From Least Interference-Cost Paths to Maximum (Concurrent

advertisement
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
From Least Interference-Cost Paths to Maximum
(Concurrent) Multiflow in MC-MR Wireless
Networks
∗
Peng-Jun Wan∗ , Zhu Wang∗ , Lei Wang† , Zhiguo Wan‡ , and Sai Ji§
Department of Computer Science, Illinois Institute of Technology, wan@cs.iit.edu
† School of Software, Dalian University of Technology, lei.wang@ieee.org
‡ School of software, Tsinghua University, wanzhiguo@tsinghua.edu.cn
§ College of Computer And Software, Nanjing University of Information Science And Technology, jisai@nuist.edu.cn
Abstract—Maximum multiflow and maximum concurrent multiflow in multi-channel multi-radio (MC-MR) wireless networks
have been well-studied in the literature. They are NP-hard
even in single-channel single-radio (SC-SR) wireless networks
when all nodes have uniform (and fixed) interference radii and
the positions of all nodes are available. While they admit a
polynomial-time approximation scheme (PTAS) when the number
of channels is bounded by a constant, such PTAS is quite
infeasible practically. Other than the PTAS, all other known
approximation algorithms, in both SC-SR wireless networks and
MC-MR wireless networks, resorted to solve a polynomial-sized
linear program (LP) exactly. The scalability of their running time
is fundamentally limited by the general-purposed LP solvers. In
this paper, we first introduce the concept of interference costs and
prices of a path and explore their relations with the maximum
(concurrent) multiflow. Then we develop purely combinatorial
approximation algorithms which compute a sequence of least
interference-cost routing paths along which the flows are routed.
These algorithms are faster and simpler, and achieve nearly the
same approximation bounds known in the literature.
for each ๐‘Ž ∈ ๐ด; ๐’ฎ is also said to be a link schedule of this ๐‘ฅ.
Suppose that we are given ๐‘˜ unicast requests specified by
source-destination pairs. Let ๐’ซ๐‘— be the set of paths in (๐‘‰, ๐ด)
of the ๐‘—-th request for all 1 ≤ ๐‘— ≤ ๐‘˜, and let ๐’ซ be the union
of ๐’ซ1 , ⋅ ⋅ ⋅ , ๐’ซ๐‘˜ . Any set
Γ = {(๐‘ƒ๐‘– , ๐›ฟ๐‘– ) ∈ ๐’ซ × โ„+ : 1 ≤ ๐‘– ≤ ๐‘™}
is referred to as a path flow of these requests; its link flow is
a function ๐‘ฅ on ๐ด defined by
I. I NTRODUCTION
Consider an instance of multi-channel multi-radio (MCMR) multihop wireless network with a set ๐‘‰ of networking
nodes and a set ๐ด of node-level communication links. Each
node ๐‘ฃ has ๐œ (๐‘ฃ) radios, and there are ๐œ† non-overlapping
channels. A set of links in ๐ด is said to be independent if its
links are pairwise node-disjoint and can transmit successfully
at the same time over the same channel under a pre-specified
interference model. Let โ„ denote the collection of all independent subsets of ๐ด. For each node-level link ๐‘Ž = (๐‘ข, ๐‘ฃ) in ๐ด, we
make ๐œ†⋅๐œ (๐‘ข)⋅๐œ (๐‘ฃ) replications (๐‘ข, ๐‘ฃ, ๐‘–, ๐‘—, ๐‘™) for 1 ≤ ๐‘– ≤ ๐œ (๐‘ข),
1 ≤ ๐‘— ≤ ๐œ (๐‘ฃ), and 1 ≤ ๐‘™ ≤ ๐œ†. A replication (๐‘ข, ๐‘ฃ, ๐‘–, ๐‘—, ๐‘™)
always utilizes the ๐‘–-th radio at ๐‘ข and the ๐‘—-th radio at ๐‘ฃ over
the ๐‘™-th channel. These replications is referred to as replicated
๐œ,๐œ†
links of ๐‘Ž. We use {๐‘Ž} to denote the set of replicated links
of ๐‘Ž; and in general, for each ๐ต ⊆ ๐ด, we use ๐ต ๐œ,๐œ† to denote
the set of all replicated links of the links in ๐ต. Clearly, a
set of replicated links can transmit successfully at the same
time if and only if (1) they are pairwise radio-disjoint, and
(2) for each channel ๐‘™, all those replication links transmitting
over channel ๐‘™ are replicated from an independent set of ๐ด.
These set of replicated links are also referred to independent
978-14799-3360-0/14/$31.00 ©2014 IEEE
sets of replicated links. Let โ„ ๐œ,๐œ† denote the collection of the
independent sets of replicated links. Any set
{
}
๐’ฎ = (๐ผ๐‘— , ๐‘™๐‘— ) ∈ โ„ ๐œ,๐œ† × โ„+ : 1 ≤ ๐‘— ≤ ๐‘ž
∑๐‘ž
is referred to as a link schedule; the value ๐‘—=1 ๐‘™๐‘— is referred
to as length (or latency) of ๐’ฎ. The link demand served by ๐’ฎ
is the function ๐‘ฅ on ๐ด defined by
∑๐‘ž
๐œ,๐œ† ๐‘ฅ (๐‘Ž) = ๐‘—=1 ๐‘™๐‘— ๐ผ๐‘— ∩ {๐‘Ž} ๐‘ฅ (๐‘Ž) =
๐‘™
∑
๐›ฟ๐‘– โˆฃ๐‘ƒ๐‘– ∩ {๐‘Ž}โˆฃ .
๐‘–=1
∑๐‘™
for each ๐‘Ž ∈ ๐ด; and the value ๐‘–=1 ๐›ฟ๐‘– is referred to as flow
value of Γ. The problem Maximum Multiflow (MMF) seeks
a path flow Γ of maximum flow value and a link schedule ๐’ฎ
of length one such that ๐’ฎ serves the link flow of Γ.
Suppose that in addition that for each 1 ≤ ๐‘— ≤ ๐‘˜ the ๐‘—-th
request has a positive demand ๐‘‘๐‘— . Any set
{
}
∏๐‘˜
Π = (๐‘ƒ๐‘–1 , ⋅ ⋅ ⋅ , ๐‘ƒ๐‘–๐‘˜ , ๐›ฟ๐‘– ) ∈ ๐‘—=1 ๐’ซ๐‘— × โ„+ : 1 ≤ ๐‘– ≤ ๐‘™
is referred to as a concurrent ๐‘˜-path flow of these requests;
its cumulative link flow is a function ๐‘ฅ on ๐ด defined by
๐‘ฅ (๐‘Ž) =
๐‘™
∑
๐‘–=1
๐›ฟ๐‘–
๐‘˜
∑
๐‘—=1
๐‘‘๐‘— โˆฃ๐‘ƒ๐‘–๐‘— ∩ {๐‘Ž}โˆฃ .
∑๐‘™
for each ๐‘Ž ∈ ๐ด; and the value
๐‘–=1 ๐›ฟ๐‘– is referred to as
flow concurrency of Π. The problem Maximum Concurrent
Multiflow (MCMF) seeks a concurrent ๐‘˜-path flow Π of
334
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
maximum flow concurrency and a link schedule ๐’ฎ of length
one such that ๐’ฎ serves the cumulative link flow of Π.
As fundamental problems in multihop wireless networking,
both MMF and MCMF received much research interest in the
past decade. Most of the existing studies (e.g., [4], [7], [8],
[9], [10], [11], [12]) assumed some variants of the protocol (as
opposed to physical) interference model. In general, a protocol interference model specifies a pairwise conflict relations
among all links in ๐ด, and a subset of ๐ด is independent if
its links are pairwise conflict-free. It is classified into two
communication modes:
โˆ™
โˆ™
Unidirectional mode: For each link ๐‘Ž = (๐‘ข, ๐‘ฃ) ∈ ๐ด, the
communication between ๐‘ข and ๐‘ฃ occurs in the direction
from ๐‘ข to ๐‘ฃ, and the endpoint ๐‘ข (respectively, ๐‘ฃ) is
referred to as the sender (respectively, receiver) of ๐‘Ž.
The sender ๐‘ข of the link ๐‘Ž has an interference range,
and the interference range of ๐‘Ž is the interference range
of its sender. Two links in ๐ด conflict with each other if
and only if the receiver of at least one link lies in the
interference range of the other link.
Bidirectional mode: For each link ๐‘Ž = (๐‘ข, ๐‘ฃ) ∈ ๐ด, the
communication between ๐‘ข and ๐‘ฃ occurs in both directions, and both ๐‘ข and ๐‘ฃ have an interference range. The
interference range of ๐‘Ž is the union of the interference
ranges of its two endpoints. Two links in ๐ด conflict with
each other if and only if at least one link has an endpoint
lying in the interference range of the other link.
