Professional Documents
Culture Documents
MIMO-Pipe Modeling and Scheduling For Efficient Interference Management in Multihop MIMO Networks
MIMO-Pipe Modeling and Scheduling For Efficient Interference Management in Multihop MIMO Networks
8, OCTOBER 2010
TABLE I
MAJOR DIFFERENCES BETWEEN SINGLE-USER/CELLULAR SYSTEMS AND MULTIHOP NETWORKS
one grand challenge is that multihop wireless networks are advancing the MIMO technique in multihop networks requires
interference limited and that the interference introduces cou- a domain change from the high-SNR regime to interference
pling across various layers of the protocol stack, including the management. With this insight, a principal goal of this pa-
physical (PHY) layer, the MAC layer, the network layer, and the per is to explore MIMO-pipe modeling and obtain a rigor-
transport layer. Clearly, leveraging MIMO gains is intimately ous understanding of MIMO-pipe scheduling for throughput
related to effective interference management, and a key first maximization.
step is to develop a realistic PHY/MAC model abstraction of We focus on single-channel multihop MIMO networks, in
MIMO links in interference-limited networks. which the MIMO gains hinge heavily on effective interference
As outlined in Table I, there are at least three major differ- management. Needless to say, accurate modeling of interfer-
ences between single-user/cellular systems and multihop net- ence is of critical importance. In the existing literature, two
works, which are crucial in leveraging MIMO gains in multihop main interference models have been used, namely, the protocol
networks. We elaborate further on this as follows. model and the PHY-interference model [4]. In the protocol
1) High SNR versus bounded signal-to-interference-plus- model, a transmission is successful if no other user within a
noise ratio (SINR). In a single-user setting, spatial mul- certain transmission range from the receiver is transmitting.
tiplexing gain and diversity gain are defined in the Due to its simplicity, the protocol model has widely been
high-SNR regime (SNR → ∞) [24]. However, since used (see, e.g., [11], [12], and [25]). However, this model
multihop wireless networks are interference limited, spa- does not take the aggregated interference into consideration,
tial multiplex gain should be revisited in terms of the which may significantly degrade the efficiency and reliability
SINR, which is always bounded. Moreover, the notion of MIMO transmissions. In light of this, we will use the PHY-
of diversity gain defined in the high-SNR regime is not interference constraint in developing the MIMO-pipe model,
applicable to multihop networks. In light of this, we will where a transmission is successful if the SINR at the receiver
develop the MIMO-pipe model consisting of a set of is above a certain threshold. The PHY-interference constraint
feasible rates and reliability requirements. requires a systematic study on MIMO-pipe scheduling to miti-
2) Receiver channel state information (CSI) versus no gate potential conflict and interference among links, and this is
knowledge of the interference structure. In a cellular a main subject of this paper.
network setting, receive antennas can be used to suppress
interference, assuming that the interference structure is B. Summary of Main Results
available at the receiver (base station). This assumption is In this paper, with the objective of maximizing the network
reasonable since the base station is the intended receiver throughput,1 we first take a bottom-up approach to develop
for all users in the cell. In a multihop MIMO network, solid PHY/MAC interference models for MIMO pipes. Specif-
however, different links have different receivers, and the ically, given the number of antennas and the power constraint
interference structure is often not attainable since it is at each node, the more data streams there are at each MIMO
very difficult to track the channel matrices corresponding link, the lower the reliability per stream would be, as would
to interfering links from interferers to different receivers. be the interference tolerance capability. As noted before, it is
3) Diversity gain versus reliability enhancement/spatial more realistic to assume that the time-varying interference is
reuse. Given that diversity gain is not directly applica- unknown. Appealing to the fundamental theory of reliable com-
ble to multihop settings, we instead use the notion of munications [6], we first extract a new rate/reliability model,
reliability gain (interference tolerance enhancement). We which consists of a set of feasible rates and SINR require-
observe that MIMO diversity gain can enable the data ments, denoted by {(Ri , SINRi )}, corresponding to meaningful
to reach further at the same reliability level, and the stream multiplexing configurations. We note that the set of
hop length is intimately related to interference modeling, {(Ri , SINRi )} are a few points in the rate/reliability curve
spatial reuse, and end-to-end routing delay. Intuitively and that, for a given bit error rate (BER) requirement, the
speaking, the larger the hop length is, the smaller the rate/reliability curve can be obtained offline. Indeed, the (rate,
spatial reuse factor would be. SINR) model naturally emerges under PHY interference and
Given that the MIMO technology has great potential in has been used for PHY-layer studies in [20] and [23]. Clearly,
significantly enhancing the throughput and delay performance, this link abstraction model passes, to upper protocol layers,
there is an urgent need for developing useful models and a set of feasible rates and SINR requirements, and this is in
analysis methodologies tailored toward optimal design for mul-
tihop MIMO networks. The fundamental differences between 1 In this study, network throughput refers to the sum rate of the scheduled
multihop networks and single-user/cellular settings dictate that links. Fairness can be addressed, e.g., by using utility functions.
