Professional Documents
Culture Documents
1, JANUARY 2021
Abstract—We consider the problem of efficient packet dissemination in wireless networks with point-to-multipoint wireless
broadcast channels. We propose a dynamic policy, which achieves the broadcast capacity of the network. This policy is
obtained by first transforming the original multi-hop network into a precedence-relaxed virtual single-hop network and then
finding an optimal broadcasting policy for the relaxed network. The resulting policy is shown to be throughput-optimal for the
original wireless network using a sample-path argument. We also prove the NP-completeness of the finite-horizon broadcasting
problem, which is in contrast with the polynomial-time solvability of the problem with point-to-point channels. Illustrative
simulation results demonstrate the efficacy of the proposed broadcast policy in achieving the full broadcast capacity with
low delay.
1536-1233 ß 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See ht_tps://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.
SINHA AND MODIANO: THROUGHPUT-OPTIMAL BROADCAST IN WIRELESS NETWORKS WITH POINT-TO-MULTIPOINT TRANSMISSIONS 233
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.
234 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 20, NO. 1, JANUARY 2021
A connected dominating set D is called minimal if D n fvg polynomially solvable WIRED BROADCAST problem where the
is not a connected dominating set for any v 2 D. The set of broadcast nature of the wireless medium is absent and dif-
all minimal connected dominating set is denoted by D. ferent outgoing edges from a node can transmit different
A packet p is said to have been broadcasted by time t if the packets at the same slot [11], [13], [23].
packet p is present at every node in the network by time t. Consider the following finite horizon problem called
It is evident that a packet p is broadcasted if it has been Wireless Broadcasting, with the input parameters G; M; T .
transmitted sequentially by every node in a connected domi-
nating set D. An admissible broadcast policy p is a sequence INSTANCE: A Graph GðV; EÞ with capacities C on
of actions fpt gt0 executed at every slot t. The action at time the nodes. A set of M of packets with jMj ¼ M at
slot t consists of the following three operations: the source and a time horizon of T slots.
QUESTION: Is there a scheduling algorithm p which
1) Route Selection: Assign a connected dominating set routes all of these M packets to all nodes in the net-
D 2 D to every incoming packet at the source r for work by time T 2, i.e., Bp ðT Þ ¼ M?
routing. We prove the following hardness result:
2) Node Activation: Activate a subset of nodes from the
set of all feasible activations M. Theorem 3.1. Wireless Broadcast is NP-complete.
3) Packet Scheduling: Transmit packets from the acti-
vated nodes according to some scheduling policy.
The set of all admissible broadcast policies is denoted by Proof of Theorem 3.1 is based on reduction from the the
P. The actions executed at every slot may depend on any NP-complete problem Monotone Not All Equal 3 SAT [24]
past or future packet arrival and control actions. to the Wireless Broadcasting problem. The complete proof of
Assume that under the action of the broadcast-policy p, the Theorem is provided in Section 7.1.
the set of packets received by node i at the end of slot T is Note that the problem for T ¼ 1 is trivial as only the out-
Nip ðT Þ. Then the set of packets BðT Þ received by all nodes, neighbors of the source receive minðC; MÞ packets at the end
at the end of time T is given by of the first slot. The problem becomes non-trivial for any
T 2. In our reduction, we show that the problem is hard
\
Bp ðT Þ ¼ Nip ðT Þ: (1) even for T ¼ 2. This reduction technique may be extended in
i2V a straightforward fashion to show that the problem remains
NP-complete for any fixed T 2.
