Professional Documents
Culture Documents
Abstract— The benefits of network coding on multicast in Index Terms— Cognitive radio networks, multicast, network
traditional multihop wireless networks have already been coding, chance-constrained optimization, convex optimization.
extensively demonstrated in previous works. However, most
existing approaches cannot be directly applied to multihop I. I NTRODUCTION
cognitive radio networks (CRNs), given the unpredictable
primary user occupancy on licensed channels. Specifically, due to
the unpredictable occupancy, the channel’s available bandwidth
D UE to the pressing demand of efficient frequency
spectrum usage, cognitive radio networks (CRNs) [1]
have spurred a wide range of research interests and emerged
is time-varying and uncertain. Accordingly, the capacity of the
link using that channel is also uncertain, which can significantly as a promising technology to improve the spectrum utilization.
affect the network coding subgraph optimization and may In CRNs, with the proliferation of computationally powerful
result in severe throughput loss if not properly handled. In this wireless devices and compelling demand on diversified ser-
paper, we study the problem of network coding-based multicast vices, providing multicast services for secondary users (SUs),
in multihop CRNs while considering the uncertain spectrum especially in a multi-hop fashion, is urgently needed [2]–[5].
availability. To capture the uncertainty of spectrum availability,
we first formulate our problem as a chance-constrained program. Therefore, it is crucial to improve the performance of multicast
Given the computational intractability of the above-mentioned in multi-hop CRNs.
program, we then transform the original problem into a During the past decade, network coding [6] has been
tractable convex optimization problem, through appropriate proposed to improve the network resource utilization. By
Bernstein approximation with relaxation on link scheduling. combining multiple input packets into one packet algebraically
We further leverage Lagrangian relaxation-based optimization
techniques to propose an efficient distributed algorithm for the before forwarding, network coding is able to increase the
original problem. Extensive simulation results show that the multicast capacity [6]. The throughput benefits of network
proposed algorithm achieves higher multicast rates, compared coding on multicast in multi-hop wireless networks have been
with a state-of-the-art non-network coding algorithm in multihop well recognized in previous works, e.g., [7]–[14]. However,
CRNs, and a conservative robust network coding algorithm that almost all these works focus on traditional multi-hop wireless
treats the link capacity as a constant value in the optimization.
networks rather than multi-hop CRNs. Then, a question nat-
Manuscript received June 25, 2015; revised March 11, 2016, urally arises: whether network coding can still enhance the
October 22, 2016, and February 4, 2017; accepted February 7, 2017; approved multicast throughput in multi-hop CRNs or not?
by IEEE/ACM T RANSACTIONS ON N ETWORKING Editor D. Goeckel. This Indeed, most existing works on network coding-based multi-
work was supported in part by the State Key Development Program for
Basic Research of China (973 Project) under Grant 2014CB340303, in part cast cannot handle new challenges arising from CRNs, e.g., the
by the National NSF of China under Grant 61103224, Grant 61371124, uncertainty of spectrum availability. Particularly, in the opti-
Grant 61472445, Grant 61422208, and Grant 61272443, in part by the NSF mization of traditional wireless networks, the link capacity is
of Jiangsu Province under Grant BK2011118 and Grant BK20140076, in
part by the CCF-Intel Young Faculty Researcher Program, and in part by the usually assumed as a fixed value [7]–[9], [13], [14]. However,
CCF-Tencent Open Fund. (Corresponding author: Chao Dong.) in CRNs, due to unpredictable primary occupancy on licensed
Y. Qu is with the College of Communications Engineering, PLA Uni- channels, the availability of the channel (i.e., on/off) follows
versity of Science and Technology, Nanjing 210007, China, and also with
the Rocket Force University of Engineering, Xi’an 910025, China (e-mail: some probability distribution in the time domain, while the
quyuben@gmail.com). unoccupied bandwidth of an available channel is uncertain
C. Dong, H. Wang, and C. Tian are with the College of Communications in the frequency domain, in the sense that it is a random
Engineering, PLA University of Science and Technology, Nanjing
210007, China (e-mail: dch999@gmail.com; haiwang@ieee.org; tianchang variable satisfying some certain distribution [15]–[18]. That
126@126.com). is to say, the capacity of a link using that channel is also
H. Dai is with the Department of Computer Science and Technology, Nan- a random variable. The randomness of capacity invalidates
jing University, Nanjing 210023, China (e-mail: dhpphd2003@gmail.com).
F. Wu is with the Department of Computer Science and Engineer- all of the previous approaches on the optimization of coding
ing, Shanghai Jiao Tong University, Shanghai 200240, China (e-mail: subgraph, which is the core of network coding in multi-hop
fwu@cs.sjtu.edu.cn). networks [6]–[11]. Besides, simply replacing the uncertain
S. Tang is with the Naveen Jindal School of Management, University
of Texas at Dallas, Richardson, TX 75080 USA (e-mail: tangshaojie@ link capacity by its expected constant value is not preferable,
gmail.com). since the fruitful information of spectrum availability is not
This paper has supplementary downloadable material available at exploited, which can incur great performance degradation.
http://ieeexplore.ieee.org, provided by the authors. This consists of detailed
proofs of Theorems 1 and 2. In this paper, we study how to maximize the data rate of
Digital Object Identifier 10.1109/TNET.2017.2666788 a multicast session by intra-session network coding [9] in
1063-6692 © 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
multi-hop CRNs. To the best of our knowledge, this is the first state-of-the-art non-network coding algorithm in
work to study the problem of network coding-based multicast multi-hop CRNs, which achieves the promising benefit
in multi-hop CRNs, by taking into account the uncertainty of network coding in such scenarios. Moreover, our
of spectrum availability. Different from existing works, we decentralized algorithm outperforms the conservative
model the link capacity as a random variable instead of a fixed robust network coding algorithm without regard for
value, which captures the uncertainty of spectrum availability uncertain spectrum availability, in terms of multicast
in CRNs. To deal with the random variables in the constraints, rate.
we cast these constraints as chance constraints [19]–[21], The rest of this paper is organized as follows. Section II
i.e., candidate solutions are required to satisfy the random and Section III describe the network model and preliminaries,
constraints with a given probability. and problem formulation, respectively. In Section IV, we use
However, chance constraints are usually more difficult to Bernstein approximation to translate the chance constraints
tackle because these constraints are typically nonconvex and into tractable convex constraints. An efficient distributed algo-
sometimes difficult to be expressed in a closed form [19]. rithm is developed in Section V. VI extends our solution to the
Another challenge in our problem is that since the available multiple multicast flows case. We conduct performance evalu-
channels at different nodes could be different in multi-hop ation via extensive simulations in Section VII. In Section VIII,
CRNs, how to efficiently schedule the links under the channel we review the related work. Finally, Section IX concludes the
availability is also a critical concern. Note that the scheduling paper.
