Next Article in Journal
A Neural Network-Based Mesh Quality Indicator for Three-Dimensional Cylinder Modelling
Next Article in Special Issue
Decentralized Primal-Dual Proximal Operator Algorithm for Constrained Nonsmooth Composite Optimization Problems over Networks
Previous Article in Journal
Quantum Correlation Swapping between Two Werner States Undergoing Local and Nonlocal Unitary Operations
Previous Article in Special Issue
A Useful Criterion on Studying Consistent Estimation in Community Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Research on Throughput-Guaranteed MAC Scheduling Policies in Wireless Networks

1
School of Information Engineering, Shandong Management University, Jinan 250357, China
2
Internet of Things & Smart City Innovation Platform, Zhuhai Fudan Innovation Institute, Zhuhai 519031, China
3
School of Information Science and Engineering, Shandong University, Qingdao 226237, China
*
Authors to whom correspondence should be addressed.
Entropy 2022, 24(9), 1246; https://doi.org/10.3390/e24091246
Submission received: 18 July 2022 / Revised: 1 September 2022 / Accepted: 2 September 2022 / Published: 4 September 2022
(This article belongs to the Special Issue Signal and Information Processing in Networks)

Abstract

:
In wireless networks, MAC scheduling methods can be divided into two types according to the implementation model: centralized and distributed scheduling. By reasonably designing MAC scheduling policies, both centralized and distributed schedulers can ensure a reliable throughput capacity region, i.e., realizing throughput-guaranteed. However, it can be found that some existing throughput-guaranteed scheduling schemes cannot further ensure bounded end-to-end average delay, and the reason for this phenomenon has not been deeply analyzed. In practical communication networks, throughput and delay are equally important. Based on this idea, the existing MAC scheduling strategies are investigated systematically in this paper from two aspects of throughput and delay, and their performances are evaluated and compared through both theoretical analysis and simulation experiments. The work of this paper provides a theoretical basis for the improvement of MAC scheduling technology in the next-generation wireless networks.

1. Introduction

Depending on the way of obtaining the permission to use wireless channels, MAC layer protocols for wireless networks can be divided into two categories: competitive protocol and scheduling policy. The characteristic of the competitive protocol is that the node participates in the channel competition to win the permission to use the wireless channel. CSMA/CA protocol in IEEE 802.11 standard is a typical competitive protocol. Differently, the access permission of the wireless channel under the scheduling policy is pre-assigned in order to avoid the competition and conflict in transmission. The essence of MAC scheduling technology is to use STDMA (Space Time Division Multiple Access) to determine the scheduled time-slot for each link and allocate conflicting links into different time-slots [1]. When the network load is heavy or users have high requirements for bandwidth and delay, competitive protocols compete for resources relying on random access, which causes network congestion inevitably. By contrast, the scheduling policy allocates resources more reasonably based on STDMA. On one hand, MAC scheduling can provide higher bandwidth utilization because the link transmission time-slot is determined in advance. On the other hand, a well-designed MAC scheduling strategy can not only ensure reliable throughput performance but also reduce the data transmission delay, which is necessary for services that are sensitive to transmission bandwidth and delay (such as multimedia video) [2]. Therefore, MAC scheduling policy would become the first choice of MAC layer protocol in the next-generation wireless network systems.
Currently, widely used wireless networks can be classified into two types: centralized and distributed networks. A centralized network requires a central node for network control and management, such as CN (cellular networks). In distributed architecture, network nodes complete resource allocation by themselves, such as MANET (mobile ad hoc networks), WSN (wireless sensor networks) and WMN (wireless mesh networks). In order to adapt to different network architectures, a series of centralized and distributed MAC scheduling strategies have been proposed. One of the important criteria for evaluating the performance of MAC scheduling is the strong or weak stability of network systems. Reasonable MAC scheduler can maintain the strong or weak stability of the network system. When the input load locates within a certain capacity region, the system is defined as weakly stable [3] if the network can bear the effective throughput of all data packets. A scheduling policy is considered to be throughput-guaranteed as long as it keeps the network weakly stable under some interference model. Furthermore, the network system remains strongly stable if the end-to-end transmission delay can be upper bounded on the basis of ensuring weak stability [4]. Studies show that strong stability can significantly reduce the transmission delay of business flows from source to destination compared with weak stability, which improves the throughput efficiency and user experience [5]. At present, a series of research achievements have been made on designing MAC scheduling strategies to ensure strong/weak stability of wireless networks, which are elaborated in the Section 2.
In addition, some researchers aim at extending MAC scheduling methods from single-channel networks to multi-channel networks. In multi-channel environment, the spectrum resource is divided into multiple non-overlapping channels, and the wireless interface (network card) of the node can choose one channel to complete communication. In this way, links in the same area are able to utilize different channels to transmit data simultaneously without interference. Hence, conflicts are avoided and the bandwidth is increased [6]. When a wireless node is configured with multiple interfaces, it can send and receive message at the same time-slot, which further improves the resource utilization [7]. The multi-channel data transmission is shown in Figure 1. In the physical layer, MIMO (Multiple Input and Multiple Output) and CR (Cognitive Radio) provide technical support for use of multiple channels. However, the application of multi-channel technology brings more complicated problems from hardware and software implementation. Due to channel difference and interface conflicts, it seems to be more difficult to design throughput-guaranteed MAC scheduling strategies for multi-channel wireless networks than for single-channel networks [8]. A series of MAC scheduling methods ensuring QoS (Quality of Service) have been proposed for multi-channel networks, which will be elaborated in the Section 2.
This paper focuses on MAC scheduling policies in single-channel and multi-channel wireless networks, proposes a complete MAC scheduling performance evaluation system, and uses this system to evaluate the throughput and delay performance of the existing typical wireless MAC scheduling policies. The rest of this paper is organized as follows. Section 2 introduces the existing centralized and distributed MAC scheduling strategies in both single-channel and multi-channel scenarios. Section 3 gives the judgment theorems of weak stability and strong stability of the networks, which constitute the performance evaluation system of MAC scheduling strategies. In Section 4, the throughput and delay performances of the existing MAC scheduling methods are analyzed. Section 5 completes the computer simulation experiments to verify the theoretical analysis. Finally, we conclude in Section 6. To improve readability, the acronyms used in the paper are listed in Table 1.

