Impact of Energy Expenditure Rate Constraints on the Performance of Multi-Hop Wireless Mesh Networks A Technical Report by Nachiket Sahasrabudhe Adviser: Prof. Joy Kuri Centre for Electronics Design and Technology(CEDT) INDIAN INSTITUTE OF SCIENCE BANGALORE - 560 012, INDIA March 2008 Contents Abstract 2 1 Effect of energy expenditure rate constraints 3 1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.3.1 Contention Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.3.2 Energy Expenditure Rate Constraint . . . . . . . . . . . . . . . . 10 Mathematical Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.4.1 Dual Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 1.4.2 Solution to the relaxed problem . . . . . . . . . . . . . . . . . . . 14 1.4.3 Solution to the routing problem . . . . . . . . . . . . . . . . . . . 15 1.4.4 Solution to the scheduling problem . . . . . . . . . . . . . . . . . 16 1.4.5 Dual problem solution by sub-gradient method . . . . . . . . . . . 18 Numerical results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 1.5.1 Single end-to-end flow . . . . . . . . . . . . . . . . . . . . . . . . 20 1.5.2 Multiple end-to-end flows . . . . . . . . . . . . . . . . . . . . . . 21 1.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 1.7 Acknowledgment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 1.4 1.5 Bibliography 22 1 Abstract In this article we study the problem of joint congestion control, routing and MAC layer scheduling in multi-hop wireless mesh network, where the nodes in the network are subjected to maximum energy expenditure rates. We model link contention in the wireless network using the contention graph and we model energy expenditure rate constraint of nodes using the energy expenditure rate matrix. We formulate the problem as an aggregate utility maximization problem and apply duality theory in order to decompose the problem into two sub-problems namely, network layer routing and congestion control problem and MAC layer scheduling problem. The source adjusts its rate based on the cost of the least cost path to the destination where the cost of the path includes not only the prices of the links in it but also the prices associated with the nodes on the path. The MAC layer scheduling of the links is carried out based on the prices of the links. We study the effects of energy expenditure rate constraints of the nodes on the optimal throughput of the network. 2 Chapter 1 Effect of energy expenditure rate constraints 1.1 Introduction Resource allocation in wireless networks is considered more challenging compared to the wireline networks because of the constrained resources in wireless networks. In a typical multi-hop wireless network, there is no fixed infrastructure and every node acts as a router, forwarding the packets of other nodes. Since the wireless medium is a shared one, activity on one link can greatly affect the activity on others. In the simplest case, reception at a node requires that other nodes in its vicinity remain silent for the duration of the reception. So only a subset of a given collection of links can be active at the same time. This additional constraint, called the wireless link contention constraint, makes the resource allocation problem more challenging in wireless networks. Resource allocation problems in wire-line networks have been extensively studied in the literature [7], [8] and many cross layer optimization algorithms have been developed. Researchers have also studied the problem of optimal throughput in wireless networks by taking into account the wireless link interference constraint [6], [2], [4]. In this article we study the the problem of determining the optimum throughput when the nodes in the network are constrained to have a maximum energy expenditure rate. Wireless sensor networks provide a natural context for our problem. The constraint on energy expenditure rates translates directly to increased network lifetimes. We apply the cross layer optimization to determine the optimal throughput of the network. We apply the theory of duality in convex optimization to solve the problem. 