2.4 Broadcast Capacity The above hardness result is in sharp contrast with the
Let Rp ðT Þ ¼ jBp ðT Þj denote the number of packets deliv- efficient solvability of the broadcasting problem in the set-
ered to all nodes in the network up to time T , under the ting of point-to-point channels. In wired networks, the
action of an admissible policy p. Also assume that the exter- broadcast capacity can be achieved by routing packets using
nal packets arrive at the source node with expected rate of maximal edge-disjoint spanning trees, which can be effi-
packets per slot. The policy p is called a broadcast policy of ciently computed using Edmonds’ algorithm [23]. In a
rate if recent series of papers [11], [12], we proposed efficient
throughput-optimal algorithms for wireless Directed Acy-
Rp ðT Þ clic Graphs (DAG) in the static and time-varying settings. In
lim ¼ ; w:p:1: (2)
T !1 T a follow-up paper [13], the above line of work was extended
to networks with arbitrary topology. In contrast, Theorem
The broadcast capacity of the network is defined as 3.1 and its corollary establishes that achieving the broadcast
capacity in a wireless network with the broadcast channel is
¼ supf : p is a broadcast policy of rate g: (3)
p2P intractable even for simple network topology, such as a
DAG. Also notice that this hardness result is inherently dif-
The Wireless Broadcasting problem is defined as finding ferent from the hardness result of [25], where the difficulty
an admissible policy p that achieves the Broadcast rate . stems from the hardness of max-weight node activations,
which is an Independent Set problem. The above result
3 HARDNESS RESULTS should also be contrasted with the hardness of the mini-
mum energy broadcasting problem [26].
Since a broadcast policy, as defined above, continues to be
executed forever (compared to the finite termination prop-
4 THROUGHPUT-OPTIMAL BROADCASTING POLICY
erty of standard algorithms), the usual notions of computa-
tional complexity theory do not directly apply in FOR A RELAXED NETWORK
characterizing the complexity of these policies. Neverthe- In this section, we give a brief outline of the design of the
less, we show that the closely related problem of finite hori- proposed broadcast policy, which will be described in detail
zon broadcasting is NP-hard. Remarkably, this problem in the subsequent sections. At a high level, the proposed
remains hard even if the node activation constraints are policy consists of two interdependent modules—a control
eliminated (i.e., all nodes can transmit packets at the same policy for a precedence-relaxed virtual network described
slot, which occurs e.g., when each node transmits over a dis- below, and a control policy for the actual physical network,
tinct channel). Thus, the hardness of the problem arises described in Section 5. Although from a practical point of
from the combinatorial nature of distributing the packets view, we are ultimately interested in the optimal control
among the nodes. This result is in sharp contrast with the policy for the physical network, as we will soon see, this
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.
SINHA AND MODIANO: THROUGHPUT-OPTIMAL BROADCAST IN WIRELESS NETWORKS WITH POINT-TO-MULTIPOINT TRANSMISSIONS 235
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.
236 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 20, NO. 1, JANUARY 2021
2. Node Activations. We maximize the term (b) in the Using the well-known Skorokhod representation theorem
above with respect to all feasible controls to obtain the fol- [30] of the Queueing recursion (4), we have3
lowing node scheduling policy: At time t activate a feasible Q~i ðtÞ ¼ sup Ai ðt; tÞ Si ðt; tÞ þ : (16)
schedule m UMW ðtÞ having the maximum weight, where the 1tt
nodes are weighted by the virtual queue-lengths Q ~
QðtÞ, i.e.,
X
M UMW ðtÞ ¼ arg max Q~i ðtÞci 1ði 2 MÞ: (12) 1. Recall that, fðtÞ ¼ OðgðtÞÞ if there exists a positive constant c and a
M2M
i2V finite time t0 such that fðtÞ cgðtÞ; 8t t0 .
fðtÞ
2. We say fðtÞ ¼ oðgðtÞÞ if limt!1 gðtÞ ¼ 0.
In connection with the virtual queue systems Q~
QðtÞ, we 3. Note that, for simplicity of notation and without any loss of gener-
establish the following theorem which will be essential in ality, we have assumed the system to be empty at time t ¼ 0.
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.
SINHA AND MODIANO: THROUGHPUT-OPTIMAL BROADCAST IN WIRELESS NETWORKS WITH POINT-TO-MULTIPOINT TRANSMISSIONS 237
ular node, with positive virtual queue length, is scheduled This implies that
for transmission in a slot, even though it does not have any P
packets to transmit in its physical queue. The surprising fact Qi ðtÞ
lim i2V ¼ 0; w:p: 1;
that will follow from Theorem 5.2 is that this kind of wasted t!1 t
transmissions are rare and they do not affect throughput.
i.e., the physical queues are rate-stable.
