IEEE INFOCOM 2014 - IEEE Conference on Computer Communications From Least Interference-Cost Paths to Maximum (Concurrent) Multiflow in MC-MR Wireless Networks ∗ Peng-Jun Wan∗ , Zhu Wang∗ , Lei Wang† , Zhiguo Wan‡ , and Sai Ji§ Department of Computer Science, Illinois Institute of Technology, wan@cs.iit.edu † School of Software, Dalian University of Technology, lei.wang@ieee.org ‡ School of software, Tsinghua University, wanzhiguo@tsinghua.edu.cn § College of Computer And Software, Nanjing University of Information Science And Technology, jisai@nuist.edu.cn Abstract—Maximum multiflow and maximum concurrent multiflow in multi-channel multi-radio (MC-MR) wireless networks have been well-studied in the literature. They are NP-hard even in single-channel single-radio (SC-SR) wireless networks when all nodes have uniform (and fixed) interference radii and the positions of all nodes are available. While they admit a polynomial-time approximation scheme (PTAS) when the number of channels is bounded by a constant, such PTAS is quite infeasible practically. Other than the PTAS, all other known approximation algorithms, in both SC-SR wireless networks and MC-MR wireless networks, resorted to solve a polynomial-sized linear program (LP) exactly. The scalability of their running time is fundamentally limited by the general-purposed LP solvers. In this paper, we first introduce the concept of interference costs and prices of a path and explore their relations with the maximum (concurrent) multiflow. Then we develop purely combinatorial approximation algorithms which compute a sequence of least interference-cost routing paths along which the flows are routed. These algorithms are faster and simpler, and achieve nearly the same approximation bounds known in the literature. for each ๐ ∈ ๐ด; ๐ฎ is also said to be a link schedule of this ๐ฅ. Suppose that we are given ๐ unicast requests specified by source-destination pairs. Let ๐ซ๐ be the set of paths in (๐, ๐ด) of the ๐-th request for all 1 ≤ ๐ ≤ ๐, and let ๐ซ be the union of ๐ซ1 , ⋅ ⋅ ⋅ , ๐ซ๐ . Any set Γ = {(๐๐ , ๐ฟ๐ ) ∈ ๐ซ × โ+ : 1 ≤ ๐ ≤ ๐} is referred to as a path flow of these requests; its link flow is a function ๐ฅ on ๐ด defined by I. I NTRODUCTION Consider an instance of multi-channel multi-radio (MCMR) multihop wireless network with a set ๐ of networking nodes and a set ๐ด of node-level communication links. Each node ๐ฃ has ๐ (๐ฃ) radios, and there are ๐ non-overlapping channels. A set of links in ๐ด is said to be independent if its links are pairwise node-disjoint and can transmit successfully at the same time over the same channel under a pre-specified interference model. Let โ denote the collection of all independent subsets of ๐ด. For each node-level link ๐ = (๐ข, ๐ฃ) in ๐ด, we make ๐⋅๐ (๐ข)⋅๐ (๐ฃ) replications (๐ข, ๐ฃ, ๐, ๐, ๐) for 1 ≤ ๐ ≤ ๐ (๐ข), 1 ≤ ๐ ≤ ๐ (๐ฃ), and 1 ≤ ๐ ≤ ๐. A replication (๐ข, ๐ฃ, ๐, ๐, ๐) always utilizes the ๐-th radio at ๐ข and the ๐-th radio at ๐ฃ over the ๐-th channel. These replications is referred to as replicated ๐,๐ links of ๐. We use {๐} to denote the set of replicated links of ๐; and in general, for each ๐ต ⊆ ๐ด, we use ๐ต ๐,๐ to denote the set of all replicated links of the links in ๐ต. Clearly, a set of replicated links can transmit successfully at the same time if and only if (1) they are pairwise radio-disjoint, and (2) for each channel ๐, all those replication links transmitting over channel ๐ are replicated from an independent set of ๐ด. These set of replicated links are also referred to independent 978-14799-3360-0/14/$31.00 ©2014 IEEE sets of replicated links. Let โ ๐,๐ denote the collection of the independent sets of replicated links. Any set { } ๐ฎ = (๐ผ๐ , ๐๐ ) ∈ โ ๐,๐ × โ+ : 1 ≤ ๐ ≤ ๐ ∑๐ is referred to as a link schedule; the value ๐=1 ๐๐ is referred to as length (or latency) of ๐ฎ. The link demand served by ๐ฎ is the function ๐ฅ on ๐ด defined by ∑๐ ๐,๐ ๐ฅ (๐) = ๐=1 ๐๐ ๐ผ๐ ∩ {๐} ๐ฅ (๐) = ๐ ∑ ๐ฟ๐ โฃ๐๐ ∩ {๐}โฃ . ๐=1 ∑๐ for each ๐ ∈ ๐ด; and the value ๐=1 ๐ฟ๐ is referred to as flow value of Γ. The problem Maximum Multiflow (MMF) seeks a path flow Γ of maximum flow value and a link schedule ๐ฎ of length one such that ๐ฎ serves the link flow of Γ. Suppose that in addition that for each 1 ≤ ๐ ≤ ๐ the ๐-th request has a positive demand ๐๐ . Any set { } ∏๐ Π = (๐๐1 , ⋅ ⋅ ⋅ , ๐๐๐ , ๐ฟ๐ ) ∈ ๐=1 ๐ซ๐ × โ+ : 1 ≤ ๐ ≤ ๐ is referred to as a concurrent ๐-path flow of these requests; its cumulative link flow is a function ๐ฅ on ๐ด defined by ๐ฅ (๐) = ๐ ∑ ๐=1 ๐ฟ๐ ๐ ∑ ๐=1 ๐๐ โฃ๐๐๐ ∩ {๐}โฃ . ∑๐ for each ๐ ∈ ๐ด; and the value ๐=1 ๐ฟ๐ is referred to as flow concurrency of Π. The problem Maximum Concurrent Multiflow (MCMF) seeks a concurrent ๐-path flow Π of 334 IEEE INFOCOM 2014 - IEEE Conference on Computer Communications maximum flow concurrency and a link schedule ๐ฎ of length one such that ๐ฎ serves the cumulative link flow of Π. As fundamental