3968 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 8, OCTOBER 2010
independent from those of Hji if i = i ; ni is the additive ji }] = Nt Nr . It then follows from (4) that
E[Tr{Hji HH
white Gaussian noise with σ 2 = E[n2i ]/Nr .
P d−α
The first term in (1) is the desired data signal for link i, SINRi = ii
−α 2
. (5)
while the last two terms are cochannel interference and noise, j=i P dji + σ
respectively. As is standard, we assume that the channel matrix It is clear that {SINRi } heavily hinges on the average power
Hii is known at the receiver but unknown at the transmitter of interference plus noise (Ti ) and plays a key role in deter-
of link i (CSI at the receiver) [16]. Furthermore, in practical mining the reliability per multiplexing stream in interference-
systems, it is difficult, if not impossible, to obtain the MIMO limited communications. Based on the aforementioned
channel matrices {Hji , j = i} from interferers, simply because derivations, we will first address a fundamental issue: How do
the signals are not intended for the desired link, and it is infea- we extract solid PHY/MAC models that are realistic yet easy
sible to estimate these complex channel matrices [1]. In light of to use to optimize upper protocol layers in multihop MIMO
this, we impose the following assumption on the knowledge of networks? We take a bottom-up approach to extract a set of
the interference. feasible rates and SINR requirements, which the PHY layer
1) For Each Individual MIMO Link, the Interfering Signals can pass to upper protocol layers.
Are Unknown to Its Receiver and Its Transmitter: It is clear that
given a BER requirement, the rate/reliability curve can easily B. MIMO-Pipe Rate/Reliability Abstraction
be obtained offline. To characterize the tradeoff between stream
multiplexing and reliability requirement, we shall choose rates Every MIMO link can offer stream multiplexing by opening
of {kR, k = 1, . . . , N }, where R is the base rate per stream. up multiple spatial data pipes in the same frequency channel
Observe that the SINR at each data stream depends on the time- and achieve spatial multiplexing gain. However, given the
varying interference that is critical to set transmission rates at number of antennas and the total transmission power at each
each transmitter, but the instantaneous interference information node, the more data streams there are at each MIMO link, the
is not available at the transmitter and the receiver. To simplify lower the reliability per stream would be, as will be the interfer-
transmission scheduling, we set the transmission rate to be the ence tolerance capability. Accordingly, the SINR requirement
same for independent data streams at each MIMO link, and is more stringent. In the following, we will further elaborate,
the stream reliability is guaranteed by effective interference through an example, the tradeoff between stream multiplexing
management. As will be shown below, only symmetric stream gain and interference tolerance capability (equivalently, the
configurations will be meaningful (we will further elaborate in SINR requirements). Note that, in this study, the transmis-
the next section). We emphasize that this assumption can be sion power is assumed to be fixed. Dynamic power control
relaxed with modified SINR requirements. is beyond the scope of this paper and will be addressed in
Based on [16], the average energy of interference plus noise the future. Based on the fundamental requirements for reliable
per receive antenna is given by communications, we show that some configurations for stream
multiplexing are meaningful (while others are not), and for each
P E Tr Hji HH
Ti =
ji
+ σ2 . (2) meaningful configuration, we develop the corresponding rate
Nt d α
ji N r and the SINR requirement. In what follows, we assume that all
j=i
nodes have the same number of antennas.