In the plane geometric variant, the interference range of an
endpoint ๐‘ข of a link ๐‘Ž is assumed to be a disk centered at
๐‘ข of radius ๐‘Ÿ๐‘Ž (๐‘ข), which is also knows as the interference
radius. Under the plane geometric variant of the protocol interference model in either unidirectional mode or bidirectional
mode, the computational hardness of MMF and MCMF was
well characterized in both single-channel single-radio (SC-SR)
setting [10] and MC-MR setting [11]. On one hand, they are
NP-hard in even in SC-SR networks in which all nodes have
uniform (and fixed) communication radii and uniform (and
fixed) interference radii and the positions of all nodes are
available. On the other hand, they admit a polynomial-time
approximation scheme (PTAS) when the number of channels
is bounded by a constant. In other words, for any fixed ๐œ€ > 0, it
has polynomial-time (depending on ๐œ€) (1 + ๐œ€)-approximation
algorithm. Such PTAS is of theoretical interest only and is
quite infeasible practically as it involves very time-consuming
exhaustive enumerations and ellipsoid method. Other than the
PTAS, all other known approximation algorithms for MMF
and MCMF, in both SC-SR wireless networks (e.g., [7], [8],
[9], [10]) and in MC-MR wireless networks (e.g., [4], [11],
[12]), resorted to solve a polynomial-sized linear program
(LP) exactly. However, such LP-based methods can require
an inordinate amount of running time and memory even for a
moderate sized input [1].
In this paper, we take a purely combinatorial approach
for approximating MMF and MCMF in MC-MR wireless
networks (and in SC-SR wireless networks as well as a
special case) under the protocol interference model. A subtle
definition of the interference cost of a path in the node-level
communication topology (๐‘‰, ๐ด) is introduced. Our algorithms
iteratively compute a sequence of cheapest paths in terms
of interference cost along which the flows are routed. They
are much faster and conceptually simpler (than the generalpurposed LP solvers). They also present a trade-off between
the targeted approximation bound and the running time: for
any fixed ๐œ€ > 0, they may achieve approximation bounds
at most 1 + ๐œ€ times those achieved in [11] at the growth of
the running time in at most the square order of 1/๐œ€. Both
the designs and analyses of our algorithms are applicable to
general protocol interference model. When applied to the same
variants of the protocol interference model, they achieve nearly
the same approximation bounds as those achieved in [11].
The remainder of this paper is organized as follows. In
Section II, we introduce the relevant known facts and results
to be exploited by the subsequent sections of this paper. In
Section III, we define the interference costs and prices of a
path and exploring their relations with the maximum (concurrent) multiflow. In Section IV and Section V, we present
the designs and analyses of our approximation algorithms
for MMF and MCMF respectively. In Section VI, we apply
the approximations algorithms developed in the previous two
sections to the specific variants of the protocol interference
model. We conclude this paper in Section VII.
The following standard terms and notations are adopted
throughout this paper. Let ๐‘› = โˆฃ๐‘‰ โˆฃ and ๐‘š = โˆฃ๐ดโˆฃ. ๐บ
denotes the link-conflict graph of ๐ด under the given protocol
interference model. In other words, ๐ด is the vertex set of ๐บ
and two links in ๐ด are adjacent in ๐บ if and only if they conflict
with each other. An orientation of ๐บ is a digraph ๐ท obtained
from ๐บ by imposing an orientation on each edge of ๐บ. For
any ๐‘Ž ∈ ๐ด, ๐‘ [๐‘Ž] denotes the set of links in ๐ด conflicting
with ๐‘Ž plus ๐‘Ž itself. Suppose that ๐ท is an orientation. For
๐‘–๐‘›
๐‘œ๐‘ข๐‘ก
[๐‘Ž] (respectively, ๐‘๐ท
[๐‘Ž]) denotes the set
each ๐‘Ž ∈ ๐ด, ๐‘๐ท
of in-neighbors (respectively, out-neighbors) of ๐‘Ž in ๐ท plus ๐‘Ž
itself. For any real-valued
function ๐‘“ on ๐ด and any ๐ต ⊆ ๐ด,
∑
๐‘“ (๐ต) represents ๐‘∈๐ต ๐‘“ (๐‘); For any real-valued function ๐‘“
on
∑ ๐ด×๐ด, and any ๐‘Ž ∈ ๐ด, and any ๐ต ⊆ ๐ด, ๐‘“ (๐‘Ž, ๐ต) represents
๐‘∈๐ต ๐‘“ (๐‘Ž, ๐‘). Let โ‰บ be an ordering of ๐ด. For any pair of links
๐‘Ž, ๐‘ ∈ ๐ด, both ๐‘Ž โ‰บ ๐‘ and ๐‘ โ‰ป ๐‘Ž represent that ๐‘Ž appears before
๐‘ in the ordering โ‰บ.
II. P RELIMINARIES
For MC-MR wireless networks, Wan et al. [12] introduced
the interference factor ๐œŒ (๐‘Ž, ๐‘) of two conflicting links ๐‘Ž and
๐‘, which captures the essential advantage of multiple radios
and multiple channels. If ๐‘Ž and ๐‘ share a common endpoint
๐‘ข, then each replicated link of ๐‘ conflicts with exactly
)(
)
(
1
1
1−
๐œŒ (๐‘Ž, ๐‘) = 1 − 1 −
๐œ (๐‘ข)
๐œ†
portion of replicated links of ๐‘Ž; otherwise, each replicated link
of ๐‘ conflicts with exactly
1
๐œŒ (๐‘Ž, ๐‘) =
๐œ†
335
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
portion of replicated links of ๐‘Ž. Note that ๐œŒ (๐‘Ž, ๐‘) = ๐œŒ (๐‘, ๐‘Ž)
in either case. In addition, each replicated link of a link ๐‘Ž =
(๐‘ข, ๐‘ฃ) conflicts with exactly
(
)(
)(
)
1
1
1
๐œŒ (๐‘Ž, ๐‘) = 1 − 1 −
1−
1−
๐œ (๐‘ข)
๐œ (๐‘ฃ)
๐œ†
portion of replicated links of ๐‘Ž (include itself).
Consider any non-negative function ๐‘ฅ on ๐ด. The ๐‘ฅ-weighted
inductivity of ๐ด is the value
∑
Δ∗ (๐‘ฅ) = max min
๐œŒ (๐‘Ž, ๐‘) ๐‘ฅ (๐‘)
∅โˆ•=๐ต⊆๐ด ๐‘Ž∈๐ต
∑๐‘™
We use โˆฅΠโˆฅ to denote its flow value ๐‘–=1 ๐›ฟ๐‘– . Scaling Γ by a
positive factor ๐‘ results in the path flow
๐‘Γ := {(๐‘ƒ๐‘– , ๐‘๐›ฟ๐‘– ) : 1 ≤ ๐‘– ≤ ๐‘™} ;
clearly, โˆฅ๐‘Γโˆฅ = ๐‘ โˆฅΓโˆฅ.
Consider a concurrent ๐‘˜-path flow
Π = {(๐‘ƒ๐‘–1 , ⋅ ⋅ ⋅ , ๐‘ƒ๐‘–๐‘˜ , ๐›ฟ๐‘– ) : 1 ≤ ๐‘– ≤ ๐‘™}
∑๐‘™
We use โˆฅΠโˆฅ to denote its flow concurrency ๐‘–=1 ๐›ฟ๐‘– . Scaling
Π by a positive factor ๐‘ results in the concurrent ๐‘˜-path flow
๐‘Π := {(๐‘ƒ๐‘–1 , ⋅ ⋅ ⋅ , ๐‘ƒ๐‘–๐‘˜ , ๐‘๐›ฟ๐‘– ) : 1 ≤ ๐‘– ≤ ๐‘™} ;
๐‘∈๐‘ [๐‘Ž]∩๐ต
A link schedule of ๐‘ฅ of length at most Δ∗ (๐‘ฅ) can be produced
by a simple
by Wan et al.
)
( greedy algorithm GLS developed
[12] in ๐‘‚ ๐‘š2 ๐œ† + ๐‘š๐‘š′ max๐‘ฃ∈๐‘‰ ๐œ (๐‘ฃ) time, where ๐‘š′ is the
total number of conflicting pairs of links in ๐ด. Note that this
running time grows linearly with the number of channels and
the maximum number of radios of all nodes. Consider an
orientation ๐ท of ๐บ. The ๐‘ฅ-weighted inward interference of
๐‘Ž with respect to ๐ท is defined to be
∑
๐œŒ (๐‘Ž, ๐‘) ๐‘ฅ (๐‘) .
Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ) =
๐‘–๐‘› [๐‘Ž]
๐‘∈๐‘๐ท
and the ๐‘ฅ-weighted inward interference of ๐ท is defined to be
๐‘–๐‘›
Δ๐‘–๐‘›
๐ท (๐‘ฅ) = max Δ๐ท (๐‘Ž; ๐‘ฅ) .
๐‘Ž∈๐ด
The following relation between Δ∗ (๐‘ฅ) and Δ๐‘–๐‘›
๐ท (๐‘ฅ) was
proved in [12].
Lemma 2.1: Δ∗ (๐‘ฅ) ≤ 2Δ๐‘–๐‘›
๐ท (๐‘ฅ). If ๐ท is acyclic, then
∗
(๐‘ฅ)
.
Δ (๐‘ฅ) ≤ Δ๐‘–๐‘›
๐ท
The inward local independence number (ILIN) of ๐ท is
defined to be
๐‘–๐‘›
max max ๐ผ ∩ ๐‘๐ท
[๐‘Ž] .
clearly, โˆฅ๐‘Πโˆฅ = ๐‘ โˆฅΠโˆฅ.