problems in multihop wireless networking, both MMF and MCMF received much research interest in the past decade. Most of the existing studies (e.g., [4], [7], [8], [9], [10], [11], [12]) assumed some variants of the protocol (as opposed to physical) interference model. In general, a protocol interference model specifies a pairwise conflict relations among all links in ๐ด, and a subset of ๐ด is independent if its links are pairwise conflict-free. It is classified into two communication modes: โ โ Unidirectional mode: For each link ๐ = (๐ข, ๐ฃ) ∈ ๐ด, the communication between ๐ข and ๐ฃ occurs in the direction from ๐ข to ๐ฃ, and the endpoint ๐ข (respectively, ๐ฃ) is referred to as the sender (respectively, receiver) of ๐. The sender ๐ข of the link ๐ has an interference range, and the interference range of ๐ is the interference range of its sender. Two links in ๐ด conflict with each other if and only if the receiver of at least one link lies in the interference range of the other link. Bidirectional mode: For each link ๐ = (๐ข, ๐ฃ) ∈ ๐ด, the communication between ๐ข and ๐ฃ occurs in both directions, and both ๐ข and ๐ฃ have an interference range. The interference range of ๐ is the union of the interference ranges of its two endpoints. Two links in ๐ด conflict with each other if and only if at least one link has an endpoint lying in the interference range of the other link. In the plane geometric variant, the interference range of an endpoint ๐ข of a link ๐ is assumed to be a disk centered at ๐ข of radius ๐๐ (๐ข), which is also knows as the interference radius. Under the plane geometric variant of the protocol interference model in either unidirectional mode or bidirectional mode, the computational hardness of MMF and MCMF was well characterized in both single-channel single-radio (SC-SR) setting [10] and MC-MR setting [11]. On one hand, they are NP-hard in even in SC-SR networks in which all nodes have uniform (and fixed) communication radii and uniform (and fixed) interference radii and the positions of all nodes are available. On the other hand, they admit a polynomial-time approximation scheme (PTAS) when the number of channels is bounded by a constant. In other words, for any fixed ๐ > 0, it has polynomial-time (depending on ๐) (1 + ๐)-approximation algorithm. Such PTAS is of theoretical interest only and is quite infeasible practically as it involves very time-consuming exhaustive enumerations and ellipsoid method. Other than the PTAS, all other known approximation algorithms for MMF and MCMF, in both SC-SR wireless networks (e.g., [7], [8], [9], [10]) and in MC-MR wireless networks (e.g., [4], [11], [12]), resorted to solve a polynomial-sized linear program (LP) exactly. However, such LP-based methods can require an inordinate amount of running time and memory even for a moderate sized input [1]. In this paper, we take a purely combinatorial approach for approximating MMF and MCMF in MC-MR wireless networks (and in SC-SR wireless networks as well as a special case) under the protocol interference model. A subtle definition of the interference cost of a path in the node-level communication topology (๐, ๐ด) is introduced. Our algorithms iteratively compute a sequence of cheapest paths in terms of interference cost along which the flows are routed. They are much faster and conceptually simpler (than the generalpurposed LP solvers). They also present a trade-off between the targeted approximation bound and the running time: for any fixed ๐ > 0, they may achieve approximation bounds at most 1 + ๐ times those achieved in [11] at the growth of the running time in at most the square order of 1/๐. Both the designs and analyses of our algorithms are applicable to general protocol interference model. When applied to the same variants of the protocol interference model, they achieve nearly the same approximation bounds as those achieved in [11]. The remainder of this paper is organized as follows. In Section II, we introduce the relevant known facts and results to be exploited by the subsequent sections of this paper. In Section III, we define the interference costs and prices of a path and exploring their relations with the maximum (concurrent) multiflow. In Section IV and Section V, we present the designs and analyses of our approximation algorithms for MMF and MCMF respectively. In Section VI, we apply the approximations algorithms developed in the previous two sections to the specific variants of the protocol interference model. We conclude this paper in Section VII. The following standard terms and notations are adopted throughout this paper. Let ๐ = โฃ๐ โฃ and ๐ = โฃ๐ดโฃ. ๐บ denotes the link-conflict graph of ๐ด under the given protocol interference model. In other words, ๐ด is the vertex set of ๐บ and two links in ๐ด are adjacent in ๐บ if and only if they conflict with each other. An orientation of ๐บ is a digraph ๐ท