Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions

Similar documents
Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18

Exact Algorithms Lecture 7: FPT Hardness and the ETH

NP-Completeness. Algorithms

Queue Length Stability in Trees Under Slowly Convergent Traffic Using Sequential Maximal Scheduling

Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information

Dynamic Routing on Networks with Fixed-Size Buffers

Cross-Layer Optimization for Wireless Networks with Multi-Receiver Diversity

A Distributed Throughput-Optimal CSMA/CA

Principles of AI Planning. Principles of AI Planning. 7.1 How to obtain a heuristic. 7.2 Relaxed planning tasks. 7.1 How to obtain a heuristic

1 Definition of Reduction

Complexity Classes and Polynomial-time Reductions

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE

Recitation 4: Elimination algorithm, reconstituted graph, triangulation

Routing over Parallel Queues with Time Varying Channels with Application to Satellite and Wireless Networks

Markov Chains and Multiaccess Protocols: An. Introduction

9.1 Cook-Levin Theorem

Introduction to Parameterized Complexity

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

End-to-end bandwidth guarantees through fair local spectrum share in wireless ad-hoc networks

The Encoding Complexity of Network Coding

Treewidth and graph minors

Scheduling on clusters and grids

SAT-CNF Is N P-complete

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.

Delay-minimal Transmission for Energy Constrained Wireless Communications

Wireless Multicast: Theory and Approaches

Direct Routing: Algorithms and Complexity

Introduction Multirate Multicast Multirate multicast: non-uniform receiving rates. 100 M bps 10 M bps 100 M bps 500 K bps

Power Laws in ALOHA Systems

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems

Discrete Optimization. Lecture Notes 2

The Capacity of Wireless Networks

Worst-case Ethernet Network Latency for Shaped Sources

Eulerian disjoint paths problem in grid graphs is NP-complete

Maximizing System Lifetime in Wireless Sensor Networks

Optimal Control of Distributed Computing Networks with Mixed-Cast Traffic Flows

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14

Integer Programming Theory

Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co

Joint Scheduling and Instantaneously Decodable Network Coding

Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees

Unit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W.

Computability Theory

Distributed Throughput Maximization in Wireless Mesh Networks via Pre-Partitioning

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Linear Time Unit Propagation, Horn-SAT and 2-SAT

NP-Completeness of 3SAT, 1-IN-3SAT and MAX 2SAT

Routing algorithms. Jan Lönnberg, 51101M. October 2, Based on G. Tel: Introduction to Distributed Algorithms, chapter 4.

Conflict Graphs for Combinatorial Optimization Problems

Announcements. CSEP 521 Applied Algorithms. Announcements. Polynomial time efficiency. Definitions of efficiency 1/14/2013

3 No-Wait Job Shops with Variable Processing Times

Optimality of Periodwise Static Priority Policies in Real-time Communications

To Motivate Social Grouping in Wireless Networks

Ch9: Exact Inference: Variable Elimination. Shimi Salant, Barak Sternberg

The Role of Network Coding in Wireless Unicast

Some Optimization Trade-offs in Wireless Network Coding

298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions

Consistency and Set Intersection

Algorithms: Lecture 10. Chalmers University of Technology

Delay Minimization in Multihop Wireless Networks: Static Scheduling Does It

On the Rectangle Escape Problem

Treaps. 1 Binary Search Trees (BSTs) CSE341T/CSE549T 11/05/2014. Lecture 19

Posets, graphs and algebras: a case study for the fine-grained complexity of CSP s

Byzantine Consensus in Directed Graphs

NP and computational intractability. Kleinberg and Tardos, chapter 8

Solving Boolean Equations with BDDs and Clause Forms. Gert Smolka

Draft Notes 1 : Scaling in Ad hoc Routing Protocols

Binary Decision Diagrams

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks

The Maximum Throughput of A Wireless Multi-Hop Path

An algorithm for Performance Analysis of Single-Source Acyclic graphs

CS521 \ Notes for the Final Exam

EULER S FORMULA AND THE FIVE COLOR THEOREM

When Network Embedding meets Reinforcement Learning?