3 CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 4 We observe the effects of variation of the energy expenditure rate constraint on the nodes in the network. We notice that the optimal throughput is determined by the dominant of the two bounds, namely, the bound imposed by wireless link capacity constraint and the one imposed by energy expenditure rate constraint. The rest of this article is organized as follows. In Section 1.2 we have a brief discussion on the related work. Section 1.3 describes the system model. In Section 1.4 we state the problem as a convex optimization problem and discuss the corresponding dual problem. In Section 1.5 we state the numerical results while Section 1.6 concludes the article. 1.2 Related Work Here we give a brief survey of the work that has already been done in the area of crosslayer optimization. In a paper by Yuan Xue et al. [1] the authors consider the problem of multi-hop flows on ad-hoc wireless networks by proposing a price based resource allocation model in order to maximize the aggregate utility. They propose a maximal clique associated shadow prices, rather than the link associated prices. In [3], Lijun Chen el al. propose two algorithms which decompose vertically into protocol layers where TCP and MAC jointly solve the system problem. They also provide a distributed algorithm for the scheduling of the wireless links in the network. A similar approach is presented in [2] by Francesco Lo Presti where a cross layer optimization is carried out and a distributed algorithm for scheduling is suggested which is a combination of the one suggested in [1]and [3]. [6] discusses the impact of interference on multi-hop wireless network performance. There a problem of optimal throughput is handled and upper and lower bounds on it are suggested. In all these papers, the wireless nodes are assumed to have no constraints on the rate of energy expenditure; essentially, this amounts to assuming that nodes have access to unlimited energy. Our work is motivated by wireless sensor networks, and therefore we impose upper limits on the rate at which energy can be spent by each node. CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 1.3 5 System Model We represent a network as a directed graph G = (N , L), where N represents the set of nodes in the network and L represents the set of possible wireless links in the network. The total number of nodes in the network is denoted by N = |N | and the total number of links by L = |L|. A wireless link (i, j) ∈ L if nodes i and j are within transmission range of each other i.e. direct communication between nodes i and node j is possible. As in [2] we assume that if a link (i, j) ∈ L, then so does the link (j, i). We assume a static topology and each link l ∈ L has a fixed finite capacity Cl , when active. Let F denote the set of all end-to-end multi-hop flows in the network. For every flow f ∈ F , s(f ) and d(f ) represent the source and destination nodes, respectively. The data rate associated with the flow f is represented by xf and yf l denotes the part of the flow f that is carried by the link l. Let yf = (yf l )l∈L be a vector representing the part of a flow f carried by each link in the network. Let h(l) and t(l) denote the head and the tail of a link l. Then we define two sets H(n) and T (n) for every node n ∈ N as follows: H(n) = n T (n) = n l : h(l) = n, l ∈ L o . l : t(l) = n, l ∈ L o . Then in order to satisfy the flow conservation equation, the net flow inserted by a node n into the network shall be zero unless n is a source or destination node for some flow f ∈ F . In other words, for every f ∈ F , n ∈ N , x if n = s(f ) f X X yf l − yf l = −xf if n = d(f ) l∈H(n) l∈T (n) 0 otherwise This can be represented in a matrix form with the help of the node-link incidence CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 6 matrix A, which we define as follows: 1 if link l originates at node n Anl = −1 if link l terminates at node n 0 otherwise Thus the flow conservation constraint can be represented as Ayf = uf , ∀f ∈ F . (1.1) where uf = (uf n )n∈N , and uf n represents the amount of traffic of type f ∈ F injected into the network by node n. Thus, uf n = x f if n = s(f ) −xf if n = d(f ) 0 otherwise Let y denote a vector of size L, the