. To explain BoE, we construct a theory based on the model of an “ideal CSMA network ” (ICN). We find that link throughputs are insensitive to the distributions of the backoff countdown time and transmission time in ICN given the ratio of their mean c. The BoE computation method emerges from ICN in the limit 0→c. The insensitivity result explains why BoE works so well for IEEE 802.11 networks, in which the backoff countdown process is one that has memory and the transmission time can be arbitrarily distributed. Furthermore, c does not have to be very small for BoE to be highly accurate. BoE allows us to make shortcuts in performance evaluation, bypassing complicated stochastic analysis. An immediate application of BoE is for quick identification of starved links in the network so that remedies can be devised to solve the problem. Index Terms—CSMA, 802.11, Wi-Fi, multiple access. I.

Distributed random access algorithm: Scheduling and congestion control

by L. Jiang, D. Shah, J. Shin, J. Walrand - IEEE TRANS. INFORM. THEORY , 2009
"... This paper provides proofs of the rate stability, Harris recurrence, and ε-optimality of CSMA algorithms where the backoff parameter of each node is based on its backlog. These algorithms require only local information and are easy to implement. The setup is a network of wireless nodes with a fixed ..."
Abstract - Cited by 43 (13 self) - Add to MetaCart
This paper provides proofs of the rate stability, Harris recurrence, and ε-optimality of CSMA algorithms where the backoff parameter of each node is based on its backlog. These algorithms require only local information and are easy to implement. The setup is a network of wireless nodes with a fixed conflict graph that identifies pairs of nodes whose simultaneous transmissions conflict. The paper studies two algorithms. The first algorithm schedules transmissions to keep up with given arrival rates of packets. The second algorithm controls the arrivals in addition to the scheduling and attempts to maximize the sum of the utilities of the flows of packets at the different nodes. For the first algorithm, the paper proves rate stability for strictly feasible arrival rates and also Harris recurrence of the queues. For the second algorithm, the paper proves the ǫ-optimality. Both algorithms operate with strictly local information in the case of decreasing step sizes, and operate with the additional information of the number of nodes in the network in the case of constant step size.
(Show Context)

Citation Context

...i and Srikant [31]. These algorithms are generally not 2throughput optimal and require multiple rounds of message exchanges among nodes. A class of local algorithms was proposed by Jiang and Walrand =-=[26]-=-. The algorithms adjust access probabilities in CSMA for both scheduling and congestion control by means of a novel optimization problem and its relation to certain reversible networks. The result is ...

On the design of efficient CSMA algorithms for wireless networks

by J. Ghaderi, R. Srikant - In Proceedings of CDC 2010 , 2010
"... ar ..."
Abstract - Cited by 38 (12 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...f the MWS algorithm. A recent result in this direction of research can be found in [9]. Recently, it has been shown that it is possible to design CSMA algorithms that are throughputoptimal. Reference =-=[10]-=- develops an algorithm that adaptively chooses the CSMA parameters under a time-scale separation assumption, i.e., the CSMA Markov chain converges to its stationary distribution instantaneously compar...

DiffQ: Practical Differential Backlog Congestion Control for Wireless Networks

by Ajit Warrier, Sankararaman Janakiraman, Sangtae Ha, Injong Rhee - In Proc. of INFOCOM, Rio de Janeiro , 2009
"... Abstract—Congestion control in wireless multi-hop networks is challenging and complicated because of two reasons. First, interference is ubiquitous and causes loss in the shared medium. Second, wireless multihop networks are characterized by the use of diverse and dynamically changing routing paths. ..."
Abstract - Cited by 35 (0 self) - Add to MetaCart
Abstract—Congestion control in wireless multi-hop networks is challenging and complicated because of two reasons. First, interference is ubiquitous and causes loss in the shared medium. Second, wireless multihop networks are characterized by the use of diverse and dynamically changing routing paths. Traditional end point based congestion control protocols are ineffective in such a setting resulting in unfairness and starvation. This paper adapts the optimal theoretical work of Tassiulas and Ephremedes [33] on cross-layer optimization of wireless networks involving congestion control, routing and scheduling, for practical solutions to congestion control in multi-hop wireless networks. This work is the first that implements in real off-shelf radios, a differential backlog based MAC scheduling and router-assisted backpressure congestion control for multi-hop wireless networks. Our adaptation, called DiffQ, is implemented between transport and IP and supports legacy TCP and UDP applications. In a network of 46 IEEE 802.11 wireless nodes, we demonstrate that DiffQ far outperforms many previously proposed “practical” solutions for congestion control. I.
(Show Context)