Optimization I : Brute force and Greedy strategy

On the Scaling Law of Network Coding Gains in Wireless Networks

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur

CS446: Machine Learning Fall Problem Set 4. Handed Out: October 17, 2013 Due: October 31 th, w T x i w

Dynamic Index Coding for Wireless Broadcast Networks

Paths, Flowers and Vertex Cover

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Distributed minimum spanning tree problem

Symmetry in Type Theory

Chapter 8. NP-complete problems

Computational problems. Lecture 2: Combinatorial search and optimisation problems. Computational problems. Examples. Example

Mining Frequent Itemsets in Time-Varying Data Streams

Data Link Layer: Collisions

Modelling and simulation of guaranteed throughput channels of a hard real-time multiprocessor system

CS 4100 // artificial intelligence

Blocking Avoidance in Wireless Networks

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1

EECS 144/244: Fundamental Algorithms for System Modeling, Analysis, and Optimization

1 Inference for Boolean theories

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 3, MARCH

Transcription:

Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions Abhishek Sinha Laboratory for Information and Decision Systems MIT MobiHoc, 2017 April 18, 2017 1 / 63

Introduction Outline 1 Introduction 2 Hardness of Wireless Broadcasting 3 4 Numerical Results 5 Conclusion 2 / 63

Introduction Motivation We consider the problem of optimally broadcasting packets in a multi-hop wireless adhoc network 3 / 63

Introduction Motivation We consider the problem of optimally broadcasting packets in a multi-hop wireless adhoc network A primary measure of efficiency is throughput-optimality, i.e., policies that achieve the entire capacity region Vast literature for the Unicast problem (Backpressure policy), not so much for other flow problems Packet duplications are harder to deal with (no flow conservations) 4 / 63

Introduction Introduction We study the Generalized Flow Problem and design throughput-optimal policies. A Fundamental problem with wide ranging applications: Internet routing, in-network function computations, live multi-media streaming, military communications etc. Topics of this talk: 1 Broadcast: Specialized dynamic algorithms that solve the throughput-optimal broadcasting problem It admits an inherently decentralized solution 5 / 63

Introduction Introduction We study the Generalized Flow Problem and design throughput-optimal policies. A Fundamental problem with wide ranging applications: Internet routing, in-network function computations, live multi-media streaming, military communications etc. Topics of this talk: 1 Broadcast: Specialized dynamic algorithms that solve the throughput-optimal broadcasting problem It admits an inherently decentralized solution 2 Generalized Flow: A general algorithmic paradigm that efficiently solves all flow problems (unicast+broadcast+multicast+anycast). 6 / 63

Introduction System Model The Wireless Network is represented by a graph G(V, E), where each node has an omnidirectional antenna. Packets arrive at a source node r i.i.d. at every slot at rate λ. Due to the local broadcast nature of the wireless medium, packets transmitted by a node i is heard at all of its out-neighbor j + (i). As a result, if two or more in-neighbors of a node transmits at a slot, it results in a collision. This talk considers collision-free schedules only. The set of all feasible collision-free node activations is given by M. 7 / 63

Introduction An Illustrative Example λ 1 2 4 3 5 6 7 A wireless network 8 / 63

Introduction An Illustrative Example λ 1 1 2 4 2 4 3 3 5 6 7 A wireless network 5 6 7 Activation s 1 9 / 63

Introduction An Illustrative Example λ 1 1 1 2 4 2 4 2 4 3 3 3 5 6 7 A wireless network 5 6 7 Activation s 1 5 6 7 Activation s 2 10 / 63

Introduction An Illustrative Example λ 1 1 1 1 2 4 2 4 2 4 2 4 3 3 3 3 5 6 7 5 6 7 5 6 7 5 6 7 A wireless network Activation s 1 Activation s 2 Activation s 3 11 / 63

Introduction An Illustrative Example λ 1 1 1 1 2 4 2 4 2 4 2 4 3 3 3 3 5 6 7 5 6 7 5 6 7 5 6 7 A wireless network Activation s 1 1 Activation s 2 Activation s 3 2 4 3 5 6 7 Activation s 4 A wireless network and its feasible link activations under the primary interference constraints. M = {s 1, s 2, s 3, s 4} 12 / 63