l th entry of which represents the aggregate flow on the link l, i.e. y= X yf f ∈F 1.3.1 Contention Graph We model contention among the wireless links in the network by the wireless link contention graph as in [1]. DEFINITION 1 A graph Gc = (Vc , Ec ) is a wireless link contention graph of network G, if there exists a mapping function ϕ : L → Vc that satisfies 1. ϕ(l) ∈ Vc , if and only if l ∈ L; 2. (ϕ(l), ϕ(l0 )) ∈ Ec , if for l, l0 ∈ L, ∃l00 ∈ L, so that l ∩ l00 6= φ and l0 ∩ l00 6= φ. CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 7 2 0 4 1 5 3 Figure 1.1: A network graph G (1,2) (2,4) (0,1) (4,5) (1,3) (3,4) Figure 1.2: The wireless link contention graph Gc corresponding to the network graph G in the Figure 1.1. CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 8 Figure 1.1 shows an example of a wireless network and the corresponding link contention graph is shown in the Figure 1.2 . The contention graph models the interference among the wireless links. Every link in the network graph G is represented as a node in the link contention graph Gc . If there exists an edge between the two nodes in the link contention graph, then the corresponding links in the network graph (which these two nodes represent in the contention graph) can not be activated simultaneously. As an example consider two links (i1 , j1 ) ∈ L and (i2 , j2 ) ∈ L in any arbitrary graph. Assume that the node j2 is in the transmission range of the node i1 . Then the signal transmitted by the node i1 to the node j1 will reach the node j2 also. Thus the node j2 can not transmit or receive data on the link (i2 , j2 ) as long as the node i1 is in the transmission mode. Thus, in the link contention graph, an edge will be present between the nodes representing the links (i1 , j1 ) and (i2 , j2 ) respectively. There are many ways to incorporate these interference effects into the link contention graph. Here we assume that a transmission by a node affects all the nodes within twohops from it. Thus there exists an edge between two nodes in the link contention graph Gc if the corresponding two links in the network graph G either share a node or share a common neighborhood link. Figure 1.1 and Figure 1.2 illustrate this. The link (0, 1) and the link (1, 2) contend for channel access as they share a common node, while the link (0, 1) and the link (2, 4) contend for channel access as they share a neighborhood link (1, 2). As the contending links can not be activated simultaneously the effective capacity of a link is less than its actual capacity. All the links that do not interfere with each other can be scheduled simultaneously. These links correspond to the set of independent nodes in the link contention graph. DEFINITION 2 A set of nodes V ⊆ Vc is said to be maximally independent if, 1. no pair of nodes vi ,vj ∈ V is connected. 2. every node v ∈ Vc \ V is connected to at least one node from the set V. CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS Suppose there are K maximal independent sets in the link contention graph. 9 Let I1 , I2 , I3 , . . . , IK be these maximal independent sets and let 0 ≤ ai ≤ 1, be the fraction of time an independent set Ii is activated. Then the fraction of time a link l is active can be obtained by, X λl = ( ak k|l ∈ Ik ) Thus the effective capacity of a link l is given by, clef f = λl Cl Let c represent a vector of size L, the lth entry of it representing the effective capacity of a link l for the specified schedule. We call this vector an effective capacity vector. We represent an independent set I by a column matrix rI defined as follows, C if a link l ∈ I l r Il = 0 o.w. Cl being the physical layer capacity of the link l. Also we define an L × K matrix MI the columns of which are the vectors rI . Thus we can write the vector c as, j=K c = X aj rj j=1 = MI a where, aT = [ a1 , a2 , . . . , aK ] DEFINITION 3 A link rate vector y is said to be schedulable if ∃ some schedule represented by a vector a such that y ≤ MI a (1.2) 10 CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 1.3.2 Energy Expenditure Rate Constraint We incorporate the effects of energy-expenditure-rate constraints of nodes into our network model. Let the amount