![Page 1: A graph theory based opportunistic link scheduling for wireless ad hoc networks](https://reader030.vdocuments.us/reader030/viewer/2022020407/575082681a28abf34f999eb6/html5/thumbnails/1.jpg)
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 10, OCTOBER 2009 5075
A Graph Theory Based Opportunistic LinkScheduling for Wireless Ad Hoc Networks
Qing Chen, Student Member, IEEE, Qian Zhang, Senior Member, IEEE, and Zhisheng Niu, Senior Member, IEEE
AbstractβTaking advantage of the independent fading channelconditions among multiple wireless users, opportunistic transmis-sions schedule the user with the instantaneously best conditionand thus increase the spectrum utilization efficiency of wirelessnetworks. So far, most proposed opportunistic scheduling policiesfor ad hoc networks exploit local multiuser diversity, i.e., eachtransmitter selects its best receiver independently. However, dueto co-channel interference, the decisions of neighboring transmit-ters are highly correlated. Furthermore, the neighboring linkswithout a common sender also experience independent channelfading. Taking the contention relationship and the channeldiversity among links into account, we extend the concept ofmulti-user diversity to a more generalized one, by which a set ofsenders cooperatively schedule the instantaneously and globallybest out-going links, thus the spatial diversity of the channelvariation can be further exploited. In this paper, we formulate theopportunistic scheduling problem with fairness requirements intoan optimization problem and present its optimal solution, i.e., theoptimal scheduling policy. We also propose GOS, a distributedGraph theory based and Opportunistic Scheduling algorithm,which modifies IEEE 802.11 protocol to implement the optimalscheduling policy. Theoretical analysis and simulation resultsboth verify that our implementation achieves higher networkthroughput and provides better fairness support than the existingalgorithms.
Index TermsβWireless ad hoc networks, multiuser diversity,opportunistic scheduling, proportional fairness, graph theory,maximum weighted independent set.
I. INTRODUCTION
THE opportunistic transmission is firstly studied for cel-lular networks, in which a base station serves multiple
wireless users which are experiencing independent channelfading. The authors showed in [1] that the total capacitycan be maximized by picking the user with the best channelto transmit. For wireless ad hoc networks, the OpportunisticAuto Rate (OAR) scheme is proposed in [2], by which a flowtransmits with higher data rate and more back-to-back packetswhen the channel condition is better. OAR only exploits thetime diversity of the channel variation, whereas a node mayhave packets destined to several neighboring nodes in wirelessad hoc networks. Therefore, each transmitter selecting itsinstantaneously best receiver simply exploits the multiuser di-versity as in cellular networks, which jointly leverages the timeand spatial heterogeneity of channels. Furthermore, multiple
Manuscript received March 21, 2007; revised February 16, 2008; acceptedMarch 4, 2008. The associate editor coordinating the review of this paper andapproving it for publication was V. Bhargava.
Q. Chen and Z. Niu are with the Tsinghua National Laboratory forInformation Science and Technology, Tsinghua University, Beijing, China (e-mail: [email protected]; [email protected]).
Q. Zhang is with the Department of Computer Science, Hong KongUniversity of Science and Technology (e-mail: [email protected]).
Digital Object Identifier 10.1109/TWC.2009.070311
co-channel senders exist in a wireless ad hoc network andthe neighboring links which are not originated from the samesender also experience independent channel fluctuations. Byintroducing the coordination among neighboring transmitters,such link diversity can be exploited and further improves thesystem performance.
However, to opportunistically schedule the links in 802.11based ad hoc networks, there are at least three unique chal-lenges due to the substantially different PHY and MAC char-acteristics. Firstly, due to the shared media in wireless ad hocnetworks, the co-channel interference has deep impact on thelink scheduling. Two links that contend with each other can notbe scheduled concurrently. Hence, we should find the optimalset of links those can be activated simultaneously to achievethe best network performance. Secondly, while selecting thelinks with good channel conditions, it is also important toconsider the fairness among the flows. To schedule a linkshould not be barely based on its channel quality but alsothe achieved throughput of its own and the neighboring flows.Thirdly, without the help of any infrastructure node, thescheduling policy should be executed in a distributed way.Not only the transmitter selects the on-going receiver but alsothe links without common senders should exchange necessaryinformation and adjust their own transmission patterns accord-ingly.
Recently, Opportunistic packet Scheduling and Auto Rate(OSAR) scheme [3] and Medium Access Diversity (MAD)scheme [4] are proposed to exploit multiuser diversity for802.11 based wireless ad hoc networks. By using theseschemes, one sender multicasts a channel probing message(e.g. Group RTS in MAD) before data transmissions. Eachreceiver replies the current channel condition and then thesender schedules the rate adaptive transmission to the receiverwith the best channel quality. In [5], the authors improved theOSAR and proposed a Contention-Based Prioritized Oppor-tunistic (CBPO) scheme to reduce the probing overhead, inwhich the channel conditions can be replied simultaneouslyby using Black-Burst (BB) contention method. However, theprevious algorithms do not consider the interaction amongneighboring transmitters, i.e. a sender individually makes itslocal decision to maximize its own performance. In [11],the authors introduce the cooperation among neighboringtransmitters into the opportunistic scheduling. It is shown thatcooperatively selecting the outgoing link remarkably increasesthe network throughput. Actually, Such cooperation leads to amore generalized multiuser diversity, i.e. the diversity amongmultiple links with and without a common sender.
Purely exploiting channel variations shows preference toflows with good channel conditions. For wireless ad hoc
1536-1276/09$25.00 cβ 2009 IEEE
![Page 2: A graph theory based opportunistic link scheduling for wireless ad hoc networks](https://reader030.vdocuments.us/reader030/viewer/2022020407/575082681a28abf34f999eb6/html5/thumbnails/2.jpg)
5076 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 10, OCTOBER 2009
networks, many schemes [6]β[8] are presented to providefair scheduling, whereas none of them takes the time-varyingchannels into account. For 802.11 based networks with fadingchannels, to keep fairness among multiple flows, MAD [4]use a π-set round robin and the revenue based scheduling tomake sure each receiver can be served according to its QoSrequirement. However, by the above work, QoS requirementsare difficult to achieve, since no mechanism is presented tocoordinate the neighboring sendersβ transmissions.
In this paper, we formulate the cooperative and opportunis-tic scheduling with fairness requirements as an optimizationproblem, in which the objective is to maximize the networkutility and the constraints are the contention restrictions. Theutility function is chosen to reveal the fairness among differentlinks. We solve the problem and present its optimal solu-tion, i.e. the optimal policy for our opportunistic schedulingproblem. In order to implement the optimal policy into theIEEE 802.11 based ad hoc networks, we also propose adistributed scheduling algorithm, which is inspired by a greedyalgorithm in graph theory to find the maximum weightedindependent set. In our scheme, the links exchange theirchannel information and determine their own transmissionpriorities by adjusting the length of a Traffic-control Inter-Frame Space (TIFS), which is a newly introduced by us andto be inserted into the consecutive transmissions of each link.Through such a priority-based link scheduling algorithm, alink with better channel condition accesses the channel withhigher probability, while the fairness requirements are takeninto consideration. The key contributions of this paper are: 1)A generalized multiuser diversity model is given for wirelessad hoc networks, while considering fairness requirements; 2)We present the optimal criteria to choose the globally optimalset of simultaneously transmitting links, which actually is aweighted maximum independent set in the context of the graphtheory; 3) A Graph theory based and Opportunistic Scheduling(GOS) is designed, which can be easily implemented intothe IEEE 802.11 based ad hoc networks. We also give thetheoretical analysis of the performance lower bound and theoverhead of our scheme. 4) In the GOS, we propose a newpriority based algorithm by introducing the TIFS, and theoptimal value of TIFS is analytically given.