Assuming that the channel-state information is available at We assume a MIMO link with Nt = Nr = 4 and assume for
the receiver only (receiver CSI), the ergodic capacity of link i, now that the transmission power is equally split among four
which is denoted Ci (SINR), is given by [16] transmit antennas. The spatial DOF is four. There are five pos-
sible configurations for stream multiplexing. Since there is no
−1
Hii HHii Φn (H) interference information at the transmitter and the receiver, we
E log2 det I + SINRi 1 H −1
Nr E Tr Hii Hii Φn (H) assume that the transmission rate is the same for independent
data streams. This is because the SINR at each data stream
where I is the identity matrix, and Φn (H) is defined as depends on the interference, and the interference information
⎛ ⎞ is critical to set transmission rates.
1 ⎝ P ⎠+I Stream Configuration I: All spatial DOF of this MIMO link are
Φn (H) = 2 Hji HH
ji (3)
σ Nt d α
ji used for stream multiplexing to obtain full multiplexing
j=i
gain, and accordingly, each transmit antenna would inde-
and SINRi is the average SINR of link i along each of pendently transmit one data stream, as shown in Fig. 2(a).
the principal directions of the interference-plus-noise space The overall data rate over this MIMO link is 4Rs , where Rs
[16], i.e., is the data rate for each stream. Since all spatial DOF are
used for multiplexing, the SINR requirement per receive
P E x2i P d−α
ii antenna, which is denoted by β3 , would be high, dictating
SINRi = = .
−α E [Tr{Hji Hji }]
α
Nt dii Ti H
P d + σ 2 that the interference tolerance capability is low.
j=i ji Nt Nr
Stream Configuration II: Alternatively, as shown in Fig. 2(b),
(4)
two antennas can transmit the same data stream to improve
Following the assumption that the entries of Hji are iden- reliability by exploiting spatial diversity, and let the other
tically distributed and the power of each entry is 1, we have two antennas transmit different streams. The overall rate is
3970 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 8, OCTOBER 2010
Fig. 2. Stream configurations for a MIMO link with four antennas. (a) Data rate 4Rs and SINR ≥ β3 . (b) Data rate 3Rs and SINR ≥ β3 . (c) Data rate 2Rs
and SINR ≥ β3 . (d) Data rate 2Rs and SINR ≥ β2 . (e) Data rate Rs and SINR ≥ β1 .
3Rs . Clearly, the data stream x3 is more reliable than x1 Proposition 2.1:
and x2 since the antennas provide spatial diversity gain for a) For a MIMO link with N transmit antennas and N receive
x3 . However, since the total interference from other users antennas, where each antenna is dedicated to one stream
is the same for all three streams over the MIMO link, the only, when equal power allocation is used across transmit
SINR requirement for this configuration is still β3 to guar- antennas,
√ the number of meaningful configurations is at
antee the success of the transmission of x1 and x2 . That is, most 4N + 1 − 1.
x1 and x2 are the bottleneck streams. Observe that, with b) When optimal power allocation is used, the number of
the same SINR requirement, Configuration I can provide meaningful configurations is at most N .
