IEEE COMMUNICATIONS LETTERS, VOL. 1, NO. 1, AUGUST 2010

1

On the Complexity of System Throughput Derivation for Static 802.11 Networks Gene Cheung, Senior Member, IEEE, Jeongkeun Lee, Member, IEEE, Sung-Ju Lee, Senior Member, IEEE, and Puneet Sharma, Senior Member, IEEE

Abstract—The exploding popularity of 802.11 Wireless Local Area Networks (WLAN) has drawn intense research interest in the optimization of WLAN performance through channel assignment to access points (AP), AP-client association control, and transmission scheduling—we refer to any combination of the three approaches as WLAN management. No matter what degrees of freedom are enabled in WLAN management for performance optimization in a particular WLAN setting, a fundamental question is the corresponding maximum achievable system throughput. We show that for a particular network setting, the derivation of the system throughput (where system throughput is aggregate throughput of all clients or maxmin throughput), for any combination of channel assignment, association control and transmission scheduling, is NP-hard and inapproximable to a constant factor in polynomial time.

I. I NTRODUCTION With increasing popularity of 802.11 Wireless Local Area Networks (WLAN), extensive research into optimization of WLAN system performance is being conducted. A key challenge in WLAN optimization is to properly account for signal interference, stemming from simultaneous wireless transmissions by different entities in the same channel. Broadly speaking, there are three mechanisms to mitigate interference: channel assignment to access points (AP) [1], AP-client association control [2], and transmission scheduling [3]. Depending on a particular network setting, an optimizer may perform any combination of the three—together we simply call WLAN management—to maximize a chosen system throughput objective function. No matter what particular WLAN management an optimizer is to perform, a fundamental question is the maximum achievable system throughput for a given static network setup: namely, placements of APs and clients and their communication and interference relations. Not only can the maximum throughput serve as an upper bound against which different WLAN management schemes can be compared, it can also be used to evaluate the network setup itself, so that the setup can be recasted (e.g., relocation of APs) to increase throughput. In this paper we prove, for our chosen network model, the following negative result: for the special case when there is only one channel and each client can only associate to one particular AP, the derivation of 802.11 system throughput, where throughput can be either aggregate throughput of all clients or max-min throughput, is NP-hard and inapproximable to a constant factor in polynomial time. As a corollary, the derivation of throughput for the general case when there are more than one channel and a client can associate to one of several APs is also NP-hard and inapproximable to a

constant factor in polynomial time. Compared to previous WLAN throughput analysis, our work differs from [4] in that optimal centralized scheduling is considered for multiple APs when the system throughput is sought, and differs from [5] in that a graph-based interference model is adopted rather than distance-based models. Moreover, there is no discussion on the complexity of deriving optimal system throughput. Compared to the majority of previous works studying complexity and algorithms for interference-aware wireless networking, we focus on AP-client communication in WLAN only, which is single-hop, while [3], [6], [7] discussed the more general multi-hop case. While the general multi-hop problem includes single-hop as a special case, from an algorithmic point of view, there is hope that the special case of deriving system throughput for single-hop network can be simpler in complexity. Our contribution is to demonstrate that even in the special case of single-hop network, deriving system throughput is NP-hard and inapproximable in polynomial time. II. M ODEL AND A SSUMPTIONS We consider a set of WLAN APs, each with its own exclusive group of associated client stations (STA), all managed by a single administrative domain. (See Fig. 1 for an example.) An ideal optimizer schedules interference-free transmissions for each AP-STA pair in normalized time 0 ≤ t ≤ 1 to maximize a chosen performance metric (to be defined in Section III), taking into account all STA-AP, STA-STA and AP-AP interference relationships. Finding the ideal schedule is equivalent to deriving the system throughput for a given network setup. s2

s1

s5

s7

a3

a2

a1

s8

s3

s4

s6

Fig. 1. Example of WLAN graph G(V; L, E). Triangles are APs; circles are STAs; arrows are communication links; dotted lines are interference edges.

