Home Opportunistic Channel Scheduling for Ad Hoc Networks with Queue Stability
Article
Licensed
Unlicensed Requires Authentication

Opportunistic Channel Scheduling for Ad Hoc Networks with Queue Stability

  • Lei Dong EMAIL logo and Yongchao Wang
Published/Copyright: January 24, 2015
Become an author with De Gruyter Brill

Abstract

In this paper, a distributed opportunistic channel access strategy in ad hoc network is proposed. We consider the multiple sources contend for the transmission opportunity, the winner source decides to transmit or restart contention based on the current channel condition. Owing to real data assumption at all links, the decision still needs to consider the stability of the queues. We formulate the channel opportunistic scheduling as a constrained optimization problem which maximizes the system average throughput with the constraints that the queues of all links are stable. The proposed optimization model is solved by Lyapunov stability in queueing theory. The successive channel access problem is decoupled into single optimal stopping problem at every frame and solved with Lyapunov algorithm. The threshold for every frame is different, and it is derived based on the instantaneous queue information. Finally, computer simulations are conducted to demonstrate the validity of the proposed strategy.

Funding statement: Funding: This work was supported in part by the National Science Foundation of China under grant 61372135 and 111 project B08038.

Appendix: Proof of theorem 1

We first prove part 1). From Lyapunov algorithm in Table 1, we can obtain the optimal stopping time Nl at frame l by calculating the following equation:

(28)maxNlNQ(l)E[VyNl+k=1KQk(l)Bk,Nl|Q(l)]E[TNl|Q(l)]+τd

Obviously, any other strategy leads to a smaller value than Lyapunov algorithm, including the i.i.d algorithm. Therefore, we have

(29)E[VyNl*+k=1KQk(l)Bk,Nl*|Q(l)]E[TNl*|Q(l)]+τdE[VyNiid+k=1KQk(l)Bk,Niid]E[TNiid]+τd

where Niid means an i.i.d algorithm. Before further proof, we give Lemma 2.

Lemma 2: When the constraints in eq. (5) are feasible and bound requirements of {yNl,TNl,Bk,Nl} in Section 3 hold, then for any η>0 and ε>0, there is an i.i.d algorithm satisfying

(30)E[yNiid](E[TNiid]+τd)(λ^η)E[Bk,Niid](E[TNiid]+τd)(μkε)
Proof: Denote Ξ as the set that contains all the values of {E[yNiid],(E[Bk,Niid])k=1K,E[TNiid]} obtained by i.i.d algorithms. For any i.i.d algorithm, we can express it as the linear mixture of two other i.i.d algorithms, thus the set Ξ is convex. From the bound constraints YminE[yNl|Q(l)]Ymax and TminE[TNl|Q(l)]Tmax in Section 3, we can conclude the set is also bounded.

We know that the optimal stopping rule Nl which may not be an i.i.d algorithm is determined by the queue information Q(l). It is noted that Nl can also be regarded as one of the i.i.d algorithms based on the unique conditional distribution which is corresponding to the queue information Q(l). Therefore, all the stopping rules belong to the set Ξ.

From the statement above, Nl at frame l can be replaced with some i.i.d algorithm Niid, thus the summation 1L{l=0L1E[yNl*],l=0L1E[TNl*],l=0L1E[Bk,Nl*]} can be regarded as the summation of different i.i.d algorithms. Since the set Ξ is convex and bounded, the linear combination of different i.i.d algorithms also forms an i.i.d algorithm. For any i.i.d algorithm in eq. (30) which attains near to the optimal value λˆ, the proof is similar with the optimal solution Nl, thus the proof is completed. □

Substituting eq. (30) into eq. (29), we have

(31)E[VyNl*+k=1KQk(l)Bk,Nl*|Q(l)]E[TNl*|Q(l)]+τd[V(λ^η)+k=1KQk(l)(μkε)]

Adding E[VyNl|Q(l)] on both sides of eq. (10), and implementing the Lyapunov algorithm, we have

(32)E[Δ(l)|Q(l)]E[VyNl*|Q(l)]C+E[k=1KQk(l)(μk(TNl*+τd)Bk,Nl*)|Q(l)]E[VyNl*|Q(l)]