of energy spent by each node while transmitting a bit be et , and the amount of energy spent while receiving a bit be er . The net data transmission and reception rate for each node is restricted by the maximum allowable energy expenditure rate corresponding to that node, which we represent by γn for the node n. Thus we have the following condition that has to be satisfied at each node in the network, X et yj + j∈H(n) X er yj ≤ γn , ∀n ∈ N (1.3) j∈T (n) We define the N × L energy matrix E as follows, Enl = e if l ∈ H(n) t er if l ∈ T (n) 0 otherwise DEFINITION 4 A link rate vector y is said to be energy-feasible if , Ey ≤ Γ, (1.4) Γ being a column matrix of size N , the nth entry of which is γn . It should be noted that, even though the vector y is schedulable, that does not imply that it is energy feasible and vice versa. The rest of this section introduces notations that we will be using often in this article. Omn represents an all zero matrix of size m × n. Similarly 1mn represents an all one matrix of size m × n. Im indicates an identity matrix of size m. Let x̃ be a column matrix of size (|F | ∗ L + |F | + K), and for each flow f , we define a column matrix vf of size N . Let w be a column matrix of size (N ∗ |F | + 1). Thus, x̃ = h y1 x1 y2 x2 . . . y|F | x|F | a1 a2 . . . aK i CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 11 1 if i = N ∗ |F | + 1 wi = 0 otherwise −1 if i = s(f ) vf i = 1 if i = d(f ) 0 otherwise For each flow f ∈ F , we define a N × (L + 1) matrix Af as: Af = h A i vf We define two matrices, a (N ∗ |F | + 1) × (L ∗ |F | + K + |F |) matrix B and a (L + N ) × ((L + 1) ∗ |F | + K) matrix Me as follows: A1 ON (L+1) .. B = . ON (L+1) O1(L+1) IL OL1 Me = E ON 1 1.4 ON (L+1) . . . ON (L+1) ON K A2 . . . ON (L+1) ON K .. .. . . ON (L+1) . . . O1(L+1) ... IL OL1 . . . E ON 1 . . . A|F | ON K O1(L+1) 11K IL OL1 −MI E O N 1 ON K Mathematical Formulation Consider a wireless network having an arbitrary topology. Our aim is to send data on this network between the source-destination pairs at the maximum possible rates, without violating the capacity constraints of the wireless links, flow conservation constraints, wireless link contention constraints and the energy expenditure rate constraints on the nodes in the network. We associate a utility function with each flow f ∈ F [2]. Now our aim is to maximize the aggregate utility associated with the network, which will be the CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 12 sum of the utilities of all the flows in the network. The utility function is assumed to be concave, nondecreasing and differentiable everywhere. Thus the formal representation of the problem of maximization of the source data-rates is as follows: maximize: X U (xf ) f ∈F Subject to: Ayf = uf , ∀f ∈ F X yf ≤ M I a f ∈F et X j∈H(n) yj + e r X yj ≤ γn , ∀n ∈ N j∈T (n) K X ak = 1 k=1 a ≥ 0 yf ≥ 0, ∀f ∈ F xf ≥ 0, ∀f ∈ F This is a convex optimization problem with affine constraints. But to solve this problem, a central entity is required that is aware of the network topology. We take the help of duality theory in order to solve this problem, based on which a distributed algorithm can be derived in future. Since Slater’s conditions for Strong Duality are satisfied (convex optimization problem with affine constraints) [9], the optimal value of the dual problem and that of the primal one will be the same. Before stating the dual problem we represent the above problem in the standard form, with all the unknowns on one side. CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS maximize: f (x̃) = X 13 U (xf ) f ∈F Subject to: Bx̃ = w (1.5) Me x̃ ≤ Γe (1.6) x̃ ≥ 0 (1.7) where Γe is as follows, γ (i−L) if L < i ≤ (L + N ) Γei = 0 otherwise All the matrices in the equations (1.5)-(1.7) are as defined in the previous section. 