The rest of this paper is organized as follows. Problemformulation is given in Section II. Section III represents theoptimal solutions. Section IV to VI describe the distributedimplementation of the optimal scheduling and its performanceanalysis. Section VII gives the numerical results. This paperis concluded in Section VIII.
II. PROBLEM FORMULATION
Consider an ad hoc network with π links (ππ, π β π© ), inwhich ππ denotes the πth link. We assume that all of the links(single-hop flows) have saturated traffic. In this paper, we con-sider the system with fixed transmit power. Due to the fadingphenomenon, the channel condition of a certain link, i.e. theSINR (Signal to Interference plus Noise Ratio) sensed by thereceiver, is time-varying. Suppose that time is divided intotimeslots with fixed time width. Hence, throughput achievedby a link in one timeslot is linear proportional to its transmitdata rate. It is reasonable to assume that channel conditions do
not vary during a timeslot, since the channel coherence timetypically exceeds the duration of multiple packet transmissions[3]. As in literature [3], we also use the highest achievable datarate (ππ(π‘)), which is determined by the SINR, to represent theπth linkβs channel condition in timeslot π‘.
The contention relationship of links can be represented bya Contention Graph (CG) [8], in which vertexes are links andan edge exists between two vertexes if the corresponding twolinks contend with each other. Herein, two links are claimedto be contended if and only if any node of one link is inthe interference range of any node of another link. A nodeβsinterference range is the area in which the transmission ofany other node can interrupt its receiving. Throughout thispaper, we use vertex/link/flow, contended/edged/neighboringinterchangeably. Due to the fading phenomenon, the pathgain between any two nodes varies from time to time, whichleads to a time-varying contention relationship CG(π‘). Weintroduce a contention indication function π(π, π, π‘), whichequals 1 if link π and link π are edged in the contention graphCG(π‘), otherwise zero. Moreover, by coloring vertices we canobtain several Independent Subsets (IS), in which the flowscan transmit simultaneously. A Maximal Independent Subset(MIS) (Sπ(π‘)) is an IS that is not subset of any other IS. Theset Ξ©(π‘) = {Sπ(π‘)} denotes the MIS set.
We formulate an arbitrary scheduler as Q, in which Q(π‘)denotes the scheduled transmitting link set in timeslot π‘. Theπ βQ(π‘) means that link π transmits at this moment. We alsointroduce an indicator function πΌπ , which equals 1 if π istrue, otherwise zero.
We formulate each linkβs average throughput as ππ =limπ‘ββ ππ(π‘), in which ππ(π‘) denotes the average throughputof the πth link until timeslot π‘ and it can be updated by usingan exponentially weighted low-pass filter [1], i.e.
ππ(π‘+ 1) =ππ β 1
ππππ(π‘) +
1
ππππ(π‘)πΌπβπ(π‘), (1)
in which ππ is the average window size. We aim to maximizethe network utility by introducing the utility functions ππ(β ),which are non-decreasing, concave and differentiable. Bymaximizing the sum of all usersβ utilities
βπ ππ(β ), we can
control the tradeoff between efficiency and fairness. Differentshapes of utility functions lead to different types of fairness.For example, a family of utility functions parameterized byπΌ β₯ 0 is proposed in [10]:
ππΌ(π₯) =
β§β¨β©
log π₯, if πΌ = 1π₯1βπΌ
1β πΌ, otherwise.
(2)
by which the proportional fairness is achieved as πΌ = 1 andthe max-min fairness as πΌ β β. If we set πΌ = 0, the problemreduces to system throughput maximization.
Thus we present the link scheduling problem with fairnessrequirements as
maxπ
βπβπ© ππΌ(ππ)
s.t. π(π, π, π‘) = 0, βπ, π β π(π‘), π β= π.(3)
![Page 3: A graph theory based opportunistic link scheduling for wireless ad hoc networks](https://reader030.vdocuments.us/reader030/viewer/2022020407/575082681a28abf34f999eb6/html5/thumbnails/3.jpg)
CHEN et al.: A GRAPH THEORY BASED OPPORTUNISTIC LINK SCHEDULING FOR WIRELESS AD HOC NETWORKS 5077
III. OPTIMAL CRITERIA OF SCHEDULING AND THEIR
GRAPH THEORETICAL ANALYSIS
Let us denote the optimal solution/policy of problem (3) byπβ. Then we have the following lemma.
Lemma 1: The optimal selection of the opportunisticscheduling (3) in any timeslot π‘ is a maximal independentset, i.e. the optimal policy satisfies πβ(π‘) β Ξ©(π‘).
This can be easily proved by contradiction. Then, we givethe following three propositions to present the optimal policiesfor the proportional fairness, the system throughput maximiza-tion and the πΌ-utility maximization problem respectively.
Proposition 1: The optimal solution of the log-utility max-imization problem (πΌ = 1 in problem (3)), i.e. the schedulingproblem with proportional fairness, is of the following form.
πβ(π‘) = ππβ(π‘)
where πβ = argmaxπ
βπβππ(π‘)
(1 +ππ(π‘)
(ππ β 1)ππ(π‘)). (4)
Proof:According to the objective of the problem (3) with
πΌ = 1, the optimal scheduler πβ should meet the con-dition:
βπβπ© log πβπ β₯ β
πβπ© log ππ, in which the πβπ andππ are obtained by the scheduler πβ and an arbitraryscheduler π respectively. Thus we have
βπβπ© log πβπ (π‘) β₯β
πβπ© log ππ(π‘), βπ‘. This can be simply proved by contradic-tion. With the help of Lemma 1, we have πβ(π‘) = πβ
π(π‘). Theabove inequation is equivalent to the following condition: Forany specific π‘,
βπβπ©
log πβπ (π‘+ 1) β₯βπβπ©
log πβ π (π‘+ 1), (5)
where πβ π is obtained by a scheduler πβ that satisfies πβ (π) =ππβ(π), βπ < π‘ and πβ (π‘) = ππβ (π‘) (ππβ (π‘) is an arbitraryMIS). Thus, we have πβ π (π‘) = πβπ (π‘).
To avoid the logarithmic computation, (5) can be put asβπβπ©
πβπ (π‘+ 1) β₯βπβπ©
πβ π (π‘+ 1). (6)
Since the average throughputs of links which are selectedneither by πβ nor by πβ are the same in both sides of (6), thelink set of concern is πβ
π(π‘)βͺππβ (π‘). Therefore, we have
βπβππβ(π‘)
βͺππβ (π‘)
πβπ (π‘+ 1) β₯β
πβππβ (π‘)βͺ
ππβ (π‘)
πβ π (π‘+ 1). (7)
Since πβͺπ can be replaced by either π
βͺ(π β π) or
πβͺ(π β π ), (7) can be written as
βπβππβ (π‘)
πβπ (π‘+ 1)β
πβππβ (π‘)βππβ (π‘)
πβπ (π‘+ 1)
β₯β
πβππβ (π‘)
πβ π (π‘+ 1)β
πβππβ(π‘)βππβ (π‘)
πβ π (π‘+ 1).(8)
By replacing πβπ (π‘)βs and πβ π (π‘)βs in (8) using (1), we haveβ
πβππβ
(ππ β 1)πβπ (π‘) + ππ(π‘)
ππ
βπβπ
πβ βππβ
(ππ β 1)πβπ (π‘)ππ
β₯β
πβππβ
(ππ β 1)πβ π (π‘) + ππ(π‘)
ππ
βπβππββπ
πβ
(ππ β 1)πβ π (π‘)ππ
.