obtained from ๐บ by imposing an orientation on each edge of ๐บ. For any ๐ ∈ ๐ด, ๐ [๐] denotes the set of links in ๐ด conflicting with ๐ plus ๐ itself. Suppose that ๐ท is an orientation. For ๐๐ ๐๐ข๐ก [๐] (respectively, ๐๐ท [๐]) denotes the set each ๐ ∈ ๐ด, ๐๐ท of in-neighbors (respectively, out-neighbors) of ๐ in ๐ท plus ๐ itself. For any real-valued function ๐ on ๐ด and any ๐ต ⊆ ๐ด, ∑ ๐ (๐ต) represents ๐∈๐ต ๐ (๐); For any real-valued function ๐ on ∑ ๐ด×๐ด, and any ๐ ∈ ๐ด, and any ๐ต ⊆ ๐ด, ๐ (๐, ๐ต) represents ๐∈๐ต ๐ (๐, ๐). Let โบ be an ordering of ๐ด. For any pair of links ๐, ๐ ∈ ๐ด, both ๐ โบ ๐ and ๐ โป ๐ represent that ๐ appears before ๐ in the ordering โบ. II. P RELIMINARIES For MC-MR wireless networks, Wan et al. [12] introduced the interference factor ๐ (๐, ๐) of two conflicting links ๐ and ๐, which captures the essential advantage of multiple radios and multiple channels. If ๐ and ๐ share a common endpoint ๐ข, then each replicated link of ๐ conflicts with exactly )( ) ( 1 1 1− ๐ (๐, ๐) = 1 − 1 − ๐ (๐ข) ๐ portion of replicated links of ๐; otherwise, each replicated link of ๐ conflicts with exactly 1 ๐ (๐, ๐) = ๐ 335 IEEE INFOCOM 2014 - IEEE Conference on Computer Communications portion of replicated links of ๐. Note that ๐ (๐, ๐) = ๐ (๐, ๐) in either case. In addition, each replicated link of a link ๐ = (๐ข, ๐ฃ) conflicts with exactly ( )( )( ) 1 1 1 ๐ (๐, ๐) = 1 − 1 − 1− 1− ๐ (๐ข) ๐ (๐ฃ) ๐ portion of replicated links of ๐ (include itself). Consider any non-negative function ๐ฅ on ๐ด. The ๐ฅ-weighted inductivity of ๐ด is the value ∑ Δ∗ (๐ฅ) = max min ๐ (๐, ๐) ๐ฅ (๐) ∅โ=๐ต⊆๐ด ๐∈๐ต ∑๐ We use โฅΠโฅ to denote its flow value ๐=1 ๐ฟ๐ . Scaling Γ by a positive factor ๐ results in the path flow ๐Γ := {(๐๐ , ๐๐ฟ๐ ) : 1 ≤ ๐ ≤ ๐} ; clearly, โฅ๐Γโฅ = ๐ โฅΓโฅ. Consider a concurrent ๐-path flow Π = {(๐๐1 , ⋅ ⋅ ⋅ , ๐๐๐ , ๐ฟ๐ ) : 1 ≤ ๐ ≤ ๐} ∑๐ We use โฅΠโฅ to denote its flow concurrency ๐=1 ๐ฟ๐ . Scaling Π by a positive factor ๐ results in the concurrent ๐-path flow ๐Π := {(๐๐1 , ⋅ ⋅ ⋅ , ๐๐๐ , ๐๐ฟ๐ ) : 1 ≤ ๐ ≤ ๐} ; ๐∈๐ [๐]∩๐ต A link schedule of ๐ฅ of length at most Δ∗ (๐ฅ) can be produced by a simple by Wan et al. ) ( greedy algorithm GLS developed [12] in ๐ ๐2 ๐ + ๐๐′ max๐ฃ∈๐ ๐ (๐ฃ) time, where ๐′ is the total number of conflicting pairs of links in ๐ด. Note that this running time grows linearly with the number of channels and the maximum number of radios of all nodes. Consider an orientation ๐ท of ๐บ. The ๐ฅ-weighted inward interference of ๐ with respect to ๐ท is defined to be ∑ ๐ (๐, ๐) ๐ฅ (๐) . Δ๐๐ ๐ท (๐; ๐ฅ) = ๐๐ [๐] ๐∈๐๐ท and the ๐ฅ-weighted inward interference of ๐ท is defined to be ๐๐ Δ๐๐ ๐ท (๐ฅ) = max Δ๐ท (๐; ๐ฅ) . ๐∈๐ด The following relation between Δ∗ (๐ฅ) and Δ๐๐ ๐ท (๐ฅ) was proved in [12]. Lemma 2.1: Δ∗ (๐ฅ) ≤ 2Δ๐๐ ๐ท (๐ฅ). If ๐ท is acyclic, then ∗ (๐ฅ) . Δ (๐ฅ) ≤ Δ๐๐ ๐ท The inward local independence number (ILIN) of ๐ท is defined to be ๐๐ max max ๐ผ ∩ ๐๐ท [๐] . clearly, โฅ๐Πโฅ = ๐ โฅΠโฅ. III. L EAST I NTERFERENCE -C OST PATHS Consider an orientation ๐ท of ๐บ with ILIN ๐, and let ๐ ˆ=๐ in SC-SR setting and ๐ ˆ = ๐ + 2 in MC-MR setting. Suppose that ๐ฆ is positive function on ๐ด. Let ๐ฆˆ be the function on ๐ด defined by ∑ ๐ฆˆ (๐) = ๐ (๐, ๐) ๐ฆ (๐) ๐๐ข๐ก [๐] ๐∈๐๐ท for each ๐ ∈ ๐ด. The value ๐ฆˆ (๐) is interpreted as the ๐ฆweighted interference cost brought by ๐ to its closed outneighborhood in ๐ท. For each 1 ≤ ๐ ≤ ๐, let ๐๐๐ ๐ก๐ (ˆ ๐ฆ ) be the (interference) cost of the cheapest (๐ ๐ , ๐ก๐ )-path with respect to ๐ฆˆ. In this section, we establish the following intrinsic relations between the least interference-cost paths and maximum (concurrent) multiflows. Theorem 3.1: Let ๐๐๐ก be the value of the maximum multiflow. Then, ๐ฆ (๐ด) . ๐ฆ) ≤ ๐ ˆ min ๐๐๐ ๐ก๐ (ˆ 1≤๐≤๐ ๐๐๐ก Theorem 3.2: Let ๐๐๐ก be the concurrency of the maximum concurrent multiflow. Then, ๐ ∑ ๐∈๐ด ๐ผ∈โ Δ๐๐ ๐ท The following upper bound on (๐ฅ) was proved in [10] in the SC-SR setting and in [12] in the MC-MR setting. Lemma 2.2: Suppose ๐ฅ has a link schedule of length at most one. Then, for any orientation ๐ท with ILIN ๐, Δ๐๐ ˆ ๐ท (๐ฅ) ≤ ๐ where ๐ ˆ = ๐ in SC-SR setting and ๐ ˆ = ๐ + 2 in MC-MR setting. Consider a link schedule { } ๐ฎ = (๐ผ๐ , ๐๐ ) ∈ โ ๐,๐ × โ+ : 1 ≤ ๐ ≤ ๐ . ∑๐ We use โฅ๐ฎโฅ to denote its length ๐=1 ๐๐ . Scaling ๐ฎ by a positive factor ๐ results in the link schedule ๐๐ ๐๐๐ ๐ก๐ (ˆ ๐ฆ) ≤ ๐ ˆ ๐=1 ๐ฆ (๐ด) . ๐๐๐ก We begin with following property of a singleton path flow. Lemma 3.3: Suppose that ๐ฅ is the link flow of a singleton path flow {(๐, ๐ฟ)}. Then, for any ๐ ∈ ๐ด, ( ) ๐๐ Δ๐๐ ๐ท (๐; ๐ฅ) = ๐ฟ๐ ๐, ๐๐ท [๐] ∩ ๐ and ๐๐ฎ := {(๐ผ๐ , ๐๐๐ ) : 1 ≤ ๐ ≤ ๐} ; ∑ ๐ฆ (๐) Δ๐๐ ๐ฆ (๐ ) . ๐ท (๐; ๐ฅ) = ๐ฟˆ ๐∈๐ด Proof: For any ๐ ∈ ๐ด, Δ๐๐ ๐ท (๐; ๐ฅ) = ∑ = ∑ ๐ (๐, ๐) ๐ฅ (๐) ๐๐ [๐] ๐∈๐๐ท ๐ (๐, ๐) ๐ฟ โฃ๐ ∩ {๐}โฃ ๐๐ [๐] ๐∈๐๐ท clearly, โฅ๐๐ฎโฅ = ๐ โฅ๐ฎโฅ. Consider a path flow =๐ฟ ∑ ๐๐ [๐] ๐∈๐๐ท ๐ (๐, ๐) โฃ๐ ∩ {๐}โฃ ) ( ๐๐ [๐] ∩ ๐ . = ๐ฟ๐ ๐, ๐๐ท Γ = {(๐๐ , ๐ฟ๐ ) : 1 ≤ ๐ ≤ ๐} . 