III. L EAST I NTERFERENCE -C OST PATHS
Consider an orientation ๐ท of ๐บ with ILIN ๐œ‡, and let ๐œ‡
ˆ=๐œ‡
in SC-SR setting and ๐œ‡
ˆ = ๐œ‡ + 2 in MC-MR setting. Suppose
that ๐‘ฆ is positive function on ๐ด. Let ๐‘ฆˆ be the function on ๐ด
defined by
∑
๐‘ฆˆ (๐‘Ž) =
๐œŒ (๐‘Ž, ๐‘) ๐‘ฆ (๐‘)
๐‘œ๐‘ข๐‘ก [๐‘Ž]
๐‘∈๐‘๐ท
for each ๐‘Ž ∈ ๐ด. The value ๐‘ฆˆ (๐‘Ž) is interpreted as the ๐‘ฆweighted interference cost brought by ๐‘Ž to its closed outneighborhood in ๐ท. For each 1 ≤ ๐‘— ≤ ๐‘˜, let ๐‘‘๐‘–๐‘ ๐‘ก๐‘— (ˆ
๐‘ฆ ) be the
(interference) cost of the cheapest (๐‘ ๐‘— , ๐‘ก๐‘— )-path with respect
to ๐‘ฆˆ. In this section, we establish the following intrinsic relations between the least interference-cost paths and maximum
(concurrent) multiflows.
Theorem 3.1: Let ๐‘œ๐‘๐‘ก be the value of the maximum multiflow. Then,
๐‘ฆ (๐ด)
.
๐‘ฆ) ≤ ๐œ‡
ˆ
min ๐‘‘๐‘–๐‘ ๐‘ก๐‘— (ˆ
1≤๐‘—≤๐‘˜
๐‘œ๐‘๐‘ก
Theorem 3.2: Let ๐‘œ๐‘๐‘ก be the concurrency of the maximum
concurrent multiflow. Then,
๐‘˜
∑
๐‘Ž∈๐ด ๐ผ∈โ„
Δ๐‘–๐‘›
๐ท
The following upper bound on
(๐‘ฅ) was proved in [10] in
the SC-SR setting and in [12] in the MC-MR setting.
Lemma 2.2: Suppose ๐‘ฅ has a link schedule of length at
most one. Then, for any orientation ๐ท with ILIN ๐œ‡,
Δ๐‘–๐‘›
ˆ
๐ท (๐‘ฅ) ≤ ๐œ‡
where ๐œ‡
ˆ = ๐œ‡ in SC-SR setting and ๐œ‡
ˆ = ๐œ‡ + 2 in MC-MR
setting.
Consider a link schedule
{
}
๐’ฎ = (๐ผ๐‘— , ๐‘™๐‘— ) ∈ โ„ ๐œ,๐œ† × โ„+ : 1 ≤ ๐‘— ≤ ๐‘ž .
∑๐‘ž
We use โˆฅ๐’ฎโˆฅ to denote its length
๐‘—=1 ๐‘™๐‘— . Scaling ๐’ฎ by a
positive factor ๐‘ results in the link schedule
๐‘‘๐‘— ๐‘‘๐‘–๐‘ ๐‘ก๐‘— (ˆ
๐‘ฆ) ≤ ๐œ‡
ˆ
๐‘—=1
๐‘ฆ (๐ด)
.
๐‘œ๐‘๐‘ก
We begin with following property of a singleton path flow.
Lemma 3.3: Suppose that ๐‘ฅ is the link flow of a singleton
path flow {(๐‘ƒ, ๐›ฟ)}. Then, for any ๐‘Ž ∈ ๐ด,
(
)
๐‘–๐‘›
Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ) = ๐›ฟ๐œŒ ๐‘Ž, ๐‘๐ท [๐‘Ž] ∩ ๐‘ƒ
and
๐‘๐’ฎ := {(๐ผ๐‘— , ๐‘๐‘™๐‘— ) : 1 ≤ ๐‘— ≤ ๐‘ž} ;
∑
๐‘ฆ (๐‘Ž) Δ๐‘–๐‘›
๐‘ฆ (๐‘ƒ ) .
๐ท (๐‘Ž; ๐‘ฅ) = ๐›ฟˆ
๐‘Ž∈๐ด
Proof: For any ๐‘Ž ∈ ๐ด,
Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ) =
∑
=
∑
๐œŒ (๐‘Ž, ๐‘) ๐‘ฅ (๐‘)
๐‘–๐‘› [๐‘Ž]
๐‘∈๐‘๐ท
๐œŒ (๐‘Ž, ๐‘) ๐›ฟ โˆฃ๐‘ƒ ∩ {๐‘Ž}โˆฃ
๐‘–๐‘› [๐‘Ž]
๐‘∈๐‘๐ท
clearly, โˆฅ๐‘๐’ฎโˆฅ = ๐‘ โˆฅ๐’ฎโˆฅ.
Consider a path flow
=๐›ฟ
∑
๐‘–๐‘› [๐‘Ž]
๐‘∈๐‘๐ท
๐œŒ (๐‘Ž, ๐‘) โˆฃ๐‘ƒ ∩ {๐‘}โˆฃ
)
(
๐‘–๐‘›
[๐‘Ž] ∩ ๐‘ƒ .
= ๐›ฟ๐œŒ ๐‘Ž, ๐‘๐ท
Γ = {(๐‘ƒ๐‘– , ๐›ฟ๐‘– ) : 1 ≤ ๐‘– ≤ ๐‘™} .
336
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
Thus, the first part holds.
By the first part, we have
∑
๐‘ฆ (๐‘Ž) Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ)
๐‘Ž∈๐ด
=๐›ฟ
∑
๐‘Ž∈๐ด
=๐›ฟ
∑
๐‘ฆ (๐‘Ž) ๐œŒ
๐‘Ž∈๐ด
๐‘–๐‘›
๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ
)
=
=
๐‘∈๐‘ƒ
∑∑
๐‘–๐‘›
{๐‘} ∩ ๐‘๐ท
[๐‘Ž] ๐œŒ (๐‘Ž, ๐‘) ๐‘ฆ(๐‘Ž)
∑
∑
๐‘Ž∈๐ด
From Lemma 3.3, we also derive the following property of a
singleton concurrent ๐‘˜-path flow.
Lemma 3.4: Suppose that ๐‘ฅ is the cumulative link flow of
a singleton concurrent ๐‘˜-path flow
∑
๐‘Ž∈๐ด
=
=
๐‘–๐‘›
๐‘Ž, ๐‘๐ท
๐‘ฆ (๐‘Ž) Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ) = ๐›ฟ
๐‘˜
∑
[๐‘Ž] ∩ ๐‘ƒ๐‘—
=
≥
๐‘‘๐‘— ๐‘ฆˆ (๐‘ƒ๐‘— ) .
=
{(๐‘ƒ๐‘— , ๐›ฟ๐‘‘๐‘— ) : 1 ≤ ๐‘— ≤ ๐‘˜} .
For each 1 ≤ ๐‘— ≤ ๐‘˜, let ๐‘ฅ๐‘— be the link flow of the singleton
∑๐‘˜
path flow (๐‘ƒ๐‘— , ๐›ฟ๐‘‘๐‘— ). Then, ๐‘ฅ = ๐‘—=1 ๐‘ฅ๐‘— . By Lemma 3.3, for
any ๐‘Ž ∈ ๐ด,
=
๐›ฟ๐‘‘๐‘— ๐œŒ
๐‘–๐‘›
๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ๐‘—
)
๐‘—=1
=๐›ฟ
๐‘˜
∑
)
(
๐‘–๐‘›
๐‘‘๐‘— ๐œŒ ๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ๐‘— .
Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ๐‘– )
๐‘–=1
๐‘ฆ (๐‘Ž) Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ๐‘– )
๐‘–=1
๐‘™
∑
๐›ฟ๐‘– ๐‘ฆˆ (๐‘ƒ๐‘– )
๐›ฟ๐‘– ๐‘‘๐‘–๐‘ ๐‘ก๐‘— (ˆ
๐‘ฆ)
๐‘ฆ)
min ๐‘‘๐‘–๐‘ ๐‘ก๐‘— (ˆ
1≤๐‘—≤๐‘˜
)∑
๐‘™
)
๐›ฟ๐‘–
๐‘–=1
min ๐‘‘๐‘–๐‘ ๐‘ก๐‘— (ˆ
๐‘ฆ ) ๐‘œ๐‘๐‘ก.
1≤๐‘—≤๐‘˜
On one hand, by Lemma 2.2,
∑
∑
๐‘–๐‘›
๐‘ฆ (๐‘Ž) Δ๐‘–๐‘›
๐‘ฆ (๐‘Ž) ≤ ๐œ‡
ˆ๐‘ฆ (๐ด) .
๐ท (๐‘Ž; ๐‘ฅ) ≤ Δ๐ท (๐‘ฅ)
๐‘Ž∈๐ด
๐‘∈๐ด
Thus, the theorem holds.
Finally, we prove Theorem 3.2.
Proof of Theorem 3.2: Let
๐‘—=1
(
๐‘™
∑
(
Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ๐‘— )
๐‘™
∑
(
is equivalent to the path flow
๐‘˜
∑
๐‘Ž∈๐ด
๐‘™ ∑
∑
≥
{(๐‘ƒ1 , ⋅ ⋅ ⋅ , ๐‘ƒ๐‘˜ , ๐›ฟ)} .
Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ) =
๐‘ฆ (๐‘Ž)
๐‘–=1
Proof: The concurrent ๐‘˜-path flow
๐‘˜
∑
∑
๐‘–=1 ๐‘Ž∈๐ด
)
๐‘—=1
๐‘Ž∈๐ด
๐‘‘๐‘— ๐‘ฆˆ (๐‘ƒ๐‘— )
be a maximum multiflow, and ๐‘ฅ be its link flow. For each
1 ≤ ๐‘– ≤ ๐‘™, let ๐‘ฅ๐‘– be the
∑๐‘™link flow of the singleton path flow
{(๐‘ƒ๐‘– , ๐›ฟ๐‘– )}. Then, ๐‘ฅ = ๐‘–=1 ๐‘ฅ๐‘– . By Lemma 3.3,
∑
๐‘ฆ (๐‘Ž) Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ)
๐‘—=1
and
๐‘ฆ (๐‘Ž) Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ๐‘— )
{(๐‘ƒ๐‘– , ๐›ฟ๐‘– ) ∈ ๐’ซ × โ„+ : 1 ≤ ๐‘– ≤ ๐‘™}
Then, for any ๐‘Ž ∈ ๐ด,
๐‘‘๐‘— ๐œŒ
∑
So, the lemma holds.
Now, we are ready to prove Theorem 3.1.
Proof of Theorem 3.1: Let
{(๐‘ƒ1 , ⋅ ⋅ ⋅ , ๐‘ƒ๐‘˜ , ๐›ฟ)} .
(
Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ๐‘— )
๐‘—=1
So, the second part also holds.
Lemma 3.3 gives an alternative interpretation on the interference cost of a path ๐‘ƒ : Let ๐‘ฅ be the link flow of a path flow
{(๐‘ƒ, 1)}.
∑
๐‘ฆˆ (๐‘ƒ ) =
๐‘ฆ (๐‘Ž) Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ) .
๐‘˜
∑
๐‘˜
∑
๐‘—=1
๐‘˜
∑
๐œŒ (๐‘Ž, ๐‘) ๐‘ฆ(๐‘Ž)
= ๐›ฟˆ
๐‘ฆ (๐‘ƒ ) .
(๐‘Ž; ๐‘ฅ) = ๐›ฟ
๐‘˜
∑
=๐›ฟ
๐‘œ๐‘ข๐‘ก [๐‘]
๐‘∈๐‘ƒ ๐‘Ž∈๐‘๐ท
Δ๐‘–๐‘›
๐ท
๐‘ฆ (๐‘Ž)
๐‘—=1 ๐‘Ž∈๐ด
๐‘∈๐‘ƒ ๐‘Ž∈๐ด
=๐›ฟ
∑
๐‘Ž∈๐ด
∑
๐‘–๐‘›
{๐‘} ∩ ๐‘๐ท
๐‘ฆ (๐‘Ž)
[๐‘Ž] ๐œŒ (๐‘Ž, ๐‘)
๐‘Ž∈๐ด
=๐›ฟ
(
Again by Lemma 3.3, we have
∑
๐‘ฆ (๐‘Ž) Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ)
{(๐‘ƒ๐‘–1 , ⋅ ⋅ ⋅ , ๐‘ƒ๐‘–๐‘˜ , ๐›ฟ๐‘– ) : 1 ≤ ๐‘– ≤ ๐‘™}
be a maximum concurrent multiflow, and ๐‘ฅ be its cumulative
link flow. For each 1 ≤ ๐‘– ≤ ๐‘™, let ๐‘ฅ๐‘– be the link flow of the
singleton concurrent ๐‘˜-path flow
{(๐‘ƒ๐‘–1 , ⋅ ⋅ ⋅ , ๐‘ƒ๐‘–๐‘˜ , ๐›ฟ๐‘– )} .
๐‘—=1
337
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
Then, ๐‘ฅ =
∑๐‘™
Algorithm MF(๐œ€)
// Flow Phase
Γ ← ∅, ๐‘ฅ ← 0,๐›พ ← 0;๐‘ฆ ← 1;
while Δ๐‘–๐‘›
๐ท (๐‘ฅ) ≥ (1 + ๐œ€) ๐›พ do
๐‘ƒ ← a cheapest path in ๐’ซ w.r.t. ๐‘ฆˆ;
1
๐›ฟ←
๐‘–๐‘› [๐‘Ž]∩๐‘ƒ ;
max๐‘Ž∈๐ด ๐œŒ(๐‘Ž,๐‘๐ท
)
Γ ← Γ ∪ {(๐‘ƒ, ๐›ฟ)};
๐‘ฆ
ˆ(๐‘ƒ )
๐›พ ← ๐›พ + ๐‘ฆ(๐ด) ๐›ฟ;
∀๐‘Ž ∈ ๐‘ƒ , ๐‘ฅ (๐‘Ž) ← ๐‘ฅ (๐‘Ž) (+ ๐›ฟ;
(
))
๐‘–๐‘› [๐‘Ž] ∩ ๐‘ƒ ;
∀๐‘Ž ∈ ๐ด, ๐‘ฆ (๐‘Ž) ← ๐‘ฆ (๐‘Ž) 1 + ๐œ€๐›ฟ๐œŒ ๐‘Ž, ๐‘๐ท
// Link-Scheduling Phase
๐’ฎ ← the link schedule of ๐‘ฅ output by GLS;
// Scaling Phase
1
1
Γ ← โˆฅ๐’ฎโˆฅ
Γ, ๐’ฎ ← โˆฅ๐’ฎโˆฅ
๐’ฎ;
Output Γ and ๐’ฎ.
๐‘ฅ๐‘– . By Lemma 3.4,
∑
๐‘ฆ (๐‘Ž) Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ)
๐‘–=1
๐‘Ž∈๐ด
=
=
=
∑
๐‘ฆ (๐‘Ž)
๐‘Ž∈๐ด
๐‘™ ∑
∑
๐‘ฆ (๐‘Ž) Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ๐‘– )
๐›ฟ๐‘–
๐‘™
∑
≥โŽ
โŽ›
=โŽ
๐‘‘๐‘— ๐‘ฆˆ (๐‘ƒ๐‘–๐‘— )
๐‘—=1
๐›ฟ๐‘–
๐‘–=1
โŽ›
Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ๐‘– )
๐‘–=1
๐‘–=1 ๐‘Ž∈๐ด
๐‘™
๐‘˜
∑
∑
๐‘–=1
≥
๐‘™
∑
๐‘˜
∑
๐‘˜
∑
๐‘—=1
๐‘˜
∑
โŽž(
๐‘‘๐‘— ๐‘‘๐‘–๐‘ ๐‘ก๐‘— (ˆ
๐‘ฆ )โŽ 
๐‘—=1
TABLE I
O UTLINE OF THE ALGORITHM MF(๐œ€).
๐‘‘๐‘— ๐‘‘๐‘–๐‘ ๐‘ก๐‘— (ˆ
๐‘ฆ)
โŽž
๐‘™
∑
)
๐›ฟ๐‘–
iterations until the flow cost ๐›พ exceeds Δ๐‘–๐‘›
๐ท (๐‘ฅ) / (1 + ๐œ€). In
each iteration, a cheapest path ๐‘ƒ ∈ ๐’ซ with respect to ๐‘ฆˆ is
computed, and ๐›ฟ units of flow are routed along ๐‘ƒ where
๐‘–=1
๐‘‘๐‘— ๐‘‘๐‘–๐‘ ๐‘ก๐‘— (ˆ
๐‘ฆ )โŽ  ๐‘œ๐‘๐‘ก
๐‘—=1
๐›ฟ=
On the other hand, by Lemma 2.2,
∑
∑
๐‘–๐‘›
๐‘ฆ (๐‘Ž) Δ๐‘–๐‘›
๐‘ฆ (๐‘Ž) ≤ ๐œ‡
ˆ๐‘ฆ (๐ด) .
๐ท (๐‘Ž; ๐‘ฅ) ≤ Δ๐ท (๐‘ฅ)
๐‘Ž∈๐ด
๐‘∈๐ด
Thus, the theorem holds.
IV. M AXIMUM M ULTIFLOW
Suppose that ๐ท is an orientation of ๐บ with ILIN ๐œ‡, and
denote ๐œ‡
ˆ = ๐œ‡ in SC-SR setting and ๐œ‡
ˆ = ๐œ‡ + 2 in MC-MR
setting. Consider an arbitrary parameter ๐œ€ ∈ (0, 1]. In this
section, we present an efficient algorithm MF(๐œ€) algorithm for
the problem MMF, which achieves an approximation bound
2 (1 + ๐œ€) ๐œ‡
ˆ in general and (1 + ๐œ€) ๐œ‡
ˆ if ๐ท is acyclic, and has
running time growing with 1/๐œ€ in at most the square order.
The algorithm MF(๐œ€) is outlined in Table I. It runs in three
phases:
โˆ™ Flow Phase: This phase computes a path flow Γ and
its link flow ๐‘ฅ iteratively by computing a sequence of
cheapest paths in terms of interference costs.
โˆ™ Link-Scheduling Phase: This phase computes a link
schedule ๐’ฎ of ๐‘ฅ by simply applying the greedy algorithm
GLS developed in [12].
โˆ™ Scaling Phase: This phase scales both Γ and ๐’ฎ by a
factor 1/ โˆฅ๐’ฎโˆฅ and then return them as the final output.
Both the Link-Scheduling Phase and the Scaling Phase
are straightforward. The Flow Phase is quite subtle and is
elaborated below.
The Flow Phase builds up a path flow Γ incrementally and
updates its link flow ๐‘ฅ accordingly throughput this phase. The
Flow Phase maintains a flow cost variable ๐›พ, which are the
cumulative costs incurred by Γ. Initially, Γ is empty, ๐‘ฅ is
zero-valued, and ๐›พ is zero. The Flow Phase also maintains
a positive weight function ๐‘ฆ on ๐ด to help the building
up Γ. Initially, ๐‘ฆ is one-valued. The Flow Phase runs in
1
).