(9)
Since we have πβ (π‘) = πβ(π‘), by multiplyingβπβππβ (π‘)
β©ππβ (π‘)(ππ β 1)πβπ (π‘) to both sides, (9) can
be written asβ
πβππβ (ππ β 1)πβπ (π‘) + ππ(π‘)βπβππβ (ππ β 1)πβπ (π‘)
β₯β
πβππβ (ππ β 1)πβ π (π‘) + ππ(π‘)βπβπ
πβ (ππ β 1)πβ π (π‘).
(10)Therefore, the scheduler πβ is the optimal solution if and
only if
πβ(π‘) = ππβ(π‘), πβ = argmaxπ
βπβππ(π‘)
(1+ππ(π‘)
(ππ β 1)ππ(π‘)).
(11)
Note: If the window size ππ goes to infinite, eqn. (11) canbe reduced to
πβ(π‘) = ππβ(π‘), πβ = argmaxπ
βπβππ(π‘)
ππ(π‘)
ππ(π‘). (12)
since we have limπ₯πβ0
βπ
(1 + π₯π) = 1 +βπ
π₯π by taking a
first-order approximation.Proposition 2: The optimal solution of the system through-
put maximization (πΌ = 0 in problem (3)), is of the followingform.
πβ(π‘) = ππβ(π‘), where πβ = argmaxπ
βπβππ(π‘)
ππ(π‘).
(13)Proof:
Similarly as the proof of Proposition 1, the optimal sched-uler πβ to maximize the overall throughput of links shouldmeet the following condition: For any specific π‘,
βπβππβ (π‘)
βͺππβ (π‘)
πβπ (π‘+1) β₯β
πβππβ(π‘)βͺ
ππβ (π‘)
πβ π (π‘+1). (14)
where πβ π is obtained by a scheduler πβ that satisfies πβ (π) =ππβ(π), βπ < π‘ and πβ (π‘) = ππβ (π‘) (ππβ (π‘) is an arbitraryMIS).
(14) can be written asβ
πβππβ
(ππ β 1)πβπ (π‘) + ππ(π‘)
ππ+
βπβπ
πβ βππβ
(ππ β 1)πβπ (π‘)ππ
β₯β
πβππβ
(ππ β 1)πβ π (π‘) + ππ(π‘)
ππ+
βπβππββπ
πβ
(ππ β 1)πβ π (π‘)ππ
.
(15)By adding
βπβππβ (π‘)
β©ππβ (π‘)
(ππβ1)πβπ (π‘)ππ
to both sides,
(15) can be written asβ
πβππβ(π‘)ππ(π‘)ππ
β₯ βπβπ
πβ (π‘)ππ(π‘)ππ
.Therefore, the optimal solution of the system throughput
maximization problem can be given as (13).
Proposition 3: In the case of the window size ππ β β, theoptimal solution of πΌ-utility maximization problem (3), is ofthe following form.
πβ(π‘) = ππβ(π‘), where πβ = argmaxπ
βπβππ(π‘)
ππ(π‘)
(ππ(π‘))πΌ.
(16)Proof:
![Page 4: A graph theory based opportunistic link scheduling for wireless ad hoc networks](https://reader030.vdocuments.us/reader030/viewer/2022020407/575082681a28abf34f999eb6/html5/thumbnails/4.jpg)
5078 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 10, OCTOBER 2009
The optimal scheduler πβ to maximize the network πΌ-utilityof links should meet the following condition: For any specificπ‘,
βπβππβ
βͺππβ
ππΌ(πβπ (π‘+1)) β₯
βπβππβ
βͺππβ
ππΌ(πβ π (π‘+1)). (17)
where πβ π is obtained by a scheduler πβ that satisfies πβ (π) =ππβ(π), βπ < π‘ and πβ (π‘) = ππβ (π‘) (ππβ (π‘) is an arbitraryMIS).
(17) can be written asβ
πβππβ
ππΌ(πβπ (π‘+ 1)) +
βπβπ
πβ βππβ
ππΌ(πβπ (π‘+ 1))
β₯β
πβππβ
ππΌ(πβπ (π‘+ 1)) +
βπβππββπ
πβ
ππΌ(πβπ (π‘+ 1)).
(18)
By using the first order Taylor expression and ππ β β, wehave
ππΌ(πβπ (π‘+ 1)) = ππΌ(
(ππ β 1)πβπ (π‘) + ππ(π‘)
ππ)
= ππΌ(πβπ (π‘)) + π β²
πΌ(πβπ (π‘))
ππ(π‘)
ππ+ π(
ππ(π‘)
ππ).
(19)
where π β²πΌ(β ) is the differential function of ππΌ(β ). By addingβ
πβππββ©
ππβ ππΌ(π
βπ (π‘)) to both sides of (18), we have
βπβππβ (π‘)
π β²πΌ(π
βπ (π‘))
ππ(π‘)
ππβ₯
βπβπ
πβ (π‘)
π β²πΌ(π
β π (π‘))
ππ(π‘)
ππ. (20)
The differential function of πΌβfamily utility is π₯βπΌ. There-fore, the nearly optimal solution of the network πΌ-utilitymaximization problem can be given as (16).
Note: If the πΌ is set as 1, the nearly optimal solution is rightthe reduced proportional fairness scheduler (12). In anothercase that πΌ = 0, we get the same optimal scheduling policyas Proposition 2 claims.
In the real world, large ππ is acceptable, thus the nearlyoptimal solution is reasonable. By defining the weight of theπth link as ππ(π‘)
(ππ(π‘))πΌ, we can see that the nearly optimal schedul-
ing policy πβ selects a Maximum Weighted Independent Set(MWIS) in each timeslot. The MWIS is one concept in thegraph theory, which denotes an MIS that has the largest totalweight of links among all the MISβs.
Graph theory is an important branch of mathematics inwhich a graph can be a symbolic representation of a networkand of its connectivity. In recent years, graph theory has beenwidely introduced into the research of the wireless ad hocnetworks, e.g. the media access scheme design [8], the systemcapacity [13] and the network connectivity [14] analysis. Inthe previous literature, the graph is used to represent thecontention or the connectivity. Whereas, in this paper, weconsider the fading channels and thus we suggest using theweighted graph in which each vertex is associated with aweight. In the view of the graph theory, to find the (weighted)maximal independent set is a classical and NP-hard discretemathematical problem. There have been proposed and ana-lyzed numerous approximation algorithms for this problem.We give some background knowledge as follows.
A. Maximum Weighted Independent Set in Graph Theory
Let πΊ be an undirected graph where each vertex π£ has apositive weight π€π£ . Let π (πΊ) and πΈ(πΊ) denote the vertex setand the edge set of πΊ, respectively, as usual. Let π (πΊ) bethe sum of the weights of all vertices: π (πΊ) =
βπ£βπ π€π£ .