a higher data rate than Configuration II, indicating that
Proof: Let C(N ) denote the number of meaningful con-
Configuration II is not meaningful and can be ignored.2
figurations for a MIMO link with N transmit antennas and
Stream Configurations III and IV: Two configurations, as shown
N receive antennas. It is clear that C(N ) is monotonically
in Fig. 2(c) and (d), can be used to obtain two multi-
increasing as N . To prove part a), we first consider a special
plexing streams. Along the same line aforementioned, we
case with N = n(n + 1), where n is a positive integer. Define
observe that Configuration III achieves the data rate of 2Rs Δ
with SINR requirement β3 . In Configuration IV, each data ni as ni = N/i for all i = 1, 2, . . . , n. It follows that N =
stream is transmitted through two transmit antennas, which i ∗ ni + γi , where γi is the residual with 0 ≤ γi < i < ni . It
is more reliable than Configuration III. Therefore, the can be shown that, by letting the MIMO link transmit with
SINR requirement for this configuration, which is denoted overall data rate iRs , each data stream would have at least ni
as β2 , is smaller than β3 . Configuration III in Fig. 2(c) is transmit antennas. The corresponding SINR requirement is βi .
inferior to Configuration IV in Fig. 2(d) and can thus be Similarly, the link can also transmit with data rate ni Rs , in
ignored. which case each data stream has at least i transmit antennas.
Stream Configuration V: By letting all antennas transmit the In summary, when N = n(n + 1), C(N ) = 2n. Furthermore,
same data stream, the link achieves full spatial diversity when N < n(n + 1), C(N ) < 2n.
with data rate Rs , as shown in Fig. 2(e). Clearly, the SINR Using a similar argument, we can show that when N =
requirement for this configuration, which is denoted as β1 , n2 , C(N ) = 2n − 1. It then follows from the monotonicity of
is smaller than both β2 and β3 . C(N ) that when n2 ≤ N < n(n + 1), C(N ) = 2n − 1. Note
that when n2 ≤ N < n(n + 1)
In summary, for the MIMO link with Nt = Nr = 4,
there are three different meaningful configurations under √
2n < 4n2 + 1 ≤ 4N + 1 < 4n(n + 1) + 1 = 2n + 1
equal power allocation: Configuration I, Configuration IV,
and Configuration V, with overall data rates 4Rs , 2Rs , and Rs which implies that
and SINR requirements β3 > β2 > β1 , respectively.
√
C(N ) = 4N + 1 − 1.
2 This is due to the assumption that the transmitter equally splits its power
over all transmit antennas. When optimal power allocation is possible, e.g., Similarly, we have that when n(n + 1) ≤ N < (n + 1)2 ,
allocating more power on the top two antennas and less on the bottom two
antennas, the link can achieve data rate 3Rs with an SINR requirement smaller
C(N ) = 2n, and
than β3 . In this scenario, the number of meaningful configurations is equal to √
four. 2n + 1 ≤ 4N + 1 < 4(n + 1)2 + 1 < 2n + 2. (6)
GE et al.: MIMO-PIPE MODELING AND SCHEDULING FOR EFFICIENT INTERFERENCE MANAGEMENT 3971
The aforementioned problem is nonconvex in general. To 1, P̂ becomes an integer matrix). Let S1 be a set of links
solve this problem, rewrite the throughput as Δ
with l ∈ S1 and qS1 >0. Define S2 as S2 = S1 \ l. (S2 is
nonempty; otherwise, i∈S2 dai (S2 ) = 0, and Condition 2 is
a
i (S)
pi,k
Φ(P) = qS dk invalid.) Observe that
1 − pi,0
S i∈S k=1 p̂l,0
q S2 = (1 − p̂i,0 ) p̂j,0 = qS > 0. (14)
K
ai (S) (1 − p̂l,0 ) 1
i∈S2 j∈
/S2
= pj,0 pl,m dk pi,k .