336 IEEE INFOCOM 2014 - IEEE Conference on Computer Communications Thus, the first part holds. By the first part, we have ∑ ๐ฆ (๐) Δ๐๐ ๐ท (๐; ๐ฅ) ๐∈๐ด =๐ฟ ∑ ๐∈๐ด =๐ฟ ∑ ๐ฆ (๐) ๐ ๐∈๐ด ๐๐ ๐, ๐๐ท [๐] ∩ ๐ ) = = ๐∈๐ ∑∑ ๐๐ {๐} ∩ ๐๐ท [๐] ๐ (๐, ๐) ๐ฆ(๐) ∑ ∑ ๐∈๐ด From Lemma 3.3, we also derive the following property of a singleton concurrent ๐-path flow. Lemma 3.4: Suppose that ๐ฅ is the cumulative link flow of a singleton concurrent ๐-path flow ∑ ๐∈๐ด = = ๐๐ ๐, ๐๐ท ๐ฆ (๐) Δ๐๐ ๐ท (๐; ๐ฅ) = ๐ฟ ๐ ∑ [๐] ∩ ๐๐ = ≥ ๐๐ ๐ฆˆ (๐๐ ) . = {(๐๐ , ๐ฟ๐๐ ) : 1 ≤ ๐ ≤ ๐} . For each 1 ≤ ๐ ≤ ๐, let ๐ฅ๐ be the link flow of the singleton ∑๐ path flow (๐๐ , ๐ฟ๐๐ ). Then, ๐ฅ = ๐=1 ๐ฅ๐ . By Lemma 3.3, for any ๐ ∈ ๐ด, = ๐ฟ๐๐ ๐ ๐๐ ๐, ๐๐ท [๐] ∩ ๐๐ ) ๐=1 =๐ฟ ๐ ∑ ) ( ๐๐ ๐๐ ๐ ๐, ๐๐ท [๐] ∩ ๐๐ . Δ๐๐ ๐ท (๐; ๐ฅ๐ ) ๐=1 ๐ฆ (๐) Δ๐๐ ๐ท (๐; ๐ฅ๐ ) ๐=1 ๐ ∑ ๐ฟ๐ ๐ฆˆ (๐๐ ) ๐ฟ๐ ๐๐๐ ๐ก๐ (ˆ ๐ฆ) ๐ฆ) min ๐๐๐ ๐ก๐ (ˆ 1≤๐≤๐ )∑ ๐ ) ๐ฟ๐ ๐=1 min ๐๐๐ ๐ก๐ (ˆ ๐ฆ ) ๐๐๐ก. 1≤๐≤๐ On one hand, by Lemma 2.2, ∑ ∑ ๐๐ ๐ฆ (๐) Δ๐๐ ๐ฆ (๐) ≤ ๐ ˆ๐ฆ (๐ด) . ๐ท (๐; ๐ฅ) ≤ Δ๐ท (๐ฅ) ๐∈๐ด ๐∈๐ด Thus, the theorem holds. Finally, we prove Theorem 3.2. Proof of Theorem 3.2: Let ๐=1 ( ๐ ∑ ( Δ๐๐ ๐ท (๐; ๐ฅ๐ ) ๐ ∑ ( is equivalent to the path flow ๐ ∑ ๐∈๐ด ๐ ∑ ∑ ≥ {(๐1 , ⋅ ⋅ ⋅ , ๐๐ , ๐ฟ)} . Δ๐๐ ๐ท (๐; ๐ฅ) = ๐ฆ (๐) ๐=1 Proof: The concurrent ๐-path flow ๐ ∑ ∑ ๐=1 ๐∈๐ด ) ๐=1 ๐∈๐ด ๐๐ ๐ฆˆ (๐๐ ) be a maximum multiflow, and ๐ฅ be its link flow. For each 1 ≤ ๐ ≤ ๐, let ๐ฅ๐ be the ∑๐link flow of the singleton path flow {(๐๐ , ๐ฟ๐ )}. Then, ๐ฅ = ๐=1 ๐ฅ๐ . By Lemma 3.3, ∑ ๐ฆ (๐) Δ๐๐ ๐ท (๐; ๐ฅ) ๐=1 and ๐ฆ (๐) Δ๐๐ ๐ท (๐; ๐ฅ๐ ) {(๐๐ , ๐ฟ๐ ) ∈ ๐ซ × โ+ : 1 ≤ ๐ ≤ ๐} Then, for any ๐ ∈ ๐ด, ๐๐ ๐ ∑ So, the lemma holds. Now, we are ready to prove Theorem 3.1. Proof of Theorem 3.1: Let {(๐1 , ⋅ ⋅ ⋅ , ๐๐ , ๐ฟ)} . ( Δ๐๐ ๐ท (๐; ๐ฅ๐ ) ๐=1 So, the second part also holds. Lemma 3.3 gives an alternative interpretation on the interference cost of a path ๐ : Let ๐ฅ be the link flow of a path flow {(๐, 1)}. ∑ ๐ฆˆ (๐ ) = ๐ฆ (๐) Δ๐๐ ๐ท (๐; ๐ฅ) . ๐ ∑ ๐ ∑ ๐=1 ๐ ∑ ๐ (๐, ๐) ๐ฆ(๐) = ๐ฟˆ ๐ฆ (๐ ) . (๐; ๐ฅ) = ๐ฟ ๐ ∑ =๐ฟ ๐๐ข๐ก [๐] ๐∈๐ ๐∈๐๐ท Δ๐๐ ๐ท ๐ฆ (๐) ๐=1 ๐∈๐ด ๐∈๐ ๐∈๐ด =๐ฟ ∑ ๐∈๐ด ∑ ๐๐ {๐} ∩ ๐๐ท ๐ฆ (๐) [๐] ๐ (๐, ๐) ๐∈๐ด =๐ฟ ( Again by Lemma 3.3, we have ∑ ๐ฆ (๐) Δ๐๐ ๐ท (๐; ๐ฅ) {(๐๐1 , ⋅ ⋅ ⋅ , ๐๐๐ , ๐ฟ๐ ) : 1 ≤ ๐ ≤ ๐} be a maximum concurrent multiflow, and ๐ฅ be its cumulative link flow. For each 1 ≤ ๐ ≤ ๐, let ๐ฅ๐ be the link flow of the singleton concurrent ๐-path flow {(๐๐1 , ⋅ ⋅ ⋅ , ๐๐๐ , ๐ฟ๐ )} . ๐=1 337 IEEE INFOCOM 2014 - IEEE Conference on Computer Communications Then, ๐ฅ = ∑๐ Algorithm MF(๐) // Flow Phase Γ ← ∅, ๐ฅ ← 0,๐พ ← 0;๐ฆ ← 1; while Δ๐๐ ๐ท (๐ฅ) ≥ (1 + ๐) ๐พ do ๐ ← a cheapest path in ๐ซ w.r.t. ๐ฆˆ; 1 ๐ฟ← ๐๐ [๐]∩๐ ; max๐∈๐ด ๐(๐,๐๐ท ) Γ ← Γ ∪ {(๐, ๐ฟ)}; ๐ฆ ˆ(๐ ) ๐พ ← ๐พ + ๐ฆ(๐ด) ๐ฟ; ∀๐ ∈ ๐ , ๐ฅ (๐) ← ๐ฅ (๐) (+ ๐ฟ; ( )) ๐๐ [๐] ∩ ๐ ; ∀๐ ∈ ๐ด, ๐ฆ (๐) ← ๐ฆ (๐) 1 + ๐๐ฟ๐ ๐, ๐๐ท // Link-Scheduling Phase ๐ฎ ← the link schedule of ๐ฅ output by GLS; // Scaling Phase 1 1 Γ ← โฅ๐ฎโฅ Γ, ๐ฎ ← โฅ๐ฎโฅ ๐ฎ; Output Γ and ๐ฎ. ๐ฅ๐ . By Lemma 3.4, ∑ ๐ฆ (๐) Δ๐๐ ๐ท (๐; ๐ฅ) ๐=1 ๐∈๐ด = = = ∑ ๐ฆ (๐) ๐∈๐ด ๐ ∑ ∑ ๐ฆ (๐) Δ๐๐ ๐ท (๐; ๐ฅ๐ ) ๐ฟ๐ ๐ ∑ ≥โ โ =โ ๐๐ ๐ฆˆ (๐๐๐ ) ๐=1 ๐ฟ๐ ๐=1 โ Δ๐๐ ๐ท (๐; ๐ฅ๐ ) ๐=1 ๐=1 ๐∈๐ด ๐ ๐ ∑ ∑ ๐=1 ≥ ๐ ∑ ๐ ∑ ๐ ∑ ๐=1 ๐ ∑ โ( ๐๐ ๐๐๐ ๐ก๐ (ˆ ๐ฆ )โ ๐=1 TABLE I O UTLINE OF THE ALGORITHM MF(๐). ๐๐ ๐๐๐ ๐ก๐ (ˆ ๐ฆ) โ ๐ ∑ ) ๐ฟ๐ iterations until the flow cost ๐พ exceeds Δ๐๐ ๐ท (๐ฅ) / (1 + ๐). In each iteration, a cheapest path ๐ ∈ ๐ซ with respect to ๐ฆˆ is computed, and ๐ฟ units of flow are routed along ๐ where ๐=1 ๐๐ ๐๐๐ ๐ก๐ (ˆ ๐ฆ )โ ๐๐๐ก ๐=1 ๐ฟ= On the other hand, by Lemma 2.2, ∑ ∑ ๐๐ ๐ฆ (๐) Δ๐๐ ๐ฆ (๐) ≤ ๐ ˆ๐ฆ (๐ด) . ๐ท (๐; ๐ฅ) ≤ Δ๐ท (๐ฅ) ๐∈๐ด ๐∈๐ด Thus, the theorem holds. IV. M AXIMUM M ULTIFLOW Suppose that ๐ท is an orientation of ๐บ with ILIN ๐, and denote ๐ ˆ = ๐ in SC-SR setting and ๐ ˆ = ๐ + 2 in MC-MR setting. Consider an arbitrary parameter ๐ ∈ (0, 1]. In this section, we present an efficient algorithm MF(๐) algorithm for the problem MMF, which achieves an approximation bound 2 (1 + ๐) ๐ ˆ in general and (1 + ๐) ๐ ˆ if ๐ท is acyclic, and has running time growing with 1/๐ in at most the square order. The algorithm MF(๐) is outlined in Table I. It runs in three phases: โ Flow Phase: This phase computes a path flow Γ and its link flow ๐ฅ iteratively by computing a sequence of cheapest paths in terms of interference costs. โ Link-Scheduling Phase: This phase computes a link schedule ๐ฎ of ๐ฅ by simply applying the greedy algorithm GLS developed in [12]. โ Scaling Phase: This phase scales both Γ and ๐ฎ by a factor 1/ โฅ๐ฎโฅ and then return them as the final output. Both the Link-Scheduling Phase and the Scaling Phase are straightforward. The Flow Phase is quite subtle and is elaborated below. The Flow Phase builds up a path flow Γ incrementally and updates its link flow ๐ฅ accordingly throughput this phase. The Flow Phase maintains a flow cost variable ๐พ, which are the cumulative costs incurred by Γ. Initially, Γ is empty, ๐ฅ is zero-valued, and ๐พ is zero. The Flow Phase also maintains a positive weight function ๐ฆ on ๐ด to help the building up Γ. Initially, ๐ฆ is one-valued. The Flow Phase runs in 1 ). ๐๐ [๐] ∩ ๐ max๐∈๐ด ๐ ๐, ๐๐ท ( The ๐ฟ is selected such that after Γ is augmented by (๐, ๐ฟ), the maximum increment on Δ๐๐ ๐ท (๐; ๐ฅ) for all ๐ ∈ ๐ด is exactly one by Lemma 3.3. The pair (๐, ๐ฟ) is then added to Γ, and all other variables are subsequently updated. Specifically, the ˆ(๐ ) ๐ฟ, which is the product new flow (๐, ๐ฟ) incurs a flow cost ๐ฆ๐ฆ(๐ด) of the ๐ฆ-weighted interference cost of ๐ and the flow amount ๐ฟ routed along ๐ . Such cost is charged to ๐พ. The update on ๐ฅ is straightforward: ๐ฅ (๐) is incremented by ๐ฟ for each link ๐ ∈ ๐ . For each link ๐ ∈ ๐ด, ๐ฆ (๐) is increased by a factor ) ( ๐๐ [๐] ∩ ๐ . 1 + ๐๐ฟ๐ ๐, ๐๐ท ( ) ๐๐ Note that ๐ฟ๐ ๐, ๐๐ท [๐] ∩ ๐ is the increment of Δ๐๐ ๐ท (๐; ๐ฅ) due to the growth of Γ by Lemma 3.3. Such update on ๐ฆ ensures that if a link ๐ receives a larger increment on Δ๐๐ ๐ท (๐; ๐ฅ), then ๐ฆ (๐) grows faster which in turn makes it less likely to appear in a cheapest path in the future iteration. Next, we analyze the performance of the algorithm MF(๐). Theorem 4.1: The Flow Phase of the algorithm MF(๐) terminates in at most ⌉ ⌈ ๐ ln ๐ ๐ ln (1 + ๐) − 1+๐ iterations, and the final output of the algorithm MF(๐) is a 2 (1 + ๐) ๐ ˆ-approximate solution in general and a (1 + ๐) ๐ ˆapproximate solution if ๐ท is acyclic. Proof: We introduce the following notations in this proof. Let ๐๐๐ก be the value of the maximum multiflow. Γ0 , ๐ฅ0 , ๐ฆ0 , and ๐พ0 denote initial values of ๐ฅ, ๐ฆ, and ๐พ respectively in the Flow Phase. For each iteration ๐ ≥ 1 of the Flow Phase, Γ๐ , ๐ฅ๐ , ๐ฆ๐ and ๐พ๐ denote the values of ๐ฅ, ๐ฆ, and ๐พ respectively at the end of the ๐-th iteration; (๐๐ , ๐ฟ๐ ) denotes the flow added in 338 IEEE INFOCOM 2014 - IEEE Conference on Computer Communications the ๐-th iteration. Consider any iteration ๐ of the Flow Phase. For each ๐ ∈ ๐ด, since ๐๐ Δ๐๐ ๐ท (๐; ๐ฅ๐ ) − Δ๐ท (๐; ๐ฅ๐−1 ) ) ( ๐๐ = ๐ฟ๐ ๐ ๐, ๐๐ท [๐] ∩ ๐๐ ≤ 1, ๐∈๐ด which implies ∑ Δ๐๐ (๐; ๐ฅ๐ ) ln ๐ ๐๐ ≥ ๐/๐ > Δ๐ท (๐ฅ๐ ) ≥ ๐∈๐ด ๐ท ๐ ln (1 + ๐) − we have )) ( ( ๐๐ ๐ฆ๐ (๐) = ๐ฆ๐−1 (๐) 1 + ๐๐ฟ๐ ๐ ๐, ๐๐ท [๐] ∩ ๐๐ ๐ฟ ๐ ๐,๐ ๐๐ [๐]∩๐๐ ) (๐) (1 + ๐) ๐ ( ๐ท ≥๐ฆ ๐−1 = ๐ฆ๐−1 (๐) (1 + ๐) ๐๐ Δ๐๐ ๐ท (๐;๐ฅ๐ )−Δ๐ท (๐;๐ฅ๐−1 ) Hence, . = ∑ Thus, ∑ ( ) ๐๐ = ๐ฆ๐−1 (๐ด) + ๐๐ฟ๐ ๐ ๐, ๐๐ท [๐] ∩ ๐๐ ๐ฆ๐−1 (๐) ๐∈๐ด Δ๐๐ ๐ท (๐ฅ๐ ) ≤ (1 + ๐) ๐พ๐ ≤ where the fourth equality follows from Lemma 3.3. Therefore, by induction on the iterations, for each iteration ๐ of the Flow Phase, for each ๐ ∈ ๐ด, and Δ๐๐ ๐ท (๐;๐ฅ๐ ) ( ๐ฆ๐ (๐ด) ≤ ๐ฆ0 (๐ด) exp ๐ ๐ ∑ ๐๐ (Δ๐๐ ๐ท (๐;๐ฅ๐ )−Δ๐ท (๐;๐ฅ๐−1 )) Thus, (๐พ๐ − ๐พ๐−1 ) = ๐ exp (๐๐พ๐ ) . and if ๐ท is acyclic, then โฅΓโฅ ๐๐๐ก ≥ . โฅ๐ฎโฅ (1 + ๐) ๐ ˆ Δ๐๐ ๐ท (๐ฅ๐ ) 1 (1 + ๐) 1 ๐ฆ๐ (๐ด) ln ≥ ln . ๐ ๐ ๐ ๐ On the other hand, by Theorem 3.1, we have ∑๐ ๐ ∑ ๐ ˆ ๐=1 ๐ฟ๐ ๐ ˆ โฅΓ๐ โฅ ๐ฆˆ๐−1 (๐๐ ) ≤ = . ๐พ๐ = ๐ฟ๐ ๐ฆ๐−1 (๐ด) ๐๐๐ก ๐๐๐ก ๐=1 By Lemma 2.2, we have โฅ๐ฎโฅ ≤ Δ∗ (๐ฅ) ≤ 2Δ๐๐ ๐ท (๐ฅ) , which implies that Now, we bound the number of iterations of the Flow Phase. Assume to the contrary that the Flow Phase didn’t terminate after ⌈ ⌉ ๐ ln ๐ ๐ ln (1 + ๐) − 1+๐ ๐= ๐ ln ๐ ln (1 + ๐) − โฅΓโฅ โฅΓโฅ ๐๐๐ก ≥ . ≥ โฅ๐ฎโฅ 2 (1 + ๐) ๐ ˆ 2Δ๐๐ (๐ฅ) ๐ท If ๐ท is acyclic, again by Lemma 2.2 we have โฅ๐ฎโฅ ≤ Δ∗ (๐ฅ) ≤ Δ๐๐ ๐ท (๐ฅ) , which implies that โฅΓโฅ โฅΓโฅ ๐๐๐ก ≥ ๐๐ . ≥ โฅ๐ฎโฅ (1 + ๐) ๐ ˆ Δ๐ท (๐ฅ) ⌉ ๐ 1+๐ (1 + ๐) ๐ ˆ โฅΓ๐ โฅ . ๐๐๐ก โฅΓโฅ ๐๐๐ก ≥ , โฅ๐ฎโฅ 2 (1 + ๐) ๐ ˆ Hence, ⌈ Δ๐๐ ๐ท (๐ฅ๐ ) . 1+๐ โฅΓ๐ โฅ ๐๐๐ก . ≥ ๐๐ (1 + ๐) ๐ ˆ Δ๐ท (๐ฅ๐ ) ) ๐ก=1 iterations. Let > Finally, we prove the approximation bound of the output by the algorithm. It is sufficient to show that at the end of the Link-Scheduling Phase, ; ๐พ๐ ≥ Δ๐๐ ๐ท (๐ฅ๐ ) . 1+๐ Suppose that the Flow Phase runs in ๐ iterations. By the stopping rule of the Flow Phase, ≤ ๐ฆ๐−1 (๐ด) exp (๐ (๐พ๐ − ๐พ๐−1 )) , ๐ก=1 . โฅΓโฅ ๐๐๐ก . ≥ (1 + ๐) ๐ ˆ Δ๐๐ (๐ฅ) ๐ท = ๐ฆ๐−1 (๐ด) + ๐๐ฟ๐ ๐ฆˆ๐−1 (๐๐ ) ( ) ๐ฆˆ๐−1 (๐๐ ) = ๐ฆ๐−1 (๐ด) 1 + ๐๐ฟ๐ ๐ฆ๐−1 (๐ด) = ๐ฆ๐−1 (๐ด) (1 + ๐ (๐พ๐ − ๐พ๐−1 )) ∑๐ Δ๐๐ (๐ฅ๐ ) ๐ 1+๐ This means that the number of iterations is at most ๐, which is a contradiction. Next, we show that at the end of the of the Flow Phase, ๐∈๐ด ๐ฆ๐ (๐) ≥ ๐ฆ0 (๐) (1 + ๐) > 1 (1 + ๐) ๐ท ๐พ๐ ≥ ln ๐ ๐ )) ( ( ๐๐ ๐ฆ๐−1 (๐) 1 + ๐๐ฟ๐ ๐ ๐, ๐๐ท [๐] ∩ ๐๐ = (1 + ๐) Δ๐๐ ๐ท (๐ฅ๐) 1 (1 + ๐) ln ๐ ๐ Furthermore, ∑ ๐ฆ๐ (๐ด) = ๐ฆ๐ (๐) ๐∈๐ด ∑ By the choice of ๐ฟ๐ , ๐∈๐ด Δ๐๐ ๐ท (๐; ๐ฅ๐ ) strictly increases by at least one with the iteration ๐. So, ∑ Δ๐๐ ๐ท (๐; ๐ฅ๐ ) ≥ ๐, . This completes of the proof of the theorem. 