Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Gordon Wilfong
Lisa Zhang
I. I NTRODUCTION
Wireless access technologies such as 802.11x and 3G/4G
have been improving in data rates and reducing in cost,
paving the way for ubiquitous, high-speed broadband wireless
coverage. The biggest challenge in making this vision a reality,
however, is to cost effectively connect all the access points or
base stations to the Internet using some backhaul technology.
Current backhaul technologies such as T1 or DSL lines are
fast becoming a bottleneck as access speeds rise, and faster
wired technologies such as T3 or fiber connections can be
expensive to lease or install in a number of scenarios.
With the technical improvements and standardization of
long-haul, non-line-of-sight (NLOS) wireless technologies
such as WiMAX (802.16d, also called 802.16-2004 [16]),
wireless backhaul is fast becoming a cost effective alternative to wired technologies. The recent standardization of
the WiMAX standard is expected to drive down prices of
WiMAX-compliant hardware, making it possible for service
providers to extensively deploy WiMAX-based backhaul links
at competitive costs. The added benefits of a wireless backhaul
include ease of deployment and the ability to bypass an
incumbent wireline carriers networks. Further, with spectral
availability widening globally (esp. in the 5GHz range) standardized wireless backhaul equipment can now be deployed in
a large number of locations. Wireless backhaul networks will
be useful to provide high speed Internet access to residential,
small and medium business customers, as well as Internet
access for WiFi hot spots and cellular base stations. Public
safety services and private networks could also be built using
71Mbps
14Mbps
16Mbps
7Mbps
48Mbps
45Mbps
63Mbps
17Mbps
67Mpbs
42Mbps
69Mbps
30Mbps
6Mbps
51Mbps
15Mbps
(a)
69Mbps
= 1552 Kbps
32Mbps
(b)
= 6692 Kbps
Fig. 1. (a) A one-hop topology connecting ten access points to the wired access point , (b) a multihop topology for the same set of
access points. Link capacities were generated using a standard pathloss model. Here is the backhaul throughput (uplink + downlink) for
each access point. We assume spatial reuse in the network, where each access point may be sending or receiving over at most one link at
any time.
Let
denote the fraction of the total subchannels that are
allocated to the directed link every time it is active. Since
(!
#%$/& " 0)
* "+
, +
%
.-
* "%+
.-
, 1+
43
89;:HGJIEK@CBED
+
+
LF
M3
(1)
43
Note that if two neighbors are sufficiently far apart so that their
receptions from a shared transmitting neighbor do not interfere
(for example, with directional transmissions), then the above
condition may be relaxed. However, here we conservatively
assume they may interfere.
For a directed link let N
be the total bit rate along
link , i.e. N
is the total bit rate of all connections whose
paths contain link . Now can support a data rate of at most
O +
. Since each link is active every alternate timeslot,
that is, for exactly half the time, we require the following link
constraint:
PF
Q ,+
SRT
2
(2)
U3
(odd node)
(odd node)
(odd node)
even
even
odd
odd
odd
even
even
even
(a)
even
(b)
(c)
Fig. 2. (a) Possible valid uplink (in dash-dotted blue) and downlink (in dashed purple) routes for a node : only links connecting odd
nodes and even nodes are permitted in routes; (b) links that are activated in even timeslots in the Even-Odd framework; (c) links that are
activated in odd timeslots.
Definition 1: If N
is the total bit rate of all connections
on link , then the connections are admissible in the Even-Odd
scheduling framework if @!8 D
689;:=<C>A@CBED
@!8 D
@!8 D
!@ 8 D
RT
F
RT 3
43
(3)
For general graph topologies, (3) does not guarantee admissibility, since a subchannel assignment may not be feasible.
However, since our routing phase only allows links between
even and odd nodes, it effectively creates a bipartite graph.
Based on results for coloring bipartite graphs [23], [9], Inequalities (3) ensure that a feasible assignment of subchannels
exists and can be easily computed for every link.
C. Tackling Interference
Self-interference, that is, interference between link pairs that
share a node, is eliminated in our framework with a combination of our Even-Odd link activation and subchannelization.