Packet Scheduling. There are many possibilities for the com-
ponent (3), i.e., Packet scheduling in the physical network.
Theorem 5.1 is established by combining the key sample
Recall that, the packet scheduling component selects packet(s)
path property of arrivals and departures from Eqn. (17),
to be transmitted (subject to the node capacity constraint)
with an adversarial queueing theoretic argument of Gamar-
when multiple packets contend for transmission by an active
nik [31]. The complete proof of the Theorem is provided in
node and plays a role in determining the physical queuing
Section 7.3.
process. In this paper, we consider a priority based scheduler
As a direct consequence of Theorem 5.1, we have the
which gives priority to the packet which has been transmitted
main result of this paper:
by the nodes the least number of times. We call this scheduling
policy Least Transmitted First or LTF. The LTF policy is
Theorem 5.2. UMW is a throughput-optimal wireless broad-
inspired from the Nearest To Origin policy of Gamarnik [31],
cast policy.
where it was shown to stabilize the queues for the unicast
problem in wired networks in a deterministic adversarial set-
Proof. The total number of packets RðtÞ, received by all
ting. In spite of the high-level similarities, however, we
nodes in common up to time t may be bounded in terms
emphasize that these two policies are different, as the LTF pol-
of the physical queue lengths as follows:
icy works in the broadcast setting with point-to-multipoint
transmissions and involves packet duplications.
X ðÞ
Definition 2 (The policyLTF). If multiple packets are Að0; tÞ Qi ðtÞ RðtÞ Að0; tÞ; (18)
available for transmission by an active node at the same i2V
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.
238 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 20, NO. 1, JANUARY 2021
RðtÞ
lim ¼ ; w.p.1:
t!1 t
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.
SINHA AND MODIANO: THROUGHPUT-OPTIMAL BROADCAST IN WIRELESS NETWORKS WITH POINT-TO-MULTIPOINT TRANSMISSIONS 239
Fig. 5. Plot of the broadcast delay incurred by the UMW policy as a Fig. 7. Plot of the broadcast delay incurred by the UMW policy as a
function of the arrival rate in the network shown in Fig. 4. function of the arrival rate in the 3
3 wireless grid network shown in
Fig. 6.
the right most curve marked (a). From the plot, we observe
that the delay-throughput curve has a vertical asymptote
approximately along the straightline ¼ 13. This, together
with Lemma 6.1, immediately implies that the broadcast
capacity of the network is ¼ 13 and confirms the through-
put-optimality of the UMW policy.
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.
240 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 20, NO. 1, JANUARY 2021
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.
SINHA AND MODIANO: THROUGHPUT-OPTIMAL BROADCAST IN WIRELESS NETWORKS WITH POINT-TO-MULTIPOINT TRANSMISSIONS 241
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.
242 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 20, NO. 1, JANUARY 2021
in one step, starting from the state X. Assume that the drift Finally, using the Borel Cantelli Lemma, we conclude
satisfies the following two conditions: that
(C1) There exists an > 0 and a B < 1 such that Pðlimsup Yt h log tÞ ¼ PðEt i.o.Þ ¼ 0:
EðDLðXÞjXðtÞ ¼ XÞ ; 8X 2 X with ZðXÞ B: This proves that Yt ¼ Oðlog tÞ; w.p.1. u
t
(C2) There exists a D < 1 such that Combining Theorem A.1 with Lemma 2, we have the fol-
lowing corollary
jDLðXÞj D; w.p. 1; 8X 2 X :
Corollary A.2. Under the conditions (C1) and (C2) of Theo-
Then, the Markov Chain fXðtÞgt0 is positive recur- rem A.1, we have
rent. Furthermore, there exists scalars u > 0 and a
C < 1 such that LðXðtÞÞ ¼ Oðlog tÞ; w.p.1
limsup E expðu LðXðtÞÞ C :
t!1
7.2.2 Construction of a Stationary Randomized Policy
We now establish the following technical lemma, which for the Virtual Queues fQ ~
QðtÞg t1
will be useful later.