1.4.1 Dual Problem While formulating the dual problem we partially relax the primal problem by relaxing the inequality constraint given by the Equation (1.6) above. We represent a Lagrangian function corresponding to this relaxation as: L(x̃, p, q) = f (x̃) − p q T (Me x̃ − Γe ) where p (L × 1) represents the prices associated with the links and q (N × 1) represents the prices associated with the nodes in the network. So the relaxed problem becomes: max L(x̃, p, q) subject to: Bx̃ − w = 0 (1.8) x̃ ≥ 0 (1.9) CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 14 Thus the dual problem associated with the primal problem that we started with is given by: min D(p, q) (1.10) subject to: p ≥ 0 q ≥ 0 where, D(p, q) = max L(x̃, p, q) 1.4.2 (1.11) subject to: Bx̃ − w = 0 (1.12) x̃ ≥ 0 (1.13) Solution to the relaxed problem The problem of maximizing the relaxed objective function can be split into two separate problems which are illustrated below. We can notice that a solution to the one of them is associated with the routing in the network while the solution to the other is associated with the scheduling of the wireless links in the network. We define two functions D1 (p, q) and D2 (p) (as in [3]) as follows: D1 (p, q) = max( X (U (xf ) − f ∈F L X (pi + qh(i) et + pt(i) er )yf i )) i=1 subject to: Ayf = uf , ∀f ∈ F yf ≥ 0, ∀f ∈ F xf ≥ 0, ∀f ∈ F . CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 15 D2 (p) = max(pT MI a) K X subject to: ak = 1 k=1 a≥0 So we have, D(p, q) = D1 (p, q) + D2 (p) + N X qi γ i . (1.14) i=1 It can be noticed that the function D2 (p) is a piecewise linear one and hence not differentiable everywhere, as a result of which the function D(p, q) is also not differentiable everywhere. 1.4.3 Solution to the routing problem The function D1 (p, q) is associated with the routing problem. The solution to this problem is to route the traffic for each source destination pair along the least cost path between the source and the destination where the cost of a link l is an effective cost pef f (l) given by (pl + qh(l) et + qt(l) er ), which takes into account the cost associated with the head and tail nodes of the link. Since there can be multiple paths with least total effective-cost and traffic can be routed along these paths in more than one manner, the solution to the routing problem may not be unique. Thus, for every flow f ∈ F , we have a maximization problem, max(U (xf ) − xf ,yf L X peff (l)yf l ) l=1 subject to: Ayf = uf . yf ≥ 0. xf ≥ 0. CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 16 Solving this for every flow gives xf = U 0−1 (p(f )), ∀f ∈ F (1.15) where p(f ) is the total effective-cost of the least effective-cost path from the source to the destination for the flow f . 1.4.4 Solution to the scheduling problem The function D2 (p) is associated with the MAC-layer scheduling problem. Here our aim is to find a schedule a, that will maximize the product, pT MI a. DEFINITION 5 A solution to the scheduling problem will be said to satisfy the property P, if the schedule a is of the form, 1 for exactly one 1 ≤ i ≤ K ai = 0 for the rest 1 ≤ i ≤ K Thus, a solution to the scheduling problem satisfying property P is such that only one independent set is activated repeatedly. Claim 1 For an arbitrary price vector p, there will always be an optimal solution to the scheduling problem which satisfies the property P. Proof : A solution to this problem lies in the convex hull of the columns of the matrix MI . As the objective is a linear function of the unknowns ai , 1 ≤ i ≤ K, from the theory of linear programming we can say that the solution to this problem lies at the extreme point of the convex hull of the columns of the matrix MI [11]. Since the extreme point of this convex hull corresponds to one of the maximal independent sets of the contention graph Gc , the resulting solution will schedule links that belong to this independent set CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 17 and will not activate the other independent sets, hence the schedule a will satisfy the property P. Claim 2 A feasible solution to the primal problem can not satisfy the property P, unless a destination node is within a single-hop from the source node. Proof : If we take a schedule satisfying property P, then only one independent set gets scheduled repeatedly. This means that the effective capacity vector will be such that there are few elements of capacity C, while the rest have zero capacity. So, in the routing problem, we will get a disjoint set of links, and there will be no end-to-end path between the source