S j∈ i∈S l∈S,l=i m=1
/S k=1
Then, it follows from Condition 1 that ∀ i ∈ S2
It can be shown that Φ(P) is a monotonically increasing
pi,ai (S1 ) = 1 − pi,0 = pi,ai (S2 ) > 0. (15)
function of P.3 Accordingly, the optimization problem in (11)
is a quasi-concave program and can be solved by using the K
bisection method [3]. Let P∗ = [p∗i,k , i = 1, 2, . . . , M, k = Combining (15) with the constraint that k=0 pi,k = 1,
0, 1, . . . , K] denote the optimal probability matrix that max- we have ai (S1 ) = ai (S2 ), ∀ i ∈ S2 . It then follows from
imizes the network throughput, i.e., P∗ = arg maxP Φ(P). Condition 2 that
Note that P∗ may not be unique. We have the following
property regarding P∗ . Φ(P∗ ) = dai (S1 ) = dai (S1 ) + dal (S1 )
i∈S1 \l
Proposition 3.1: The optimal probability matrix P∗ can be i∈S1
an integer matrix, i.e., p∗i,k ∈ {0, 1}, ∀ i, k. > dai (S2 ) = Φ(P∗ ) (16)
Proof: Let P∗ denote an optimal integer matrix that max- i∈S2
imizes the network throughput among all integer matrices.
Then, it is sufficient to show that, for any fractional matrix where the inequality comes from the fact that dk > 0, ∀ k.
P, Φ(P) < Φ(P∗ ). Let S ∗ denote the set of links such that The contradiction in (16) implies that, for any given fractional
S ∗ = {i|p∗i,0 = 0}; then, p∗j,0 = 1, ∀ j ∈ / S ∗ . It follows that matrix P, Φ(P) < Φ(P∗ ), thereby concluding the proof.
⎡ ⎤
(S ∗ )
ai
Φ(P∗ ) = max ⎣ dk pi,k ⎦ = dai (S ∗ ) B. MIMO-Pipe Scheduling in Dense Networks: An
P,pij ∈{0,1}
i∈S ∗ k=1 i∈S ∗ Interference Management View
(12)
with pi,ai (S ∗ ) = 1, ∀ i ∈ S ∗ . Proposition 3.1 reveals that the optimal scheduling policy
Next, we need to show that, for any given fractional matrix can have an integer matrix but is not necessarily unique. To
P, Φ(P) < Φ(P∗ ). Recall from (9) that characterize the maximum network throughput, however, it
requires global information {ai (S)}, which is difficult (if not
a
i (S)
pi,k impossible) to obtain. In the following, based on the structural
Φ(P) = qS dk property of the optimal solution derived earlier, we take a
1 − pi,0
S i∈S k=1 combinatorial optimization approach to study throughput max-
(a) imization in a multihop MIMO network.
≤ qS dai (S) Recall from (5) that the average SINR per receive antenna of
S i∈S link i is given by
(b)
≤ qS Φ(P∗ ) P d−α
SINRi = ii
−α 2
. (17)
j=i P dji + σ
S
= Φ(P∗ ) (13)
For convenience, define {Zji , i, j = 1, 2, . . . , M } and {ci , i =
K
where (a) is due to the constraint that k=0 pi,k = 1, ∀ i,
1, 2, . . . , M } as
and (b) is due to the assumption that P∗ is the optimal in- −α
teger probability matrix. Then, it suffices to show that, for dji
, i = j σ2
Zji = dii ci = . (18)
any fractional matrix P, Φ(P) = Φ(P∗ ). We establish this 0, i = j. P (dii )−α
by contradiction. Suppose that there exists a fractional matrix
P̂ = [p̂i,k ] such that Φ(P̂) = Φ(P∗ ). Then, it follows from (13) Let ri,k be 1 if link i chooses the kth configuration and 0
that, for any S with qS (P̂) > 0, the following two conditions otherwise. Then, the SINR constraints are equivalent to
to be met simultaneously: 1) p̂i,ai (S) = 1 − p̂i,0 , ∀ i, and
need
Δ Δ
maximizing the total throughput, subject to interference Finally, define bi = e − ci , and b = [bi , i = 1, 2, . . . , M ]. The
constraints optimization problem P2 is then equivalent to the following
multidimensional 0–1 knapsack problem:
M
K
P1 max dk ri,k
M K
{ri,k }
i=1 k=1 KP (W, b, p) : max pj xj
x
j=1
s.t. Zji rj,k ≤ ri,k /βk − ci
M K
j k k s.t. wij xj ≤ bi , i = 1, 2, . . . , M
j=1
ri,k ≤ 1, i = 1, 2, . . . , M xj ∈ {0, 1}, j = 1, 2, . . . , M K. (22)
k
ri,k ∈ {0, 1}, ∀ i, k. (20) Without loss of generality, we assume that wij ≤ bi for all i and
j, because otherwise, xj would always be zero in any feasible
Following [17], we can show that the optimization problem solution and can be removed from the problem formulation.