Let D denote the set of all Connected Dominating Sets (CDS)
in the graph G containing the source r. Since the broadcast
Lemma 2. Let fY ðtÞgt0 be a stochastic process taking values
rate < is achievable by a stationary randomized pol-
on the nonnegative real line. Supppose that there exists sca-
icy, there exists such a policy p which executes the
lars u > 0 and C < 1 such that
following:
limsup Eðexpðu Y ðtÞÞÞ C : (19)
t!1 ThereP exist non-negative scalars fai ; i ¼ 1; 2; . . . ; jDjg
with i ai ¼ , such that each new incoming packet
Then
is routed independently along a CDS Di 2 D with
Y ðtÞ ¼ Oðlog ðtÞÞ; w.p.1 a
probability i ; 8i. The packet routed along the CDS
Di corresponds to an arrival to the virtual queues
Proof. Define the positive constant h ¼ u2 . We will show fQj ; j 2 Di g.
that As a result, packets arrive
P to the virtual queue Qj
i.i.d. at an expected rate of i:j2Di aj ; 8j per slot.
PðY ðtÞ h log ðtÞ; infinitely oftenÞ ¼ 0:
A feasible schedule s j 2 M is selected for transmis-
For this, define the event Et as sion with probability pj j ¼ 1; 2; . . . ; k i.i.d. at every
slot. By Caratheodory’s theorem, the value of k can
Et ¼ fY ðtÞ h log ðtÞg: (20) be restricted to at most n þ 1. This results in the fol-
lowing expected service rate vector from the virtual
From the given condition (19), we know that there exists
queues:
a finite time t such that
X
nþ1
Eðexpðu Y ðtÞÞÞ C þ 1; 8t t : (21) m ¼ pj cj sj :
j¼1
We can now upper-bound the probabilities of the events
Et ; t t as follows: Since each of the virtual queues must be stable under the
action of the policy p , from the theory of the GI/GI/1
PðEt Þ ¼ PðY ðtÞ h log ðtÞÞ
queues, we know that there exists an > 0 such that
¼ P expðu Y ðtÞÞ expðu h log ðtÞÞ
X
ðaÞ Eðexpðu Y ðtÞÞÞ mi aj ; 8i 2 V: (22)
j:i2Dj
t2
ðbÞ C þ 1
Next, we will verify that the conditions C1 and C2 in
:
t2 Theorem A.1 holds for the Markov Chain of the virtual
queues fQ ~
The inequality (a) follows from the Markov inequality
QðtÞg t1 under the action of the UMW policy,
with the Lyapunov function LðQ ~
QðtÞÞ ~
¼ jjQ
QðtÞjj at any
and the fact that u h ¼ 2. The inequality (b) follows from
arrival rate < .
Eqn. (21). Thus, we have
1
X
1 tX X
1
7.2.3 Verification of Condition (C1)- Negative Expected
PðEt Þ ¼ PðEt Þ þ PðEt Þ
t¼1 t¼1 t¼t
Drift
X1
1 From the definition of the policy UMW, it minimizes the
t þ ðC þ 1Þ RHS of the drift upper-bound (10) from the set of all feasible
t¼t
t2
policies P. Hence, we can upper-bound the conditional drift
p2 of the UMW policy by comparing it with the stationary pol-
t þ ðC þ 1Þ < 1:
6 icy p described in Section 7.2.2 as follows:
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.
SINHA AND MODIANO: THROUGHPUT-OPTIMAL BROADCAST IN WIRELESS NETWORKS WITH POINT-TO-MULTIPOINT TRANSMISSIONS 243
EðDUMW ðtÞjQ~ ¼Q
QðtÞ ~
QÞ Thus
X
1 pffiffiffi
Bþ2 Q ~ ¼Q
~i ðtÞE AUMW ðtÞjQ
QðtÞ ~ ~ þ 1Þ Q
jjQ
Qðt ~
QðtÞjj jjA
AðtÞ mðtÞjj nðAmax þ cmax Þ:
~ i
2jjQ
Qjj i2V
Hence, using the triangle inequality for the ‘2 norm, we obtain
X
pffiffiffi
2 Q i
~ ¼Q
~i ðtÞE mUMW ðtÞjQ
QðtÞ ~ jDLðQ ~
QðtÞÞj ¼ jjQ~ þ 1Þjj jjQ
Qðt ~
QðtÞÞjj nðAmax þ cmax Þ;
i2V
which verifies the condition C2 of Theorem A.1.