for SUs’ data transmission in multi-hop CRNs can be done II. N ETWORK M ODEL AND P RELIMINARIES
either in frequency domain or in time domain. In this work, In this section, we will first introduce the basic network
we focus on the scheduling in the frequency domain. model used in our work, then interpret the modeling of
To overcome the above challenges, we first employ uncertain spectrum availability in CRNs, and lastly, explain
Bernstein approximation techniques [19] to translate the the coding subgraph optimization in multi-hop CRNs.
aforementioned chance constraints into convex computable
constraints. Although Bernstein approximation has been A. System Model
applied in previous studies, the main novelty as well as We consider a multi-hop CRN, where N secondary
difficulty here is how to properly choose the approximation users (SUs)1 share C orthogonal channels that can be accessed
bounds according to our problem, to ensure both feasibility by SUs when they are not occupied by primary users (PUs).
and tractability in the transformation. Further, we encapsulate The set of nodes is denoted by N = {1, 2, . . . , N }, and the
the constraints of hyperarc-channel scheduling in a two- set of channels is denoted by C = {1, 2, . . . , C}. Each node
dimensional conflict graph (TDCG), and eventually obtain an is equipped with two radios: one is a half-duplex cognitive
optimization problem that can be solved by common convex radio (CR) that can switch among the channels for data
optimization approaches. Specifically, we decompose the transmissions, and the other is a half-duplex normal radio
overall problem into two relatively independent subproblems, working on a common control channel (CCC) for exchanging
i.e., a multiple-shortest-paths problem with channel control messages [5]. In this work, we assume that the location
availabilities constraints and a maximum-weighted-stable-set of all SU nodes is fixed and known.2 By exchanging the
problem on the TDCG, respectively. Then, we propose an geographical location information through CCC, the distance
efficient distributed algorithm for network coding-based between any two neighbor nodes can be calculated. With CR,
multicast in multi-hop CRNs, to simultaneously optimize the each node can identify the set of current available channels
flow rate and coding subgraph with channel selection. through existing spectrum sensing techniques [22], [23].
Our main contributions are summarized as follows: Following most previous works [3], [5], we suppose that
1) We for the first time study the problem of network the available channels at a SU may be different from those
coding-based multicast in multi-hop CRNs under uncer- at another one in the network, considering the geographical
tain spectrum availability, and formulate the problem as location differences of the SUs. Let Ci ⊆ C represent the set
a chance-constrained program. Specifically, we capture of available channels at SU i ∈ N , and CJ ⊆ C denote the
the uncertainty of link capacity in chance constraints, set of
common available channels at a set of nodes J, i.e.,
and encapsulate both hyperarc scheduling and channel CJ = j∈J Cj . Following [3], [5], [18], we assume that the
selection into multiple hyperarc-channel tuples repre- channel availability at SUs is assumed quasistatic, i.e., the
sented by the TDCG. available channel set Ci varies with time but does not change
2) We transform the formulated chance-constrained pro- in a short period of time. In this work, we mainly consider
gram into a computationally tractable convex problem, the scheduling in frequency domain other than time domain,
through appropriate Bernstein approximation and relax- in terms of assigning frequency bands (channels). We note
ation of finding stable sets on the TDCG. We decom- that our assumption of an available channel c at SU i means
pose the convex problem into two separate subproblems that SU i can transmit and receive data on channel c without
by using Lagrangian relaxation, and then propose an causing interference to the licensed PU of channel c.
efficient distributed algorithm for network coding-based
1 SU and node will be used interchangeably in the rest of this paper.
multicast in multi-hop CRNs. 2 When the locations is not fixed but randomly moving, we can pursue the
3) Simulation results show that, the proposed decentralized approaches like stochastic geometry and random graph to model the network
algorithm achieves higher multicast rate than the as in many previous works [44], [45].
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
satisfying some certain probability distribution. Notice that where x is a decision parameter vector, ε ∈ (0, 1) is a
based on [15]–[17], the availability of a channel follows an given tolerance, and {ξi }i=1,...,k are independent variables
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
with known probability distribution {Pi }i=1,...,k . Bernstein sink cannot exceed the corresponding injection rate restricted
approximation can be applied if the two following assumptions by the coding subgraph. The other is about the scheduling of
hold: hyperarcs, i.e., two hyperarcs cannot simultaneously transmit
1) {fi (x)} are affine in x for i = 1, . . . , k; if they conflict.
2) The distributions from Pi are commonly supported on 1) Link Capacity Constraint on the Coding Subgraph:
[−1, 1], i.e., for all i = 1, . . . , k, −1 ≤ ξi ≤ 1. We define biJK (c) as the ratio of the sum of any successful
Note that the final transformed constraint is determined by reception rate that relates to subset K ⊆ J, to the injection
both the probability distribution information of {ξi }i=1,...,k rate on hyperarc (i, J) through channel c, i.e.,
and the form of {fi (x)}.
Ì
{S|S⊂J,S K=∅}
ziJS (c)
biJK (c) = . (3)
III. P ROBLEM F ORMULATION ziJ (c)
In this section, we formulate the problem of network coding- If channel c is lossless, we have biJK (c) = 1 for all nonempty
based multicast in multi-hop CRNs. The objective is to find K ⊆ J and biJ∅ (c) = 0. Then, for the link rate requirement on
the flow rates and coding subgraphs with channel selection, the coding subgraph [8], [11], i.e., the flow rate for any sink
with the consideration of uncertain spectrum availability, cannot exceed the rate determined by both coding subgraph
such that the multicast rate R is maximized. In general, we and channel quality, we have
should consider the following constraints: flow rate constraints,
coding subgraph constraints, and link capacity constraints.
d
fiJj (c) ≤ ziJ (c)biJK (c). (4)
Note that with network coding, the routing issue has been j∈K
taken into account by the coding subgraph optimization as 2) Hyperarc Scheduling Constraint on the Coding
well as the flow balance and link capacity. We now specify Subgraph: Next, we deal with more complex scheduling
these constraints separately in detail. constraints on hyperarcs. According to [8], z should be
restricted with a convex subset. The core is to decide
A. Flow Rate Constraints
which sets of hyperarcs can transmit simultaneously without
A flow rate constraint requires that the amount of incoming conflict. However, this depends on the interference model
traffic rate equals to the amount of outgoing traffic at every of the network. In this study, we consider a more general
node in the network. We denote by fiJj d
(c) the data rate secondary interference model [11]. That is, since there is
for sink d from node i to node j ∈ J, when packets are only one radio for data transmission at each node, at a certain
actually transmitted on virtual wireless broadcast link (i, J), time, each node is constrained to receive from at most one
using channel c. To explicitly demonstrate the dependency of other sending node, and can only successfully receive if all
a broadcast link on a specific channel, we define other neighbors on the same channel are silent.