339 IEEE INFOCOM 2014 - IEEE Conference on Computer Communications Algorithm CMF(๐) // Flow Phase Π ← ∅, ๐ฅ ← 0,๐พ ← 0;๐ฆ ← 1; while Δ๐๐ ๐ท (๐ฅ) ≥ (1 + ๐) ๐พ, The running time of MF(๐) increases with 1/๐ in at most the square order because ( ) ๐ ๐ ๐ ln (1 + ๐) − = − ln 1 − − 1+๐ 1+๐ 1+๐ ( )2 ๐ 1 1 −2 = (1 + 1/๐) . ≥ 2 1+๐ 2 The running time of the the Flow Phase does not depend on the the number of channels and the number of radios at each node. Within each iteration of the Flow Phase, a cheapest path ๐ ∈ ๐ซ with respect to ๐ฆˆ has to be computed. A naive implementation is first making ๐ separate computations of cheapest paths ๐๐ ∈ ๐ซ๐ for each 1 ≤ ๐ ≤ ๐ and then choosing the cheapest one among them as ๐ . However, by observing that Dijkstra’s algorithm for computing shortest paths gives the shortest path to every node in the graph, we adopt the following more economic implementation. We first group unicasts by a common source node. The number of groups is at more min {๐, ๐}. Then, for each group we compute cheapest paths from the common source node to the sinks of all unicast in this group by a single call to the Dijkstra’s algorithm. As the Dijkstra’s algorithm has running time ๐ (๐ + ๐ log ๐) based on Fibonacci heap, we can compute the cheapest path ๐ ∈ ๐ซ in ๐ (min {๐, ๐} (๐ + ๐ log ๐)) ( ) time. For ๐ = Θ ๐2 , this implementation is a linear factor speedup over the naive implementation. V. M AXIMUM C ONCURRENT M ULTIFLOW Suppose that ๐ท is an orientation of ๐บ with ILIN ๐, and denote ๐ ˆ = ๐ in SC-SR setting and ๐ ˆ = ๐ + 2 in MC-MR setting. Consider an arbitrary parameter ๐ ∈ (0, 1]. In this section, we present an efficient algorithm CMF(๐) algorithm for the problem MCMF, which achieves an approximation bound 2 (1 + ๐) ๐ ˆ in general and (1 + ๐) ๐ ˆ if ๐ท is acyclic, and has running time growing with 1/๐ in at most the square order. The algorithm CMF(๐) is outlined in Table II. Similar to the algorithm MF(๐), it runs in three phases: โ Flow Phase: This phase computes a concurrent ๐-path flow Π and its cumulative link flow ๐ฅ iteratively by computing a sequence of cheapest paths in terms of interference costs. โ Link-Scheduling Phase: This phase computes a link schedule ๐ฎ of ๐ฅ by simply applying the greedy algorithm GLS developed in [12]. โ Scaling Phase: This phase scales both Π and ๐ฎ by a factor 1/ โฅ๐ฎโฅ and then return them as the final output. The Flow Phase of CMF(๐) is more intricate than that of MF(๐) and is elaborated below. The Flow Phase builds up a concurrent ๐-path flow Π incrementally and updates its cumulative link flow ๐ฅ accordingly throughput this phase. The Flow Phase maintains a flow cost variable ๐พ storing the cumulative costs incurred by Π. Initially, Π is empty, ๐ฅ is zero-valued, and ๐พ is zero. The Flow Phase (๐1 , ⋅ ⋅ ⋅ , ๐๐ ) ← cheapest paths in ๐ ∏ ๐ซ๐ w.r.t. ๐ฆˆ; ๐=1 1 ∑ ; ๐๐ [๐]∩๐ max๐∈๐ด ๐ ๐ ๐ ๐,๐ ( ๐ ๐) ๐=1 ๐ท ๐ฟ← Π ← Π ∪ {(๐1 , ⋅ ⋅ ⋅ , ๐๐ , ๐ฟ)}; ∑๐ ๐๐ ๐ฆ ˆ(๐๐ ) ๐พ ← ๐พ + ๐=1๐ฆ(๐ด) ๐ฟ; ∀๐ ∈ ๐ด, ๐ ∑ ๐ฅ (๐) ← ๐ฅ (๐) + ๐ฟ ๐๐ โฃ๐๐ ∩ {๐}โฃ; ๐=1 ๐ฆ (๐) ← ๐ฆ (๐) (1 + ๐๐ฟ ๐ ∑ ๐=1 ) ( ๐๐ [๐] ∩ ๐ ); ๐๐ ๐ ๐, ๐๐ท ๐ // Link-Scheduling Phase ๐ฎ ← the link schedule of ๐ฅ output by GLS; // Scaling Phase 1 1 Π ← โฅ๐ฎโฅ Π, ๐ฎ ← โฅ๐ฎโฅ ๐ฎ; Output Π and ๐ฎ. TABLE II O UTLINE OF THE ALGORITHM CMF(๐). also maintains a positive weight function ๐ฆ on ๐ด to help the building up Γ. Initially, ๐ฆ is one-valued. The Flow Phase runs in iterations until the flow cost ๐พ exceeds Δ๐๐ ๐ท (๐ฅ) / (1 + ๐). In each iteration, ๐ cheapest paths ๐๐ ∈ ๐ซ๐ for 1 ≤ ๐ ≤ ๐ with respect to ๐ฆˆ are computed. Along these ๐ paths, a concurrent flow of concurrency ๐ฟ is routed where 1 ). ( ∑๐ ๐๐ [๐] ∩ ๐ max๐∈๐ด ๐=1 ๐๐ ๐ ๐, ๐๐ท ๐ The ๐ฟ is selected such that after Π is augmented by the new flow (๐1 , ⋅ ⋅ ⋅ , ๐๐ , ๐ฟ) , the maximum increment on Δ๐๐ ๐ท (๐; ๐ฅ) for all ๐ ∈ ๐ด is exactly one by Lemma 3.4. The new flow is then added to Π, and all other variables are subsequently updated. Specifically, the ๐ฆ ˆ(๐๐ ) ๐ฟ๐๐ , which is the product ๐-th new flow incurs a cost ๐ฆ(๐ด) of the ๐ฆ-weighted interference prices of ๐๐ and the flow amount ๐ฟ๐๐ routed along ๐๐ . The total cost of the new flow is ∑ ๐ ๐=1 ๐๐ ๐ฆ ˆ(๐๐ ) ๐ฟ, ๐ฆ(๐ด) and it is added to ๐พ. The update on ๐ฅ is straightforward: for each link ๐ ∈ ๐ด, ๐ฅ (๐) is incremented by the total ∑๐ new flow through ๐, which is equal to ๐ฟ ๐=1 ๐๐ โฃ๐๐ ∩ {๐}โฃ. For each link ๐ ∈ ๐ด, ๐ฆ (๐) is increased by a factor 1 + ๐๐ฟ ๐ ∑ ๐=1 ) ( ๐๐ ๐๐ ๐ ๐, ๐๐ท [๐] ∩ ๐๐ . ) ( ๐๐ Note that the term ๐ฟ ๐=1 ๐๐ ๐ ๐, ๐๐ท [๐] ∩ ๐๐ is the increment of Δ๐๐ ๐ท (๐; ๐ฅ) due to the growth of Π by Lemma 3.4. Such update on ๐ฆ ensures that if a link ๐ receives a larger increment on Δ๐๐ ๐ท (๐; ๐ฅ), then ๐ฆ (๐) grows faster which in turn makes it less likely to appear in a cheapest path in the future iteration. Next, we analyze the performance of the algorithm CMF(๐). 