The Even-Odd scheme prevents a node from simultaneously
transmitting and receiving, while subchannelization ensures
that simultaneous receptions to (or transmissions from) a single node do not interfere with each other. Therefore the routing
component only needs to consider interfering link pairs that
do not have a node in common. Such cross-link interference is
eliminated by the routing component by ensuring that no two
links that interfere will be assigned the same label; thus links
with cross interference will not be active simultaneously.
IV. ROUTING
We require a routing of the connections that satisfies a
number of conditions. First, it must be possible to label each
node of the graph as either even or odd so that the path for
each connection in the routing is a path of alternating even
and odd nodes. Secondly, admissibility conditions (3) must be
satisfied. Further, to avoid out-of-order delivery of packets, and
to guarantee delay bounds (Section V), we assume that each
connection must follow a single path; that is, a connection
consists of an unsplittable flow. Finally, no two links with the
same label (even/odd) that interfere with one another can be on
paths in the routing. A feasible routing is a routing satisfying
all these conditions.
We show that determining if a feasible routing exists is
NP-complete via a reduction from the NP-complete problem
of finding a 3-Partition. The proof is included in the appendix.
Theorem 4.1: Given the link capacities and the connection
bit rates, determining if there is a feasible routing is NPcomplete.
A. ILP Formulation
Since finding a feasible routing is NP-complete, we consider
the following method for constructing a feasible routing given
the link capacities
and connection rates. We wish to
determine the largest
such that if all demands are scaled
by an factor, a feasible routing exists. We show that we can
formulate this problem as an Integer Linear Program (ILP) as
follows.
Let be the set of nodes, be the set of directed links,
be the set of connections, and for
let be the rate of
connection . ! " and #$'& are
as
defined
in Section III
for each node. Also, let and " denote the source and
sink of connection . For each directed link "%+ we define
a variable N 1+
to represent the bit rate of connection
assigned to travel on the link from to + . Then N "%+
. Let
will be either or
be the set of link pairs that
interfere with each other; we only need to consider pairs of
links that do not share a node in common. For each vertex
we define a binary variable " which is meant to represent
the parity of (i.e., )
if is chosen to be an even
node and ) if is chosen to be an odd node). For
each connection and each directed link we define a binary
)
represents the fact that
so that 1
is
variable 1
on the path that connection gets routed along. In this case,
we say that has been selected for . We define the binary
variable
for each link , which is set to 1 when is
selected by at least one connection. Here parameter
is
the capacity of the directed link . The resulting ILP, which
we call the PathsOpt ILP, is shown in Figure 3.
Constraint set just contains the standard conservation
of flow constraints for each connection. Constraint set "
guarantees that
)
if link
is selected for at least one
connection. Constraint set guarantees that the bit rate of
connection on links that are not selected for is 0. Constraint
sets " and guarantee that selected links are between
nodes with different parities. Constraint set guarantees
that each connection remains on a single path. Constraint sets
and "M ensure that any pair of interfering links that
are both selected must be assigned different parities. Constraint
sets
and
ensure that the admissibility conditions (3)
are satisfied.
Maximize ;
Subject
to:
For
,
"
)
.
4
!
For /021 , 3
For
/021 ,
3
For , 4@DC >E@D 6F
For ,
4
6HG
For , ,
% 4
,(
For@D ?
K
K
CL
L
NM ,
>E@D
6F
- ?>
For@D
Fig. 3.
CL
65JI
4
NM ,
L
L
65OPQ
R
U K
4 <-
K
U S-W 5
K
] SW
<?>VU
L
S,%T
XWZY %[6\ <U
U SW 5
K
] S-W
G IEK U
L
S,%T
XWY %[ \
,(
K
K
?>E@D
K
For
For
$#%
if '&(
if $#%,-&(.
*
if +
65
, 4 / 65 4 / 798: ;=<
, ?/ >A@B4 C>A
/
/
@B
65'<
.
,
L
4
OI
L
CL
L
One heuristic uses a modified Dijkstras algorithm to compute a shortest path tree of rooted at , that is, a tree ^ such
that for any node
, the path in ^ between and is a
shortest path [10]. We use R
as the distance along link
. Dijkstras algorithm iteratively constructs a shortest path
tree from the root . At any stage of the algorithm there is
a partial tree ^`_ and we find the shortest edge from ^:_ to
some node not in ^ _ . However we modify this step to only
consider such edges so that directed versions of the edge will
not interfere with any directed version of any edge already in
^a_ . The routing of each connection is the unique path in the
tree from the source to sink of that connection. Note that the
even/odd labeling of a node is taken as the parity of the depth
of the node in the final tree.