For a vertex set π , let π€(π) denote the sum of the weightsof the vertices in π . Let ππΊ(π£) denote the neighbor set ofvertex π£ in πΊ. For a vertex π£, the weighted degree ππ€(π£,πΊ)in πΊ is given as follows:
ππ€(π£,πΊ) =π€(ππΊ(π£))
π€π£. (21)
The weighted average degree ππ€(πΊ) of graph πΊ is defined asfollows:
ππ€(πΊ) =
βπ£βπ π€π£ππ€(π£,πΊ)
π=
βπ£βπ π€(π(π£))
π. (22)
In graph theory, the most important greedy algorithm [12]to locate the MWIS can be written as follows. We select aminimum weighted degree vertex as a vertex in the weightedindependent set πΌ , and delete this vertex and all of its neigh-bors from the graph. We repeat this process for the remainingsubgraph until the subgraph becomes empty. It is proved thatsuch an algorithm attains the following lower bound
π€(πΌ) β₯ π
ππ€ + 1. (23)
In the next section, we will borrow the above idea from thegraph theory to design our heuristic scheduling policies.
IV. GOS: A GRAPH THEORY BASED AND OPPORTUNISTIC
SCHEDULING
By the optimal criteria, a scheduler should gather followinginstantaneous parameters for each timeslot: the contentiongraph, the linksβ feasible data rate and achieved throughput.Then a set of flows in the MWIS are scheduled to transmitsimultaneously. The above procedures cannot be directly im-plemented into IEEE 802.11 based ad hoc networks due to thefollowing challenges: 1) exchanging feasible data rates all overthe network is impractical, since such a flooding consumes lotof bandwidth and some instantaneous values become outdatedafter a multi-hop transmission; 2) it is difficult to track thetime-varying contention graph which is needed in the optimalscheduling; 3) to schedule a set of links in a deterministicorder, as TDMA in cellular networks, is not trivial becauseof the distributed nature of an IEEE 802.11 based ad hocnetwork.
We design our Graph theory based and OpportunisticScheduling (GOS) policy based on the greedy algorithm tofind MIS in the graph theory, of which the core idea is thatthe link with the lowest weighted degree among its neighborstransmits first. In fact, the weighted degree denotes a kind ofcooperation among links, since a link with lower weighteddegree means that it contends with fewer neighboring links orit gets higher weight by itself. In other words, by using ourGOS, each link decides its own transmission pattern with theconsideration of its neighboring linksβ information.
In our scheme, each linkβs transmitter and receiver main-tains a degree table for the neighboring links and the link
![Page 5: A graph theory based opportunistic link scheduling for wireless ad hoc networks](https://reader030.vdocuments.us/reader030/viewer/2022020407/575082681a28abf34f999eb6/html5/thumbnails/5.jpg)
CHEN et al.: A GRAPH THEORY BASED OPPORTUNISTIC LINK SCHEDULING FOR WIRELESS AD HOC NETWORKS 5079
Fig. 1. The time line of the Graph theory based and OpportunisticScheduling. The red blocks denote the piggyback information of the degreetables.
itself. Figure 1 shows a typical time line of GOS. Before adata transmission, a sender multicasts a RTS packet and itscandidate receivers reply with CTS packets which contain theirdegree tables. Then, the sender sends back-to-back packetson one of the links. After one sequence of transmission, i.e.RTS, CTS, DATA and ACK, the transmitter would hold foran interval before starting the next transmission. The lengthof inserted interval is set according to the weighted degree ofthis link. In detail, we describe several important parts of ourGOS in following subsections.
1) Degree Table Update: As we mentioned in Section II,two links are claimed to be neighboring if they are within eachotherβs interference range. This range is variable according tothe distance between this node and its intended sender, andit is usually larger than the communication range and can beconservatively regarded as twice of it [9]. Thus in practice, weredefine the neighboring relationship as two links are withineach otherβs 2-hop transmission range.
In order to create and update the degree tables, twomechanisms are introduced: channel probing and degree tableexchanging. The probing process is based on the Group RTSmechanism [3], by which the linkβs condition is computedby its receiver when a RTS packet is arrived and the resultis sent back to the transmitters by CTS packets (one by oneif multiple candidate receivers exist). A receiver would alsoupdate the channel condition and its own degree table whenit receives any other packets, e.g. DATA packets, from itsintended senders. We modified the Group RTS mechanismto facilitate the degree table exchanging. In our scheme, areceiver measures the channel condition and updates its degreetable after receiving RTS from its intended transmitter. Thenthe receiver sends back its degree table by CTS. The transmit-ter also conveys its degree table in the DATA packets (after thepreamble part and coded in the basic data rate). It is meantthat during a sequence of RTS-CTS-DATA-ACK exchange,the transmitter and the receiver of a link synchronize theirdegree tables. In the meantime, a node overhearing the aboveCTS or DATA packets would also update its own degree table.Therefore, the channel information is spread out during thedata transmissions. Since each node maintains the informationof its neighboring links, the parameters are actually propagatedin a 2-hop transmission range.
2) Link Scheduling: Two phases of scheduling are proposedhere. The first one is that, after receiving CTS packet(s)destined to itself, the transmitter select a link which has
the lowest weighted degree among the out-going links. Thetransmitter sends certain number of back-to-back packets onthis link with the PAcket Concatenation (PAC) mechanism[4], by which nodes will transmit more data during epochs ofhigh-quality channels.
In order to achieve the priority based scheduling among thelinks without common senders, we propose the second phaseof scheduling in which a longer interval is inserted into twoconsecutive sequence of data transmissions for a lower prioritytransmitter. Here we call the inserted interval as the Traffic-control InterFrame Space (TIFS) (see Fig. 1), which is upto one or several packetsβ transmission time. In other words,after receiving an ACK packet, a transmitter would not try tosend another RTS for several packetsβ transmission time. Inaddition, if a delayed node finds that its degree has turned tobe the lowest by overhearing packets, it would reset the TIFSto 0 at once and try to send its RTS.
The optimal length of TIFS is the duration from now tillthe transmitter to be scheduled again. We give the closed-form express of the optimal TIFS in Section V. However, theoptimal value depends on several factors of the network, suchas the move pattern of the nodes, contention graph and fairnessrequirements. In order to adaptively set TIFS, we imitate theIEEE 802.11 Contention Window (CW) updating algorithm inwhich a transmitter doubles its CW size if a collision occurs:
TIFS =
β§β¨β©
0, if π = 1TIFSπππ, if TIFS = 0 and π > 1min(TIFS Γ π ,TIFSπππ₯), otherwise,
(24)
in which the π denotes one transmitterβs degree order amongall the transmitters in its neighboring links. The π = 1 meansthat such a transmitter has the lowest degree. The exponentialincrease (multiply by the factor π ) leads to quick convergenceto the optimal value, whereas the TIFS is reset to zero as soonas the weighted degree turns to be the smallest in the degreetable.
To evaluate the proposed distributed algorithm, two discus-sions should be given as follows: 1) The network performancedepends on the setting of the TIFSs, thus whatβs the optimalsetting of TIFS should be discussed; 2) By using the optimalTIFS, how is the network utility that obtained by our schemein the worst cases and how is the overhead of our distributedalgorithm? The answers will be given in the following twosections.
V. THE OPTIMAL LENGTH OF TRAFFIC CONTROL INTER
FRAME SPACE
In our heuristic scheduling algorithm, a TIFS is insertedbetween the consecutive data transmissions for an unscheduledlink. Shorter TIFS leads to frequently access to channel evenif its channel condition has not turn be good enough. However,longer TIFS leads to longer delay while it may miss the rightchance to access the channel. Therefore, the optimal lengthshould be the expect time that an unscheduled sender turns tobe scheduled from now.