More precisely, input to an optimizer is a WLAN graph G(V; L, E), containing: i) vertices V = A ∪ S of APs A and STAs S, ii) directed communication links L connecting each AP to its associated STAs, and iii) vertex-to-vertex interference edges E. An AP ai and any one of its associated STAs sj share two communication links li,j and lj,i ; activation of li,j means data is transmitted from vertex vi to vertex vj . A bi-directional

IEEE COMMUNICATIONS LETTERS, VOL. 1, NO. 1, AUGUST 2010

2

edge1 ei,j between vertices vi and vj (between APs, between STAs associated with different APs, or between a STA and an AP different from its associated AP) implies that one vertex’s transmission can interfere with another vertex’s transmission or reception. vi and vj can receive at the same time, however. An optimizer schedules transmissions of each communication link. An ideal schedule πi,j for each link li,j , is given in the form of a set of Ti,j tuples: πi,j = {[si,j (1), ti,j (1)), . . . , [si,j (Ti,j ), ti,j (Ti,j ))}

(1)

where for each tuple k, [si,j (k), ti,j (k)), link li,j becomes active (vi transmits) from time si,j (k) to ti,j (k). Without loss of generality, we assume the tuples are non-overlapping and ordered in time, i.e., si,j (k) < ti,j (k) ≤ si,j (k + 1). In addition, we assume that the ideal schedule is normalized to 1, i.e., 0 ≤ si,j (1) and ti,j (Ti,j ) ≤ 1. Mathematically, we say that two schedules πi,j and πi′ ,j ′ overlap if the following is true: ∃k, k ′ s.t. si′ ,j ′ (k ′ ) ≤ si,j (k) < ti′ ,j ′ (k ′ ) or ∃k, k ′

s.t.

si′ ,j ′ (k ′ ) < ti,j (k) ≤ ti′ ,j ′ (k ′ ) si,j (k) ≤ si′ ,j ′ (k ′ ) < ti,j (k) or si,j (k) < ti′ ,j ′ (k ′ ) ≤ ti,j (k)

(2)

III. P ROBLEM F ORMULATIONS A. Client Throughput Model Let di be the transmission and reception duration of a STA vi . STA vi shares two communication links, li,j and lj,i , with its associated AP vj . Mathematically, we calculate di using transmission schedules πi,j and πj,i as follows: di =

Ti,j X

k=1

(ti,j (k) − si,j (k)) +

Tj,i X

(tj,i (k) − sj,i (k))

(3)

k=1

We use di as a metric to quantify client throughput (uplink plus downlink) for STA vi ∈ S. An alternative definition of client throughput di is the volume of uplink traffic only, derived using schedule πi,j . One can easily verify that our claim of NP-hardness and inapproximability for derivation of aggregate client throughput and max-min client throughput holds equally true for this alternative definition of client throughput using the same proofs in Section IV. B. Objective Functions The goal of an optimizer is to find interference-free transmission schedules that maximize a given performance objective. We consider two objectives: maximize aggregate client throughput (MaxSum), and maximize the minimum client throughput (MaxMin). MaxSum, maximizing the sum of throughput of all STAs in the network, can be written simply: X max di (4) ∀vi ∈S

Taking fairness into consideration, MaxMin identifies the minimum throughput STA and maximizes its performance:   (5) max min di ∀vi ∈S

1 The

interference relation can be derived by a measurement-based estimation [8] or by a distance-based interference model [5].

IV. NP-H ARDNESS P ROOFS A. Maximizing Aggregate Throughput We show that MaxSum (4) is NP-hard via a reduction from a known NP-hard problem independent set (IS). IS optimization problem is to find the largest subset of nodes U ′ ⊂ U in an undirected graph Q = (U, E) such that there does not exist an edge ei,j ∈ E between any two nodes ui , uj in U ′ , and the cardinality of |U ′ | is maximized. We show that solving MaxSum is equivalent to solving IS, hence MaxSum is also NP-hard. For each instance of IS, we construct an instance of MaxSum as follows. First, the set of nodes U in IS will be reused as the set of STAs S in MaxSum. Second, each STA will have its own AP serving it and shared by no other STAs, hence |S| = |A|, and there exist interference edges from each AP to all other APs. Third, the same set of edges E among nodes in IS will be reused as interference edges among STAs in MaxSum. We claim that there exists an independent set of size K in an instance of IS if and only if there is an aggregate throughput of K in a corresponding instance in MaxSum, hence solving MaxSum is equivalent to IS. We show this in both directions. If there is an independent set of size K in IS, then the same corresponding set of STAs in MaxSum can transmit simultaneously for all time 0 ≤ t ≤ 1 without interference, resulting in an aggregate throughput of K. Conversely, if there is an aggregate throughput of K in MaxSum, we know that there exists an instant t, 0 ≤ t ≤ 1, where there are at least K simultaneously transmitting vertices (otherwise throughput of K cannot be achieved). At such instant t, the K transmitting vertices must be K non-interfering STAs (a single transmitting AP will prevent all other APs from transmitting or receiving data). Hence the K nodes in IS corresponding to the K simultaneously transmitting STAs will form a size-K independent set. Since both directions have been proven, we have shown that solving MaxSum is equivalent to solving IS, and hence MaxSum is NP-hard. 2 B. Maximizing Minimum Client Throughput We show that MaxMin (5) is NP-hard via a reduction from a known NP-hard problem K-coloring (COL). Recall that COL optimization problem is to find the smallest number K of distinct colors required to color each node in an undirected graph Q = (U, E) so that no two nodes ui , uj ∈ U connected by an edge ei,j ∈ E are of the same color. We show that solving MaxMin is equivalent to solving COL, hence MaxMin is also NP-hard. For each instance of COL, we construct a corresponding instance of MaxMin as follows. First, the set of nodes U in COL will be reused as the set of STAs S in MaxMin. Second, the set of edges E connecting nodes in COL will be reused as the set of interference edges connecting corresponding STAs in MaxMin. Third, each STA will have its own AP for communication, and there exist interference edges from each AP to all other APs. We claim that graph Q of COL is K-colorable if and only if the corresponding MaxMin instance has max-min throughput of ≥ 1/K. We prove this claim for both directions. It is clear