X
ðaÞ 1
Bþ2 ~i ðtÞE Ap ðtÞjQ
Q ~ ¼Q
QðtÞ ~ 7.2.5 Almost Sure Bound on Virtual Queue Lengths
~ i
2jjQ
Qjj i2V
X Finally, we invoke Corollary A.2 to conclude that
2 ~i ðtÞE mp ðtÞjQ
Q ~ ¼Q
QðtÞ ~
i ~
i2V limsup jjQ
QðtÞjj ¼ Oðlog tÞ; w.p.1:
t
X
1 This implies that
¼ B2 ~i ðtÞ Em ðtÞ EA ðtÞ
Q
~ i i
2jjQ
Qjj i2V ~ i ðtÞ ¼ Oðlog tÞ;
max Q w.p.1:
i
X X
1 7.3 Proof of Theorem 5.1
¼ B2 ~i ðtÞ m
Q aj
2jjQ~
Qjj
i Throughout this proof, we will consider only the typical
i2V j:i2Dj
sample point v 2 E defined in Eqn. (13). For the sake of
notational simplicity, we will drop the argument v for eval-
P
ðbÞ B Q~i ðtÞ uating a random variable X at v, i.e., the deterministic sam-
i2V
; (23) ple path Xðv; tÞ; v 2 E will be simply denoted by XðtÞ. We
~
2jjQ
Qjj ~
jjQ
Qjj
now make a simple observation which will be useful in the
where inequality (a) follows from the definition of the UMW proof of the theorem:
policy and inequality (b) follows from the stability property
of the randomized policy given in Eqn. (22). Since the vir- Lemma 3. Consider a function F : Zþ ! Zþ , where Zþ is
tual-queue lengths Q ~
QðtÞ is a non-negative vector, it is easy the set of non-negative integers. Assume that
to see that (e.g., by squaring both sides) F ðtÞ ¼ Oðlog tÞ. Define MðtÞ ¼ sup0tt F ðtÞ. Then,
X rffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
X 1) MðtÞ is non-decreasing in t and MðtÞ F ðtÞ.
~i ðtÞ
Q Q~2 ðtÞ ¼ jjQ
~
Qjj: 2) MðtÞ ¼ Oðlog tÞ.
i
i2V i
Hence, from Eqn. (23) in the above chain of inequalities, we Proof. Clearly, MðtÞsup0tt F ðtÞ F ðtÞ and
obtain Mðt þ 1Þ ¼ sup0ttþ1 F ðtÞ sup0tt F ðtÞ ¼ MðtÞ:
B To prove the second claim, let tmax ðtÞ ¼ arg max0tt F ðtÞ.
EðDUMW ðtÞjQ
~ ¼Q
QðtÞ ~
QÞ : (24) Clearly, tmax ðtÞ t. Hence, for large enough t, we have
~
2jjQ
Qjj
Thus MðtÞ ¼ F ðtmax ðtÞÞ ¼ Oðlog tmax ðtÞÞ ¼ Oðlog tÞ:
u
t
EðDUMW ðtÞjQ
~
QðtÞÞ ; ~ B=:
8jjQ
Qjj
2 As a consequence of Lemma 3 applied to Eqn. (17), we
This verfies the negative expected drift condition C1 in have almost surely
Theorem A.1.
Ai ðt0 ; tÞ Si ðt0 ; tÞ þ MðtÞ; 8i 2 V; 8t0 t;
7.2.4 Verification of Condition (C2)- Almost Surely (25)
Bounded Drift
To show that the magnitude of one-step drift jDLðQ ~ is
QÞj for some non-decreasing function MðtÞ ¼ Oðlog tÞ. We
almost surely bounded, we compute now return to the proof of the main result, Theorem 5.1.