To compute the expect time, we model the fading channelas a Finite-State Markov channel (FSMC) as in literature [15],in which each state means a achievable data rate ππ. For eachlink, the transition probability can be computed by giving the
![Page 6: A graph theory based opportunistic link scheduling for wireless ad hoc networks](https://reader030.vdocuments.us/reader030/viewer/2022020407/575082681a28abf34f999eb6/html5/thumbnails/6.jpg)
5080 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 10, OCTOBER 2009
Fig. 2. A two-dimension Markov Chain for a two-link transmission scenario.
nodesβ mobile speed, the average signal to noise ratio and thesampling rate (see detail in literature [15]). Here we assumethat the channel conditions of different links are independent.Therefore, a π -link fading channel can be formulated as aπ -dimension discrete Markov chain (see Fig. 2 for example).Each state is identified by π π‘π(π‘) = (π€1, π€2, β β β , π€π ), π β π¦and π¦ = {1, 2, β β β ,πΎπ}, in which the πΎ denotes the numberof possible data rates (including zero) and π€π denotes theweight of the πth link associated with a certain data rate,e.g. π€π = ππ for system maximization and π€π = ππ/ππfor proportional fairness. By using the optimal schedulingin each state, the links in the MWIS should be scheduled,i.e. πβ(π π‘π) = ππβ ,πβ = argmaxπ{βπβππ
π€π}. We canclassify the states into overlapped groups associated with eachlink πππ = {πβ£π β πβ(π π‘π)}, βπ β π© . In other words, πππ
contains all the states in which the πth link would be scheduled.We assume that each link knows the starting state π π‘π0 , i.e.,the weights of all other links. Thus the optimal TIFS shouldbe the expect first arrival time, i.e. the expect rounds (denotedby πππ) that starting from state π π‘π, the state of the Markovchain firstly jumps into the state group πππ.
By taking other states as the transition states after one-stepjump, we have πππ =
βπβπ¦βπππ
(1 + πππ)πππ +β
πβπππ
πππ ,
in which πππ denotes the one-step transit probability fromstate π π‘π to π π‘π . The πππβs can be computed by multiplyingeach linkβs transit probability, since the transitions of linksare assumed to be independent. The above equation can berewritten as (1β πππ)πππ β
βπ β=π,πβπ¦βπππ
ππππππ = 1.
For different π, π β π¦βπππ, the above equation holds. Wehave an equation array with π½ = πΎπ β β£πππβ£ equations andπ½ unknown values (ππβs). Therefore, we have
(πΌπ β ππ)ββππ =
ββπ π (25)
Here πΌπ is a π½-dimension identity matrix, ππ is the one-steptransit probability matrix among the states {π π‘πβ£π β π¦βπππ}.Meanwhile ββππ = {πππβ£π β π¦ β πππ} and ββπ π is a π½-rowvector of all 1βs. Let ππ = {π§(π)ππ } denote (πΌπ β ππ)
β1. Thusββππ = ππββπ π.
In conclusion, the optimal TIFS for the πth link in state π
should be
π‘ππ = ππππ0 =
π½βπ=1
π§(π)ππ β π0, (26)
where π0 denotes the width of one timeslot.
VI. THE PERFORMANCE ANALYSIS OF OUR GOS
A. Performance Lower Bound of the Optimal Scheduling
As we mentioned in the Section III, the centralized andgreedy algorithm to locate MWIS obtains a lower boundas equation (23). In this paper, we propose a distributedway to located the MWIS. Distributed and centralized im-plementations differ in terms of the choice of vertex to beselected in each stage. By using our distributed and heuristicscheduling GOS with the optimal TIFS setting and the PerfectInformation (PI), more than one link can be selected at thesame time, whereas each chosen link is associated with thelowest weighted degree among its neighbors. The perfectinformation means that each link knows the right weighteddegrees of its neighboring links.
Let π£πβs (π β β) denote the vertices selected from thecontention graph. Then we give the following lemma whichhelps to derive the lower bound of our algorithm.
Lemma 2: In our proposed GOS with the PI, the verticesin the CG can be divided into groups πΊβ²
πβs which satisfy thefollowing requirements:
β Non-overlapped: πΊβ²π
β©πΊβ²
π = Ξ¦, βπ, π β β and π β= π.β Full Division:
βͺπββ πΊ
β²π = ππΆπΊ, where the ππΆπΊ denotes
the set of all the vertices in the CG.β Core Existence: π£π should be within and be the core of
one and only one group, i.e. πΊβ²π. The core means that
π£π should be associated with the lowest weighted degreeamong the group πΊβ²
π.
Proof: The lemma is proved if we can give a process ofthe grouping. We present the following procedures.
Firstly, we set the groups πΊβ²π = {π£π}, in which only a core
vertex exists in each group.Nextly, we group the other non-core vertices. For an arbi-
trary non-core vertex π£π, it must have at least one neighboringvertex, otherwise it should be a core. Three situations shouldbe considered: 1) If only one core exists in π£πβs neighborhood,π£π joins the group of this core; 2) If multiple cores are aroundπ£π, π£π can randomly select to join one and only one groupfrom the groups associated with the neighboring cores; 3) Inthe cases that no core exists in π£πβs neighborhood, we can findat least one vertex, denoted by π£π, is the neighbor of π£π andsatisfies π€π£π < π€π£π . Such a π£π must exist, otherwise π£π wouldbe a core. If π£π have already been grouped, π£π can join thesame group as π£π. Otherwise, π£π can be treated as π£π to finda group. If a group can be found for π£π, π£π would join thesame group as π£π. Otherwise, a π£π, which is not a core andsatisfies π€π£π < π€π£π , can be found. π£π is absolutely not theπ£π, since we have π€π£π < π€π£π < π€π£π . Iteratively, a chain ofnon-core vertices can be found if π£π still can not be grouped.Whereas, the number of vertices in CG is finite. Thus the chainwould definitely be terminated by reaching a grouped vertex,e.g. the vertex has a neighboring core. Then all the vertices in
![Page 7: A graph theory based opportunistic link scheduling for wireless ad hoc networks](https://reader030.vdocuments.us/reader030/viewer/2022020407/575082681a28abf34f999eb6/html5/thumbnails/7.jpg)
CHEN et al.: A GRAPH THEORY BASED OPPORTUNISTIC LINK SCHEDULING FOR WIRELESS AD HOC NETWORKS 5081
this chain can be grouped into the group associated with thisgrouped vertex.
With the help of Lemma 2, we can give the performancelower bound of our algorithm as follows.
Proposition 4: The distributed and heuristic schedulingGOS with the PI obtains the following performance lowerbound, i.e., produces the independent set satisfying the in-equality
π€(πΌπΆ) =β
π£πβπΌπΆ
π€π£π β₯π
ππ€ + 1, (27)
where π is the overall weight, ππ€ is the weighted averagedegree and πΌπΆ = {π£πβ£π β β} denotes the link set selected byour GOS.
Proof: We can divide the contention graph into non-overlapped, full divided and core existed groups according tothe Lemma 2, i.e., πΊβ²
π, π β β. We first argue the lower boundof ππ€π as follows.