IEEE COMMUNICATIONS LETTERS, VOL. 1, NO. 1, AUGUST 2010

that if Q is K-colorable, then STAs of MaxMin corresponding to nodes of the same color in Q can be scheduled for transmission simultaneously without causing interference. If each set of STAs of MaxMin corresponding to the same-color nodes in COL are scheduled for transmission in turn for the same duration each, then the throughput of each STA is exactly 1/K, and the max-min throughput of MaxMin is also 1/K. 1

6 2

5 10

7

9

4

8

3

Fig. 2. Example of an MaxMin instance constructed from an COL instance.

We now show that if the max-min throughput of the corresponding instance in MaxMin is ≥ 1/K, then original Q of COL is K-colorable. Without loss of generality, we first define a schedule π = {C1 , C2 , . . . , CB } that results in maxmin throughput for the given MaxMin instance. B is the number of STA sets Ci ’s in schedule π, where each Ci is scheduled for transmission in turn for the same duration 1/B. Let M be the minimum number of times any STA appears as a transmitter in sets Ci ’s of schedule π. The max-min throughput using schedule π is hence M/B. Let K be the smallest integer such that: M 1 ≤ (6) K B As an example, consider an MaxMin instance in Fig. 2 with five STAs and five associated APs. One optimal transmission schedule π would be {{l1,6 , l3,8 }, {l2,7, l4,9 }, {l3,8 , l5,10 }, {l4,9, l1,6 }, {l5,10 , l2,7 }}. It is easy to see that B = 5 and M = 2 and max-min throughput is 2/5. Smallest integer K satisfying (6) is 3. We prove by contradiction. Suppose schedule π has maxmin throughput of M/B and K such that 1/K ≤ M/B, but graph Q of COL is not K-colorable. Q being not K-colorable means there are ≥ K + 1 nodes in Q. Let us first consider the special case when the number of nodes in Q is exactly K + 1. Having K +1 nodes in Q and Q not K-colorable means K +1 nodes form a clique. We know each STA must appear in the schedule π at least M times. But each STA cannot appear in a same set Ci with any other STA, because corresponding nodes in Q forming a clique means each STA interferes with every other STA. Thus, at least (K + 1)M sets Ci ’s are needed, but at most M K sets are available. A contradiction. Consider now the general case where the number of nodes in Q is K v and the chromatic number (minimum number of colors to color a graph) of Q is K c , where K v ≥ K c ≥ K +1. We can transpose the original graph Q to a new graph Qc by mapping all same-color nodes in Q to a single node of the same color in Qc ; all edges shared by the same-color nodes in Q will now be shared by a single node in Qc . Note that Qc has K c nodes, each of a different color, and forms a clique.