Proof. Our proof technique is inspired by an adversarial
~
jDLðQ
QðtÞÞj ¼ jLðQ~ þ 1ÞÞ LðQ
Qðt ~
QðtÞÞj queueing theory argument, given in [31]. We remind the
¼ jjQ
~ þ 1Þjj jjQ
Qðt ~
QðtÞÞjj : reader that we are analyzing a typical sample path satisfy-
ing Eqn. (25), which holds almost surely. In the following
Now, from the dynamics of the virtual queues (4), we have argument, each copy of a packet is counted separately.
~i
for any virtual queue Q Without any loss of generality, assume that we start
from an empty network at time t ¼ 0. Let Rk ðtÞ denote the
~i ðt þ 1Þ Q
jQ ~i ðtÞj jAi ðtÞ mi ðtÞj: total number of packets waiting to be transmitted further
at time t, which have already been forwarded exactly k
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.
244 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 20, NO. 1, JANUARY 2021
P
times by the time t. We call such packets “layer k” packets. second group of packets is given by D:i2Dk AD ðt0 ; tÞ. We
As we have mentioned earlier, if a packet is duplicated next estimate the number of layer k packets that crossed
multiple times along its assigned route D (which is a con- the edge e during the time interval ðt0 ; t . Since the LTF
nected dominating set (or CDS, in short)), each copy of the packet scheduling policy is used in the physical network,
packet is counted separately in the variable Rk ðtÞ, i.e., layer k packets were not processed only when there were
XX packets in layers up to k 1 that included the node i in its
Rk ðtÞ ¼ Rði;DÞ ðtÞ; (26) routing
Pk1 CDS. The number of such packets is bounded by
Pk1
D2D i2Dk j¼0 B j ðt0 Þ j¼0 Bj ðtÞ, which denotes the total possible
number
Pk1 P of packets in layers up to k 1 at time t0 , plus
where the variable Rði;DÞ ðtÞ denotes the number of packets
j¼0 D:i2Dj AD ðt0 ; tÞ, which is the number of new pack-
following the CDS D, that are waiting to be transmitted by ets that arrived in the interval ðt0 ; t and includes the node i
the node i 2 D at time t and Dk is the set of nodes in the as a transmitter within their first k 1 hops. Thus, we con-
CDS D, which are exactly kth hop away from the source clude that at least
along the CDS D. We show by induction that Rk ðtÞ is
almost surely bounded by a function, which is Oðlog tÞ. X
k1 k1 X
X
Base Step k ¼ 0. Consider the source node i ¼ r and an max 0; Si ðt0 ; tÞ Bj ðtÞ AD ðt0 ; tÞ ; (28)
arbitrary time t. Let t0 t be the largest time at which no j¼0 j¼0 D:i2Dj
packets have priority over all other packets (in fact, there is X
k1 X
k X
packet of other layers present only at the source, but this is ¼2 Bj ðtÞ þ AD ðt0 ; tÞ Si ðt0 ; tÞ
not the case at other nodes which we will consider in the j¼0 j¼0 D:i2Dj
D2D i2D0
2 Bj ðtÞ þ MðtÞ;
j¼0
MðtÞ:
where the inequality (a) follows from the fact that each
(27)
packet gets routed to a node i for transmission only once
def and hence
Define B0 ðtÞ ¼ MðtÞ. Since MðtÞ ¼ Oðlog tÞ, we have
B0 ðtÞ ¼ Oðlog tÞ. Note that, since MðtÞ is non-decreasing n1 X
X
from Lemma (3), so is B0 ðtÞ. Ai ðt0 ; tÞ ¼ AD ðt0 ; tÞ; 8i 2 V:
Induction Step. As our inductive assumption, suppose j¼0 D:i2Dj
that, for some non-decreasing functions Bj ðtÞ ¼ Oðlog tÞ;
j ¼ 0; 1; 2; . . . ; k 1, we have Rj ðtÞ Bj ðtÞ, for all time t. The inequality (b) follows from the property of the typi-
We next show that there exists a non-decreasing function cal sample paths, stated in Eqn. (25). Hence, the total
Bk ðtÞ ¼ Oðlog tÞ such that Rk ðtÞ Bk ðtÞ for all time t. number of layer k packets at time t is bounded as
To prove the above assertion, fix a node i and an arbi-
trary time t. Let t0 t denote the largest time before t, such X X X
k1
Rk ðtÞ ¼ Rði;DÞ ðtÞ 2n Bj ðtÞ þ nMðtÞ:
that there were no layer k packets waiting to be transmitted
i D:i2Dk j¼0
by the node i. Set t0 ¼ 0 if no such time exists. Hence the
node i was always having packets to transmit during the Define Bk ðtÞ to be the RHS of the above equation, i.e.,
time interval ðt0 ; t (packets in layer k or lower). The layer k
packets that wait to be transmitted by the node i at time t ðdef Þ X
k1
are composed only of a subset of packets which were in Bk ðtÞ ¼ 2n Bj ðtÞ þ nMðtÞ: (29)
j¼0
layers 0 j k 1 at time t0 or packets that arrived dur-
ing the time interval ðt0 ; t and include the node i as one of Using our induction assumption and Eqn. (29), we con-
their kth transmitter along the route followed. By our induc- clude that Bk ðtÞ ¼ Oðlog tÞ, and it is easily seen to be non-
tion assumption, Pk1the first group
Pk1 of packets has a size decreasing. This completes the proof of the induction step.