One may just follow the similar approach in [8] and [11]
Tic = {j|dij ≤ rT , j = i, c ∈ Ci Cj }, (1)
using a conflict graph on the hypergraph only to capture the
where dij is the distance between node i and j, and rT is the conflict of hyperarcs. This kind of hyperarc conflict graph,
transmission range of node i. Tic is thus the set of nodes that however, cannot be directly applied mainly because the hyper-
node i can simultaneously transmit data to through channel arc conflict graph is insufficient in describing the extra conflict
c. Note that the difference between Tic and J in a hyperarc in competing for channels. Take a simple example. According
(i, J) is that the former clearly specifies the common available to the hyperarc conflict graph, hyperarc (i1 , J1 ) interferes
channel, while the latter does not. with hyperarc (i2 , J2 ). Actually, the two hyperarcs may not
According to the max-flow min-cut theorem in [6], there interfere, if they employ different channels. Using such a
exists a flow vector fiJjd
(c) for each sink d, which satisfies hyperarc conflict graph will definitely decrease the number
⎧ of simultaneously active links, which results in throughput
⎪
⎨R i=s degradation in the end.
fiJj (c) −
d
fjIi (c ) = −R i ∈ D
d In this work, inspired by [24], we develop a two-
⎪
⎩ dimensional conflict graph (TDCG) to describe the conflicts
J⊆Tic j∈J {j|I⊆Tjc ,i∈I} 0 otherwise,
over hyperarcs and channels jointly. Each vertex in the TDCG
(2)
represents a hyperarc-channel tuple, a basic resource point in
for all d ∈ D. The first and second parts in the left of (2) the multi-hop CRN. The TDCG is thus a graph that illustrates
correspond to the total outgoing rate and total incoming rate, the conflict relationships among the resource points in the
respectively. If node i is the source node, its outgoing rate is multi-hop CRN. A tuple w is defined in the format as follows:
R and incoming rate is 0. If i is one of the sinks, its outgoing
hyperarc-channel tuple: [(i, J), c],
rate is 0 and incoming rate is R. Otherwise, node i is an
intermediate node, and its outgoing rate should be equal to its where (i, J)∈ A and c ∈ Ci CJ . The tuple [(i, J), c] indicates
incoming rate. that the hyperarc (i, J) operates on channel c. Consider two
tuples w1 = [(i1 , J1 ), c1 ] and w2 = [(i2 , J2 ), c2 ]. We say that
B. Coding Subgraph Constraints w1 and w2 do not conflict if the following conditions hold:
Similar to [7]–[9], and [11], the constraints of coding i1 = i2 ; 2) i1 ∈ J2 ; 3) i2 ∈ J1 ; 4) J1 J2 = ∅; 5)
1)
subgraph include two types. One is that the link rate for any J1 Tic22 = ∅ and J2 Tic11 = ∅ when c1 = c2 .
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
z = (ziJ (c))(i,J)∈A,c∈C ∈ PSTAB (G). (6) 3 We here assume that all nodes use the same power for transmission.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
it means that there exists no interference among the broadcast to verify. Specifically, the feasible set of (12) can be either
link (i, J). convex or non-convex, which depends on the distribution
Intuitively, one may easily have the following constraints of hiJ (c) [19]. Typically, if [aT bT ]T has a symmetric
for the flow rate requirement, i.e., the aggregate data rates on logarithmically concave density, Pr{aT x < b} ≥ 1 − is
each broadcast link (i, J) cannot exceed the link’s capacity on convex for < 1/2 [19]. However, it is still unclear how
channel c [11], [14] to compute the closed form of the probability even if it is
convex [19], making the problem intractable.
d
fiJj (c) ≤ hiJ (c), c ∈ Ci , , K ⊆ J ⊆ Tic . (11)
d∈D j∈K
IV. B ERNSTEIN A PPROXIMATION TO THE
However, the link capacity hiJ (c) in (11) is actually a C HANCE -C ONSTRAINED P ROGRAM
random variable and thus uncertain — not knowing what the
exact value is. The standard way to treat such uncertainty is In this section, we propose a conservative convex approx-
to pass from the uncertain constraint to its chance-constrained imation approach. Bernstein approximations are known as
version [19]–[21] an useful class of approximation techniques for chance con-
⎧ ⎫ straints [19]–[21]. However, it should be careful to choose the
⎨ ⎬ appropriate approximation form according to the characteristic
Pr d
fiJj (c) − hiJ (c) ≤ 0 ≥ 1 − εiJ (c), (12) of the link capacity constraints. And in the transformation,
⎩ ⎭
d∈D j∈K both the feasibility and tractability should be ensured. Specif-
where εiJ (c)∈ (0, 1)
is thecorresponding violation tolerance. ically, we should replace the chance constraints with a series
Define ε i∈N c∈Ci J⊆T c εiJ (c). By setting ε 1, of constraints Υ, such that (i) any solution satisfies (12) when
i
we can guarantee that for all c ∈ Ci , J ⊆ Tic , K ⊆ J, it is feasible for Υ (safe approximation), and (ii) the con-
constraints like (11) hold with a high probability 1-ε.4 The straints in Υ are convex and efficiently computable (tractable
chance constraint based approach to modeling data uncertainty approximation). In the rest of this section, we describe the
in optimization theory was initially proposed in [33] and approximation approach in two steps, presented by Theorem 1
followed by a huge literature (please refer to [21] for the and Theorem 2, respectively.
references therein). For simplicity, we define fiJj (c) d∈D fiJj d
(c). Then,
(12) turns to be
⎧ ⎫
D. Network Coding-Based Multicast in Multi-Hop CRNs ⎨ ⎬
Putting the three types of constraints together, we have the Pr fiJj (c) − hiJ (c) ≤ 0 ≥ 1 − εiJ (c). (13)
⎩ ⎭
following chance-constrained program: j∈K
and the latter one can be derived from (15). The detailed proof techniques. However, the new problem is still NP-hard in
is provided in Appendix A. general, owing to the aforementioned combinatorial difficulty
In light of Theorem 1, we can use a series of constraints in (6). Fortunately, enlightened by [11], after relaxing (6) of
finding all MLSSs rather than MMSSs in the TDCG, we can
Υ : inf { d
fiJj (c) + ρ log E[exp(−ρ−1 hiJ (c))]
ρ>0 employ the dual decomposition method to obtain an efficient
d∈D j∈K
and decentralized solution.d
−ρ log(εiJ (c))} ≤ 0, i ∈ N , J ⊆ Tic , c ∈ Ci (16)
Let fijd (c) J⊆T c fiJj (c), where ∀i ∈ N and j ∈ Tic ,
i
to replace (12) in the chance-constrained program, so that an with the clear understanding that fiJj d
(c) = 0 if j ∈ Tic .
optimal solution to the new problem is a feasible suboptimal Therefore, fijd (c) represents the flow rate
of innovative packets
solution to the original problem. However, the closed form of on link (i, j) using channel c (c ∈ Ci Cj ) for sink d.