The next two heuristics are based on the following. Suppose
4
we are given a complete directed graph b )
and
a set of connections
between various node pairs as well
as a routing of these connections. For each directed link
in , let N6c
be the resulting total bit rate routed over
. Then for each
, define dc 6 8, 9;the
node load of
:=<?>A@!BED
with
respect
to
, as dc
)fegh
N6c
R
,
689;: G IEK @!BED
N c
R
.
We now describe two heuristics based on the node load.
Each heuristic adds connections one at a time in some greedy
manner. We assume that for each node there is a unit rate
connection from to and a unit rate connection from to
.
The first heuristic is as follows. Order the nodes by increasing length of their shortest path to
where as before,
link lengths are taken to be R
. Start with all nodes
unlabeled, all connections unrouted and so all node loads
are 0. Then for each node in order do the following.
First route the connection from to
along the path using
no directed links between nodes of the same parities, and
even node
odd node
odd node
even node
Fig. 4.
Imaginary network
for the backhaul network from
Figure 2. Thick links are odd links with propagation delay and
thin links are even links with propagation delay 0.
n
)
RT
=l
J
J
$o l
if
if
l
(5)
(4)
even node
odd node
even node
odd node
of m n at time Vn.)
l where )Vn (mod ), then this
packet starts to leave the buffer of link in m at time where
n
(6)
"
is the packet size of . Suppose
where
and #
10 $ . This implies
n
4)
Vn
Rkj
!_
Dl
%_
@!8 !
?D l
%&
!_ ' where ' ))(+*-,/. 2 . Note that a packet
of size is served in either ' timeslots in which case
the packet experiences ' entire idle timeslots; or the
packet is served in ' active timeslots in which case it
experiences ' entire idle timeslot. An even link _ is active
at even timeslots, which implies k_ 4) J3
!_ , l 4 _
and 4) J3
$o Q l 5 . Hence,
5
'
6
)
'
Note that 7
' if
services within ' active timeslots, and
8' if services within ' active
timeslots. As a result,
& .
9l
_
9l
=l
Rj
%_
Vn
Rkj
l 3
Rkj
%_
l
%_
%_
Rj
%_
%_
Real time
arrival
departure
Imaginary time
2
2
3
3
Fig. 5. The clocks for the real and imaginary system. The dotted intervals for the imaginary time line is when the imaginary clock is turned
off. The arrows indicate the mapping of the arrival and departure times of the two systems.
If
in
%_
m
Vn
_
(7)
Since is active at odd timeslots,
" and
6
5'
6
6
'
As argued before,
' .
Hence,
" .
We now consider item . We inductively assume that before
servicing packet , link in
services packets one at a
time under the schedule . Let be any packet whose
. Let where and are the actual end-to-end delays that
departure time is after that of , i.e.
their corresponding departure times under in the imaginary experiences in the real and imaginary systems respectively.
system be
8 and
8 . Since
Let be the first link and be the last link
, we have
and
. alongProof:
the path for packet , and let be the packet size of .
Since services one packet at a time under ,
. There are two cases to consider depending We have
on whether services in ' or '
timeslots under .
! If services within ' timeslots under , then also
services within ' active timeslots under . In this case,
and
Let
. By (5)
"
%' . If is active during even timeslots, then and
(4), we have
"
implies
3
3
5
%
6
6
5'
'
The above theorem immediately implies the following.
If is active during odd timeslots, similar analysis also
Corollary 5.4: For any scheduling policy and connection ,
'
"
shows
.
we
have
! If services in '
timeslots under , then also
services in '
active timeslots under . In this case,
"
%' . If is active during even timeslots we have, where and are the worst-case end-to-end delay
bounds for connection in the real and imaginary systems
5
respectively.