bounded by j¼0 Bj ðt0 Þ j¼0 Bj ðtÞ, where we have To conclude the proof of the theorem, observe that the
used the fact (using our induction step) that the functions sum of the lengths of the physical queues at time t may
Bj ðÞ’s are monotonically non-decreasing. The size of the be alternatively written as
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.
SINHA AND MODIANO: THROUGHPUT-OPTIMAL BROADCAST IN WIRELESS NETWORKS WITH POINT-TO-MULTIPOINT TRANSMISSIONS 245
X X
n1 queues. A positive result in this direction would lead to a
Qi ðtÞ ¼ Rk ðtÞ: (30) more efficient implementation.
i2V k¼1
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.
246 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 20, NO. 1, JANUARY 2021
[21] K. Jain, J. Padhye, V. N. Padmanabhan, and L. Qiu, “Impact of Abhishek Sinha received the BE degree in elec-
interference on multi-hop wireless network performance,” Wire- tronics and telecommunication engineering from
less Netw., vol. 11, no. 4, pp. 471–487, 2005. Jadavpur University, Kolkata, India, the ME degree
[22] D. B. West, et al., Introduction to Graph Theory, vol. 2. Upper in telecommunication engineering from the Indian
Saddle River, NJ, USA: Prentice Hall, 2001. Institute of Science, Bangalore, and the PhD
[23] R. Rustin, Combinatorial Algorithms. Algorithmics Press, New York, degree from the Massachusetts Institute of Tech-
1973. nology, in 2017, where he worked with the Labora-
[24] T. J. Schaefer, “The complexity of satisfiability problems,” in Proc. tory for Information and Decision Systems (LIDS).
10th Annu. ACM Symp. Theory Comput., 1978, pp. 216–226. He is currently an assistant professor with the
[25] D. Shah, N. C. David, and J. N. Tsitsiklis, “Hardness of low delay Department of Electrical Engineering, IIT Madras.
network scheduling,” IEEE Trans. Inf. Theory, vol. 57, no. 12, After his PhD, he worked as a senior engineer with
pp. 7810–7817, Dec. 2011. Qualcomm Research, San Diego. He is a recipient of several awards
[26] A. E. F. Clementi, P. Crescenzi, P. Penna, G. Rossi, and P. Vocca, including the Best Paper Award in INFOCOM 2018, the Best Paper Award
“On the complexity of computing minimum energy consumption in MobiHoc 2016, Prof. Jnansaran Chatterjee memorial gold medal and T.
broadcast subgraphs,” in Proc. Annu. Symp. Theoretical Aspects P. Saha Memorial gold centered silver medal from Jadavpur University,
Comput. Sci., 2001, pp. 121–131. and Jagadis Bose National Science Talent Search (JBNSTS) scholarship,
[27] J. K. Lenstra and A. H. G. Rinnooy Kan, “Complexity of schedul- Kolkata, India. His areas of interests include network control, information
ing under precedence constraints,” Operations Res., vol. 26, no. 1, theory, machine learning, and applied probability.
pp. 22–35, 1978.