๐‘–๐‘› [๐‘Ž] ∩ ๐‘ƒ
max๐‘Ž∈๐ด ๐œŒ ๐‘Ž, ๐‘๐ท
(
The ๐›ฟ is selected such that after Γ is augmented by (๐‘ƒ, ๐›ฟ), the
maximum increment on Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ) for all ๐‘Ž ∈ ๐ด is exactly
one by Lemma 3.3. The pair (๐‘ƒ, ๐›ฟ) is then added to Γ, and
all other variables are subsequently updated. Specifically, the
ˆ(๐‘ƒ )
๐›ฟ, which is the product
new flow (๐‘ƒ, ๐›ฟ) incurs a flow cost ๐‘ฆ๐‘ฆ(๐ด)
of the ๐‘ฆ-weighted interference cost of ๐‘ƒ and the flow amount
๐›ฟ routed along ๐‘ƒ . Such cost is charged to ๐›พ. The update on
๐‘ฅ is straightforward: ๐‘ฅ (๐‘Ž) is incremented by ๐›ฟ for each link
๐‘Ž ∈ ๐‘ƒ . For each link ๐‘Ž ∈ ๐ด, ๐‘ฆ (๐‘Ž) is increased by a factor
)
(
๐‘–๐‘›
[๐‘Ž] ∩ ๐‘ƒ .
1 + ๐œ€๐›ฟ๐œŒ ๐‘Ž, ๐‘๐ท
(
)
๐‘–๐‘›
Note that ๐›ฟ๐œŒ ๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ is the increment of Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ)
due to the growth of Γ by Lemma 3.3. Such update on
๐‘ฆ ensures that if a link ๐‘Ž receives a larger increment on
Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ), then ๐‘ฆ (๐‘Ž) grows faster which in turn makes it less
likely to appear in a cheapest path in the future iteration.
Next, we analyze the performance of the algorithm MF(๐œ€).
Theorem 4.1: The Flow Phase of the algorithm MF(๐œ€)
terminates in at most
⌉
⌈
๐‘š ln ๐‘š
๐œ€
ln (1 + ๐œ€) − 1+๐œ€
iterations, and the final output of the algorithm MF(๐œ€) is a
2 (1 + ๐œ€) ๐œ‡
ˆ-approximate solution in general and a (1 + ๐œ€) ๐œ‡
ˆapproximate solution if ๐ท is acyclic.
Proof: We introduce the following notations in this proof.
Let ๐‘œ๐‘๐‘ก be the value of the maximum multiflow. Γ0 , ๐‘ฅ0 , ๐‘ฆ0 ,
and ๐›พ0 denote initial values of ๐‘ฅ, ๐‘ฆ, and ๐›พ respectively in the
Flow Phase. For each iteration ๐‘– ≥ 1 of the Flow Phase, Γ๐‘– ,
๐‘ฅ๐‘– , ๐‘ฆ๐‘– and ๐›พ๐‘– denote the values of ๐‘ฅ, ๐‘ฆ, and ๐›พ respectively at
the end of the ๐‘–-th iteration; (๐‘ƒ๐‘– , ๐›ฟ๐‘– ) denotes the flow added in
338
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
the ๐‘–-th iteration. Consider any iteration ๐‘– of the Flow Phase.
For each ๐‘Ž ∈ ๐ด, since
๐‘–๐‘›
Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ๐‘– ) − Δ๐ท (๐‘Ž; ๐‘ฅ๐‘–−1 )
)
(
๐‘–๐‘›
= ๐›ฟ๐‘– ๐œŒ ๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ๐‘– ≤ 1,
๐‘Ž∈๐ด
which implies
∑
Δ๐‘–๐‘› (๐‘Ž; ๐‘ฅ๐‘™ )
ln ๐‘š
๐‘–๐‘›
≥ ๐‘™/๐‘š >
Δ๐ท (๐‘ฅ๐‘™ ) ≥ ๐‘Ž∈๐ด ๐ท
๐‘š
ln (1 + ๐œ€) −
we have
))
(
(
๐‘–๐‘›
๐‘ฆ๐‘– (๐‘Ž) = ๐‘ฆ๐‘–−1 (๐‘Ž) 1 + ๐œ€๐›ฟ๐‘– ๐œŒ ๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ๐‘–
๐›ฟ ๐œŒ ๐‘Ž,๐‘ ๐‘–๐‘› [๐‘Ž]∩๐‘ƒ๐‘– )
(๐‘Ž) (1 + ๐œ€) ๐‘– ( ๐ท
≥๐‘ฆ
๐‘–−1
= ๐‘ฆ๐‘–−1 (๐‘Ž) (1 + ๐œ€)
๐‘–๐‘›
Δ๐‘–๐‘›
๐ท (๐‘Ž;๐‘ฅ๐‘– )−Δ๐ท (๐‘Ž;๐‘ฅ๐‘–−1 )
Hence,
.
=
∑
Thus,
∑ (
)
๐‘–๐‘›
= ๐‘ฆ๐‘–−1 (๐ด) + ๐œ€๐›ฟ๐‘–
๐œŒ ๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ๐‘– ๐‘ฆ๐‘–−1 (๐‘Ž)
๐‘Ž∈๐ด
Δ๐‘–๐‘›
๐ท (๐‘ฅ๐‘™ ) ≤ (1 + ๐œ€) ๐›พ๐‘™ ≤
where the fourth equality follows from Lemma 3.3. Therefore,
by induction on the iterations, for each iteration ๐‘™ of the Flow
Phase, for each ๐‘Ž ∈ ๐ด,
and
Δ๐‘–๐‘›
๐ท (๐‘Ž;๐‘ฅ๐‘™ )
(
๐‘ฆ๐‘™ (๐ด) ≤ ๐‘ฆ0 (๐ด) exp ๐œ€
๐‘™
∑
๐‘–๐‘›
(Δ๐‘–๐‘›
๐ท (๐‘Ž;๐‘ฅ๐‘– )−Δ๐ท (๐‘Ž;๐‘ฅ๐‘–−1 ))
Thus,
(๐›พ๐‘– − ๐›พ๐‘–−1 )
= ๐‘š exp (๐œ€๐›พ๐‘™ ) .
and if ๐ท is acyclic, then
โˆฅΓโˆฅ
๐‘œ๐‘๐‘ก
≥
.
โˆฅ๐’ฎโˆฅ
(1 + ๐œ€) ๐œ‡
ˆ
Δ๐‘–๐‘›
๐ท (๐‘ฅ๐‘™ )
1 (1 + ๐œ€)
1 ๐‘ฆ๐‘™ (๐ด)
ln
≥ ln
.
๐œ€
๐‘š
๐œ€
๐‘š
On the other hand, by Theorem 3.1, we have
∑๐‘™
๐‘™
∑
๐œ‡
ˆ ๐‘–=1 ๐›ฟ๐‘–
๐œ‡
ˆ โˆฅΓ๐‘™ โˆฅ
๐‘ฆˆ๐‘–−1 (๐‘ƒ๐‘– )
≤
=
.
๐›พ๐‘™ =
๐›ฟ๐‘–
๐‘ฆ๐‘–−1 (๐ด)
๐‘œ๐‘๐‘ก
๐‘œ๐‘๐‘ก
๐‘–=1
By Lemma 2.2, we have
โˆฅ๐’ฎโˆฅ ≤ Δ∗ (๐‘ฅ) ≤ 2Δ๐‘–๐‘›
๐ท (๐‘ฅ) ,
which implies that
Now, we bound the number of iterations of the Flow Phase.
Assume to the contrary that the Flow Phase didn’t terminate
after
⌈
⌉
๐‘š ln ๐‘š
๐œ€
ln (1 + ๐œ€) − 1+๐œ€
๐‘™=
๐‘š ln ๐‘š
ln (1 + ๐œ€) −
โˆฅΓโˆฅ
โˆฅΓโˆฅ
๐‘œ๐‘๐‘ก
≥
.
≥
โˆฅ๐’ฎโˆฅ
2
(1
+ ๐œ€) ๐œ‡
ˆ
2Δ๐‘–๐‘›
(๐‘ฅ)
๐ท
If ๐ท is acyclic, again by Lemma 2.2 we have
โˆฅ๐’ฎโˆฅ ≤ Δ∗ (๐‘ฅ) ≤ Δ๐‘–๐‘›
๐ท (๐‘ฅ) ,
which implies that
โˆฅΓโˆฅ
โˆฅΓโˆฅ
๐‘œ๐‘๐‘ก
≥ ๐‘–๐‘›
.
≥
โˆฅ๐’ฎโˆฅ
(1 + ๐œ€) ๐œ‡
ˆ
Δ๐ท (๐‘ฅ)
⌉
๐œ€
1+๐œ€
(1 + ๐œ€) ๐œ‡
ˆ โˆฅΓ๐‘™ โˆฅ
.
๐‘œ๐‘๐‘ก
โˆฅΓโˆฅ
๐‘œ๐‘๐‘ก
≥
,
โˆฅ๐’ฎโˆฅ
2 (1 + ๐œ€) ๐œ‡
ˆ
Hence,
⌈
Δ๐‘–๐‘›
๐ท (๐‘ฅ๐‘™ )
.
1+๐œ€
โˆฅΓ๐‘™ โˆฅ
๐‘œ๐‘๐‘ก
.