6
Item 4 is best illustrated by the two upward arrows in
(8)
( 2
Figure 5. Packet is assigned departure time at a time
no later than when starts to depart from in the imaginary However, the above relationship does not hold for all schedulsystem, which is the imaginary time . The real time ing policies indiscriminately. For example, if the scheduling
n
()
4)
Vn
Rkj
_ 4)
_
J
Q %l
o
fl
_
=l
_
9l
Vn
Rj
9l
Rj
l 3
Rkj
R_
R_J
n
4)
Zl
_
Vn
4)
!_, l
Vn
Bn
_
Vn
Rj
!_
_
Vn
_
!_
Rkj
_
_
Vn
4)
l
=l
9l
Rkj
Rj
n "
l
n
Rkj
Rkj
Rkj
l 3
Rkj
n
_
J
9l
l 3
Q l
Dn
l
_
Rkj
n
Jo l
Rj
l 3
_
J
Rkj
Rkj
Rkj
9l
=l
_
4)
PF
Q l
_
Rj
_
Bn
Vn
l
_"
Vn
6n
_
n
n
RT
9l 3
"
then
where
rate<
<
latency
servers is
a
rate-latency
server.
For
WFQ,
)
6
<
<
<
(See
[28].)
To
incorporate
"
*
*
. CEDF protocol we redefine
non-zero propagation delay to the
the deadline at each server by adding the amount
equal
to
<
propagation
<
the
delay
of
the
server.
For
CEDF,
)
<
* , 6 < *
, with high probability. (See
.
[2], [24].)
"
n
"U
l
l 3
timeslot. The factor of 2 in the term n " comes naturally as
a link in the real wireless system has the same capacity as in
the imaginary wireline system but is only activated half of the
time. We also remark that although Theorem 5.6 does not hold
for all scheduling policies, Theorem 5.3 and Corollary 5.4 do.
20 degrees
d*0.05
Q
B. Routing
We generated seven input scenarios, which we call S1S7.
Each input has 15 access points located at random within a
5km x 5km area. Recall that all traffic must pass through
the single root (gateway). Since with a 20MHz bandwidth
we assume a maximum link capacity of 75Mbps, in the best
scenario (where all links in the backhaul network are of high
capacity), we can expect to have a tree of capacity at most
75/15 = 5Mbps. In reality, however, shadow fades and pathloss
reduce the link capacities to some extent.
Figure 7 compares the capacity of the optimal backhaul tree
constructed using the ILP, to the capacity of the tree obtained
using the heuristics. Since the heuristic solutions run very fast,
we can run all three and select the topology that results in the
highest capacity. As shown in the figure, the capacity of such
a heuristic-based tree was within 75100% of the optimal.
6000
99.2%
99.1%
88.9%
89%
4000
Opt
SP
MinMax
MinMax+SP
100%
100%
75.6%
2000
S1
S2
S3
S4
S5
S6
S7
80
8
16
60
32
64
128
40
256
512
20
0
T1
T2
T3
T4
T5
T6
T7
Fig. 8. Total backhaul network capacity for seven sample inputs for
different numbers of subchannels. Capacity is shown as a percentage
of the maximum capacity without subchannelization.
80
P-FIFO
P-OF
150
P-CEDF
P-WFQ
E-FIFO
100
E-OF
E-CEDF
50
E-WFQ
200
P-FIFO
P-OF
60
P-CEDF
P-WFQ
E-FIFO
40
E-OF
E-CEDF
20
E-WFQ
0
T1
T2
T3
T4
T5
T6
T7
T1
T2
T3
T4
(a)
T5
T6
T7
(b)
Fig. 9. (a) Maximum and (b) average packet delays over all uplink and downlink connections using different link activation schemes and
scheduling policies. The striped bars represent delays in the Even-Odd framework.
P-WFQ Max
E-WFQ Max
P-WFQ Avg
E-WFQ Avg
E-WFQ Bound
250
200
P-WFQ Max
E-WFQ Max
P-WFQ Avg
E-WFQ Avg
120
100
80
60
40
20
0
10
30
40
50
60
70
Access tree load (%)
80
90
100
Fig. 11. Maximum and average end-to-end packet delays as the data
rates of all the connections is increased, shown here as a percentage
of the maximum admissible connection rate.