and the destination. Hence the claim. Claim 3 There exists some optimal solution to the scheduling problem which does not satisfy property P. Proof : Since Slater’s conditions for Strong Duality are satisfied by the primal problem (convex objective function with affine constraints), the duality gap is zero [10]. Which implies that, optimal primal objective and optimal dual objective are equal. Hence there exists an optimal solution to the dual problem, say p∗. Since a scheduling policy that forms the part of the solution to the primal problem, does not satisfy the property P (from the Claim 2 above), there must exist some optimal solution to the scheduling problem, for p = p∗, which does not satisfy property P. Hence the claim. Claim 4 If p∗ is an optimal solution to the Equation (1.10), then multiple columns r j of matrix MI , satisfy the equation, rj = arg max p∗T ri 1≤i≤K (1.16) Proof : Let an independent set given by an optimal schedule that satisfies the property P be rm . Now from the Claim 3 there exists an optimal schedule a∗ (p∗ ) that does not CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 18 satisfy the property P. Thus we have, p∗T rm = p∗T MI a∗ (p∗ ) K X = p∗T ri a∗i (p∗ ) (1.17) i=0 As a∗ (p∗ ) represents a schedule, K X a∗i (p∗ ) = 1 (1.18) i=0 From Equations (1.16),(1.17) and (1.18) we can say that the columns of MI corresponding to the nonzero entries of the vector a∗ (p∗ ) shall satisfy, p∗T ri = p∗T rm if a∗i (p∗ ) 6= 0 As multiple entries of a∗ (p∗ ) are non-zero, multiple columns of MI satisfy the Equation (1.16). 1.4.5 Dual problem solution by sub-gradient method Since the function D(p) is not differentiable everywhere, the usual gradient method is not applicable. Hence we go for a sub-gradient method in order to solve the problem. DEFINITION 6 [10] Given a convex function D(p) : <n → <, we say that a vector h(p) ∈ <n is a sub-gradient of D(p) at point p ∈ <n if:D(p̄) ≥ D(p)+(p̄−p)T h(p), ∀p̄ ∈ <n Now h(p, q) = Γe − Me x̃(p, q) (1.19) CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 0 1 3 4 2 19 7 6 5 Figure 1.3: The data flow is from the node 0 to the node 7 for a single source-destination case. is a sub-gradient of a dual function D(p) at point p.This can be shown as in [3]. Thus using the sub-gradient algorithm the price vector p is updated as follows [10], pj (t + 1) = [pj (t) − δhj (p(t), q(t))]+ (1.20) qj (t + 1) = [qj (t) − δhL+j (p(t), q(t))]+ Where [x]+ = max(0, x) and δ is the step-size associated with the sub-gradient method. It can be shown that if the norm of the sub-gradient is bounded i.e. there exists H, such that ||h(p, q)||2 ≤ H, ∀p ≥ 0, q ≥ 0 then the sub-gradient algorithm converges within the band of H 2 δ/2 around an optimal solution [3]. 1.5 Numerical results Here we give the results that we obtained after solving the dual problem by a sub-gradient algorithm by implementing the equations (1.15),(1.19) and (1.20) . We illustrate the results for one simple topology as shown in the Figure 1.3. We assume that all the links in the network have the same capacity C = 10M bits/sec. Results are shown for a single source-destination pair as well as multiple source-destination pairs.The utility function associated with the flows in the network is U (xf ) = log(xf ). Assume that et , the energy spent by a node for transmitting a single bit is 0.75 units and er , the energy spent by a node for receiving a single bit is 0.5 units. We assume that the energy expenditure CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 20 rate constraint is the same for all the nodes, we represent this by γ. We take a constant step-size δ = 0.001 for the sub-gradient method. Along with the numerical evaluation, we also compute the time averages of the data-rates of the respective flows. For both the cases(i.e. single end-to-end flow and multiple end-to-end flows.) plots are shown below. It is worth noticing that the time averages of the source data-rates and the data-rates obtained by the algorithm converge to the same value. 