Citation Context

...erential backlog based congestion control in wireless sensor networks [35]. Akyol et al., [2] show using simulations that differential backlog based congestion control yields near optimal rates. Also =-=[16]-=-, [17] theoretically analyze the problem of MAC scheduling for utility maximization and propose distributed MAC scheduling algorithms similar to DiffQ. While their work is similar in spirit, their ana...

Distributed CSMA/CA algorithms for achieving maximum throughput in wireless networks

by Jian Ni, R. Srikant - in Proc. Inf. Theory Appl. Workshop , 2009
"... Recently, it has been shown that CSMA-type random access algorithms can achieve the maximum throughput in wireless ad hoc networks. Central to these results is a distributed randomized algorithm which selects schedules according a product-form distribution. The product-form distribution is achieved ..."
Abstract - Cited by 35 (1 self) - Add to MetaCart
Recently, it has been shown that CSMA-type random access algorithms can achieve the maximum throughput in wireless ad hoc networks. Central to these results is a distributed randomized algorithm which selects schedules according a product-form distribution. The product-form distribution is achieved by considering a continuous-time Markov model of an idealized CSMA protocol under which collisions cannot occur. In this paper, we present an algorithm which achieves the same product-form distribution in a discrete-time setting where collision of data packets is avoided through the exchange of control messages (however, the control messages are allowed to collide as in the 802.11 suite of protocols). In our discrete-time model, each time slot consists of a few control mini-slots followed by a data slot. We show that two control mini-slots are sufficient for our distributed scheduling algorithm to realize the same steady-state distribution as in the continuous-time case. Thus, the overhead can be as low as twice the ratio of a control mini-slot to a data slot. 1
(Show Context)

Citation Context

...tivity properties of such a CSMA algorithm have been recently studied in [12]. Based on the product-form distribution of the idealized CSMA Markov chain, a distributed algorithm has been developed in =-=[9]-=- to adaptively choose the CSMA parameters to meet the traffic demand without explicitly knowing the arrival rates. The result in [9] makes a time-scale separation assumption, whereby the CSMA Markov c...

Markov Approximation for Combinatorial Network Optimization

by Minghua Chen, Soung Chang Liew, Ziyu Shao, Caihong Kai
"... Many important network design problems can be formulated as a combinatorial optimization problem. A large number of such problems, however, cannot readily be tackled by distributed algorithms. The Markov approximation framework studied in this paper is a general technique for synthesizing distribut ..."
Abstract - Cited by 31 (14 self) - Add to MetaCart
Many important network design problems can be formulated as a combinatorial optimization problem. A large number of such problems, however, cannot readily be tackled by distributed algorithms. The Markov approximation framework studied in this paper is a general technique for synthesizing distributed algorithms. We show that when using the log-sum-exp function to approximate the optimal value of any combinatorial problem, we end up with a solution that can be interpreted as the stationary probability distribution of a class of timereversible Markov chains. Certain carefully designed Markov chains among this class yield distributed algorithms that solve the log-sum-exp approximated combinatorial network optimization problem. By three case studies, we illustrate that Markov approximation technique not only can provide fresh perspective to existing distributed solutions, but also can help us generate new distributed algorithms in various domains with provable performance. We believe the Markov approximation techniques will find application in many network optimization problems, and this paper serves as a call for participation of it.
(Show Context)

Citation Context

...the recent progress in carriersense multiple-access (CSMA) network design. In [3] [4], it was shown that the throughput of links in a CSMA network can be computed from a time-reversible Markov chain. =-=[5]-=- [6] reverse-engineered to show that CSMA solves the combinatorial MWIS problem asymptotically, off by an entropy term. With this observation, [5] [6] made a significant contribution showing that a st...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University