Υ is still hard to compute, owing to the uncertain expectation The optimization problem is converted into
value and the inf(·) function.
Next, we exploit some useful distribution features including maximize R
the support, unimodality, symmetry of the distribution, to subject to (2), (4), (6), and
obtain a computationally tractable approximation, which is fijd (c) ≤ ĥiJ (c), i ∈ N , K ⊆ Tic ,
presented by the following theorem. d∈D j∈K J⊆Tic
Theorem 2: Suppose that for a given εiJ (c) > 0, there (18)
exists f = (fiJj (c))j∈K ≥ 0 such that (15) holds, where Φ(f)
is defined by (14). If the distribution of hiJ (c) has bounded where ĥiJ (c) βiJ (c) − αiJ (c)ν − + αiJ (c)σ 2 log( εiJ1(c) ).
support [aiJ (c), biJ (c)], we then have
d
fiJj (c) ≤ βiJ (c) − αiJ (c)ν − A. Dual Decomposition and Subgradient Method
d∈D j∈K We form the dual problem by introducing the Lagrange
multipliers for constraints in (4) and (18). By introducing dual
1
+ αiJ (c)σ 2 log( ), (17) variables λ (λdiK (c)) ≥ 0, μ (μiK (c)) ≥ 0 to relax
εiJ (c) (4) and (18) respectively, and moving them to the objective
which implies (13), where αiJ (c) = 12 (biJ (c) − aiJ (c)) = 0, function, we have
βiJ (c) = 12 (biJ (c) + aiJ (c)), and ν − , σ are the constants θ(λ, μ) = max L(R, f, z, λ, μ)
related to the probability distribution of hiJ (c). R,f,z
Proof: The proof mainly utilizes the following inequality subject to (R, f) ∈ QF (19)
2
Ω(y) ≤ max{ν − y, ν + y} + σ2 y 2 , where ν − , ν + ∈ [−1, 1] z ∈ PSTAB (G), (20)
and σ ≥ 0 are constants that depend on the given fami-
lies of probability distributions of y with bounded support where f = (fijd (c)) ≥ 0, z = (ziJ (c)) ≥ 0, and the flow
[−1, 1]. Since hiJ (c) may not be bounded in [-1, 1], e.g., polytope QF is defined by (2). The corresponding Lagrangian
hiJ (c) ∈ [aiJ (c), biJ (c)], we need to normalize hiJ (c) as is given by
follows: ζiJ (c) hiJ (c)−β iJ (c)
, where αiJ (c) 12 (biJ (c) − λ, μ)
L(R, f, z,
αiJ (c)
aiJ (c)) = 0 and βiJ (c) 12 (biJ (c)+aiJ (c)). And substituting = R+ λdiK (c)
ζiJ (c) in the inequality can derive the final approximation. The c
⎛ d∈D i∈N c∈Ci K⊆Ti ⎞
detailed proof is provided in Appendix B.
The above approximation can be implemented in ×⎝ ziJ (c)biJK (c) − fijd (c)⎠
reality as follows. First, in practice, SUs learn the exact J⊆Tic
⎛ j∈K ⎞
probability distribution of hiJ (c) to determine the values
of αiJ (c), βiJ (c), ν − , σ. In this study, we assume that SUs + μiK (c)⎝ ĥiJ (c)− fijd (c)⎠
can accurately obtain the probability distribution of B c by c c
the methods proposed in existing measurement data studies ⎛ i∈N c∈Ci K⊆Ti J⊆Ti d∈D j∈K
[15]–[17], [42] in advance. The estimation of the probability = ⎝R − λdiK (c) fijd (c)
distribution of B c can be seen as a warmup for the evaluation d∈D i∈N c∈Ci K⊆Tic j∈K
of the proposed algorithm in real world. Since we focus on ⎞
the long-duration application, the cost of this warmup will be − μiK (c) fijd (c)⎠
small, compared with the performance gain. The effect of the i∈N c∈Ci K⊆Ti d∈D j∈K c
We note that (17) is linear and thus convex, which may The first term in the above equation depends only on the
enable the whole problem to be solved by convex optimization flow rate variables fijd (c), while the second term relies solely
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
on the coding subgraph variables ziJ (c). Therefore, the dual where qijd
(c) = {K|K⊆Tic ,j∈K} (λiK (c) + μiK (c)). This
d
function can be computed by decomposing the optimization subproblem is a multiple-shortest-paths problem owing to the
problem into following subproblems: conservation constraints in the flow polytope QF . Addition-
θ(λ, μ) = max L(R, f, z, λ, μ) ally, the subproblem is similar to the subgraph optimization
{R,f,z} problem in [11], except that we should consider the channel
= θ1 (λ, μ) + θ2 (λ) + θ0 , (22) selection for every link under a given set of available channels.
Solving (28) is equivalent to searching for each sink d ∈ D,
where d
the shortest path with respect to the cost qij (c) from the source
θ1 (λ, μ) s to sink d, ensuring that there is at least a common channel
= max available for each link in the path. Moreover, to maximize (28),
(R,f)∈QF ,0≤R≤1
⎛ we need to increase R and make the right expression small.
Nevertheless, R and f are coupled by QF . Fixing R, we should
× ⎝R − λdiK (c) fijd (c) minimize the cost:
d∈D i∈N c∈Ci K⊆Tic j∈K
⎞
min d
qij (c)fijd (c), (29)
fijd (c)⎠,
f
− μiK (c) (23) d∈D i∈N c∈Ci j∈Tic
i∈N c∈Ci K⊆Tic d∈D j∈K
for s to each d supporting end-to-end throughput R. (29) can
θ2 (λ) ⎛ be seen as a minimum-cost network problem without capacity
constraints [11]. Consequently, it is sufficient for each of the
= max ⎝ λdiK (c)
z∈PSTAB (G) D parallel optimization problems to find a single minimum-
d∈D i∈N c∈Ci K⊆Tic
⎞ cost path from s to d with an available channel for each link.