340 ∑๐ IEEE INFOCOM 2014 - IEEE Conference on Computer Communications Theorem 5.1: The algorithm CMF(๐) terminates in at most ⌋ ⌊ ๐ ln ๐ ๐ ln (1 + ๐) − 1+๐ iterations, and outputs Π and ๐ฅ satisfying that โฅΠโฅ ๐๐๐ก . ≥ (1 + ๐) ๐ ˆ Δ๐๐ (๐ฅ) ๐ท Proof: We introduce the following notations in this proof. Let ๐๐๐ก be the concurrency of the maximum concurrent multiflow. Π0 , ๐ฅ0 , ๐ฆ0 , and ๐พ0 denote initial values of ๐ฅ, ๐ฆ, and ๐พ respectively in the Flow Phase. For each iteration ๐ ≥ 1 of the Flow Phase, Π๐ , ๐ฅ๐ , ๐ฆ๐ and ๐พ๐ denote the values of ๐ฅ, ๐ฆ, and ๐พ respectively at the end of the ๐-th iteration; (๐๐1 , ⋅ ⋅ ⋅ , ๐๐๐ , ๐ฟ๐ ) denotes the concurrent flow added in the ๐-th iteration. Consider any iteration ๐ of the Flow Phase. For each ๐ ∈ ๐ด, since and skip the details. First, we can show that for any iteration number ๐ of the Flow Phase, at the end of the ๐-th iteration, Δ๐๐ (๐ฅ๐ ) 1 (1 + ๐) ๐ท ln ๐ ๐ ๐ ∑ ) ( ๐๐ ๐๐ ๐ ๐, ๐๐ท [๐] ∩ ๐๐๐ ≤ 1, ๐๐๐ก โฅΠโฅ . ≥ ๐๐ (1 + ๐) ๐ ˆ Δ๐ท (๐ฅ) Using this inequality and Lemma 2.2, we can conclude that at the end of the Link-Scheduling Phase, โฅΠโฅ ๐๐๐ก ≥ , โฅ๐ฎโฅ 2 (1 + ๐) ๐ ˆ and if ๐ท is acyclic, then โฅΠโฅ ๐๐๐ก ≥ . โฅ๐ฎโฅ (1 + ๐) ๐ ˆ This completes the proof of the theorem. The same remark at the end of Section IV also applies to the algorithm CMF(๐) and is omitted here. ๐=1 we have โ ๐ฆ๐ (๐) = ๐ฆ๐−1 (๐) โ1 + ๐๐ฟ๐ ≥ ๐ฆ๐−1 (๐) (1 + ๐) = ๐ฆ๐−1 (๐) (1 + ๐) ๐ฟ๐ ๐ ∑ ) ( โ VI. A PPLICATIONS In this section, we apply the algorithms MF(๐) and CMF(๐) to the plane geometric variants of the protocol interference model by choosing an appropriate orientation ๐ท. We remark that any ordering โบ of ๐ด naturally induces an orientation ๐ท by orienting every edge {๐, ๐} in the link-conflict graph ๐บ for ๐ to ๐ if ๐ โบ ๐, or in the reverse direction otherwise. In the unidirectional mode, Wan [10] introduced the following orientation ๐ท. Consider any conflicting pair of links ๐ and ๐ in ๐ด. If the receiver of ๐ is within the interference range of the sender of ๐, then we take the orientation from ๐ to ๐; otherwise, we take the orientation from ๐ to ๐. Ties are broken arbitrarily. Suppose that for each link ๐ ∈ ๐ด, the interference radius of its sender is at least ๐ times its length for some constant ๐ > ⌈1. It was shown ⌉ in [13] that the ILIN − 1. By Theorem 4.1 of such ๐ท is at most ๐/ arcsin 1−๐ 2 and Theorem 5.1, we have the following corollary. Corollary 6.1: Under the plane geometric variant of the protocol interference model in the unidirectional mode in which the interference radius of its sender of each link is at least ๐ times the link length for some constant ๐ > 1, by adopting the orientation ๐ท given in [10], both MF(๐) and CMF(๐) have an approximation bound (⌈ ⌉ ) ๐−1 2 (1 + ๐) ๐/ arcsin +1 2๐ ๐๐ ๐๐ ๐ ๐, ๐๐ท [๐] ∩ ๐๐๐ โ ๐=1 ∑๐ ๐=1 ๐๐ ๐๐ ๐(๐,๐๐ท [๐]∩๐๐๐ ) ๐๐ Δ๐๐ ๐ท (๐;๐ฅ๐ )−Δ๐ท (๐;๐ฅ๐−1 ) . Furthermore, ๐ฆ๐ (๐ด) = ∑ ๐ฆ๐−1 (๐) (1 + ๐๐ฟ๐ ∑ ๐ฆ๐−1 (๐) ๐ ∑ ๐=1 =๐ฆ๐−1 (๐ด) + ๐๐ฟ๐ ( ๐ ∑ ๐ ∑ ) ( ๐๐ ๐๐ ๐ ๐, ๐๐ท [๐] ∩ ๐๐๐ ๐=1 ๐∈๐ด =๐ฆ๐−1 (๐ด) + ๐๐ฟ๐ ) ( ๐๐ ๐๐ ๐ ๐, ๐๐ท [๐] ∩ ๐๐๐ ) ๐=1 ๐∈๐ด =๐ฆ๐−1 (๐ด) + ๐๐ฟ๐ ๐ ∑ ∑ ( ) ๐๐ ๐๐ ๐ ๐, ๐๐ท [๐] ∩ ๐๐๐ ๐ฆ๐−1 (๐) ๐∈๐ด ๐๐ ๐๐๐ ๐ก๐ (ˆ ๐ฆ๐−1 ) ๐=1 =๐ฆ๐−1 (๐ด) 1 + ๐๐ฟ๐ ∑๐ ๐=1 ๐๐ ๐๐๐ ๐ก๐ (ˆ ๐ฆ๐−1 ) ๐ ˆ โฅΠ๐ โฅ . ๐๐๐ก Then, using the above inequality and the fact that ∑ ๐๐ Δ ๐∈๐ด ๐ท (๐; ๐ฅ๐ ) strictly increases by at least one with the iteration ๐, we can prove the upper bound on the number of iterations of the Flow Phase by contradiction. Using the above inequality again and the stopping rule of the Flow Phase, we can show that at the end of the of the Flow Phase, ๐๐ Δ๐๐ ๐ท (๐; ๐ฅ๐ ) − Δ๐ท (๐; ๐ฅ๐−1 ) = ๐ฟ๐ ≤ ๐พ๐ ≤ ) ๐ฆ๐−1 (๐ด) =๐ฆ๐−1 (๐ด) (1 + ๐ (๐พ๐ − ๐พ๐−1 )) ≤๐ฆ๐−1 (๐ด) exp (๐ (๐พ๐ − ๐พ๐−1 )) , where the fourth equality follows from Lemma 3.3. The rest of the proof is almost the same as that in the proof of Theorem 4.1. We only outline the steps of the argument in MC-MR wireless networks, and (⌈ ⌉ ) ๐−1 2 (1 + ๐) ๐/ arcsin −1 2๐ 341 IEEE INFOCOM 2014 - IEEE Conference on Computer Communications in SC-SR wireless networks, In the bidirectional mode, Wan et al. [13] introduced the following orientation ๐ท. Consider any conflicting pair of links ๐ and ๐ in ๐ด. If ๐ has an endpoint ๐ข and ๐ has an endpoint ๐ฃ satisfying that ๐ข is within the interference range of ๐ฃ and its interference radius is no more than that of ๐ฃ, then we take the orientation from ๐ to ๐; otherwise, we take the orientation from ๐ to ๐. Ties are broken arbitrarily. It was shown in [13] that the ILIN of such ๐ท is at most 8. By Theorem 4.1 and Theorem 5.1, we have the following corollary. Corollary 6.2: Under the plane geometric variant of the protocol interference model in the bidirectional mode, by adopting the orientation ๐ท given in [13], both MF(๐) and CMF(๐) have an approximation bound 18 (1 + ๐) in MC-MR wireless networks, and 16 (1 + ๐) in SC-SR wireless networks, In the bidirectional mode with symmetric interference radii (i.e., for each link, its two endpoints have equal interference radii), we sorts the links in the decreasing order of the interference radii of their endpoints and ties are broken arbitrarily. Such ordering is referred to as the interference radius decreasing ordering. It was shown in [13] that for the acyclic orientation ๐ท induced by the