160
6000
P-WFQ delay
E-WFQ delay
Capacity
140
5000
120
4000
100
80
3000
60
2000
40
150
20
100
1000
0
5
50
20
Capacity (Kbps)
350
300
140
Burstiness of Input Traffic. Next, we examine the endto-end delays with variations in the amount of burstiness in
packet arrivals. For ease of presentation, we compare one
representative scheduler from each framework, namely, PWFQ and E-WFQ, for the backhaul tree T1. Figure 10 shows
how the delays for the P-WFQ and the E-WFQ schedulers
increase as the burst size is increased: larger burst sizes
represent more bursty traffic. For both schedulers, the delay
increases as burst size increases, although E-WFQ consistently
provides lower delays compared to P-WFQ. In particular,
for non-bursty (uniform) traffic E-WFQ can provide average
(maximum) delays of under 5ms (20ms), while the P-WFQ
average (maximum) delay remains above 40ms (150ms). We
also plot here the upper bound on end-to-end packet delay
for E-WFQ computed using Theorem 5.6. We see that the
measured maximum E-WFQ delay is close to the analytical
bound for traffic with low burstiness; this indicates that the
analytical delay bound may be useful when designing backhaul
networks or admitting delay-sensitive connections.
11 13 15 17 19 21 23 25
0
0
50
100
150
200
Burst size (packets)
250
300
Fig. 12. Total backhaul network capacity (as a histogram) and the
average packet delays as more nodes are added to a 5km x 5km
space. The backhaul tree is reconstructed at each stage.
150
100
50
P-CEDF
40
E-CEDF
30
20
10
0
T1
T2
T3
T4
(a)
T5
T6
T7
T1
T2
T3
T4
T5
T6
T7
(b)
Fig. 13. (a) Maximum and (b) average packet delays over uplink
and downlink VoIP packets using different link activation schemes
and the CEDF scheduling policy.
VIII. D ISCUSSION
AND
F UTURE W ORK
R EFERENCES
[1] D. Aguayo, J. Bicket, S. Biswas, G. Judd, and R. Morris. Link-level
measurements from an 802.11b mesh network. In Proceedings of ACM
SIGCOMM, August 2004.
[2] M. Andrews and L. Zhang. Minimizing end-to-end delay in high-speed
networks with a simple coordinated schedule. In Proceedings of IEEE
INFOCOM, pages 380 388, New York, NY, March 1999.
[3] Lichun Bao and J. J. Garcia-Luna-Aceves. Transmission Scheduling
in Ad Hoc Networks with Directional Antennas. In Proceedings ACM
MobiCom, pages 4858, New York, September 2002.
[4] J. Y. Le Boudec and P. Thiran. Network Calculus. Springer Verlag,
http://ica1www.epfl.ch/PS files/NetCal.htm, 2004.
[5] Benjamin A. Chambers. The Grid Roofnet: A Rooftop Ad Hoc Wireless
Network. Masters thesis, Massachusetts Institue of Technology, May
2002. http://www.pdos.lcs.mit.edu/grid/pubs.html.
[6] R. Chandra, L. Qiu, K. Jain, and M. Mahdian. Optimizing the placement
of integration points in multi-hop wireless networks. In Proceedings of
IEEE ICNP, October 2004.
[7] Imrich Chlamtac and Andras Farago. Making transmission schedules
immune to topology changes in multi-hop packet radio networks.
IEEE/ACM Transactions on Networking, 2(1):2329, 1994.
[8] Romit Roy Choudhury, Xue Yang, Nitin H. Vaidya, and Ram Ramanathan. Using directional antennas for medium access control in ad
hoc networks. In Proceedings of ACM MobiCom, pages 5970, 2002.
[9] R. Cole, K. Ost, and S. Schirra. Edge-coloring bipartite multigraphs in
time. Combinatorica, 21:5 12, 2001.
[10] E. W. Dijkstra. A note on two problems in connection with graphs.
Numerische Math., 1:269 271, 1959.
[11] V. Erceg and K.V.S. Hari et al. Channel models for fixed wireless
applications. IEEE 802.16 Broadband Wireless Access Working Group,
IEEE 802.16.3c-01/29r4, 2001. http://ieee802.org/16.
[12] V. Erceg and L.J.Greenstein et al. An empirically based path loss model
for wireless channels in suburban environments. IEEE/ACM Journal on
Selected Areas in Communications, 17(7):1205 1211, 1999.
[13] Violeta Gambiroza, Bahareh Sadeghi, and Edward W. Knightly. End-toend performance and fairness in multihop wireless backhaul networks.