Since each of the flows in the minimum-cost path carries the
× ziJ (c)biJK (c)⎠, (24) total throughput R as there is only one active path from s to
J⊆Tic
d and one channel for each link, (28) can be reformulated as
θ0 = μiK (c) ĥiJ (c). (25) ⎛ ⎞
i∈N c∈Ci K⊆Tic J⊆Tic
max ⎝R(1 − d
qij (c))⎠, (30)
In the first subproblem, similar as in [11], we add a R,0≤R≤1
d∈D (i,j,c)∈Psd
redundant constraint on R (0 ≤ R ≤ 1), since by the
definitions of ziJ (c) and biJK (c), and constraint (4), the rate R where Psd denotes the collection of links (i, j) with channel c
cannot be larger than one. This constraint is to avoid handling (c ∈ Ci Cj ) in the minimum-cost path from s to d. If the sum
possibly unbounded solutions. Then, we have the following of costs in all paths from source s to all sinks is less than 1,
dual problem the maximum is 1 for R̂ and for those link flows fˆijd (c) with
(i, j, c) ∈ Psd . Otherwise, the maximum is zero by setting
minimize θ(λ, μ) both R and f to zero.
subject to λ ≥ 0, μ ≥ 0. To solve (30), we have to determine D shortest paths, which
Since θ(λ, μ) may not be differentiable, we apply the well- can be distributively solved by the asynchronous Bellman-Ford
known subgradient projection method to solve the above dual algorithm [35]. Since all qijd
(c) are greater than zero, there
problem. And the update rules are given by exist no cycles with negative costs and thus the shortest path
algorithms converge [35] in O(M N ) time, where M and N
λ[t + 1] = {λ[t] − η1 [t]Δ1 [t]}+ (26) are the number of arcs and nodes, respectively. In fact, in
μ[t + 1] = {μ[t] − η2 [t]Δ2 [t]}+ , (27) our problem, the time complexity is O(M N C), where C is
where {x}+ max(x, 0), η1 [t] and η2 [t] are the maximal number of available channels.
We now consider the second subproblem, which can be
corresponding
appropriate stepsizes,
and Δ1 [t] =
( J⊆T c ẑiJ (c)[t]b̂iJK (c) − fˆd (c)[t]), Δ2 [t] =
rewritten as
i j∈K ij ⎛ ⎞
( J⊆T c ĥiJ (c) − d∈D j∈K fˆijd (c)[t]). f̂[t] = (fˆijd (c)[t])
i
and ẑ[t] = (ẑiJ (c)[t]) are the solutions of subproblems (23) ẑ = arg max ⎝ wiJ (c)ziJ (c)⎠, (31)
z∈PSTAB (G) i∈N c∈Ci J⊆Tic
and (24) respectively, at step t. And b̂iJK (c) can be locally
calculated by node i. We will solve these subproblems in a where weights wiJ (c) = d∈D K⊆Tic (λiK (c)biJK (c)).
d
decentralized way in Section V-B. The weight wiJ (c) of a node i is just a function of local
B. Flow Optimization and Scheduling Subproblem Solution variables λdiK (c) and biJK (c)), which enables us to design a
Rearranging (23) yields distributed scheduling algorithm. This is a standard maximum-
weight-stable-set (MWSS) problem in the scheduling litera-
(R̂, f̂) ture [36], which is NP-hard in general. A worth emphasizing
⎛ ⎛ ⎞⎞
point is that the weight is not only related to the hyperarc
= arg max ⎝R− ⎝ d
qij (c)fijd (c)⎠⎠, but also the channel they choose. We have encapsulated both
(R,f)∈QF ,0≤R≤1 i∈N c∈Ci j∈Tic
d∈D the hyperarc and channel in a tuple in the proposed TDCG.
(28) To obtain an efficient solution, we relax the maximum weight
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
stable set constraint and instead search a maximal stable link (i, J), using channel c. Similar to (2), there exists a flow
set. The relaxed problem can be solved using the distributed vector xdfiJj (c) for each sink d ∈ Df , which satisfies
algorithm in [36]. The input of the algorithm is a weighted df
indirected graph and the output is a stable set with high weight. xiJj (c) − xdf
jIi (c )
Further, the output stable set is guaranteed to be maximal too. J⊆Tic j∈J {j|I⊆Tjc ,i∈I}
And the algorithm converges in just 2δ(G) steps, where δ(G) ⎧
⎨ Rf i = sf
is the stability number of the conflict graph G [36]. = −Rf i ∈ Df (33)
The sequence of f̂[t] and ẑ[t] iterated by subgradient ⎩
0 otherwise,
optimization methods might be infeasible [37]. To recover
the primal solution, we employ a classical primal recovery for all f ∈ F and d ∈ Df .
method [37], which averages the intermediate optimal values, 2) Coding Subgraph Constraints: The coding subgraph
i.e. constraints contain the restriction of coding subgraph on the
link rate and the conflict on the hyperarc scheduling. Note that
1 1 1
T T T
R∗ = R̂[t], f∗ = f̂[t], z∗ = ẑ[t]. (32) in the multiple flows case, the definitions of biJK (c), ziJ (c)
T t=1 T t=1 T t=1 and ziJS (c) are the same as in the single flow case. For the
This approach can converge to the primal optimal solution first constraint, similar to (4), the flow rate for any sink of a
a flow should be no more than the rate restricted by the coding
for a stepsize b +c t with a > 0, b ≥ 0 and c > 0 [37].
Since both the flow optimization subproblem and scheduling subgraph combined with channel quality. That is,
subproblem can be distributively solved, our proposed solu- df
xiJj (c) ≤ ziJ (c)biJK (c), ∀d ∈ Df , f ∈ F. (34)
tion is also distributed. In the implementation, each node i j∈K
firstly initializes its variables, i.e., dual variables λ[0], μ[0],
flow rate variables fijd (c)[0] and coding subgraph variables For the second constraint of scheduling on the coding sub-
ziJ (c)[0]. Then, given λ[t] and μ[t], each node solves the two graph, it deals with the scheduling of hyperarcs with channels
subproblems to obtain the locally optimal flow rate fˆijd (c)[t] only, which has nothing to do with the flows and their
and injection rate ẑiJ (c)[t], and exchanges this information to rates. When there are multiple multicast flows, the con-
its corresponding neighbors by the CCC. Each node updates structed TDCG keeps unchanged. Accordingly, this constraint
the dual variables using (26) and (27), and repeats the afore- is exactly the same as (6).
mentioned process until the algorithm converges. 3) Link Capacity Constraints: In the multiple flows case,
the aggregate data rate on broadcast link (i, J) is the
VI. E XTENSION TO M ULTIPLE M ULTICAST F LOWS sum
offlow rate over all sinks in all data flows, i.e.,
df
f ∈F d∈D j∈K xiJj (c). The definition of link capacity
So far, we only focus on the single multicast flow case.
In this section, we introduce how to extend our theoretic hiJ (c) is same as (10). In a similar way, to deal with the
framework to the multiple multicast flows case. Generally, in uncertainty of link capacity, we employ chance constraints to
this case, the optimization problem turns into how to maximize model link capacity constraints in the following:
⎧ ⎫
the sum rates of all multicast flows subject to the three types ⎨ ⎬
of constraint similar as in the single multicast flow case. In the xdf
Pr iJj (c) − hiJ (c) ≤ ≥ 1 − εiJ (c), (35)
following, we will first present the problem formulation, and ⎩ ⎭
f ∈F d∈D j∈K
then briefly discuss how to extend the solution to the multiple
multicast flows case. where εiJ (c) ∈ (0, 1) is the corresponding violation tolerance.