1.5.1 Single end-to-end flow Results from the subgradient algorithm Here the end-to-end flow exists between node 0 and node 7. The graph in Figure 1.4 shows variations in source rate as the iterations proceed, for γ = 3 and γ = 10 and the case of without γ. It can be noted that, as γ is varied from 3 to 10, the data-rate also varies from around 4M bits/sec to 5M bits/sec and keeps oscillating around this value of 5M bits/sec. It can be noticed that this limiting data-rate is the optimal throughput when there is no energy rate expenditure constraint. Thus we see that for smaller values of γ, the energy expenditure rate constraint is the dominating one, while as the value of γ increases the wireless link capacity constraint becomes the dominating one. This can be verified by noting that the curve corresponding to γ = 10 and the one without the γ restriction merge with one another. Thus for larger γ, the behavior of the system is same as that of without energy expenditure constraint. The oscillations in data-rate are due to the constant step size, that we have used while implementing the sub-gradient method [3]. We observe that, the path (node-0, node-1, node-2, node-4, node-7), which is a four-hop path, is often selected over a three-hop path (node-0,node-1,node-4,node-7), which differs from it by a single node while routing the traffic from the source to the destination. CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 21 Simulation Results In the simulation, the routing and scheduling are carried out in the centralized manner, according to the subgradient algorithm. The link and node prices are made available to the source from which it determines the least cost route to the destination and the data-rate at which it should operate over that route in each iteration. The source keeps accumulating the bits according to this data-rate till any of the links associated with the source is activated by the scheduling algorithm. On activation of a link associated with the source, the source transmits over that link at maximum of CM bps. So the source is idle whenever links associated with it are not activated and it transmits at maximum of CM bps whenever a link associated with it is activated. Thus in the Figure 1.4 xf −simu (i) indicates the time average of the data-rate, where average is obtained over i iterations. 1.5.2 Multiple end-to-end flows Here there are three end-to-end flows. From node 0 to node 7, node 5 to node 4 and node 6 to node 1. The Figure 1.5 shows the variation in the net utility with the variation in gamma. We note that as γ increases the net-utility with energy expenditure constraints approaches the net-utility without energy expenditure constraints.The average net-utility net−utisimu is obtained in the similar manner as xf −simu , as explained in the single source destination case. Figure 1.6,Figure 1.7,Figure 1.8 show the plots of data-rates that are present between the node pairs (0, 7),(5, 4) and (6, 1) respectively. It is worth noting that, the source data rate is determined based on the total price of the least cost path from the source to destination, where the cost of the path includes not only the prices of the links, but also the prices associated with the nodes along the path. Thus the source adjusts its rate as in the case of a network without energy expenditure constraints, with a modified definition of a link price, which we call an effective link price. CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 1.6 22 Conclusion We have presented a solution to the problem of joint congestion control, routing and MAC layer link scheduling in the multi-hop wireless networks where the nodes in the network are subjected to a maximum energy expenditure rate constraint. The problem is solved by dual decomposition and the sub-gradient algorithm. We also study the effects of maximum allowable energy expenditure rates of the nodes, on the maximum throughput supported by the network. We observe that as the maximum energy expenditure rate increases, the maximum throughput supported by the network also increases up-to the certain value and it then remains constant irrespective of the increment in the maximum energy expenditure rate. Our results show the maximum allowable data rates under different energy expenditure constraints. In our ongoing work, we are trying to address the problem of finding a distributed