2. Existing MAC Scheduling Policies

This section comprehensively investigates and analyzes the existing typical MAC scheduling strategies proposed by researchers in recent years from three aspects: centralized scheduling under single-channel networks, distributed scheduling under single-channel networks, and scheduling for multi-channel networks.

2.1. Centralized Scheduling for Single-Channel Networks

A centralized MAC scheduling policy applies to the scenario with a control center. The central node (or base station) allocates the resources. Aiming at designing throughput-guaranteed centralized scheduling algorithms in single-channel networks, Tassiulas and Ephremides proposed a single-path-based Maximum Weighted Scheduler (MWS) [9] and a Back-Pressure Scheduler (BPS) for multipath environments [10]. Both MWS and BPS are proven to achieve the maximum throughput capacity region, which is the union of capacity regions realized by all possible scheduling mechanisms. In order to reduce the implementation complexity of MWS, Lin et al. proposed a Greedy Maximal Matching (GMM) algorithm that can realize centralized scheduling with much lower complexity than the MWS [11]. Ghiasian and Kar et al. described the delay performance of MWS based on the coloring number in graph theory and pointed out that MWS can guarantee the tightness of the upper bound of average delay only when the network topology is regular graphics [12,13]. Zhang et al. developed a Delay-enhanced Maximum Weight Scheduler (DMWS) based on specific load factors and proved that a DMWS can achieve the tightness of the upper bound of average delay under any network topology [14]. In addition, Alper et al. used a claw-free conflict graph to reduce the implementation complexity of the MWS algorithm and ensure transmission delay [15]. It can be seen from the above research results that both the throughput and delay performances of the centralized scheduling strategy for single-channel networks have been analyzed and improved.

2.2. Distributed Scheduling for Single-Channel Networks

For network architectures such as WSN, WMN and MANET where there is no central control node in the network, using the distributed MAC scheduling strategy is obviously more suitable than the centralized scheduling policy. In single-channel environments, Wu and Joo et al. considered the different interference models and proposed the distributed Maximal Scheduler (MS) [16,17]. It was proven that MS can achieve a reliable throughput capacity region with much lower implementation complexity than that of the centralized MWS algorithm. In order to further reduce the complexity of the distributed scheduler, Gupta and Zhang et al. proposed a Queue-Length Scheduler (Q-SCHED) based on random access technology under which each node sends data selectively according to a pre-calculated probability [18,19]. Q-SCHED can guarantee a throughput capacity region arbitrarily close to MS, and its implementation complexity does not increase with the number of network links. Based on this feature, Q-SCHED is more suitable for deployment in large-scale intensive wireless distributed networks. Furthermore, Bermond et al. put forward a throughput-guaranteed cross-layer scheme that combines Q-SCHED in the MAC layer and a path selection mechanism in the network layer for a multi-hop multi-path environment [20]. Both MS and Q-SCHED can maintain the weak stability of the network when the input load locates inside the capacity region. However, it has not been analyzed and verified whether the distributed MS and Q-SCHED can provide bounded end-to-end delay.