Suppose there are F multicast flows in the network and Therefore, the problem of network coding-based multicast
denote the flow set as F = {1, . . . , F }. The f th multicast in multi-hop CRNs with multiple data flows can be mathemat-
flow is associated with a source sf ∈ N and sinks Df = ically formulated as
{1, . . . , Df } ⊂ N , for f ∈ F. Let Rf be the multicast rate
maximize U (Rf )
of flow f ∈ F. Note that since we consider the intra-flow
f ∈F
network coding policy in this paper, the coding operation at
the intermediate nodes is executed in the same flow only. subject to (33), (34), (6), (35),
First of all, the objective function becomes f ∈F U (Rf ), where xdfiJj (c) ≥ 0 and ziJ (c) ≥ 0 are optimization variables,
where the utility function U (Rf ) is non-decreasing and corresponding to flow rate and coding subgraph, respectively.
strictly concave. With the properly chosen utility function, It is not difficult to see that the above problem shares a
maximizing the objective function can achieve the fairness very similar form with the chance-constrained program for a
among the flows [38]. Two classical examples of U (Rf ) single multicast flow defined in Section III-D, which can be
R1−γ
are wf log(1 + Rf ) and wf 1−γ f
, where wf is the weight solved by a similar approach, since the objective function is
associated with flow f , and 0 ≤ γ < 1. Next, we interpret convex. Specifically, via Bernstein approximation introduced
the three types of constraint one by one in details. in Section IV, we can first transform the chance constraint (35)
1) Flow Rate Constraints: Let xdfiJj (c) be the data rate for into a safe and tractable constraint. Then, the transformed
sink d ∈ Df (f ∈ F) from node i to node j ∈ J, when problem can be efficiently solved using a dual decomposition
packets are actually transmitted on virtual wireless broadcast and subgradient method similar as in Section V.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
the objects of comparison in our evaluation, then explain the is thus rT = (γQ/η) n = (1.6 × 105 ) 4 = 20. To evaluate
explicit simulation parameters setting, and lastly present the the performance of our proposed algorithm under different
evaluation results for a single multicast flow and multiple channel qualities, we add a uniform artificial channel erasure
multicast flows. rate p in the erasure model, i.e., any successful reception is
dropped with probability p, where we change p from 0.05
A. Objects of Comparison to 0.25 in the simulations. We also suppose that the erasures
across different receivers are independent. For the tolerance
Our decentralized algorithm offers a feasible solution level, we set εiJ (c) = 0.01 for all i ∈ N , c ∈ Ci , J ⊂ Tic .
to the chance-constrained program. Firstly, to evaluate the For the channel setting, we assume that there are C = 5
gap between our algorithm and the optimal solution, we licensed channels that can be opportunistically used by SUs.
can remove constraint (12) in the program, whose solution The number of available channels at each node is randomly
forms an upper bound of the performance of our proposed selected from [1, C], and the exact set of available channels is
algorithm. Since the modified program is apparently a normal randomly constructed from the channel pool {1, 2, . . . , C}.
convex problem, we then solve it using the similar dual As to the probability distribution of the channel band-
decomposition and subgradient method and label the new width B c , its exact expression is determined by the cor-
solution as “Upper bound” in the figures. As is known to all, responding occupancy of PUs. Based on the measurement
there is no available network coding-based multicast algorithm study on spectrum utilization in [15], the distribution can be
for multi-hop CRNs in existing literatures. Therefore, we exponential. Accordingly, we first consider the exponential
employ the following algorithm to validate the use of the case, i.e., B c ∼ E(υ c ), where υ c ∈ (0, 3]. Note that different
chance-constrained program. channel c may have different distribution parameter υ c . In
Specifically, we incorporate an approach called as Robust our simulations, we randomly choose υ c from (0, 3] for each
network coding that simply substitutes the bandwidth B c to the channel c to simulate heterogeneous channels. Moreover, to
expectation value of B c in the link capacity hiJ (c). It should validate the effectiveness of our proposed algorithm, we also
be noted that this algorithm employs network coding in the conduct a similar simulation study on a normal bandwidth
multicast transmission but does not consider the uncertainty distribution, i.e., B c follows a normal distribution, B c ∼
of spectrum availability. Note that the robust network coding 2
N (μ , σ ). In the simulations, μ and σ are set as 2 and 1,
algorithm also employs a dual decomposition and subgradient respectively. Worth noting that the analysis and results can be
method similar as in our proposed decentralized algorithm. easily extended to any other distribution.
Besides, to show the benefits of network coding on multicast in As to the initialization of Lagrange multipliers in our
multi-hop CRNs, we implement the approach (labeled “Non- proposed algorithm and three other algorithms, we set the
network coding” in the figures) in [3] that studies multicast in initial values of λdiK (c) and μiK (c) to be different random
multi-hop CRNs without network coding. values chosen from (0, 0.1). Also, we run these algorithms
with the stepsizes chosen to be η1 [t] = 1t and η2 [t] = 1t . Due to
B. Setup the randomly deployment of both nodes and channels as well
For ease of scalability, the distance, rate, bandwidth and as the inherent spectrum scarce and limited transmission range
power are normalized with appropriate dimensions in our of nodes, there may exist disconnections between the source
simulation. We conduct simulations with a CRN over random and some destinations, which results in no feasible solution
network topologies, where nodes are randomly placed on for some specific data set. Therefore, in this study, we focus
a square region. We evaluate all algorithms in a network only on the data sets with feasible solutions, and present the
topology with 20 nodes on a 80 × 80 square. Specifically, corresponding results in the following subsection.
the location of each node is randomly chosen from the square
region with a uniform probability L1 , where L is the number C. Single Multicast Flow
of locations. We consider the leftmost node to always be 1) Exponential Distribution Case: We first present
the source s and two sets of sinks for the single multicast the simulation results of a single multicast flow with
flow case, i.e., the two rightmost nodes and the five rightmost two and five sinks, when the bandwidth B c follows
nodes, respectively. And for the multiple multicast flows case, exponential distribution, as illustrated in Fig. 3 and Fig. 4,
we suppose that there are three multicast flows (each with respectively. Fig. 3(a) shows the throughput performance of
three sinks). Under our interference model, the link-channel our decentralized algorithm over a multicast flow with two
interference and self-interference at the physical layer are sinks under Exponential distribution, compared to the upper
developed in our simulations after the above settings. bound, robust network coding algorithm and non-network
Following previous works [3], [18], the explicit settings coding algorithm, when the channel erasure rate p varies.
of each node are as follows. The power propagation gain According to the figure, firstly, our algorithm outperforms the
between node i and node j is gij = γd−n ij , where dij denotes non-network coding algorithm, no matter how the channel
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Fig. 3. Maximum multicast rate as a function of channel erasure rate for Fig. 5. Maximum multicast rate as a function of channel erasure rate for
a single multicast flow with two sinks under Exponential distribution, i.e., a single multicast flow with two sinks under Normal distribution,
B c ∼ E(υc ), υc ∈ (0, 3]. (a) Performance comparison of four algorithms. i.e., B c ∼ N (2, 1). (a) Performance comparison of four algorithms.