Introduction Wireless Broadcast: Problem Formulation A feasible broadcast policy π Π executes the following two actions at every slot t : Node Activation π(a): Activates a subset of nodes s(t) M subject to the underlying interference constraints. Packet Scheduling π(s): The activated nodes locally broadcasts a set of packets subject to the capacity/power constraints of the nodes. 13 / 63

Introduction Wireless Broadcast: Problem Formulation A feasible broadcast policy π Π executes the following two actions at every slot t : Node Activation π(a): Activates a subset of nodes s(t) M subject to the underlying interference constraints. Packet Scheduling π(s): The activated nodes locally broadcasts a set of packets subject to the capacity/power constraints of the nodes. Let R π (T ) denote the number of packets received in common by all nodes under the action of a broadcast policy π. The objective is to design a policy π such that for all λ < λ R π (T ) lim inf = λ, w.p. 1, T T where λ is the broadcast capacity of the network. 14 / 63

Hardness of Wireless Broadcasting Outline 1 Introduction 2 Hardness of Wireless Broadcasting 3 4 Numerical Results 5 Conclusion 15 / 63

Hardness of Wireless Broadcasting Hardness Result Our first result in this point-to-multipoint broadcast setting is the following: Theorem Wireless Broadcast is NP-complete. 16 / 63

Hardness of Wireless Broadcasting Hardness Result Our first result in this point-to-multipoint broadcast setting is the following: Theorem Wireless Broadcast is NP-complete. We also show that the problem remains hard even with the additional restriction of DAG topology and no activation constraints. 17 / 63

Hardness of Wireless Broadcasting Hardness Result Our first result in this point-to-multipoint broadcast setting is the following: Theorem Wireless Broadcast is NP-complete. We also show that the problem remains hard even with the additional restriction of DAG topology and no activation constraints. This is surprising, because we showed earlier [Sinha et al, 2015, 2016] that the problem is efficiently solvable in case of wireless DAGs with point-to-point links. 18 / 63

Hardness of Wireless Broadcasting Hardness Result Our first result in this point-to-multipoint broadcast setting is the following: Theorem Wireless Broadcast is NP-complete. We also show that the problem remains hard even with the additional restriction of DAG topology and no activation constraints. This is surprising, because we showed earlier [Sinha et al, 2015, 2016] that the problem is efficiently solvable in case of wireless DAGs with point-to-point links. The hardness comes from the requirement of optimally distributing the packets, which is intimately related to Boolean Constraint Satisfaction, described next. 19 / 63

Hardness of Wireless Broadcasting Hardness Reduction: Proof Sketch Proof: Monotone Not all equal 3-SAT (MNAE 3-SAT) = Wireless Broadcast. 20 / 63

Hardness of Wireless Broadcasting Hardness Reduction: Proof Sketch Proof: Monotone Not all equal 3-SAT (MNAE 3-SAT) = Wireless Broadcast. MNAE-3SAT: Given a CNF formula C = i (x i1 x i2 x i3 ) with no complemented variable. Problem: Does there exist a satisfying assignment such that each clause contain at least one false literal? (Y/N) 21 / 63

Hardness of Wireless Broadcasting Hardness Reduction: Proof Sketch Proof: Monotone Not all equal 3-SAT (MNAE 3-SAT) = Wireless Broadcast. MNAE-3SAT: Given a CNF formula C = i (x i1 x i2 x i3 ) with no complemented variable. Problem: Does there exist a satisfying assignment such that each clause contain at least one false literal? (Y/N) Question: Can we broadcast two packets from the source r in two slots? r P = {0, 1} x 1 x 2 x 3 x i x n c 1 c 2 c 3 c j c m 22 / 63