3

Similarly, we can map STAs in G corresponding to these same-color nodes in Q to a single STA in Gc . Schedule π for G can be transposed to a new schedule π c for Gc , where it contains the same number B of sets Ci ’s, but the previous schedule for STAs corresponding to the same color in Q are now for a single STA. Clearly, the minimum number of times any STA appears in set Ci ’s is now M c ≥ M . Now we see the same contradiction we countered in the special case: each of K c ≥ K + 1 STAs must appear at least M times alone in schedule π c (given corresponding nodes in Qc form a clique), but there are only at most M K STA sets. Having shown there is a contradiction in the general case, we have shown that if the max-min throughput of the corresponding instance in MaxMin is at least 1/K, then original Q of COL is K-colorable. Since both directions are proven, solving MaxMin is equivalent to solving COL, hence MaxMin is NP-hard. 2 V. P RACTICAL I MPLICATIONS We discuss the implications of having shown MaxSum and MaxMin are both NP-hard. First, it has been shown that both IS [9] and COL [10] are both inapproximable in polynomial time to a constant factor. Given solving MaxSum and MaxMin is equivalent to solving IS and COL, we conclude that MaxSum and MaxMin are inapproximable in polynomial time to a constant factor. Notice that we formulated our optimization problems MaxSum and MaxMin for the special case when there is only one channel and each STA can only associate to one particular AP. Given deriving the system throughput for the special case is already NP-hard and inapproximable, deriving the system throughput for the general case when there are more than one channel and each STA can associate to one of several APs within range (which must be no easier) is also NP-hard and inapproximable. For future work, we are designing heuristics exploiting clues provided by the constructed NP-hardness proofs that indicate the roots of difficulty of the sought optimization problem. R EFERENCES [1] A. Mishra et al., “A Client-driven Approach for Channel Management in Wireless LANs,” in IEEE INFOCOM, Barcelona, Spain, Apr. 2006. [2] Y. Bejerano, S.J. Han, and L. Li, “Fairness and Load Balancing in Wireless LANs using Association Control,” in ACM MobiCom, Portland, OR, Aug. 2004. [3] W. Wang et al., “Efficient Interference-Aware TDMA Link Scheduling for Static Wireless Networks,” in ACM MobiCom, Los Angeles, CA, Sept. 2006. [4] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function,” in IEEE Journal on Selected Areas in Communications, Mar. 2000, vol. 18, no.3. [5] P. Gupta and P. R. Kumar, “The capacity of wireless networks,” in IEEE Transactions on Information Theory, Mar. 2000, vol. 46, no.2. [6] M. Kodialam and T. Nandagopal, “Characterizing Achievable Rates in Multi-hop Wireless Networks: The Joint Routing and Scheduling Problem,” in IEEE INFOCOM, San Diego, CA, Sept. 2003. [7] K. Jain, J. Padhye, V. Padmanabhan, and L. Qiu, “Impact of interference on multi-hop wireless network performance,” in ACM MobiCom, New York, NY, Sept. 2003. [8] J. Lee et al., “RSS-based Carrier Sensing and Interference Estimation in 802.11 Wireless Networks,” in IEEE SECON, San Diego, CA, June 2007. [9] J. Hastad, “Clique is hard to approximate within n1−ǫ ,” in Acta Mathematica, 1999, vol. 182, pp. 105–142. [10] U. Feige and J. Kilian, “Zero Knowledge and the Chromatic Number,” in Journal of Computer and System Sciences, 1998, vol. 57, no.2, pp. 187–199.

On the Complexity of System Throughput Derivation for ...

degrees of freedom are enabled in WLAN management for performance optimization in ... achievable system throughput for a given static network setup: namely ...

78KB Sizes 2 Downloads 304 Views

Recommend Documents

On the Complexity of Explicit Modal Logics
Specification (CS) for the logic L. Namely, for the logics LP(K), LP(D), LP(T ) .... We describe the algorithm in details for the case of LP(S4) = LP and then point out the .... Of course, if Γ ∩ ∆ = ∅ or ⊥ ∈ Γ then the counter-model in q

On the Achievable Throughput of CSMA under ... - Semantic Scholar
Aug 26, 2010 - transmit a PROBE packet in slot t with probability ai only if it does ...... http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-37.html,.

On the Achievable Throughput of CSMA under ... - Semantic Scholar
Aug 26, 2010 - transmit a PROBE packet in slot t with probability ai only if it does not sense ...... [17] J. Ghaderi and R. Srikant, “On the design of efficient CSMA algorithms ... [18] X. Lin, N. B. Shroff, and R. Srikant, “A tutorial on cross-

On the Achievable Throughput of CSMA under ...
Aug 26, 2010 - multiple DATA packets by using a single packet with a bitmap, which is also used ... it is clear from context, we omit time index t. Links with zero.

Complexity Measurements of the Inter-Domain Management System
Current use of software metrics in the industry focuses on the cost and effort estimation, ..... VPN-Manager), and the VASP Management Information. Base (MIB).