≥
๐‘–๐‘›
(1 + ๐œ€) ๐œ‡
ˆ
Δ๐ท (๐‘ฅ๐‘™ )
)
๐‘ก=1
iterations. Let
>
Finally, we prove the approximation bound of the output by
the algorithm. It is sufficient to show that at the end of the
Link-Scheduling Phase,
;
๐›พ๐‘™ ≥
Δ๐‘–๐‘›
๐ท (๐‘ฅ๐‘™ )
.
1+๐œ€
Suppose that the Flow Phase runs in ๐‘™ iterations. By the
stopping rule of the Flow Phase,
≤ ๐‘ฆ๐‘–−1 (๐ด) exp (๐œ€ (๐›พ๐‘– − ๐›พ๐‘–−1 )) ,
๐‘ก=1
.
โˆฅΓโˆฅ
๐‘œ๐‘๐‘ก
.
≥
(1
+
๐œ€) ๐œ‡
ˆ
Δ๐‘–๐‘›
(๐‘ฅ)
๐ท
= ๐‘ฆ๐‘–−1 (๐ด) + ๐œ€๐›ฟ๐‘– ๐‘ฆˆ๐‘–−1 (๐‘ƒ๐‘– )
(
)
๐‘ฆˆ๐‘–−1 (๐‘ƒ๐‘– )
= ๐‘ฆ๐‘–−1 (๐ด) 1 + ๐œ€๐›ฟ๐‘–
๐‘ฆ๐‘–−1 (๐ด)
= ๐‘ฆ๐‘–−1 (๐ด) (1 + ๐œ€ (๐›พ๐‘– − ๐›พ๐‘–−1 ))
∑๐‘™
Δ๐‘–๐‘› (๐‘ฅ๐‘™ )
๐œ€
1+๐œ€
This means that the number of iterations is at most ๐‘™, which
is a contradiction.
Next, we show that at the end of the of the Flow Phase,
๐‘Ž∈๐ด
๐‘ฆ๐‘™ (๐‘Ž) ≥ ๐‘ฆ0 (๐‘Ž) (1 + ๐œ€)
>
1 (1 + ๐œ€) ๐ท
๐›พ๐‘™ ≥ ln
๐œ€
๐‘š
))
(
(
๐‘–๐‘›
๐‘ฆ๐‘–−1 (๐‘Ž) 1 + ๐œ€๐›ฟ๐‘– ๐œŒ ๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ๐‘–
= (1 + ๐œ€)
Δ๐‘–๐‘›
๐ท (๐‘ฅ๐‘™)
1 (1 + ๐œ€)
ln
๐œ€
๐‘š
Furthermore,
∑
๐‘ฆ๐‘– (๐ด) =
๐‘ฆ๐‘– (๐‘Ž)
๐‘Ž∈๐ด
∑
By the choice of ๐›ฟ๐‘– , ๐‘Ž∈๐ด Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ๐‘– ) strictly increases by at
least one with the iteration ๐‘–. So,
∑
Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ๐‘™ ) ≥ ๐‘™,
.
This completes of the proof of the theorem.
339
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
Algorithm CMF(๐œ€)
// Flow Phase
Π ← ∅, ๐‘ฅ ← 0,๐›พ ← 0;๐‘ฆ ← 1;
while Δ๐‘–๐‘›
๐ท (๐‘ฅ) ≥ (1 + ๐œ€) ๐›พ,
The running time of MF(๐œ€) increases with 1/๐œ€ in at most
the square order because
(
)
๐œ€
๐œ€
๐œ€
ln (1 + ๐œ€) −
= − ln 1 −
−
1+๐œ€
1+๐œ€
1+๐œ€
(
)2
๐œ€
1
1
−2
= (1 + 1/๐œ€) .
≥
2 1+๐œ€
2
The running time of the the Flow Phase does not depend on
the the number of channels and the number of radios at each
node. Within each iteration of the Flow Phase, a cheapest
path ๐‘ƒ ∈ ๐’ซ with respect to ๐‘ฆˆ has to be computed. A naive
implementation is first making ๐‘˜ separate computations of
cheapest paths ๐‘ƒ๐‘— ∈ ๐’ซ๐‘— for each 1 ≤ ๐‘— ≤ ๐‘˜ and then choosing
the cheapest one among them as ๐‘ƒ . However, by observing
that Dijkstra’s algorithm for computing shortest paths gives
the shortest path to every node in the graph, we adopt the
following more economic implementation. We first group
unicasts by a common source node. The number of groups is at
more min {๐‘›, ๐‘˜}. Then, for each group we compute cheapest
paths from the common source node to the sinks of all unicast
in this group by a single call to the Dijkstra’s algorithm. As the
Dijkstra’s algorithm has running time ๐‘‚ (๐‘š + ๐‘› log ๐‘›) based
on Fibonacci heap, we can compute the cheapest path ๐‘ƒ ∈ ๐’ซ
in
๐‘‚ (min {๐‘›, ๐‘˜} (๐‘š + ๐‘› log ๐‘›))
( )
time. For ๐‘˜ = Θ ๐‘›2 , this implementation is a linear factor
speedup over the naive implementation.
V. M AXIMUM C ONCURRENT M ULTIFLOW
Suppose that ๐ท is an orientation of ๐บ with ILIN ๐œ‡, and
denote ๐œ‡
ˆ = ๐œ‡ in SC-SR setting and ๐œ‡
ˆ = ๐œ‡ + 2 in MC-MR
setting. Consider an arbitrary parameter ๐œ€ ∈ (0, 1]. In this
section, we present an efficient algorithm CMF(๐œ€) algorithm
for the problem MCMF, which achieves an approximation
bound 2 (1 + ๐œ€) ๐œ‡
ˆ in general and (1 + ๐œ€) ๐œ‡
ˆ if ๐ท is acyclic,
and has running time growing with 1/๐œ€ in at most the square
order.
The algorithm CMF(๐œ€) is outlined in Table II. Similar to
the algorithm MF(๐œ€), it runs in three phases:
โˆ™ Flow Phase: This phase computes a concurrent ๐‘˜-path
flow Π and its cumulative link flow ๐‘ฅ iteratively by
computing a sequence of cheapest paths in terms of
interference costs.
โˆ™ Link-Scheduling Phase: This phase computes a link
schedule ๐’ฎ of ๐‘ฅ by simply applying the greedy algorithm
GLS developed in [12].
โˆ™ Scaling Phase: This phase scales both Π and ๐’ฎ by a
factor 1/ โˆฅ๐’ฎโˆฅ and then return them as the final output.
The Flow Phase of CMF(๐œ€) is more intricate than that of
MF(๐œ€) and is elaborated below.
The Flow Phase builds up a concurrent ๐‘˜-path flow Π incrementally and updates its cumulative link flow ๐‘ฅ accordingly
throughput this phase. The Flow Phase maintains a flow cost
variable ๐›พ storing the cumulative costs incurred by Π. Initially,
Π is empty, ๐‘ฅ is zero-valued, and ๐›พ is zero. The Flow Phase
(๐‘ƒ1 , ⋅ ⋅ ⋅ , ๐‘ƒ๐‘˜ ) ← cheapest paths in
๐‘˜
∏
๐’ซ๐‘— w.r.t. ๐‘ฆˆ;
๐‘—=1
1
∑
;
๐‘–๐‘› [๐‘Ž]∩๐‘ƒ
max๐‘Ž∈๐ด ๐‘˜
๐‘‘
๐œŒ
๐‘Ž,๐‘
(
๐‘—
๐‘—)
๐‘—=1
๐ท
๐›ฟ←
Π ← Π ∪ {(๐‘ƒ1 , ⋅ ⋅ ⋅ , ๐‘ƒ๐‘˜ , ๐›ฟ)};
∑๐‘˜
๐‘‘๐‘— ๐‘ฆ
ˆ(๐‘ƒ๐‘— )
๐›พ ← ๐›พ + ๐‘—=1๐‘ฆ(๐ด)
๐›ฟ;
∀๐‘Ž ∈ ๐ด,
๐‘˜
∑
๐‘ฅ (๐‘Ž) ← ๐‘ฅ (๐‘Ž) + ๐›ฟ
๐‘‘๐‘— โˆฃ๐‘ƒ๐‘— ∩ {๐‘Ž}โˆฃ;
๐‘—=1
๐‘ฆ (๐‘Ž) ← ๐‘ฆ (๐‘Ž) (1 + ๐œ€๐›ฟ
๐‘˜
∑
๐‘—=1
)
(
๐‘–๐‘› [๐‘Ž] ∩ ๐‘ƒ );
๐‘‘๐‘— ๐œŒ ๐‘Ž, ๐‘๐ท
๐‘—
// Link-Scheduling Phase
๐’ฎ ← the link schedule of ๐‘ฅ output by GLS;
// Scaling Phase
1
1
Π ← โˆฅ๐’ฎโˆฅ
Π, ๐’ฎ ← โˆฅ๐’ฎโˆฅ
๐’ฎ;
Output Π and ๐’ฎ.
TABLE II
O UTLINE OF THE ALGORITHM CMF(๐œ€).
also maintains a positive weight function ๐‘ฆ on ๐ด to help the
building up Γ. Initially, ๐‘ฆ is one-valued. The Flow Phase runs
in iterations until the flow cost ๐›พ exceeds Δ๐‘–๐‘›
๐ท (๐‘ฅ) / (1 + ๐œ€). In
each iteration, ๐‘˜ cheapest paths ๐‘ƒ๐‘— ∈ ๐’ซ๐‘— for 1 ≤ ๐‘— ≤ ๐‘˜ with
respect to ๐‘ฆˆ are computed. Along these ๐‘˜ paths, a concurrent
flow of concurrency ๐›ฟ is routed where
1
).