In Proceedings of ACM MobiCom, pages 287301, 2004.
[14] M. R. Garey and D. S. Johnson. Computers and Intractability: A
Guide to the Theory of NP-Completeness. W.H. Freeman and Co., San
Francisco, CA, 1979.
[15] Xiao Long Huang and Brahim Bensaou. On max-min fairness and
scheduling in wireless ad-hoc networks: analytical framework and
implementation. In Proceedings of ACM MobiHoc, pages 221231,
2001.
[16] IEEE Computer Society and IEEE Microwave Theory and Techniques
Society. 802.16-2004: Air Interface for Fixed Broadband Wireless
Aceess Systems, Oct 2004. IEEE Standards.
[17] Kamal Jain, Jitendra Padhye, Venkata N. Padmanabhan, and Lili Qiu.
Impact of Interference on Multi-hop Wireless Network Performance. In
Proceedings of ACM MobiCom, pages 6680, 2003.
[18] Ji-Her Ju and Victor O. K. Li. An optimal topology-transparent
scheduling method in multihop packet radio networks. IEEE/ACM
Transactions on Networking, 6(3):298306, 1998.
[19] V. Kanodia, C. Li, A. Sabharwal, B. Sadeghi, and E. Knightly. Distributed multi-hop scheduling and medium access with delay and
throughput constraints. In Proceedings of ACM MobiCom, 2001.
[20] R. Karrer, A.Sabharwal, and E.Knightly. Enabling Large-scale Wireless
Broadband: The Case for TAPs. In 2nd Workshop on Hot Topics in
Networks (HotNets-II), Cambridge, MA, November 2003.
[21] M. Kodialam and T. Nandagopal. Characterizing the achievable rates
in multihop wireless networks. In Proceedings of ACM MobiCom, San
Diego, CA, August 2003.
[22] I. Koffman and V.Roman. Broadband wireless access solutions based
on OFDM access in IEEE 802.16. IEEE Communications Magazine,
40(4):96 103, 2002.
[23] D. Konig. Graphok e s alkalmazasuk a determinansok e s a halmazok elmeletere (in Hungarian). Mathematikai e s Termeszettudomanyi
o, 34:104119, 1916.
Ertes
it
[24] C. Li and E. Knightly. Coordinated network scheduling: A framework
for end-to-end services. In Proceedings of IEEE ICNP, Osaka, Japan,
November 2000.
[25] Haiyun Luo, J. Cheng, and Songwu Lu. Self-coordinating localized
fair queueing in wireless ad hoc networks. IEEE/ACM Transactions on
Mobile Computing, 3(1):8698, Jan-Feb 2004.
[26] Haiyun Luo, Songwu Lu, and Vaduvur Bharghavan. A new model for
packet scheduling in multihop wireless networks. In Proceedings of
ACM MobiCom, pages 7686, 2000.
[27] R. Mirchandani and R. Francis, editors. Discrete Location Theory. John
Wiley & Sons, Inc., New York, NY, 1990.
[28] A. K. Parekh and R. G. Gallager. A generalized processor sharing
approach to flow control in integrated services networks: The multiplenode case. IEEE/ACM Transactions on Networking, 2(2):137 150,
1994.
A PPENDIX
A feasible routing was defined in Section IV.
Theorem 4.1: Given the link capacities and the connection
bit rates, determining if there is a feasible routing is NPcomplete.
Proof: Clearly checking if a routing is feasible can be
done in polynomial time. We show that the problem is NP-hard
by a reduction from the known NP-complete problem called 3P
[14]. An instance of 3-PARTITION consists of a set
ARTITION
of o i elements, a positive
integer and a positive integer
RT and such
where R
size 6 6 9for each
i
that
.The
goal
is to find a partition of
)
i
i
into
such that for F F
,
/3,3/3,
6
9 < disjoint sets
exists, then
) . Notice that if such a partition
each contains exactly 3 elements of . This problem is
NP-complete in the strong sense.
Consider an instance of 3-PARTITION. We now describe
an instance of the feasible routing problem based on that
can be constructed in time polynomial in and such that
has a solution if and only if does.
&
! $ ! $
'!
!%$
!
'
!%$
%! $ !%$ %! $ !%$
Fig. 14.
!%$ !%$
! $
'
!%$
!%$
!%$
"#
"!