[28] B. Hajek, “Hitting-time and occupation-time bounds implied by
Eytan Modiano received the BS degree in elec-
drift analysis with applications,” Advances Appl. Probability, vol. 14,
trical engineering and computer science from the
pp. 502–525, 1982.
University of Connecticut at Storrs, in 1986, and
[29] M. J. Neely, “Stochastic network optimization with application to
the MS and PhD degrees both in electrical engi-
communication and queueing systems,” Synthesis Lectures Com-
neering from the University of Maryland, College
mun. Netw., vol. 3, no. 1, pp. 1–211, 2010.
Park, Maryland, in 1989 and 1992, respectively.
[30] L. Kleinrock, Queueing Systems: Theory, vol. 1. Hoboken, NJ, USA:
He was a naval research laboratory fellow
Wiley, 1975.
between 1987 and 1992 and a national research
[31] D. Gamarnik, “Stability of adaptive and non-adaptive packet rout-
council post doctoral fellow during 1992-1993.
ing policies in adversarial queueing networks,” in Proc. 31st Annu.
Between 1993 and 1999, he was with MIT Lincoln
ACM Symp. Theory Comput., 1999, pp. 206–214.
Laboratory. Since 1999, he has been on the fac-
[32] R. G. Michael and S. J. David, Computers and Intractability: A Guide
ulty with MIT, where he is a professor and associate department head
to the Theory of NP-Completeness. San Francisco, CA, USA: Free-
with the Department of Aeronautics and Astronautics, and associate
man, 1979.
director of the Laboratory for Information and Decision Systems (LIDS).
[33] S. Guha and S. Khuller, “Approximation algorithms for connected
His research is on communication networks and protocols with emphasis
dominating sets,” Algorithmica, vol. 20, no. 4, pp. 374–387, 1998.
on satellite, wireless, and optical networks. He is the co-recipient of the
[34] M. T. Thai and D.-Z. Du, “Connected dominating sets in disk
INFOCOM 2018 Best Paper Award, the MobiHoc 2016 Best Paper
graphs with bidirectional links,” IEEE Commun. Lett., vol. 10,
Award, the Wiopt 2013 Best Paper Award, and the Sigmetrics 2006 Best
no. 3, pp. 138–140, Mar. 2006.
Paper Award. He is the editor-in-chief of the IEEE/ACM Transactions on
[35] G. K. Das, M. De, S. Kolay, S. C. Nandy, and S. Sur-Kolay,
Networking, and served as associate editor of the IEEE Transactions on
“Approximation algorithms for maximum independent set of a unit
Information Theory and the IEEE/ACM Transactions on Networking. He
disk graph,” Inf. Process. Lett., vol. 115, no. 3, pp. 439–446, 2015.
was the technical program co-chair for IEEE Wiopt 2006, IEEE Infocom
[36] L. Tassiulas and A. Ephremides, “Stability properties of constrained
2007, ACM MobiHoc 2007, and DRCN 2015. He is a fellow of the IEEE
queueing systems and scheduling policies for maximum throughput
and an associate fellow of the AIAA, and served on the IEEE Fellows
in multihop radio networks,” IEEE Trans. Autom. Control, vol. 37,
committee.
no. 12, pp. 1936–1948, Dec. 1992.
[37] A. Qayyum, L. Viennot, and A. Laouiti, “Multipoint relaying for
flooding broadcast messages in mobile wireless networks,” in " For more information on this or any other computing topic,
Proc. 35th Annu. Hawaii Int. Conf. Syst. Sci., 2002, pp. 3866–3875. please visit our Digital Library at www.computer.org/csdl.
[38] T. Clausen and P. Jacquet, “Optimized link state routing protocol
(OLSR),” RFC Editor, 2003.
[39] A. Eryilmaz and R. Srikant, “Asymptotically tight steady-state
queue length bounds implied by drift conditions,” Queueing Syst.,
vol. 72, no. 3/4, pp. 311–359, 2012.
Authorized licensed use limited to: MIT Libraries. Downloaded on December 17,2020 at 00:14:55 UTC from IEEE Xplore. Restrictions apply.