(
∑๐‘˜
๐‘–๐‘› [๐‘Ž] ∩ ๐‘ƒ
max๐‘Ž∈๐ด ๐‘—=1 ๐‘‘๐‘— ๐œŒ ๐‘Ž, ๐‘๐ท
๐‘—
The ๐›ฟ is selected such that after Π is augmented by the new
flow
(๐‘ƒ1 , ⋅ ⋅ ⋅ , ๐‘ƒ๐‘˜ , ๐›ฟ) ,
the maximum increment on Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ) for all ๐‘Ž ∈ ๐ด is exactly
one by Lemma 3.4. The new flow is then added to Π, and
all other variables are subsequently updated. Specifically, the
๐‘ฆ
ˆ(๐‘ƒ๐‘— )
๐›ฟ๐‘‘๐‘— , which is the product
๐‘—-th new flow incurs a cost ๐‘ฆ(๐ด)
of the ๐‘ฆ-weighted interference prices of ๐‘ƒ๐‘— and the flow
amount
๐›ฟ๐‘‘๐‘— routed along ๐‘ƒ๐‘— . The total cost of the new flow is
∑
๐‘˜
๐‘—=1
๐‘‘๐‘— ๐‘ฆ
ˆ(๐‘ƒ๐‘— )
๐›ฟ,
๐‘ฆ(๐ด)
and it is added to ๐›พ. The update on ๐‘ฅ is straightforward: for each link ๐‘Ž ∈ ๐ด, ๐‘ฅ (๐‘Ž) is incremented
by the total
∑๐‘˜
new flow through ๐‘Ž, which is equal to ๐›ฟ ๐‘—=1 ๐‘‘๐‘— โˆฃ๐‘ƒ๐‘— ∩ {๐‘Ž}โˆฃ.
For each link ๐‘Ž ∈ ๐ด, ๐‘ฆ (๐‘Ž) is increased by a factor
1 + ๐œ€๐›ฟ
๐‘˜
∑
๐‘—=1
)
(
๐‘–๐‘›
๐‘‘๐‘— ๐œŒ ๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ๐‘— .
)
(
๐‘–๐‘›
Note that the term ๐›ฟ ๐‘—=1 ๐‘‘๐‘— ๐œŒ ๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ๐‘— is the increment of Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ) due to the growth of Π by Lemma 3.4.
Such update on ๐‘ฆ ensures that if a link ๐‘Ž receives a larger
increment on Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ), then ๐‘ฆ (๐‘Ž) grows faster which in turn
makes it less likely to appear in a cheapest path in the future
iteration.
Next, we analyze the performance of the algorithm
CMF(๐œ€).
340
∑๐‘˜
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
Theorem 5.1: The algorithm CMF(๐œ€) terminates in at most
⌋
⌊
๐‘š ln ๐‘š
๐œ€
ln (1 + ๐œ€) − 1+๐œ€
iterations, and outputs Π and ๐‘ฅ satisfying that
โˆฅΠโˆฅ
๐‘œ๐‘๐‘ก
.
≥
(1
+
๐œ€) ๐œ‡
ˆ
Δ๐‘–๐‘›
(๐‘ฅ)
๐ท
Proof: We introduce the following notations in this proof.
Let ๐‘œ๐‘๐‘ก be the concurrency of the maximum concurrent
multiflow. Π0 , ๐‘ฅ0 , ๐‘ฆ0 , and ๐›พ0 denote initial values of ๐‘ฅ, ๐‘ฆ, and
๐›พ respectively in the Flow Phase. For each iteration ๐‘– ≥ 1 of
the Flow Phase, Π๐‘– , ๐‘ฅ๐‘– , ๐‘ฆ๐‘– and ๐›พ๐‘– denote the values of ๐‘ฅ, ๐‘ฆ,
and ๐›พ respectively at the end of the ๐‘–-th iteration;
(๐‘ƒ๐‘–1 , ⋅ ⋅ ⋅ , ๐‘ƒ๐‘–๐‘˜ , ๐›ฟ๐‘– )
denotes the concurrent flow added in the ๐‘–-th iteration. Consider any iteration ๐‘– of the Flow Phase. For each ๐‘Ž ∈ ๐ด,
since
and skip the details. First, we can show that for any iteration
number ๐‘™ of the Flow Phase, at the end of the ๐‘™-th iteration,
Δ๐‘–๐‘› (๐‘ฅ๐‘™ )
1 (1 + ๐œ€) ๐ท
ln
๐œ€
๐‘š
๐‘˜
∑
)
(
๐‘–๐‘›
๐‘‘๐‘— ๐œŒ ๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ๐‘–๐‘— ≤ 1,
๐‘œ๐‘๐‘ก
โˆฅΠโˆฅ
.
≥
๐‘–๐‘›
(1 + ๐œ€) ๐œ‡
ˆ
Δ๐ท (๐‘ฅ)
Using this inequality and Lemma 2.2, we can conclude that
at the end of the Link-Scheduling Phase,
โˆฅΠโˆฅ
๐‘œ๐‘๐‘ก
≥
,
โˆฅ๐’ฎโˆฅ
2 (1 + ๐œ€) ๐œ‡
ˆ
and if ๐ท is acyclic, then
โˆฅΠโˆฅ
๐‘œ๐‘๐‘ก
≥
.
โˆฅ๐’ฎโˆฅ
(1 + ๐œ€) ๐œ‡
ˆ
This completes the proof of the theorem.
The same remark at the end of Section IV also applies to
the algorithm CMF(๐œ€) and is omitted here.
๐‘—=1
we have
โŽ›
๐‘ฆ๐‘– (๐‘Ž) = ๐‘ฆ๐‘–−1 (๐‘Ž) โŽ1 + ๐œ€๐›ฟ๐‘–
≥ ๐‘ฆ๐‘–−1 (๐‘Ž) (1 + ๐œ€)
= ๐‘ฆ๐‘–−1 (๐‘Ž) (1 + ๐œ€)
๐›ฟ๐‘–
๐‘˜
∑
)
(
โŽž
VI. A PPLICATIONS
In this section, we apply the algorithms MF(๐œ€) and CMF(๐œ€)
to the plane geometric variants of the protocol interference
model by choosing an appropriate orientation ๐ท. We remark
that any ordering โ‰บ of ๐ด naturally induces an orientation ๐ท
by orienting every edge {๐‘Ž, ๐‘} in the link-conflict graph ๐บ for
๐‘Ž to ๐‘ if ๐‘Ž โ‰บ ๐‘, or in the reverse direction otherwise.
In the unidirectional mode, Wan [10] introduced the following orientation ๐ท. Consider any conflicting pair of links
๐‘Ž and ๐‘ in ๐ด. If the receiver of ๐‘Ž is within the interference
range of the sender of ๐‘, then we take the orientation from
๐‘ to ๐‘Ž; otherwise, we take the orientation from ๐‘Ž to ๐‘. Ties
are broken arbitrarily. Suppose that for each link ๐‘Ž ∈ ๐ด, the
interference radius of its sender is at least ๐‘ times its length
for some constant ๐‘ > ⌈1. It was shown
⌉ in [13] that the ILIN
− 1. By Theorem 4.1
of such ๐ท is at most ๐œ‹/ arcsin 1−๐‘
2
and Theorem 5.1, we have the following corollary.
Corollary 6.1: Under the plane geometric variant of the
protocol interference model in the unidirectional mode in
which the interference radius of its sender of each link is at
least ๐‘ times the link length for some constant ๐‘ > 1, by
adopting the orientation ๐ท given in [10], both MF(๐œ€) and
CMF(๐œ€) have an approximation bound
(⌈
⌉
)
๐‘−1
2 (1 + ๐œ€) ๐œ‹/ arcsin
+1
2๐‘
๐‘–๐‘›
๐‘‘๐‘— ๐œŒ ๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ๐‘–๐‘— โŽ 
๐‘—=1
∑๐‘˜
๐‘—=1
๐‘–๐‘›
๐‘‘๐‘— ๐œŒ(๐‘Ž,๐‘๐ท
[๐‘Ž]∩๐‘ƒ๐‘–๐‘— )
๐‘–๐‘›
Δ๐‘–๐‘›
๐ท (๐‘Ž;๐‘ฅ๐‘– )−Δ๐ท (๐‘Ž;๐‘ฅ๐‘–−1 )
.