(b) Performance ratio of our decentralized algorithm. (b) Performance ratio of our decentralized algorithm.
a novel routes selection metric for multi-path routing in [8] D. S. Lun et al., “Minimum-cost multicast over coded packet networks,”
multi-hop CRNs, and validated the effectiveness of the new IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2608–2623, Jun. 2006.
[9] T. Ho and H. Viswanathan, “Dynamic algorithms for multicast with
metric in enhancing end-to-end throughput and increasing intra-session network coding,” IEEE Trans. Inf. Theory, vol. 55, no. 2,
connection reliability by extensive simulations. Shu et al. [41] pp. 797–815, Feb. 2009.
studied the problem of minimizing the end-to-end delay [10] A. Khreishah, I. M. Khalil, and J. Wu, “Distributed network coding-
based opportunistic routing for multicast,” in Proc. ACM MobiHoc,
with multi-path routing in multi-hop CRNs, and proposed 2012, pp. 115–124.
a channel allocation and rate allocation scheme with low [11] D. Traskov, M. Heindlmaier, M. Médard, and R. Koetter, “Scheduling
complexity based on graph coloring. Shi and Hou [40] for network-coded multicast,” IEEE/ACM Trans. Netw., vol. 20, no. 5,
pp. 1479–1488, Oct. 2012.
investigated how to maximize the data rate for several user [12] X. Zhang and B. Li, “On the benefits of network coding in multi-channel
communication sessions with multi-path routing in multi-hop wireless networks,” in Proc. IEEE SECON, Jun. 2008, pp. 341–349.
CRNs, and presented a distributed optimization algorithm that [13] H. Su and X. Zhang, “Modeling throughput gain of network coding in
multi-channel multi-radio wireless ad hoc networks,” IEEE J. Sel. Areas
increases the data rate iteratively for the sessions. Besides, Commun., vol. 27, no. 5, pp. 593–605, Jun. 2009.
considering the uncertain spectrum supply, Pan et al. [18] [14] S. Chieochan and E. Hossain, “Channel assignment for through-
studied the joint multi-path routing and frequency scheduling put optimization in multichannel multiradio wireless mesh networks
problem in multi-hop CRNs. However, compared to the above using network coding,” IEEE Trans. Mobile Comput., vol. 12, no. 1,
pp. 118–135, Jan. 2013.
studies, there are at least two differences from our work. [15] D. Chen, S. Yin, Q. Zhang, M. Liu, and S. Li, “Mining spectrum
First, we intend to employ network coding to pursue further usage data: A large-scale spectrum measurement study,” in Proc. ACM
performance improvement, while they do not use network MobiCom, 2009, pp. 13–24.
[16] M. Mehenry. (Jun. 2003). Spectrum White Space Measurements.
coding in the multi-path routing. When network coding is [Online]. Available: http://www.newamerica.net/Download_Docs/pdfs/
introduced, these studies cannot be applied since they do Doc_File_185_1.pdf
not consider the coding subgraph optimization, which is the [17] M. Wellens, J. Riihijärvi, and P. Mähönen, “Evaluation of adaptive mac-
layer sensing in realistic spectrum occupancy scenarios,” in Proc. IEEE
key issue of network coding-based multicast problems [8]. DySPAN, Apr. 2010, pp. 1–12.
Second, all the aforementioned works focus on the service of [18] M. Pan, C. Zhang, P. Li, and Y. Fang, “Spectrum harvesting and sharing
multiple unicast flows in multi-hop CRNs, which only fits for in multi-hop CRNs under uncertain spectrum supply,” IEEE J. Sel. Areas
Commun., vol. 30, no. 2, pp. 369–378, Feb. 2012.
the data transmission of point-to-point (unicast) other than [19] A. Nemirovski and A. Shapiro, “Convex approximations of chance
point-to-multipoint (multicast). constrained programs,” SIAM J. Optim., vol. 17, no. 4, pp. 969–996,
2006.
IX. C ONCLUSION [20] A. Ben-Tal and A. Nemirovski, “Selected topics in robust convex
optimization,” Math. Program., vol. 112, no. 1, pp. 125–158, 2008.
In this paper, we for the first time studied the network [21] A. Nemirovski, “On safe tractable approximations of chance con-
coding-based multicast problem in multi-hop CRNs, while straints,” Eur. J. Oper. Res., vol. 219, no. 3, pp. 707–718, 2012.
considering the uncertain spectrum availability. We formulated [22] G. Ganesan and Y. G. Li, “Cooperative spectrum sensing in cognitive
radio networks,” in Proc. IEEE DySpAN, Nov. 2005, pp. 137–143.
the overall problem as a chance-constrained program. We [23] T. Yucek and H. Arslan, “A survey of spectrum sensing algorithms for
constructed a TDCG to encapsulate both hyperarc scheduling cognitive radio applications,” IEEE Commun. Surveys Tuts., vol. 11,
and channel selection into hyperarc-channel tuples. Though no. 1, pp. 116–130, 1st Quart., 2009.
[24] Y. Cheng, H. Li, and P.-J. Wan, “A theoretical framework for optimal
appropriate Bernstein approximation and relaxation of finding cooperative networking in multiradio multichannel wireless networks,”
stable sets in the TDCG, we proposed an efficient distributed IEEE Wireless Commun., vol. 19, no. 2, pp. 66–73, Apr. 2012.
algorithm for the original problem. Simulation results showed [25] W. Kim, S. Y. Oh, M. Gerla, and J.-S. Park, “COCAST: Multicast
mobile ad hoc networks using cognitive radio,” in Proc. IEEE MILCOM,
that our algorithm obtains higher multicast rates than the Oct. 2009, pp. 1–7.
non-network coding algorithm and the robust network coding [26] H. M. Almasaeid, T. H. Jawadwala, and A. E. Kamal, “On-demand
algorithm in CRNs. We also extend our theoretic framework multicast routing in cognitive radio mesh networks,” in Proc. IEEE
GLOBECOM, Dec. 2010, pp. 1–5.
to multiple multicast flows. [27] S.-J. Lee, W. Su, and M. Gerla, “On-demand multicast routing protocol
in multihop wireless mobile networks,” Mobile Netw. Appl., vol. 7, no. 6,
R EFERENCES pp. 441–453, 2002.
[1] J. Mitola, III, “Cognitive radio: An integrated agent architecture for soft- [28] A. M. Almasoud and A. E. Kamal, “Robust provisioning of multi-
ware defined radio,” Ph.D. dissertation, Royal Inst. Technol., Stockholm, cast sessions in cognitive radio networks,” in Proc. IEEE IWCMC,
Sweden, 2000. Aug. 2014, pp. 417–422.