Hardness of Wireless Broadcasting Hardness Reduction: Proof Sketch Proof: Monotone Not all equal 3-SAT (MNAE 3-SAT) = Wireless Broadcast. MNAE-3SAT: Given a CNF formula C = i (x i1 x i2 x i3 ) with no complemented variable. Problem: Does there exist a satisfying assignment such that each clause contain at least one false literal? (Y/N) Question: Can we broadcast two packets from the source r in two slots? r P = {0, 1} x 1 x 2 x 3 x i x n Slot 1 {0, 1} c 1 c 2 c 3 c j c m 23 / 63

Hardness of Wireless Broadcasting Hardness Reduction: Proof Sketch Proof: Monotone Not all equal 3-SAT (MNAE 3-SAT) = Wireless Broadcast. MNAE-3SAT: Given a CNF formula C = i (x i1 x i2 x i3 ) with no complemented variable. Problem: Does there exist a satisfying assignment such that each clause contain at least one false literal? (Y/N) Question: Can we broadcast two packets from the source r in two slots? r P = {0, 1} x 1 x 2 x 3 x i x n Slot 1 {0, 1} Slot 2 c 1 c 2 c 3 c j c m {0, 1}? iff Y to MNAE-3SAT 24 / 63

Outline 1 Introduction 2 Hardness of Wireless Broadcasting 3 4 Numerical Results 5 Conclusion 25 / 63

Routing of Packets: Connected Dominating Sets (CDS) CDS: Defintion A connected dominating set in a directed graph G(V, E) and root r is a set of vertices S V such that: For every v V, a directed path π = r v 1 v 2... v i v, where all nodes, excepting possibly v, are in the set S. 26 / 63

Routing of Packets: Connected Dominating Sets (CDS) CDS: Defintion A connected dominating set in a directed graph G(V, E) and root r is a set of vertices S V such that: For every v V, a directed path π = r v 1 v 2... v i v, where all nodes, excepting possibly v, are in the set S. 2 1 4 3 The sets S 1 = {1, 2}, S 2 = {1, 3} are two CDS in this network. 27 / 63

Routing of Packets: Connected Dominating Sets (CDS) CDS: Defintion A connected dominating set in a directed graph G(V, E) and root r is a set of vertices S V such that: For every v V, a directed path π = r v 1 v 2... v i v, where all nodes, excepting possibly v, are in the set S. 2 1 4 3 The sets S 1 = {1, 2}, S 2 = {1, 3} are two CDS in this network. Key observation: Route of a Packet Every packet must be transmitted sequentially by a CDS in order to be broadcasted. 28 / 63

Design of UMW: Motivation and Insight Observation: Because of coupling, networked queues are harder to analyze and control. iid arrival Q 1 (t) correlated arrivals Q 2 (t) departure Q 1 (t) IID arrivals to Q 1 causes correlated arrivals to Q 2 29 / 63

Design of UMW: Motivation and Insight Observation: Because of coupling, networked queues are harder to analyze and control. iid arrival Q 1 (t) correlated arrivals Q 2 (t) departure Q 1 (t) IID arrivals to Q 1 causes correlated arrivals to Q 2 This motivates us to obtain a relaxed system, easier to analyze, yet, preserves properties of interest (e.g., stability). Question: How to obtain a good relaxation? Which constraints to relax? 30 / 63

Design of UMW: Motivation and Insight Observation: Because of coupling, networked queues are harder to analyze and control. iid arrival Q 1 (t) correlated arrivals Q 2 (t) departure Q 1 (t) IID arrivals to Q 1 causes correlated arrivals to Q 2 This motivates us to obtain a relaxed system, easier to analyze, yet, preserves properties of interest (e.g., stability). Question: How to obtain a good relaxation? Which constraints to relax? Ans: The Precedence Constraints! 31 / 63

Precedence Constraint: Example Consider an incoming packet p with the specified broadcasting route CDS p = {1, 2}. 2 p 1 4 3 32 / 63

Precedence Constraint: Example Consider an incoming packet p with the specified broadcasting route CDS p = {1, 2}. 2 p 1 4 3 Slot 1 33 / 63

Precedence Constraint: Example Consider an incoming packet p with the specified broadcasting route CDS p = {1, 2}. 2 p 1 4 3 Slot 2 Observation: Due to the precedence, the packet p is transmitted by Node 2 after it has been transmitted by Node 1 34 / 63