ππ€π =β
π£βπ (πΊ)
ππ€(π£,πΊ) β₯βπ
βπ£βπΊβ²
π
π€π£ππ€(π£,πΊβ²π)
β₯βπ
βπ£βπΊβ²
π
π€π£ππ€(π£π, πΊβ²π) =
βπ
π€(πΊβ²π)ππ€(π£π, πΊ
β²π).
(28)Adding π =
βπ π€(πΊ
β²π) to both side of the above inequal-
ity, we have
(ππ€ + 1)π β₯βπ
π€(πΊβ²π)
2
π€π£π
(29)
Finally we apply Proposition 1 in literature [12] with ππ =π€π£π , ππ = π€(πΊβ²
π) . The inequality
(ππ€ + 1)π β₯ π 2
π€(πΌπΆ)(30)
holds, which implies this proposition.The rate adaptive IEEE 802.11 MAC protocols, e.g. OAR,
exploit the time heterogeneity of each link but do not take thegeneralized multiuser diversity into account. The links withdifferent data rates supported have nearly the same probabilityto access the channel. In the case of the perfect carrier sensing,i.e. no collision happens, the link set selected by 802.11 MACis a random independent set. We can compute the averageperformance of the rate adaptive 802.11 MAC by
π€(πΌπ ) = πΈ{βπ£βπΌπ
π€π£} = π β πΈ{ π€π£π
π€(πΊβ²π)}
= π β πΈ{ π€π£π
π€π£π +ππΊβ²(π€π£π )} =
π
ππ€ + 1,
(31)
in which πΈ denotes the expect value.Proposition 1 to 3 give the optimal and centralized schedul-
ing policies, by which a set of links in the MWIS are scheduledto transmit in a timeslot. For practical implementation, wepropose the distributed and asynchronous way to approachthe optimal policy: A link with the lowest weighted degreeamong its neighbors has the highest priority to transmit. Thedistributed algorithm may not achieve the optimal performanceas the optimal policies due to the heuristic nature, whereasProposition 4 provides its performance lower bound. Further-more, the equation (31) shows that the average performance
TABLE IAVERAGE TRANSMISSION AND CARRIER SENSING RANGES
Rates (Mbps) 11.0 5.5 2.0 1.0 CS
Range (m) 399 531 669 796 1783
of the rate adaptive 802.11 MAC without collisions equals thelower bound of our proposed algorithm with PI.
B. Overhead Analysis of our Distributed Algorithm
Comparing with other opportunistic scheduling schemes,e.g. OSAR, our distributed algorithm GOS does not induceany more control packets, although we need to carry a bitmore information on the CTS and DATA packets. However,the number of packet makes difference of network throughputrather than the packet length. The extension part of the CTSand DATA packets are the degree table whose length is3+ (8+4+11+1)Γπ bits, in which the first 3 bits indicatethe number (π) of entities in this table, and the number islimited to be no greater than 8. The (8 + 4+ 11+ 1) denotesthe information bits of one entity which is composed of onebyte for link identifier (e.g. combining the last four bits of thetransmitterβs and the receiverβs MAC address), four data ratebits (at most 16 levels), 11-bit for the weighted degree and oneimmediate neighbor indicator bit. In order to be decoded byall of the neighboring nodes, the extension parts are encodedin the basic data rate, 1Mbps. In a typical scenario, in whicha sender receives 1.5 CTS packets on average and the intervalof a data packet is the transmission time of a 1000-byte datapacket with 1Mbps data rate, the overhead induced by ourscheme is
Overhead =πAdded bits
πAdded bits + πDIFS + 4πSIFS + πRTS + 1.5πCTS + πACK + πDATA
=(3 + 24Γ 8)Γ (1 + 1.5)
(3 + 24Γ 8)Γ 2.5 + 1202 + (192 + 8Γ (34 + 1000))
= 4.8%
In this case, our new scheme introduces lower than 5%bandwidth overhead, but leads to much higher overall through-put gain as it will be seen in the next section.
VII. SIMULATION RESULT
Our simulation experiments are conducted by ns-2 (ver-sion 2.29). For system maximization problem, we compareGOS with OAR, OSAR, and the optimal scheduling. More-over, three schemes with proportional fairness requirements:GOS prop, OSAR prop and Optimal prop are compared. Byusing the optimal scheduling policies (Optimal and Opti-mal prop), there is no overhead of the information exchangingand the flows are scheduled in a collision-free way. In allschemes, the data packet size is set to 1000 bytes, of whichthe available transmit rates of data packets are set to 1Mbps,2Mbps, 5.5Mbps and 11Mbps according to IEEE 802.11bstandard. The number of packets in one back-to-back trans-mission is set according to the data rate selected: 1 for 1Mbps,2 for 2Mbps, 5 for 5.5Mbps and 11 for 11Mbps. All thecontrol packets (GRTS, CTS and ACK) are transmitted with
![Page 8: A graph theory based opportunistic link scheduling for wireless ad hoc networks](https://reader030.vdocuments.us/reader030/viewer/2022020407/575082681a28abf34f999eb6/html5/thumbnails/8.jpg)
5082 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 10, OCTOBER 2009
1 2 3 4 5 64
4.5
5
5.5
6
6.5
7
The method of setting TIFS
Net
wor
k T
hrou
ghpu
t (M
bps)
TIFS = 10ms
100ms1000ms
AaptiveTIFS
opt
Optimal
Fig. 3. Network throughput obtained by different methods of setting theTIFS. The first three methods set all the inserted TIFS as constant values(10ms, 100ms or 1000ms), the fourth is the adaptive adjusting algorithm(eqn. (24)), the fifth is the optimal TIFS setting (eqn. (26)) and the last is theoptimal scheduling without collisions and overhead.
the basic data rate, 1Mbps. The values of receiver sensitivitiesfor different data rates are chosen based on the settings ofORiNOCO 802.11b card1. Thus, the average transmission andcarrier sensing ranges can be computed by the two-ray groundreflection model and the result is shown in Table I.
In our simulation, the Rician fading channel model weuse is the same as the one used in literature [2], [3]. Toevaluate the performance of OSAR with proportional fairnessrequirements, we modify OSAR propβs scheduling criteria as:Each sender selects the link with maximal ππ/ππ among itsown outgoing links.
We use the fixed route policy and report the end-to-endeffective throughput. We set the ππΌπΉππππ = 5ms andππΌπΉππππ₯ = 500ms in the adaptive TIFS adjusting algorithm(eqn. (24)). By using different methods of setting the TIFS,we give the network throughput in Fig. 3 for a simple scenariowhere two 450-meter links are parallel with a distance of50 meters. Fig. 3 shows that the adaptive algorithm achieveshigher network throughput than the first three static settingsand its performance is nearly the same as the optimal TIFSsetting method obtains. In the following simulations, we usethe adaptive TIFS adjusting algorithm, since the optimal TIFScan not be easily computed as described in Section V.
A. Two-Transmitter Scenario
Firstly, we simulate a two-transmitter scenario with fiveCBR flows as illustrated in Fig. 4. In this scenario, eachtransmitter has multiple candidate receivers. The distancebetween any sender and its receiver of each flow is 500m.Meanwhile, the distance between two transmitters is 1800m,which is larger than the average carrier sensing range.
As Fig. 5(a) depicts, under the system maximization objec-tive, GOS prefers to transmit on link 1, 4 and 5, since theymaximize the spatial reuse of channel. Comparing with OSAR,GOS reduces throughput of link 2 and 3, but improves link
1For 802.11b, we use the specifications for the ORiNOCO 11b Client PCCard which can be found at http://www.proxim.com/.