2.3. Scheduling for Multi-Channel Networks

Because of the utilization of multiple non-overlapping orthogonal channels in a multi-channel network environment, the channel and interface allocation need to be considered, which brings a technical challenge to the design of an efficient MAC scheduling strategy. For centralized scheduling, Lin and Choi et al. proved that both MWS and GMM used in single-channel networks can be extended straightforward to multi-channel networks without performance loss [21,22]. However, for distributed MAC scheduling, the direct extension of the single-channel scheduler to the multi-channel environment may lead to an extremely poor throughput performance due to the existence of channel differences [23]. Therefore, Lin and Zhang et al. designed a distributed Single-Path (SP) scheme for a single-path data flow scenario and its extension version Multi-Path (MP) policy for flows with multiple paths [24,25]. SP and MP utilize the idea of relay forwarding to complete data allocation and channel assignment simultaneously in the scheduling phase. Bhandari et al. developed a strategy without relay forwarding in multi-channel single-interface networks where each node is equipped with only one network card [26]. Cheng et al. proposed an improved mathematical model by using tuples. Based on this model, the single-channel MS strategy can be directly extended to multi-channel networks without a loss of throughput performance [27]. Zhang et al. developed a Distributed Algorithm with Low Complexity (DA-LC) for a multi-channel multi-interface environment by using the idea of single-channel Q-SCHED policy [28]. Moreover, a Low-Complexity distributed Channel assignment and Scheduling (LDCS) policy using packet information exchange technology in multi-channel single-interface WSN was proposed in [29]. The implementation complexity of DA-LC or LDCS does not increase with the network size. Through analysis, one can obtain that the above-mentioned distributed strategies for multi-channel networks are throughput-guaranteed. However, the delay performance is still unknown and needs further analysis.

2.4. Main Contribution

As we can see, designing a QoS-guaranteed MAC scheduling technology for wireless networks has attracted extensive attention, and a well-designed MAC scheduler has become an important technical means for solving the problem of resource allocation in wireless networks. In both single-channel and multi-channel networks, the existing centralized scheduling strategies are considered to achieve strong stability of the networks. As to distributed scheduling, the above-mentioned algorithms including MS, Q-SCHED, SP, MP, Tuple-based MS, DA-LC and LDCS can ensure the weak stability of the network when the input load locates within the throughput capacity region. However, whether these distributed policies can further ensure strong stability of the networks, relevant studies have not reached corresponding conclusions. In this paper, a complete MAC scheduling policy performance evaluation system is proposed, which consists of the principles and judgment theorems of network stability. Based on the evaluation system, both throughput and end-to-end delay performances of MAC scheduling policies in single-channel and multi-channel networks can be explored in depth. Thus, the performances of the existing typical scheduling strategies are comprehensively investigated in this paper from two aspects of theoretical analysis and simulation experiments. The simulation experiments validate our theoretical analysis. The work of this paper provides strong theoretical support and experimental data for the subsequent improvement and application of MAC scheduling technology in the next-generation networks.

3. Performance Evaluation Mechanism of MAC Schedulers

This section introduces the queue update and stability models of wireless networks. Furthermore, the judgment theorems of network stability are presented that provide the theoretical basis for analyzing the throughput and delay performances of MAC scheduling strategies.

3.1. Queue Update Model

Packets sent from the source node must be queued and forwarded to the destination node. The MAC scheduling method divides the time axis into time-slots and completes the input and output of the queue in each time-slot. Nodes are required to maintain data queues in both single-channel and multi-channel networks. The queue update action includes the arriving and sending of packets. According to the scheduling algorithm, when a queue is scheduled in this time-slot, data will leave the queue and be sent to the destination or to the next-hop node. Let Al(n) represent the number of packets arriving at link l at time-slot n and the value of Al(n) in each time-slot constitute a stochastic arrival process {Al(n)}. We usually assume that the random variables Al(n) in different time-slots are independent and identically distributed (i.i.d.) with a mean of λl. It is further assumed that secondary moment is bounded, that is, we have Cov(Al(n), Ak(n)) < ∞ for any two links l and k. Hence, the average input load of the system is λ = [λ1, …, λL]. Let ql(n) denote the queue length of link l in time-slot n. Assume that the capacity of link l is fixed and denoted by cl. Indicator variable 𝜑l(n) is used to indicate whether link l is scheduled in time-slot n. If l is scheduled and ql(n) > 0, 𝜑l(n) = 1; otherwise, 𝜑l(n) = 0. Thus, the queue update process of any link l is shown in Figure 2.
The queue update process can be expressed as
q l ( n + 1 ) = q l ( n ) + A l ( n ) φ l ( n ) c l +
where []+ is the projection on [0,∞). It can be seen from Equation (1) that the infinite discrete state stochastic process q(n) = {ql(n), l = 1, …, L} constituted by all queue lengths is an irreducible and non-periodic Discrete Time Markov Chain (DTMC).