[2] J. Jin, H. Xu, and B. Li, “Multicast scheduling with cooperation and [29] K. C.-J. Lin and D.-N. Yang, “Multicast with intraflow network coding
network coding in cognitive radio networks,” in Proc. IEEE INFOCOM, in multirate multichannel wireless mesh networks,” IEEE Trans. Veh.
Mar. 2010, pp. 1–9. Technol., vol. 62, no. 8, pp. 3913–3927, Oct. 2013.
[3] C. Gao, Y. Shi, Y. T. Hou, H. D. Sherali, and H. Zhou, “Multicast [30] Y. Qu et al., “Towards near optimal network coding for secondary users
communications in multi-hop cognitive radio networks,” IEEE J. Sel. in cognitive radio networks,” in Proc. IEEE SECON, Jun./Jul. 2014,
Areas Commun., vol. 29, no. 4, pp. 784–793, Apr. 2011. pp. 522–530.
[4] Z. Shu, Y. Qian, Y. Yang, and H. Sharif, “Channel allocation and [31] A. Fanous, Y. E. Sagduyu, and A. Ephremides, “Reliable spectrum
multicast routing in cognitive radio networks,” in Proc. IEEE WCNC, sensing and opportunistic access in network-coded communications,”
Apr. 2013, pp. 1703–1708. IEEE J. Sel. Areas Commun., vol. 32, no. 3, pp. 400–410, Mar. 2014.
[5] H. M. Almasaeid and A. E. Kamal, “Exploiting multichannel diversity [32] Z. Shu, J. Zhou, Y. Yang, H. Sharif, and Y. Qian, “Network coding-
for cooperative multicast in cognitive radio mesh networks,” IEEE/ACM aware channel allocation and routing in cognitive radio networks,” in
Trans. Netw., vol. 22, no. 3, pp. 770–783, Jun. 2014. Proc. IEEE GLOBECOM, Dec. 2012, pp. 5590–5595.
[6] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, “Network infor- [33] A. Charnes, W. W. Cooper, and G. H. Symonds, “Cost horizons and
mation flow,” IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204–1216, certainty equivalents: An approach to stochastic programming of heating
Jul. 2000. oil,” Manage. Sci., vol. 4, no. 3, pp. 235–263, 1958.
[7] T. Ho et al., “A random linear network coding approach to multicast,” [34] M. Garey and D. Johnson, Computers and Intractability: A Guide to the
IEEE Trans. Inf. Theory, vol. 52, no. 10, pp. 4413–4430, Oct. 2006. Theory of NP-Completeness. San Francisco, CA, USA: Freeman, 1979.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
[35] D. P. Bertsekas and R. G. Gallager, Data Networks, 2nd ed. Fan Wu received the B.S. degree in computer
Upper Saddle River, NJ, USA: Prentice-Hall, 1992. science from Nanjing University in 2004, and the
[36] S. Basagni, “Finding a maximal weighted independent set in wireless Ph.D. degree in computer science and engineering
networks,” Telecommun. Syst., vol. 18, nos. 1–3, pp. 155–168, 2001. from the State University of New York at Buffalo
[37] T. Larsson, M. Patriksson, and A.-B. Strömberg, “Ergodic, primal in 2009. He has visited the University of Illinois at
convergence in dual subgradient schemes for convex programming,” Urbana–Champaign as a Post Doc Research Asso-
Math. Program., vol. 86, no. 2, pp. 283–312, 1999. ciate. He is currently an Associate Professor with the
[38] T. Bonald and L. Massoulié, “Impact of fairness on Internet perfor- Department of Computer Science and Engineering,
mance,” in Proc. ACM SIGMETRICS, 2001, pp. 82–91. Shanghai Jiao Tong University. His research interests
[39] I. Beltagy, M. Youssef, and M. El-Derini, “A new routing metric and include wireless networking and mobile computing,
protocol for multipath routing in cognitive networks,” in Proc. IEEE algorithmic network economics, and privacy preser-
WCNC, Mar. 2011, pp. 974–979. vation. He has authored over 70 peer-reviewed papers in leading technical
[40] Y. Shi and Y. T. Hou, “A distributed optimization algorithm for multi- journals and conference proceedings. He is a receipt of the China National
hop cognitive radio networks,” in Proc. IEEE INFOCOM, Apr. 2008, Natural Science Fund for Outstanding Young Scientists, the CCF-Intel Young
pp. 1966–1974. Faculty Researcher Program Award, the CCF-Tencent Rhinoceros bird Open
[41] Z. Shu, Y. Qian, and R. Q. Hu, “Delay based channel allocations in Fund, and the Pujiang Scholarship. He has served as the Chair of the
multi-hop cognitive radio networks,” in Proc. IEEE IWCMC, Aug. 2015, CCF YOCSEF Shanghai, on the Editorial Board of Computer Communi-
pp. 1475–1480. cations, and as a member of technical program committees of more than
[42] S. Geirhofer, L. Tong, and B. M. Sadler, “Dynamic spectrum access in 40 academic conferences.
WLAN channels: Empirical model and its stochastic analysis,” in Proc.
ACM TAPAS, 2006, pp. 271–275.
[43] J. Pintér, “Deterministic approximations of probability inequalities,”
Zeitschrift Oper. Res., vol. 33, no. 4, pp. 219–239, 1989.
[44] P. Wang, G. Mao, Z. Lin, X. Ge, and B. D. O. Anderson, “Network
coding based wireless broadcast with performance guarantee,” IEEE
Trans. Wireless Commun., vol. 14, no. 1, pp. 532–544, Jan. 2015. Shaojie Tang (S’09–M’14) received the B.S. degree
[45] H. Fukui, P. Popovski, and H. Yomo, “Physical layer network coding: in radio engineering from Southeast University,
An outage analysis in cellular network,” in Proc. 22nd Eur. Signal China, in 2006, and the Ph.D. degree from the
Process. Conf. (EUSIPCO), 2014, pp. 1133–1137. Department of Computer Science, Illinois Institute
of Technology, in 2012. He is currently an Assis-
tant Professor with the Naveen Jindal School of
Management, University of Texas at Dallas. His
main research interests focus on wireless networks
(including sensor networks and cognitive radio net-
Yuben Qu received the B.S. degree in mathematics
works), social networks, security and privacy, and
and applied mathematics from Nanjing University
game theory. He has served on the Editorial Board
in 2009, and the M.S. degree in communication
of the Journal of Distributed Sensor Networks. He also served as a TPC
and information systems and the Ph.D. degree in
Member of a number of conferences, such as the ACM MobiHoc, the IEEE
computer science and technology from the PLA Uni-
ICNP, and the IEEE SECON.
versity of Science and Technology in 2012 and 2016,
respectively. He is currently a Research Assistant
with the Rocket Force University of Engineering,
China. His research interests include D2D commu-
nication, crowdsensing, and network coding.