P1 is NP-hard. With this, we convert the aforementioned In a dense network, all links lie in a disk of a fixed area.
optimization problem into a multidimensional 0–1 knapsack As the number of links increases, the network gets saturated.
problem. To this end, we construct a new constraint, i.e., In other words, the total number of concurrent transmitting
links is upper bounded by a constant, which is denoted by D,
Zji rj,k + e ri,k − 1 ≤ ri,k /βk − ci regardless of the total number of links in the network [10].
j k k k We can investigate all O(M D ) size-D subsets of the M links,
(21) and for each size-D subset of the links, the corresponding
knapsack problem has DK variables (rather than M K) and
where e is some positive constant. By choosing the constant e D capacity constraints (rather than M ). To distinguish from
to be sufficiently large, we have the following.
the original knapsack problem KP (W, b, p), we denote this
1) The case with k ri,k = 0: In this case, link i does not size-constrained knapsack problem by DKP (W, b, p), which
transmit; the SINR
constraint always holds. is formally defined in the following:
2) The case with k ri,k = 1: In this case, link i chooses
one configuration to transmit; it is equivalent to the first
DK
M
K Since D is a constant for dense networks, the solution to
P2 max dk ri,k KP (W, b, p) boils down to the solution of DKP (W, b, p).
{ri,k }
i=1 k=1 Note that the problem DKP (W, b, p) is still NP-hard [9],
which implies that This proves that xB is a feasible solution to DKP (W, b, p).
Next, we will prove that DKj=1 pj xj ≥ p
B opt
(W, (1 − )b, p).
" ! #
bi A bi
DK DK
DK Toward this goal, it suffices to show that any feasible solu-
wij xA
j< w x ≤ +DK ≤ (1+)bi . tion x to DKP (W, (1 − )b, p) is also a feasible solution to
DK j=1 ij j DK
j=1
DKP (W , b , p).
(27)
Since x is a feasible solution to DKP (W, (1 − )b, p),
This proves that xA is a feasible solution to DKP (w, (1 + we have
)b, p).
DK
DK
j=1 pj xj ≥ p
A opt
Next, we will prove that (W, b, p). To- wij xj ≤ (1 − )bi . (31)
ward this goal, it suffices to show that any feasible solution x to j=1
DKP (W, b, p) is also a feasible solution to DKP (W , b , p),
since the value of an optimal solution for DKP (W , b , p) (xA Following the right-hand side of (25), we have
in this case) is at least as good as the value of a feasible solution DK
DK DK DK
(xopt (W, b, p) in this case). DK DK
wij xj ≤ wij xj+ xj ≤ (1−)+DK = .
x is a feasible solution to DKP (W, b, p), we have bi j=1
Since
DK
j=1 j=1
j=1 ij xj ≤ bi . Following the right-hand side of (25),
w (32)
GE et al.: MIMO-PIPE MODELING AND SCHEDULING FOR EFFICIENT INTERFERENCE MANAGEMENT 3975
DK
Since j=1 wij xj is an integer, (32) also implies that
DK
j=1 wij xj ≤ DK/ . This proves the theorem.
Discussions: DKP (W, (1 + )b, p) differs from
DKP (W, b, p) in that the constraints are relaxed from bi
to (1 + )bi . Our first approach essentially says that by
sacrificing the constraints a little bit, we can compute a solution
with a profit at least as good as that of the optimal solution.