interference radius decreasing ordering, its ILIN is at most 8. By Theorem 4.1 and Theorem 5.1, we have the following corollary. Corollary 6.3: Under the plane geometric variant of the protocol interference model in the bidirectional mode with symmetric interference radii, by adopting the orientation ๐ท induced by the interference radius decreasing ordering, both MF(๐) and CMF(๐) have an approximation bound 10 (1 + ๐) in MC-MR wireless networks, and 8 (1 + ๐) in SC-SR wireless networks, In the bidirectional mode with uniform interference radii (i.e., the endpoints of all links have equal interference radii), we sorts the links in the lexicographic order of their left endpoints and ties are broken arbitrarily. Such ordering is referred to as the lexicographic ordering. It was shown in [5] that for the acyclic orientation ๐ท induced by the lexicographic ordering, its ILIN is at most 6. By Theorem 4.1 and Theorem 5.1, we have the following corollary. Corollary 6.4: Under the plane geometric variant of the protocol interference model in the bidirectional mode with uniform interference radii, by adopting the orientation ๐ท induced by the lexicographic ordering, both MF(๐) and CMF(๐) have an approximation bound 8 (1 + ๐) in MC-MR wireless networks, and 6 (1 + ๐) in SC-SR wireless networks, VII. C ONCLUSION 2 (1 + ๐) ๐ ˆ-approximate solutions in general, and (1 + ๐) ๐ ˆapproximate solutions if ๐ท is acyclic. Compared to the existing approximation algorithms based on the LP approach, these approximation bounds are only slightly larger by a factor 1+๐, but they are much faster and simpler. Underlying the combinatorial approach followed by these algorithms is the intrinsic relation between interference costs and prices of a path and the maximum (concurrent) multiflow. These algorithms iteratively compute a sequence of least interference-cost routing paths along which the flows are routed. By leveraging the techniques in [3], [2], [6], we can further speed up these algorithms and the details will be reported in the full version of this paper. ACKNOWLEDGEMENTS: This work was supported in part by the National Science Foundation of USA under grants CNS-0916666 and CNS-1219109, and by the National Natural Science Foundation of P. R. China under grants 61128005. R EFERENCES [1] D. Bienstock. Potential function methods for approximately solving linear programs: theory and practice. Kluwer Academic Publisher, 2002. [2] L. K. Fleischer, Approximating fractional multicommodity flow independent of the number of commodities, SIAM Journal of Discrete Mathematics 13(4):505–520, 2000. [3] N. Garg and J. Koฬnemann, Faster and simpler algorithms for multicommodity flow and other fractional packing problems, SIAM Journal on Computing 37: 630–652, 2007. Conference version appeared in Proc. IEEE FOCS 1998, pp. 300–309. [4] B. Han, V. S. A. Kumar, M. V. Marathe, S. Parthasarathy, and A. Srinivasan, Distributed Strategies for Channel Allocation and Scheduling in Software-Defined Radio Networks, Proc. IEEE INFOCOM 2009, pp. 1521-1529. [5] C. Joo, X. Lin, and N. B. Shroff, Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks, Proc. IEEE INFOCOM 2008. [6] G. Karakostas, Faster approximation schemes for fractional multicommodity flow problems, Proc. ACM-SIAM SODA 2002. [7] M. Kodialam and T. Nandagopal, Characterizing achievable rates in multi-hop wireless networks: the joint routing and scheduling problem, Proc. of ACM MobiCom 2003. [8] M. Kodialam and T. Nandagopal, Characterizing the capacity region in multi-radio multi-channel wireless mesh networks, Proc. ACM MobiCom 2005. [9] V.S.A. Kumar, M.V. Marathe, S. Parthasarathy, and A. Srinivasan, Algorithmic aspects of capacity in wireless networks, SIGMETRICS Perform. Eval. Rev. 33(1):133–144, 2005. [10] P.-J. Wan, Multiflows in Multihop Wireless Networks, Proc. ACM MOBIHOC 2009. [11] P.-J. Wan, Y. Cheng, Z. Wang, and F. Yao, Multiflows in Multi-Channel Multi-Radio Multihop Wireless Networks, Proc. IEEE INFOCOM 2011. [12] P.-J. Wan, X. Jia, G. Dai, H. Du, Z.G. Wan, and O. Frieder, Scalable Algorithms for Wireless Link Schedulings in Multi-Channel Multi-Radio Wireless Networks, Proc. IEEE INFOCOM 2013. [13] P.-J. Wan, C. Ma, Z. Wang, B. Xu, M. Li, and X. Jia, Weighted Wireless Link Scheduling without Information of Positions And Interference/Communication Radii, Proc. IEEE INFOCOM 2011. In this paper, we have developed purely combinatorial approximation algorithms for both maximum multiflow and maximum concurrent multiflow in MC-MR wireless networks. These algorithms adopt an orientation ๐ท of the conflict graph and a parameter ๐ ∈ (0, 1] which represents the trade-off between the approximation ratio and the running time. Let ๐ be the ILIN of ๐ท, and denote ๐ ˆ = ๐ in SC-SR setting and ๐ ˆ = ๐ + 2 in MC-MR setting. At the running time growing with 1/๐ in at most the square order, they produce 342