Fig. 4. A two-transmitter scenario and its contention graph. There are fourmaximal independent subsets: Ξ© = {(π2), (π3), (π1, π4), (π1, π5)}.
1, 4 and 5 by almost 100%. Totally, the network throughputof GOS is 35% higher than that of OSAR. Furthermore, ourGOS achieves about 90% of the network throughput achievedby the optimal scheduling.
To evaluate our scheduling policies to achieve propor-tional fairness, Fig. 5(b) shows the each linkβs normalizedthroughput, i.e. ππ/πβπ , in which πβπ is the throughput obtainedby the Optimal prop. Our policy GOS prop achieves wellfairness among links and its network throughput is about 70%of the optimal one. Let FI denote the proportional fairness
indexes, which is given by FI =(β
πβπ© ππ/πβπ )
2
πβ
πβπ© (ππ/πβπ )2. The FI of
the Optimal prop, GOS prop and OSAR prop are 1, 0.9993and 0.9497 respectively. It shows that comparing with theOSAR prop, our GOS prop obtains higher throughput andhigher fairness index.
B. Random Topologies
In this experiment, we simulate random topologies, inwhich the transmitters are uniformly distributed in a squarearea. More importantly, each transmitter has one or tworeceivers which are also in this square area. Firstly, we setthe side length of square as 800m, and the distance betweeneach transmitter and its intended receiver is fixed at 450m.Therefore, under this setting, the links can hear from eachother. Figure 6(a) shows the network throughput versus thenumber of links in the square, where each transmitter isassociated with only one receiver. It is shown that our GOSgets nearly the same throughput as the Optimal schedulinggets, and it outperforms the OSAR up to 50% when thenumber of links equals 8. As the number of links increases,the Optimal and GOS get higher network throughput since thedegree of diversity increases. However, without exploiting thediversity among links which do not have a common sender, thethroughput achieved by OSAR drops as the number of linksincrease due to higher collision probability. The OSAR andOAR achieve the same throughput, since no multi-receiverdiversity can be exploited here. In Fig. 6(b), when eachsender is associated with two receivers, the OSAR gets higherthroughput than OAR which does not exploit multiuser diver-sity. However, our GOS still obtains the highest performancedue to the coordination among different senders. In Fig. 8,we also present the throughput obtained by the policies withproportional fairness requirement. In this 800Γ800 area, thesix links are symmetrical, thus the throughput of each linkobtained by each policy is almost equal. Our GOS obtains25% higher throughput than the OSAR.
Secondly, we set the side length of the square area as 2km.Each transmitter has one or two candidate receivers which
![Page 9: A graph theory based opportunistic link scheduling for wireless ad hoc networks](https://reader030.vdocuments.us/reader030/viewer/2022020407/575082681a28abf34f999eb6/html5/thumbnails/9.jpg)
CHEN et al.: A GRAPH THEORY BASED OPPORTUNISTIC LINK SCHEDULING FOR WIRELESS AD HOC NETWORKS 5083
1 2 3 4 50
0.5
1
1.5
2
2.5
3
3.5
4
4.5
Flow ID
Thr
ough
put (
Mbp
s)
OptimalGOSOSAROAR
(a) System Maximization
1 2 3 4 50
0.2
0.4
0.6
0.8
1
1.2
Link ID
Nor
mal
ized
Thr
ough
put (
b/b*
)
Optimal_propGOS_propOSAR_prop
(b) Proportional Fairness
Fig. 5. Throughput of each link in the two-transmitter scenario.
1 2 3 4 5 6 7 83
4
5
6
7
8
9
10
Number of Links
Net
wor
k T
hrou
ghpu
t (M
bps)
OptimalGOSOSAROAR
(a) One receiver per each transmitter
2 4 6 8 103
4
5
6
7
8
9
10
Number of Links
Net
wor
k T
hrou
ghpu
t (M
bps)
OptimalGOS OSAR OAR
(b) Two receivers per each transmitter
Fig. 6. Network throughput versus the number of links in the random scenarios within an 800mΓ800m square area.
are uniformly distributed in a round area with a radius ofπ·πππ₯ from their intended transmitters. By setting π·πππ₯ =800π, the network throughput of different schemes versus thenumber of links is shown by Fig. 7. Similarly as before, ourGOS performs much better than OSAR with a 30% throughputgain. In addition, we simulate an topology with 3 sendersand 6 receivers and the FI of the Optimal prop, GOS propand OSAR prop are 1, 0.9972 and 0.8816 respectively, whichreveals that our policy provides much better fairness supportthan the OSAR does.
VIII. CONCLUSION
In this paper, we study the opportunistic scheduling problemfor IEEE 802.11 based wireless ad hoc networks, in which thefading effect of the channel, the contention among neighboringlinks and the utility-based fairness among links are taken intoconsideration. By exploiting the generalized multiuser diver-sity, i.e. by assigning the links with or without the commonsender in better channel conditions with higher priority toaccess the channel, the network throughput can be dynamically
increased. We formulate the utility-based scheduling problemas an optimization problem and we present the optimal so-lutions for different utility functions. In order to implementthe optimal schedulers into IEEE 802.11 based ad hoc net-works, we propose the graph theory based and opportunisticscheduling scheme, GOS, which is a distributed algorithm andimitates the greedy algorithm to locate the maximum weightedindependent set in graph theory. We give the analytic analysisof the performance bound and the overhead of our GOS, whichboth verify its efficiency. The simulation results also show thatGOS achieves more than 30% network throughput gain andprovides better fairness support than the existing work.
ACKNOWLEDGMENT
The research was support in part by the National BasicResearch Program of China (973 Program: 2007CB310607),NSFC/Hong Kong Research Grants Council Joint Re-search Scheme under Grant 6073116031, the Interna-tional S&T Cooperation Program of China (ISCP) (No.2008DFA12100), grants from RGC under the contract 622508
![Page 10: A graph theory based opportunistic link scheduling for wireless ad hoc networks](https://reader030.vdocuments.us/reader030/viewer/2022020407/575082681a28abf34f999eb6/html5/thumbnails/10.jpg)
5084 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 10, OCTOBER 2009
4 5 6 7 8 9 104
5
6
7
8
9
10
11
12
13
Number of Links
Net
wor
k T
hrou
ghpu
t (M
bps)
OptimalGOSOSAROAR
(a) One receiver per each transmitter
2 4 6 8 104
5
6
7
8
9
10
11
12
13
Number of Links
Net
wor
k T
hrou
ghpu
t (M
bps)
OptimalGOSOSAROAR
(b) Two receivers per each transmitter
Fig. 7. Network throughput versus the number of links in the random scenarios within an 2kmΓ2km square area.
1 2 3 4 5 60
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
Link ID
Thr
ough
put (
Mbp
s)
Optimal_propCOS_propOSAR_prop
Fig. 8. Network throughput of links obtained by the optimal prop, theGOS prop and the OSAR prop in an 800Γ800 square area.
and RPC06/07.EG05, NSFC/RGC grant N HKUST609/07,and the NSFC oversea Young Investigator grant under No.60629203.
REFERENCES
[1] P. Viswanath, D. Tse, and R. Laroia, βOpportunistic beamforming usingdumb antennas,β IEEE Trans. Inform. Theory, vol. 48, no. 6, pp. 1277β1294, June 2002.