Precedence Relaxation: Example We maintain a virtual system where the packet p is injected to the virtual queues Q 1, Q 2 immediately upon arrival. p 1 2 4 p Q 1 (t) p Q 2 (t) µ 1 (t) µ 2 (t) µ 3 (t) 3 Q 3 (t) Q 4 (t) µ 4 (t) A Wireless Network G Virtual Queues 35 / 63

Virtual Queues: Operation Formally, 1 Associate a virtual queue Q v (t) with each node v of the graph. 2 Upon packet arrival: Determine a CDS T p (t) for the packet p Immediately inject a new virtual packet to each virtual queue along in the CDS This amounts to incrementing the queue counters in the CDS 36 / 63

Virtual Queues: Operation Formally, 1 Associate a virtual queue Q v (t) with each node v of the graph. 2 Upon packet arrival: Determine a CDS T p (t) for the packet p Immediately inject a new virtual packet to each virtual queue along in the CDS This amounts to incrementing the queue counters in the CDS 3 Serve the virtual packets at the rate µ (t) as long as the corresponding virtual queues are non-empty Subject to the same link scheduling constraints (µ (t) M) Don t care whether the physical queue is empty or not. 37 / 63

Virtual Queues: Operation Formally, 1 Associate a virtual queue Q v (t) with each node v of the graph. 2 Upon packet arrival: Determine a CDS T p (t) for the packet p Immediately inject a new virtual packet to each virtual queue along in the CDS This amounts to incrementing the queue counters in the CDS 3 Serve the virtual packets at the rate µ (t) as long as the corresponding virtual queues are non-empty Subject to the same link scheduling constraints (µ (t) M) Don t care whether the physical queue is empty or not. Question: How to design the optimal controls: T p (t) and µ (t)? 38 / 63

Dynamics of the Virtual Queues Q(t) The virtual queue lengths can be mathematically identified with an n-dimensional vector taking values in Z n +. 39 / 63

Dynamics of the Virtual Queues Q(t) The virtual queue lengths can be mathematically identified with an n-dimensional vector taking values in Z n +. Denote the (controlled) arrival to the VQ Q i by à i (t). Then, the virtual queues evolve as: Q i (t + 1) = ( Qi (t) + Ãi (t) µ i (t)) +, (Lindley recursion) (1) Note that, the arrivals to the virtual queues ( à i (t), i V ) are explicit control variables at the source. Unlike the original system, given the controls, the virtual queues are independent of each other. This makes their exact analysis tractable. 40 / 63

Stabilizing Controls for Q(t) : Drift Analysis A natural first-step is to design π UMW ( A(t), µ(t) ), such that, it stabilizes t 0 the virtual system { Q(t)} t 0. The policy consists of the routing decisions : routing A π (t), and scheduling µ π (t). Intuition: This control is likely to stabilize the physical queues as well However, note that the dynamics of the physical queues depend explicitly on the packet scheduling policy (e.g., FIFO, LIFO etc.). We will come to this issue later. 41 / 63

Stabilizing Controls for Q(t) : Drift Analysis A natural first-step is to design π UMW ( A(t), µ(t) ), such that, it stabilizes t 0 the virtual system { Q(t)} t 0. The policy consists of the routing decisions : routing A π (t), and scheduling µ π (t). Intuition: This control is likely to stabilize the physical queues as well However, note that the dynamics of the physical queues depend explicitly on the packet scheduling policy (e.g., FIFO, LIFO etc.). We will come to this issue later. To stabilize the virtual queues, we choose the control that minimizes the drift of the Quadratic Lyapunov (potential) function of the Virtual Queues. 42 / 63

Derivation of the Control-Policy Define a Quadratic Lyapunov (potential) function L( Q(t)) def = Q i 2 (t) i V The one-slot drift of L( Q(t)) under any admissible policy π may be computed to be π (t) def = L( Q(t + 1)) L( Q(t)) ( B + 2 Q i (t)a(t)1(i T π (t)) ) Q i (t)µ π i (t) i V i V }{{}}{{} (a) (b) (2) Where T π (t) T and µ π (t) M are routing and activation control variables chosen for slot t. The drift upper-bound (2) has a nice separable form and may be minimized over the routing and activation controls individually. 43 / 63

