Adaptive packet routing for bursty adversarial traffic
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Journal of the ACM (JACM)
Stability preserving transformations: packet routing networks with edge capacities and speeds
SODA '01 Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms
Stability of load balancing algorithms in dynamic adversarial systems
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Scheduling Over a Time-Varying User-Dependent Channel with Applications to High Speed Wireless Data
FOCS '02 Proceedings of the 43rd Symposium on Foundations of Computer Science
Source Routing and Scheduling in Packet Networks
FOCS '01 Proceedings of the 42nd IEEE symposium on Foundations of Computer Science
Simple Routing Strategies for Adversarial Systems
FOCS '01 Proceedings of the 42nd IEEE symposium on Foundations of Computer Science
The capacity of wireless networks
IEEE Transactions on Information Theory
Providing quality of service over a shared wireless link
IEEE Communications Magazine
Three dozen papers on online algorithms
ACM SIGACT News
Algorithms for routing and centralized scheduling to provide QoS in IEEE 802.16 mesh networks
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
Assessing the effectiveness of longest-in-system (lis) schedulingin ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
QoS differentiation for IEEE 802.16 WiMAX mesh networking
Mobile Networks and Applications
Dynamic packet scheduling in wireless networks
PODC '12 Proceedings of the 2012 ACM symposium on Principles of distributed computing
Hi-index | 0.00 |
We study routing and scheduling in multihop wireless networks. When data is transmitted from its source node to its destination node it may go through other wireless nodes as intermediate hops. The data transmission is node constrained, i.e. every node can transmit data to at most one neighboring node per time step. The transmission rates are time varying as a result of the changing wireless channel conditions.In this paper we assume that the data arrivals and transmission rates are governed by an adversary. The power of the adversary is limited by an admissibility condition which forbids the adversary from overloading any wireless node a priori. The node constrained transmission and the time-varying nature of the transmission rates make our model different from and harder than the standard adversarial queueing model which relates to wireline networks.For the case in which the adversary specifies the paths that the data must follow, we design scheduling algorithms that ensure network stability. These algorithms try to give priority to data that is closest to its source node. However, at each time step only a subset of the data queued at a node is eligible for scheduling. One of our algorithms is fully distributed.For the case in which the adversary does not dictate the data paths, we show how to route the data so that the admissibility condition is satisfied. We can then schedule data along the chosen paths using our stable scheduling algorithms. We conclude by discussing the performance of distributed load balancing algorithms for combined routing and scheduling.