Furthermore,
๐‘ฆ๐‘– (๐ด) =
∑
๐‘ฆ๐‘–−1 (๐‘Ž) (1 + ๐œ€๐›ฟ๐‘–
∑
๐‘ฆ๐‘–−1 (๐‘Ž)
๐‘˜
∑
๐‘—=1
=๐‘ฆ๐‘–−1 (๐ด) + ๐œ€๐›ฟ๐‘–
(
๐‘˜
∑
๐‘˜
∑
)
(
๐‘–๐‘›
๐‘‘๐‘— ๐œŒ ๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ๐‘–๐‘—
๐‘—=1
๐‘Ž∈๐ด
=๐‘ฆ๐‘–−1 (๐ด) + ๐œ€๐›ฟ๐‘–
)
(
๐‘–๐‘›
๐‘‘๐‘— ๐œŒ ๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ๐‘–๐‘— )
๐‘—=1
๐‘Ž∈๐ด
=๐‘ฆ๐‘–−1 (๐ด) + ๐œ€๐›ฟ๐‘–
๐‘˜
∑
∑ (
)
๐‘–๐‘›
๐‘‘๐‘—
๐œŒ ๐‘Ž, ๐‘๐ท
[๐‘Ž] ∩ ๐‘ƒ๐‘–๐‘— ๐‘ฆ๐‘–−1 (๐‘Ž)
๐‘Ž∈๐ด
๐‘‘๐‘— ๐‘‘๐‘–๐‘ ๐‘ก๐‘— (ˆ
๐‘ฆ๐‘–−1 )
๐‘—=1
=๐‘ฆ๐‘–−1 (๐ด) 1 + ๐œ€๐›ฟ๐‘–
∑๐‘˜
๐‘—=1
๐‘‘๐‘— ๐‘‘๐‘–๐‘ ๐‘ก๐‘— (ˆ
๐‘ฆ๐‘–−1 )
๐œ‡
ˆ โˆฅΠ๐‘™ โˆฅ
.
๐‘œ๐‘๐‘ก
Then,
using the above inequality and the fact that
∑
๐‘–๐‘›
Δ
๐‘Ž∈๐ด ๐ท (๐‘Ž; ๐‘ฅ๐‘– ) strictly increases by at least one with the
iteration ๐‘–, we can prove the upper bound on the number of
iterations of the Flow Phase by contradiction. Using the above
inequality again and the stopping rule of the Flow Phase, we
can show that at the end of the of the Flow Phase,
๐‘–๐‘›
Δ๐‘–๐‘›
๐ท (๐‘Ž; ๐‘ฅ๐‘– ) − Δ๐ท (๐‘Ž; ๐‘ฅ๐‘–−1 )
= ๐›ฟ๐‘–
≤ ๐›พ๐‘™ ≤
)
๐‘ฆ๐‘–−1 (๐ด)
=๐‘ฆ๐‘–−1 (๐ด) (1 + ๐œ€ (๐›พ๐‘– − ๐›พ๐‘–−1 ))
≤๐‘ฆ๐‘–−1 (๐ด) exp (๐œ€ (๐›พ๐‘– − ๐›พ๐‘–−1 )) ,
where the fourth equality follows from Lemma 3.3.
The rest of the proof is almost the same as that in the proof
of Theorem 4.1. We only outline the steps of the argument
in MC-MR wireless networks, and
(⌈
⌉
)
๐‘−1
2 (1 + ๐œ€) ๐œ‹/ arcsin
−1
2๐‘
341
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
in SC-SR wireless networks,
In the bidirectional mode, Wan et al. [13] introduced the
following orientation ๐ท. Consider any conflicting pair of links
๐‘Ž and ๐‘ in ๐ด. If ๐‘Ž has an endpoint ๐‘ข and ๐‘ has an endpoint
๐‘ฃ satisfying that ๐‘ข is within the interference range of ๐‘ฃ and
its interference radius is no more than that of ๐‘ฃ, then we take
the orientation from ๐‘ to ๐‘Ž; otherwise, we take the orientation
from ๐‘Ž to ๐‘. Ties are broken arbitrarily. It was shown in [13]
that the ILIN of such ๐ท is at most 8. By Theorem 4.1 and
Theorem 5.1, we have the following corollary.
Corollary 6.2: Under the plane geometric variant of the
protocol interference model in the bidirectional mode, by
adopting the orientation ๐ท given in [13], both MF(๐œ€) and
CMF(๐œ€) have an approximation bound 18 (1 + ๐œ€) in MC-MR
wireless networks, and 16 (1 + ๐œ€) in SC-SR wireless networks,
In the bidirectional mode with symmetric interference radii
(i.e., for each link, its two endpoints have equal interference radii), we sorts the links in the decreasing order of
the interference radii of their endpoints and ties are broken
arbitrarily. Such ordering is referred to as the interference
radius decreasing ordering. It was shown in [13] that for
the acyclic orientation ๐ท induced by the interference radius
decreasing ordering, its ILIN is at most 8. By Theorem 4.1
and Theorem 5.1, we have the following corollary.
Corollary 6.3: Under the plane geometric variant of the
protocol interference model in the bidirectional mode with
symmetric interference radii, by adopting the orientation ๐ท
induced by the interference radius decreasing ordering, both
MF(๐œ€) and CMF(๐œ€) have an approximation bound 10 (1 + ๐œ€)
in MC-MR wireless networks, and 8 (1 + ๐œ€) in SC-SR wireless
networks,
In the bidirectional mode with uniform interference radii
(i.e., the endpoints of all links have equal interference radii),
we sorts the links in the lexicographic order of their left
endpoints and ties are broken arbitrarily. Such ordering is
referred to as the lexicographic ordering. It was shown in [5]
that for the acyclic orientation ๐ท induced by the lexicographic
ordering, its ILIN is at most 6. By Theorem 4.1 and Theorem
5.1, we have the following corollary.
Corollary 6.4: Under the plane geometric variant of the
protocol interference model in the bidirectional mode with
uniform interference radii, by adopting the orientation ๐ท induced by the lexicographic ordering, both MF(๐œ€) and CMF(๐œ€)
have an approximation bound 8 (1 + ๐œ€) in MC-MR wireless
networks, and 6 (1 + ๐œ€) in SC-SR wireless networks,
VII. C ONCLUSION
2 (1 + ๐œ€) ๐œ‡
ˆ-approximate solutions in general, and (1 + ๐œ€) ๐œ‡
ˆapproximate solutions if ๐ท is acyclic. Compared to the existing
approximation algorithms based on the LP approach, these
approximation bounds are only slightly larger by a factor 1+๐œ€,
but they are much faster and simpler. Underlying the combinatorial approach followed by these algorithms is the intrinsic
relation between interference costs and prices of a path and the
maximum (concurrent) multiflow. These algorithms iteratively
compute a sequence of least interference-cost routing paths
along which the flows are routed. By leveraging the techniques
in [3], [2], [6], we can further speed up these algorithms and
the details will be reported in the full version of this paper.
ACKNOWLEDGEMENTS: This work was supported in
part by the National Science Foundation of USA under grants
CNS-0916666 and CNS-1219109, and by the National Natural
Science Foundation of P. R. China under grants 61128005.
R EFERENCES
[1] D. Bienstock. Potential function methods for approximately solving
linear programs: theory and practice. Kluwer Academic Publisher,
2002.
[2] L. K. Fleischer, Approximating fractional multicommodity flow independent of the number of commodities, SIAM Journal of Discrete
Mathematics 13(4):505–520, 2000.
[3] N. Garg and J. Koฬˆnemann, Faster and simpler algorithms for multicommodity flow and other fractional packing problems, SIAM Journal on
Computing 37: 630–652, 2007. Conference version appeared in Proc.
IEEE FOCS 1998, pp. 300–309.
[4] B. Han, V. S. A. Kumar, M. V. Marathe, S. Parthasarathy, and A.
Srinivasan, Distributed Strategies for Channel Allocation and Scheduling
in Software-Defined Radio Networks, Proc. IEEE INFOCOM 2009, pp.
1521-1529.
[5] C. Joo, X. Lin, and N. B. Shroff, Understanding the Capacity Region
of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless
Networks, Proc. IEEE INFOCOM 2008.
[6] G. Karakostas, Faster approximation schemes for fractional multicommodity flow problems, Proc. ACM-SIAM SODA 2002.
[7] M. Kodialam and T. Nandagopal, Characterizing achievable rates in
multi-hop wireless networks: the joint routing and scheduling problem,
Proc. of ACM MobiCom 2003.
[8] M. Kodialam and T. Nandagopal, Characterizing the capacity region in
multi-radio multi-channel wireless mesh networks, Proc. ACM MobiCom
2005.
[9] V.S.A. Kumar, M.V. Marathe, S. Parthasarathy, and A. Srinivasan,
Algorithmic aspects of capacity in wireless networks, SIGMETRICS
Perform. Eval. Rev. 33(1):133–144, 2005.
[10] P.-J. Wan, Multiflows in Multihop Wireless Networks, Proc. ACM
MOBIHOC 2009.
[11] P.-J. Wan, Y. Cheng, Z. Wang, and F. Yao, Multiflows in Multi-Channel
Multi-Radio Multihop Wireless Networks, Proc. IEEE INFOCOM 2011.
[12] P.-J. Wan, X. Jia, G. Dai, H. Du, Z.G. Wan, and O. Frieder, Scalable
Algorithms for Wireless Link Schedulings in Multi-Channel Multi-Radio
Wireless Networks, Proc. IEEE INFOCOM 2013.
[13] P.-J. Wan, C. Ma, Z. Wang, B. Xu, M. Li, and X. Jia, Weighted
Wireless Link Scheduling without Information of Positions And Interference/Communication Radii, Proc. IEEE INFOCOM 2011.
In this paper, we have developed purely combinatorial
approximation algorithms for both maximum multiflow and
maximum concurrent multiflow in MC-MR wireless networks.
These algorithms adopt an orientation ๐ท of the conflict graph
and a parameter ๐œ€ ∈ (0, 1] which represents the trade-off
between the approximation ratio and the running time. Let
๐œ‡ be the ILIN of ๐ท, and denote ๐œ‡
ˆ = ๐œ‡ in SC-SR setting
and ๐œ‡
ˆ = ๐œ‡ + 2 in MC-MR setting. At the running time
growing with 1/๐œ€ in at most the square order, they produce
342
Download