Optimal Routing Policy T p (t) Let T denote the set of all CDS in G. Minimizing the routing term (a), we get the following optimal routing policy. Optimal Routing : T p (t) Tp (t) arg min Q i (t)1(i T ) T T i V In other words, the drift minimizing routing policy is to route the incoming packet along the Minimum Weight CDS, where each node i is weighted by the corresponding virtual queue Q i (t). 44 / 63

Example of Optimal Routing Q 2 (t) = 5 2 Q 1 (t) = 10 Q 4 (t) = 0 p 1 4 3 Q 3 (t) = 7 45 / 63

Example of Optimal Routing Q 2 (t) = 5 2 p Q 1 (t) = 10 1 Q 4 (t) = 0 4 Weight of CDS {1, 2} = 15 Weight of CDS {1, 3} = 17 3 Q 3 (t) = 7 46 / 63

Example of Optimal Routing Q 2 (t) = 5 2 p Q 1 (t) = 10 1 Q 4 (t) = 0 4 Weight of CDS {1, 2} = 15 Weight of CDS {1, 3} = 17 3 Q 3 (t) = 7 Chosen route=mcds= {1, 2} 47 / 63

Optimal Node Scheduling Policy µ (t) Let M denote the set of all non-interfering activations in G. Minimizing the scheduling term (b) in the drift expression, we get the following optimal scheduling policy. Optimal Scheduling : µ (t) µ (t) arg max Q i (t)1(i M) M M i V In other words, the drift minimizing node scheduling policy is to schedule the Max-Weight activation, where each node i is weighted by the corresponding virtual queue length Q i (t). 48 / 63

Example of Optimal Scheduling Q 2 (t) = 5 2 p Q 1 (t) = 10 1 Q 4 (t) = 0 4 Due to interference, can activate only one node per slot 3 Q 3 (t) = 7 49 / 63

Example of Optimal Scheduling Q 2 (t) = 5 2 p Q 1 (t) = 10 1 Q 4 (t) = 0 4 Due to interference, can activate only one node per slot 3 Q 3 (t) = 7 Optimal Schedule = Activate the Node 1 50 / 63

Stability of the Virtual Queue Theorem 6: Strong Stability of Q(t) Under the above routing and scheduling policy, for all arrival rate λ λ the virtual queue process is Strongly stable and has a limiting M.G.F, i.e., and, lim sup T 1 T T E( Q i (t)) B t=1 i lim sup E(exp(θ T i Q i (t))) C for some finite B, C and strictly positive θ. 51 / 63

Stability of the Virtual Queue Theorem 6: Strong Stability of Q(t) Under the above routing and scheduling policy, for all arrival rate λ λ the virtual queue process is Strongly stable and has a limiting M.G.F, i.e., and, lim sup T 1 T T E( Q i (t)) B t=1 i lim sup E(exp(θ T i Q i (t))) C for some finite B, C and strictly positive θ. The above leads to the following : Lemma: Sample Path bound on Virtual Queues Under the same condition, we have Q i (t) = O(log t), i a.s. 52 / 63

Optimal Control of the Physical Queues : Packet Scheduling How do we decide which packet to transmit over a link at any given time slot? Why does it matter? Cannot we just use FCFS? Nearest to Origin (NTO) policy [Gamarnik, 1998] Extended Nearest to Origin policy (ENTO): When multiple packets contend for an edge, schedule the one which has traversed the least number of edges Extension of NTO to general flow problems 53 / 63

Optimal Control of the Physical Queues : Packet Scheduling How do we decide which packet to transmit over a link at any given time slot? Why does it matter? Cannot we just use FCFS? Nearest to Origin (NTO) policy [Gamarnik, 1998] Extended Nearest to Origin policy (ENTO): When multiple packets contend for an edge, schedule the one which has traversed the least number of edges Extension of NTO to general flow problems Theorem 7: Stability of the Physical Queues The overall UMW policy is throughput-optimal. Proof uses the previous almost sure arrival bound on a typical sample path with an inductive argument on the edges. 54 / 63