More importantly, this can be achieved in fully polynomial Fig. 4. Sample realization of channel contention and data transmission.
time.
DKP (w, (1 − )b, p) differs from DKP (W, b, p) in that IV. C ONTENTION -BASED D ISTRIBUTED
the constraints are tightened from bi to (1 − )bi . Our second MIMO P IPE S CHEDULING
approach essentially says that a feasible solution to the DKP In the aforementioned sections, we have focused on central-
problem can be computed (in fully polynomial time) whose ized algorithms based on the long-term average SINR, aiming
corresponding profit value is at least as good as that of the to maximize the ergodic capacity. Next, we turn our attention
optimal value of the tightened version of the DKP problem. to random-access-based distributed algorithms that make use of
The first approach is guaranteed to compute a solution when the instantaneous SINR. Specifically, we assume that all links
the original knapsack problem is feasible. However, the second use minislots to contend for the channel with probability pi , i =
approach may fail to compute a solution when the original 1, . . . , M , and after each contention, the links involved in the
knapsack problem is feasible. contention update their contention probabilities accordingly.
The channel contention (probing) continues for Δ minislots,
C. MIMO-Pipe Scheduling in Extended Networks: followed by data transmissions over a duration of T , as shown
A Greedy Approach in Fig. 4.
In general, it is difficult to jointly optimize link scheduling
Next, consider MIMO-pipe scheduling in extended net- and stream multiplexing in a distributed manner under the
works, where the network scales to cover an increasing area MIMO-pipe model. One unique challenge is that multiple
with fixed node density. In such a network, the number of links can successfully transmit through one common channel;
concurrent transmissions increases as M increases. In other furthermore, each link has to update its own contention prob-
words, the number of constraints in (22) scales with M , and ability based on local information only, because links have
it has been shown that heuristic approximation algorithms are no knowledge of the channel condition and interference of
the only possible approach to solve this problem [8]. Based on other links, but the network throughput depends on the data
[17], we develop a heuristic approximation algorithm to find rates of all transmitting links. Moreover, it is challenging to
an approximated solution of the multidimensional knapsack simultaneously characterize the optimal scheme for joint stream
problem, as outlined below: multiplexing and link scheduling in a distributed manner. In the
following, we propose a suboptimal two-phase algorithm.
Algorithm 3 A heuristic algorithm for problem P2 in ex- Phase I: Finding a feasible set of coexisting links by using
tended networks random access. To this end, let all links initially choose
Configuration I4 and contend for the channel with certain
1: Initialize: rj ⇐ 1, j = 1, 2, . . . , M K and λi ⇐ 0, i =
probability. After each minislot, each link updates its con-
1, 2, . . . , M ; K tention probability in the following way: If its received
2: Normalize: Ẑij ⇐ Ẑij /bi and yi ⇐ M j=1 Ẑij ; SINR is greater than β1 , it would increase its contention
3: i∗ ⇐ arg maxi yi (determine the most violated link);
probability for the next minislot; if its SINR is smaller than
4: for each j such that rj = 1 do
β1 , it would decrease its contention probability; and if it
(aj − M i=1 λi Ẑij )/Ẑi∗ j , ai,j > 0
5: θi∗ ,j ⇐ does not contend during this mini-slot, it would keep its
∞, ai,j = 0. contention probability. In summary, the contention proba-
6: end for bility of link i at the tth minislot, which is denoted as pi (t),
7: θi∗ ,j ∗ ⇐ minj {θi∗ ,j |rj = 1}; is given by
8: rj ∗ = 0, yi = yi − Ẑi,j ∗ , λ∗i = λi∗ + θi∗ ,j ∗ ;
9: if max yi > 1 then pi (t + 1) = [pi (t) + a(t)fi (p(t))]10 (33)
10: go to 3
11: end if where a(t) is the step size that follows
12: (Improve the solution) Check to see whether any variable ∞
∞
rj can be set back to 1 without violating the conditions a(t) < 1, lim a(t) = 0, a(t) = ∞, a2 (t) < ∞
t→∞
yi ≤ 1. If there is more than one possibility, choose the t=1 t=1
variable with the greatest cj .
