Performance analysis of a distributed algorithm for admission control in wireless networks under the 2-hop interference model

Ashwin Ganesan
{"title":"Performance analysis of a distributed algorithm for admission control in wireless networks under the 2-hop interference model","authors":"Ashwin Ganesan","doi":"10.1145/3427796.3427806","DOIUrl":null,"url":null,"abstract":"A general open problem in networking is: what are the fundamental limits to the performance that is achievable with some given amount of resources? More specifically, if each node in the network has information about only its 1-hop neighborhood, then what are the limits to performance? This problem is considered for wireless networks where each communication link has a minimum bandwidth quality-of-service (QoS) requirement. Links in the same vicinity contend for the shared wireless medium. The conflict graph captures which pairs of links interfere with each other and depends on the MAC protocol. In IEEE 802.11 MAC protocol-based networks, when communication between nodes i and j takes place, the neighbors of both i and j remain silent. This model of interference is called the 2-hop interference model because the distance in the network graph between any two links that can be simultaneously active is at least 2. In the admission control problem studied in the present paper, the objective is to determine, using only localized information, whether a given set of flow rates is feasible. In the present work, a distributed algorithm is proposed for this problem, where each node has information only about its 1-hop neighborhood. The worst-case performance of the distributed algorithm, i.e. the largest factor by which the performance of this distributed algorithm is away from that of an optimal, centralized algorithm, is analyzed. Lower and upper bounds on the suboptimality of the distributed algorithm are obtained, and both bounds are shown to be tight. The exact worst-case performance is obtained for some ring topologies. While distance-d distributed algorithms have been analyzed for the 1-hop interference model, an open problem in the literature is to extend these results to the K-hop interference model, and the present work initiates the generalization to the K-hop interference model.","PeriodicalId":335477,"journal":{"name":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3427796.3427806","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

A general open problem in networking is: what are the fundamental limits to the performance that is achievable with some given amount of resources? More specifically, if each node in the network has information about only its 1-hop neighborhood, then what are the limits to performance? This problem is considered for wireless networks where each communication link has a minimum bandwidth quality-of-service (QoS) requirement. Links in the same vicinity contend for the shared wireless medium. The conflict graph captures which pairs of links interfere with each other and depends on the MAC protocol. In IEEE 802.11 MAC protocol-based networks, when communication between nodes i and j takes place, the neighbors of both i and j remain silent. This model of interference is called the 2-hop interference model because the distance in the network graph between any two links that can be simultaneously active is at least 2. In the admission control problem studied in the present paper, the objective is to determine, using only localized information, whether a given set of flow rates is feasible. In the present work, a distributed algorithm is proposed for this problem, where each node has information only about its 1-hop neighborhood. The worst-case performance of the distributed algorithm, i.e. the largest factor by which the performance of this distributed algorithm is away from that of an optimal, centralized algorithm, is analyzed. Lower and upper bounds on the suboptimality of the distributed algorithm are obtained, and both bounds are shown to be tight. The exact worst-case performance is obtained for some ring topologies. While distance-d distributed algorithms have been analyzed for the 1-hop interference model, an open problem in the literature is to extend these results to the K-hop interference model, and the present work initiates the generalization to the K-hop interference model.
2 跳干扰模型下无线网络接纳控制分布式算法的性能分析
网络中的一个普遍问题是:在给定资源量的情况下,可实现性能的基本限制是什么?更具体地说,如果网络中的每个节点只拥有其 1 跳邻域的信息,那么性能的极限是什么?在无线网络中,每个通信链路都有最低带宽服务质量(QoS)要求,这个问题就是在这种情况下考虑的。同一邻域的链路会争夺共享的无线介质。冲突图反映了哪些链路对会相互干扰,这取决于 MAC 协议。在基于 IEEE 802.11 MAC 协议的网络中,当节点 i 和 j 之间进行通信时,i 和 j 的邻居保持沉默。这种干扰模型被称为 2 跳干扰模型,因为在网络图中,任何两条可以同时活动的链路之间的距离至少为 2。在本文研究的接纳控制问题中,目标是仅使用本地化信息来确定一组给定的流量是否可行。在本文中,针对这一问题提出了一种分布式算法,其中每个节点只掌握其 1 跳邻域的信息。本文分析了分布式算法的最坏情况性能,即该分布式算法的性能与最优集中式算法的性能相差最大的因素。得出了分布式算法次优性的下限和上限,并证明这两个上限都很紧。对于某些环形拓扑结构,还得到了精确的最坏情况性能。虽然距离分布式算法已针对 1 跳干扰模型进行了分析,但文献中的一个未决问题是如何将这些结果扩展到 K 跳干扰模型,而本研究正是将这些结果推广到 K 跳干扰模型的第一步。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信