scheduling policy that will support this maximum allowable data rate. 1.7 Acknowledgment This work is partially supported by the Defence Research and Development Organization (DRDO), Ministry of Defence, Government of India, under a research grant on wireless sensor networks (DRDO 571, IISc). The authors are grateful to the anonymous reviewers for pointing out several inaccuracies in the version submitted for review. CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 23 7 Data-rate in Mbps 6 5 4 3 xf-algo,γ=10 xf-simu,γ=10 xf-algo,γ=3 xf-simu,γ=3 xf-algo, w/o γ xf-simu, w/o γ 2 1 0 0 0.0 X ⋅10 7.5 X ⋅10 4 1.5 X ⋅10 5 2.3 X ⋅10 5 3.0 X ⋅10 5 Iteration Figure 1.4: Source data-rate for different values of γ for a single source-destination case. Node 0 is the source node and node 7 is the destination node. CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 24 4.00 3.00 2.00 Net Utility 1.00 0.00 -1.00 net-utialgo, γ=10 net-utisimu,γ=10 net-utialgo,γ=3 net-utisimu,γ=3 net-utialgo, w/o γ net-utisimu, w/o γ -2.00 -3.00 -4.00 -5.00 0 0.0 X 10 7.5 X 10 4 1.5 X 10 5 2.3 X 10 5 3.0 X 10 5 Iteration Figure 1.5: Aggregate utility for different values of γ for a multiple source-destination case. Data flow is between node pairs (0, 7),(5, 4) and (6, 1). CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 5 Data rate in Mbps 4 3 25 xf-algo-0,γ=10 xf-simu-0,γ=10 xf-algo-0,γ=3 xf-simu-0,γ=3 xf-algo-0,w/o γ xf-simu-0,w/o γ 2 1 0 0 0.0 X ⋅10 7.5 X ⋅10 4 1.5 X ⋅10 5 2.3 X ⋅10 5 3.0 X ⋅10 5 Iteration Figure 1.6: Source rate variation with γ as iterations proceed for a node pair (0, 7) in the presence of multiple end-to-end flows. CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 5 Data rate in Mbps 4 3 26 xf-algo-0,γ=10 xf-simu-0,γ=10 xf-algo-0,γ=3 xf-simu-0,γ=3 xf-algo-0,w/o γ xf-simu-0,w/o γ 2 1 0 0 0.0 X ⋅10 7.5 X ⋅10 4 1.5 X ⋅10 5 2.3 X ⋅10 5 3.0 X ⋅10 5 Iteration Figure 1.7: Source rate variation with γ as iterations proceed for a node pair (5, 4) in the presence of multiple end-to-end flows. CHAPTER 1. EFFECT OF ENERGY EXPENDITURE RATE CONSTRAINTS 5 Data rate in Mbps 4 3 27 xf-algo-0,γ=10 xf-simu-0,γ=10 xf-algo-0,γ=3 xf-simu-0,γ=3 xf-algo-0,w/o γ xf-simu-0,w/o γ 2 1 0 0 0.0 X ⋅10 7.5 X ⋅10 4 1.5 X ⋅10 5 2.3 X ⋅10 5 3.0 X ⋅10 5 Iteration Figure 1.8: Source rate variation with γ as iterations proceed for a node pair (6, 1) in the presence of multiple end-to-end flows. Bibliography [1] Y. Xue, B. Li,K. Nahrstedt. ”Price-based Resource Allocation in Wireless Ad Hoc Networks”,in Proc. of the 11th International Workshop on Quality of Service (IWQoS), also Lecture Notes in Computer Science, ACM Springer-Verlag, Vol. 2707, pp. 79-96, Monterey, CA, June, 2003. [2] F.L. Presti, ”Joint Congestion Control, Routing and Media Access Control Optimization via Dual Decomposition for Ad Hoc Wireless Networks,” In the Proc. of the 8-th International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2005) , Montreal, Canada, October 2005. [3] L. Chen,S. Low,J. Doyle ,”Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks”in Proc. of IEEE Infocom 2005,March 2005. [4] L. Chen,S. Low,M. Chiang and J.C. Doyle, ”Cross-Layer Congestion Control,Routing and Scheduling Design in Ad Hoc Wireless Networks”. in Proc. of IEEE Infocom 2006,April 2006. [5] X. Lin,N.B. Shroff,R. Srikant ”A Tutorial on Cross-Layer Optimization in Wireless Networks”IEEE Journal on Selected Areas in Communication,vol.24 no. 8,August 2006. [6] K. Jain, J. Padhye, V.N. Padmanabhan, L. Qiu ”Impact of Interference On Multihop Wireless Network Performance” in Proc. of IEEE MobiCom 2003, September 2003. 28 BIBLIOGRAPHY 29 [7] S.H. Low and D.E. Lapsley, ”Optimization flow control,I:Basic algorithm and convergence ,”IEEE/ACM Trans. Netw.,pp. 861-875,Dec 1999. [8] F.P. Kelly,A. Maullo, and D. Tan, ”Rate control in communication networks:shadow prices,proportional fairness and stability,”J.Oper.Res.Soc.,vol. 49,pp. 237-252,1998. [9] S. Boyd and L. Vandenberghe, ”Convex Optimization”,Cambridge University Press [10] D. Bertsekas ”Nonlinear Programming”, Athena Scientific, 2003. [11] M.S. Bazaraa, H.D. Sherali, C.M. Shetty, ”Nonlinear Programming,Theory and Algorithms” John Wiley and Sons, Inc. 2004.