[2] B. Sadeghi, V. Kanodia, A. Sabharwal, and E. Knightly, βOAR: anopportunistic auto-rate media access protocol for ad hoc networks,βACM Wireless Networks, vol. 11, no. 1, pp. 39β53, Jan. 2005.
[3] J. Wang, H. Zhai, Y. Fang, and M. C. Yuang, βOpportunistic mediaaccess control and rate adaptation for wireless ad hoc networks,β inProc. IEEE ICCβ04, vol. 1, pp. 154β158, June 2004.
[4] Z. Ji, Y. Yang, J. Zhou, M. Takai, and R. Bagrodia, βExploitingmedium access diversity in rate adaptive wireless LANs,β in Proc. ACMMOBICOMβ04, pp. 345β359, Sept. 2004.
[5] M. Zhao, H. Zhu, W. Shao, V. O. K. Li, and Y. Yang, βContention-basedprioritized opportunistic medium access control in wireless LANs,β inProc. IEEE ICCβ06, June 2006.
[6] H. Luo and S. Lu, βA topology-independent wireless fair queueingmodel in ad hoc networks,β IEEE J. Select. Areas Commun., vol. 23,no. 3, pp. 585β597, Mar. 2005.
[7] H. L. Chao and W. Liao, βFair scheduling in mobile ad hoc networkswith channel errors,β IEEE Trans. Wireless Commun., vol. 4, no. 3, pp.1254β1263, May 2005.
[8] X. L. Huang and B. Bensaou, βOn max-min fairness and scheduling inwireless ad hoc networks: analytical framework and implementation,βin Proc. ACM MOBIHOCβ01, pp. 221β231, Oct. 2001.
[9] K. Xu, M. Gerla, and S. Bae, βHow effective is the IEEE 802.11RTS/CTS handshake in ad hoc networks,β in Proc. IEEE Globecomβ02,vol. 1, pp. 17β21, Nov. 2002.
[10] J. Mo and J. Walrand, βFair end-to-end window-based congestioncontrol,β IEEE/ACM Trans. Networking, vol. 8, no. 5, pp. 556β567,Oct. 2000.
[11] Q. Zhang, Q. Chen, F. Yang, S. Shen, and Z. Niu, βCooperative andopportunistic transmssion for wireless ad hoc networks,β IEEE Network,pp. 14β20, vol. 21, no. 1, Jan./Feb. 2007.
[12] A. Kako, T. Ono, T. Hirata, and M. M. Halldorsson, βApproximationalgorithms for the weighted independent set problem,β in Proc. 31stInternational Workshop on Graph-Theoretic Concepts in ComputerScience 2005, pp. 341β350, June 2005.
[13] Q. Dai, X. Hu, H. Yu, and J. Zhao, βOn the capacity of wireless ad-hocnetwork basing on graph theory,β in Proc. International Conf. on Netw.,Apr. 2005.
[14] O. Dousse and P. Thiran, βConnectivity vs capacity in dense ad hocnetworks,β in Proc. IEEE INFOCOMβ04, vol. 1, pp. 7β11, Mar. 2004.
[15] Q. Liu, S. Zhou, and G. B. Giannakis, βQueuing with adaptive modu-lation and coding over wireless links: cross-layer analysis and design,βIEEE Trans. Wireless Commun., vol. 4, no. 3, pp. 1142β1153, May 2005.
Qing Chen (StMβ05) received his B.S. degree fromthe Department of Electronic Engineering, TsinghuaUniversity, Beijing, China, in 2003. Currently, he isa Ph.D. candidate in the Department of ElectronicEngineering, Tsinghua University. From November2005 to May 2006, he was a visiting researcher atthe Department of Computer Science, Hong KongUniversity of Science and Technology, Hong Kong.His research interests include power control, MAClayer scheduling and quality of service in wirelessad hoc networks.
![Page 11: A graph theory based opportunistic link scheduling for wireless ad hoc networks](https://reader030.vdocuments.us/reader030/viewer/2022020407/575082681a28abf34f999eb6/html5/thumbnails/11.jpg)
CHEN et al.: A GRAPH THEORY BASED OPPORTUNISTIC LINK SCHEDULING FOR WIRELESS AD HOC NETWORKS 5085
Qian Zhang (Mβ00-SMβ04) received the BS, MS,and PhD degrees from Wuhan University, China, in1994, 1996, and 1999, respectively, all in computerscience. She joined the Hong Kong University ofScience and Technology in September 2005 as anAssociate Professor. Before that, she was at Mi-crosoft Research Asia, Beijing, China, from July1999, where she was the research manager of theWireless and Networking Group. She has publishedmore than 200 refereed papers in international lead-ing journals and key conferences in the areas of
wireless/Internet multimedia networking, wireless communications and net-working, and overlay networking. She is the inventor of about 30 pendingpatents. Her current research is on cognitive and cooperative networks, dy-namic spectrum access and management, as well as wireless sensor networks.She has also participated many activities in the IETF ROHC (Robust HeaderCompression) WG group for TCP/IP header compression.
Dr. Zhang is the associate editor for the IEEE TRANSACTIONS ON WIRE-LESS COMMUNICATIONS, IEEE TRANSACTIONS ON MULTIMEDIA, IEEETRANSACTIONS ON MOBILE COMPUTING, IEEE TRANSACTIONS ON VE-HICULAR TECHNOLOGIES (2004-2008), COMPUTER NETWORKS and COM-PUTER COMMUNICATIONS. She has also served as guest editor for the IEEEWIRELESS COMMUNICATIONS, IEEE JOURNAL ON SELECTED AREAS IN
COMMUNICATIONS, IEEE COMMUNICATION MAGAZINE, ACM/SPRINGER
JOURNAL OF MOBILE NETWORKS AND APPLICATIONS (MONET), andCOMPUTER NETWORKS.
Dr. Zhang received TR 100 (MIT Technology Review) worldβs top younginnovator award in 2004, the Best Asia Pacific (AP) Young Researcher
Award elected by the IEEE Communication Society in 2004, and the BestPaper Award by the Multimedia Technical Committee (MMTC) of the IEEECommunications Society and Best Paper Award in QShine 2006, IEEEGlobecom 2007, and IEEE ICDCS 2008. She received the Overseas YoungInvestigator Award from the National Natural Science Foundation of China(NSFC) in 2006. Dr. Zhang is Chair of the Multimedia CommunicationTechnical Committee of the IEEE Communications Society. She is alsoa member of the Visual Signal Processing and Communication TechnicalCommittee and the Multimedia System and Application Technical Committeeof the IEEE Circuits and Systems Society.
Zhisheng Niu (Mβ98-SMβ99) graduated fromNorthern Jiaotong University, Beijing, China, in1985, and got his M.E. and D.E. degrees from Toy-ohashi University of Technology, Toyohashi, Japan,in 1989 and 1992, respectively. He worked forFujitsu Laboratories Ltd., Kawasaki, Japan, from1992 to 1994, and currently is a professor at the De-partment of Electronic Engineering, Tsinghua Uni-versity, Beijing, China. His research interests includeteletraffic theory, mobile Internet, radio resourcemanagement of wireless networks, and cognitive
radio networks. Dr. Niu is a fellow of the IEICE, a senior member of the IEEE,director of IEEE Asia-Pacific Board, and council member of Chinese Instituteof Electronics. He was also serving as the TPC co-chairs of APCC2004 andIEEE ICC2008, general chairs of APCC2009 and WiCom2009, and postersession chair of Mobicom2009.