ENTO: Example priority[p 1 ] e3 = 2 priority[p 2 ] e3 = 1 p 1 e 5 Q e3 p 1 p 2 S 1 e 1 e 2 e 3 e 4 S 2 p 2 Packet p 1 has higher priority than p 2 to cross e 3 as it has traversed less number of edges 55 / 63

Proof Ideas for Theorem 7: Stability of the Physical Queues 1 Observation: Since routes are fixed at source, total number of arrival à e(t 1, t 2 ) in interval [t 1, t 2 ] at virtual queue Q i = A i (t 1, t 2 ) total number of packets that wish to be trabsmitted by the node i in the physical network sometime in future. 56 / 63

Proof Ideas for Theorem 7: Stability of the Physical Queues 1 Observation: Since routes are fixed at source, total number of arrival à e(t 1, t 2 ) in interval [t 1, t 2 ] at virtual queue Q i = A i (t 1, t 2 ) total number of packets that wish to be trabsmitted by the node i in the physical network sometime in future. 2 Theorem 6 (Stability of the Virtual Queues) + Skorokhod Map representation + Almost Sure Bound = A i (t 0, t) S i (t 0, t) + O(log(t)), i V, t 0 t, w.p. 1 This essentially implies that none of the nodes are overloaded under the UMW scheduling policy 57 / 63

Proof Ideas for Theorem 7: Stability of the Physical Queues 1 Observation: Since routes are fixed at source, total number of arrival à e(t 1, t 2 ) in interval [t 1, t 2 ] at virtual queue Q i = A i (t 1, t 2 ) total number of packets that wish to be trabsmitted by the node i in the physical network sometime in future. 2 Theorem 6 (Stability of the Virtual Queues) + Skorokhod Map representation + Almost Sure Bound = A i (t 0, t) S i (t 0, t) + O(log(t)), i V, t 0 t, w.p. 1 This essentially implies that none of the nodes are overloaded under the UMW scheduling policy 3 With the universal stability property of the ENTO packet scheduling policy it is finally shown that the physical queues are rate stable. Involves induction on the number of hops from the source. 58 / 63

Numerical Results Outline 1 Introduction 2 Hardness of Wireless Broadcasting 3 4 Numerical Results 5 Conclusion 59 / 63

Numerical Results Broadcasting: Network without Interference 1 Capacity=2 2 3 4 5 Capacity=1 6 7 8 9 10 A wireless network with non-interfering channels. The broadcast capacity of the network is λ = 2. 22 20 18 Broadcast Delay 16 14 12 10 8 6 4 2 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 Arrival rate λ 60 / 63

Numerical Results Broadcasting Simulation: Time-Varying Wireless Network Source λ = r a b 80 70 c d e Broadcast Delay 60 50 40 30 20 (c) p ON = 0.4 (b) p ON = 0.6 (a) p ON = 1 10 f g h The Grid Network 0 0.1 0.15 0.2 0.25 0.3 Arrival rate λ Plot of the broadcast delay incurred by the UMW policy as a function of the arrival rate λ in the 3 3 wireless grid network. 61 / 63

Conclusion Outline 1 Introduction 2 Hardness of Wireless Broadcasting 3 4 Numerical Results 5 Conclusion 62 / 63

Conclusion Conclusion Our understanding of network control theory has progressed enormously over the past 25 years, starting with the seminal Backpressure policy of Tassiulas and Ephremides (1992). We have derived a throughput-optimal algorithm, UMW, for broadcasting in wireless networks with point-to-multipoint links. This important problem was proposed by Massoulie and Twigg, and has remained open for last ten years. The virtual network framework used to solve the problem is surprisingly general and may be applied to other open problems in this area (e.g., Sinha, Modiano, INFOCOM 17). Opens up exciting new directions for research with lots of interesting problems. 63 / 63