4 Configuration I, or the basic configuration, indicates the configuration
that all transmit antennas send the same data stream, as shown in Fig. 2(e).
It can be shown that the worst-case time complexity of This configuration has the lowest SINR requirement and can thus involve the
Algorithm 3 is O(M 3 K 2 ) [17]. maximal number of links in the optimal set.
3976 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 8, OCTOBER 2010
Fig. 5. Network throughput achieved by different algorithms. (a) Network size 10 × 10. (b) M = 15. (c) Network size 10 × 10.
Weiyan Ge (M’10) received the B.S. degree from Guoliang Xue (M’98–SM’99) received the B.S. de-
Peking University, Beijing, China, in 2001, the gree in mathematics and the M.S. degree in opera-
M.Phil degree from the Chinese University of Hong tions research from Qufu Normal University, Qufu,
Kong, Hong Kong, in 2003, and the Ph.D. degree China, in 1981 and 1984, respectively, and the Ph.D.
from Arizona State University, Tempe, in 2008. degree in computer science from the University of
Currently, he is a Senior Engineer with the Minnesota, Minneapolis, in 1991.
Corporate Research and Development Division, He is a Professor of computer science and engi-
Qualcomm Inc., San Diego, CA. His research in- neering with the Department of Computer Science
terests include scheduling in wireless networks and and Engineering, Arizona State University, Tempe.
system design for HSPA+ networks. He is the author of more than 170 papers in his
Dr. Ge is a is a coauthor of a paper that won the research areas. His research interests include surviv-
2008 IEEE International Communications Conference Best Paper Award. ability, security, and resource-allocation issues in networks ranging from optical
networks to wireless mesh and sensor networks.
Dr. Xue received the National Science Foundation (NSF) Research Initiation
Junshan Zhang (SM’06) received the Ph.D. degree Award in 1994 and has been continuously supported by federal agencies,
from Purdue University, West Lafayette, IN, in 2000. including NSF and the Army Research Office. He is an Associate Editor
In August 2000, he joined the Department of of Computer Networks, IEEE N ETWORK, the IEEE TRANSACTIONS ON
Electrical Engineering, Arizona State University, WIRELESS COMMUNICATIONS, and the IEEE/ACM T RANSACTIONS ON
Tempe, where he has been a Professor since 2010. N ETWORKING. He served as a Technical Program Committee Cochair of IEEE
His research interests include network modeling and INFOCOM 2010 and is a Distinguished Lecturer of the IEEE Communications
optimization/control, information theory, stochastic Society.
modeling and analysis, and wireless communica-
tions. His current research focuses on fundamental
problems in information networks and network sci-
ence, including network management, network secu-
rity, network information theory, and stochastic analysis.
Prof. Zhang received the Office of Naval Research Young Investigator Award
in 2005, the National Science Foundation CAREER award in 2003, and the
Outstanding Research Award from the IEEE Phoenix Section in 2003. He
is a coauthor of a paper that won 2008 IEEE International Communications
Conference (ICC) Best Paper Award. One of his papers was selected as the
INFOCOM 2009 Best Paper Award Runner-Up. He is an Associate Editor for
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS and an editor for
the Computer Networks journal. He served as a Technical Program Committee
(TPC) Cochair for WICON 2008 and IPCCC’06, a TPC Vice Chair for
ICCCN’06, and a member of the TPCs of INFOCOM, SECON, GLOBECOM,
ICC, MOBIHOC, BROADNETS, and SPIE ITCOM. He was the General
Chair for the 2007 IEEE Communication Theory Workshop. He will be a TPC
Cochair for INFOCOM 2012.