Derivation of the velocity divergence constraint for low ...
Nov 6, 2007 - Email: [email protected]. NIST Technical ... constraint from the continuity equation, which now considers a bulk source of mass. We.

On the Complexity of Maintaining the Linux Kernel ...
Apr 6, 2009 - mm: Contains all of the memory management code for the kernel. Architecture specific ... fs: Contains all of the file system code. It is further .... C, Python, Java or any procedural or object oriented code. As seen in section 2.2, ...

ON INITIAL SEGMENT COMPLEXITY AND DEGREES OF ...
is 1-random, then X and Y have no upper bound in the K-degrees (hence, no ... stitute for Mathematical Sciences, National University of Singapore, during the ..... following result relates KZ to unrelativized prefix-free complexity when Z ∈ 2ω is

ON INITIAL SEGMENT COMPLEXITY AND DEGREES OF ...
2000 Mathematics Subject Classification. 68Q30 ... stitute for Mathematical Sciences, National University of Singapore, during the Computational. Aspects of ...... In Mathematical foundations of computer science, 2001 (Mariánské Lázn˘e),.

1 On the Complexity of Non Universal Polynomial ... - Semantic Scholar
The space CM is called the target space, a point y ∈ Im ε ⊆ CM is called a target point (also a semantical object), and the dimension M of the target space is called the target dimension. In the previous notation, for every α ∈ W, ε(α) is t

On the Complexity of Non-Projective Data ... - Research at Google
teger linear programming (Riedel and Clarke, 2006) .... gins by selecting the single best incoming depen- dency edge for each node j. ... As a side note, the k-best argmax problem for di- ...... of research is to investigate classes of non-projective

1 On the Complexity of Non Universal Polynomial ...
data (polynomial equations and inequalities) to answer questions involving quanti- fiers. .... These studies have generated a large number of semantic invariants that must be ...... In a broad sense, this scheme is close to an “oracle machine”.

On the Complexity of Computing an Equilibrium in ...
Apr 8, 2014 - good welfare is essentially as easy as computing, completely ignoring ... by designing algorithms that find allocations with high welfare (e.g.,.

A Bound on the Label Complexity of Agnostic ... - Semantic Scholar
to a large pool of unlabeled examples, and is allowed to request the label of any .... Examples. The canonical example of the potential improvements in label complexity of active over passive learning is the thresholds concept space. Specifically ...

1 On the Complexity of Non Universal Polynomial Equation Solving ...
computing and numerical analysis developed their own techniques for solving .... f1,...,fs ∈ C[X1,...,Xn] of degree at most d, the complex algebraic variety they ..... The mapping Φ associates to every parameter α ∈ W a system of ...... G.W. St

1 On the Complexity of Non Universal Polynomial Equation Solving ...
of solving them in any real or future computer. The reason is that this ... on the number of variables and the maximum of the degrees, such that the following equivalence ... not seem to be the best methods of dealing with HN. A third syntactical ...

Perspectives on the development of a magnetic navigation system for ...
Mar 17, 2006 - of this system for cardiac mapping and ablation in patients with supraventricular ... maximum field strength dropped from 0.15 T (Telstar) to.

On the Scheduling and Multiplexing Throughput Trade ...
insights as to which protocol is the best under what conditions. ... nas, a deterministic Gaussian channel with full rank matrix and a SM signaling scheme that ...

On the Complexity and Performance of Parsing with ... - GitHub
seconds to parse only 31 lines of Python. ... Once these are fixed, PWD's performance improves to match that of other ...... usr/ftp/scan/CMU-CS-68-earley.pdf.

Some critical observations on the science of complexity
master tool with which to seize the truth of the world. More than one century ..... possesses the high degree of complexity involved in deterministic chaos. It would be an .... possibility if gives of accounting for “emergent properties”. However

Perspectives on the development of a magnetic navigation system for ...
Mar 17, 2006 - Development of the magnetic navigation system was motiv- ated by the need for accurate catheter manipulation during complex ablation ...

THROUGHPUT OPTIMIZATION OF THE CIPHER ...
primitive IP in the system, such as common block ciphers, and not a special .... access and read the security system's memory (RAM) to reveal our keys and ...

THROUGHPUT OPTIMIZATION OF THE CIPHER ...
digital signatures, MACs are computed and verified with the ... MACs are used in public key digital .... access and read the security system's memory (RAM) to.

Derivation of forward and adjoint operators for least ...
tic model, and the second uses data from the Sigsbee 2a model. INTRODUCTION. We derive and implement operators for shot-profile migration and.