Substituting eq. (31) into eq. (32), we have

(33)E[Δ(l)|Q(l)]E[VyNl*|Q(l)]C(E[TNl*|Q(l)]+τd)(V(λ^η)+k=1KQk(l)ε)

Taking expectation on both sides, and using the law of iterated expectation, we have

(34)E[Δ(l)]E[VyNl*]C(E[TNl*]+τd)(V(λ^η)+k=1KQk(l)ε)

where the law of iterated expectation for any random variables X and Y is given by E{X}=E[E{X|Y}]. Summing eq. (34) from l=0 to l=L1, then dividing L on both sides and taking the limitation L, we have the following equation when η0 and ε0:

(35)limL[E[F(L)F(0)]LV1Ll=0L1E[yNl]]CVλ^*limL[1Ll=0L1E[TNl]+τd]

Since E[F(0)]=0 and E[F(L)]0, rearranging the terms in eq. (35), the proof of part 1) is completed.

To prove 2), we have the following formulation by using the bound constraints YminE[yNl|Q(l)]Ymax and TminE[TNl|Q(l)]Tmax in Section 3 to eq. (33):

(36)E[Δ(l)|Q(l)]C+V[Ymax(Tmin+τd)(λ^η)]ε(Tmin+τd)[k=1KQk(l)]

Taking expectations of eq. (36) and summing from l=0 to l=L1, then dividing L on both sides and taking the limitation L, we have eq. (12) when η0. □

References

[1] P. Viswanath, D. N. Tse, and R. Laroia, “Opportunistic beamforming using dumb antennas,IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 12771294, Jun. 2002.Search in Google Scholar

[2] M. Andrews, K. Kumaran, K. Ramanan, A, Stolyar, P. Whiting, and R. Vijayakumar, “Providing quality of service over a shared wireless link”, IEEE Commun. Mag., vol. 39, no. 2, pp. 150154, Feb. 2001.10.1109/35.900644Search in Google Scholar

[3] X. Qin and R. Berry, “Exploiting multiuser diversity for medium access control in wireless networks,” in Proc. IEEE INFOCOM, 2003, vol. 2, pp. 10841094.10.1109/INFCOM.2003.1208945Search in Google Scholar

[4] D. Zheng, W. Ge, and J. Zhang, “Distributed opportunistic scheduling for ad hoc networks with random access: an optimal stopping approach,IEEE Trans. Inf. Theory, vol. 55, no.1, pp. 205222, Jan. 2009.10.1109/TIT.2008.2008137Search in Google Scholar

[5] D. Zheng, M. O. Pun, W. Ge, J. Zhang, and H. V. Poor, “Distributed opportunistic scheduling for ad hoc communications with imperfect channel information,IEEE Trans. Wireless Commun. vol. 7, no. 12, pp. 54505460, Dec. 2008.Search in Google Scholar

[6] S. Tan, D. Zheng, J. Zhang, and J. Zeidler, “Distributed opportunistic scheduling for ad-hoc communications under delay constraints,Proc. IEEE INFOCOM, 2010, pp. 19.10.21236/ADA515840Search in Google Scholar

[7] M. J. Needly, Stochastic Network Optimization with Application to Communication and Queueing Systems. California, US: Morgan Claypool Publishers, 2010.10.1007/978-3-031-79995-2Search in Google Scholar

[8] Z. Zhang and H. Jiang, “Distributed opportunistic channel access in wireless relay networks,”IEEE J. Sel. Areas Commun., vol. 30, pp. 16751683, Oct. 2012.Search in Google Scholar

[9] T. Ferguson. (2006). “Optimal stopping and applications”. Available: http://www.math.ucla.edu/~tom/Stopping/Contents.htmlSearch in Google Scholar

[10] Y. Chow, H. Robbins, and D. Siegmund, Great Expectations: Theory of Optimal Stopping. Boston, MA: Houghton Mifflin, 1971.Search in Google Scholar

Received: 2014-6-6
Published Online: 2015-1-24
Published in Print: 2015-3-31

©2015 by De Gruyter

Downloaded on 11.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/freq-2014-0097/html
Scroll to top button