3.2. Stability Model

For wireless networks, weak/strong stability is an important basis for evaluating network performance, which directly determines the throughput and end-to-end delay of data flows. The following two theorems give definitions of weak stability and strong stability, respectively.
Theorem 1.
For any υ > 0, if there exists a constant  Ψ > 0 such that
lim n Pr l = 1 L q l ( n ) 2 > Ψ < υ
holds, the whole system is considered as weakly stable [4] where Pr{S} represents the probability of event S.
Theorem 1 is actually Definition 2 in reference [4], which implies that weak stability can maintain the queue lengths finite. That is, the network system can bear the current input load and guarantee 100% throughput under the condition of weak stability. However, weak stability cannot further provide bounded end-to-end delay. In order to analyze the delay performance, the following theorem is introduced.
Theorem 2.
For wireless networks, if the queue lengths satisfy
lim sup n 1 n σ = 1 n l = 1 L E q l ( σ ) < ,
then the network is considered to be strongly stable where E[] denotes the expectation.
Theorem 2 is actually Definition 3 in reference [4]. If strong stability is satisfied, we have according to Little’s Law [30]:
D ¯ = lim sup n 1 n σ = 1 n l = 1 L E q l ( σ ) l = 1 L λ l < .
where D ¯ denotes the end-to-end average delay of all data flows. Hence, strong stability can guarantee an upper bound of the end-to-end average delay of data flows and can provide better network QoS than the weak stability state.

3.3. Judgment Theorems of Network Stability

Lyapunov analysis method [31] is always used to analyze the performance of a network queue system. A Lyapunov function is required to be constructed, which is defined as a nonnegative scalar measure function containing the information of all queue lengths in the network. Network performance is evaluated according to how much it affects the Lyapunov function between time-slots. For example, we can define the following Lyapunov function V(n) as
V ( n ) = l = 1 L c l [ q l ( n ) ] 2 .
In network queue analysis, it is usually assumed that the queue length at the initial time is finite, that is, E[ql(0)] < ∞, for any l ∈ {1, ..., L}.

3.3.1. Judgment Theorem of Weak Stability

After the Lyapunov function is constructed, Foster’s Criterion is needed to determine the weak stability of the system [32]. The criterion is applied to Markov queues with infinite nonperiodic countable states and provides a method for judging the positive recurrence and ergodicity of the Markov chains. The criterion is described as follows.
Criterion 1.
For positive integer H and constant ϵ , if there exists a nonnegative Lyapunov function V(n) > 0 and a setΓ0 with finite states such that
E [ V ( n + H ) V ( n ) q ( n ) ] < if   q ( n ) Γ 0 E [ V ( n + H ) V ( n ) q ( n ) ] < ϵ if   q ( n ) Γ 0
holds for any time-slot n, then the aperiodic countable Markov chain (n) is positive recurrent and ergodic where E[V(n + H) q V(n) │(n)] is defined as Lyapunov drift.
According to Theorem 1, weak stability can be attained if the Markov chain q(n) is positive recurrent [4]. Therefore, Foster’s criterion is the standard criterion for judging the weak stability of the network system.

3.3.2. Judgment Theorem of Strong Stability

The Judgment of strong stability is not premised on Foster’s criterion, which is described as follows.
Criterion 2.
If there exists a positive integer H > 0 such that E{q(τ)} < ∞ holds for τ∈ {0,⋯, H−1} and simultaneously for any time-slot n,
E [ V ( n + H ) V ( n ) q ( n ) ] B ϵ l = 1 L q l ( n )
holds for some B > 0,  ϵ > 0, then the network system is strongly stable and the upper bound of the sum of average queue lengths is given by
lim sup n 1 n τ = 0 n 1 l = 1 L E [ q l ( τ ) ] B ϵ .  
For the proof of Criterion 2, one can refer to [33]. According to Theorem 2 and Little’s Law, inequality (8) leads to an upper-bounded end-to-end average delay. If (7) is satisfied, then for any δ > 0 we have l = 1 L q l ( n ) ( B + δ ) / ϵ and E [ V ( n + H ) V ( n ) q ( n ) ] δ hold. In other words, Criterion 2 can guarantee that the Lyapunov drift is negative when the queue lengths in the system are extremely large. Define a bounded state space as
Γ 0 = q ( n ) 0 l = 1 L q l ( n ) ( B + δ ) / ϵ .
It can be seen that if q(n) ∈ Γ0, we have E[V(n + H) V(n)│q(n)] < ∞; otherwise, if q(n) ∉ Γ0, E[V(n + H) V(n)│q(n)] δ. Based on Criterion 1, weak stability can be deduced. Therefore, strong stability can lead to weak stability, not vice versa.
In this paper, we use Ω to represent the maximum throughput capacity region that can be ensured by any scheduling strategy. Under a particular MAC scheduling mechanism, if the network system remains weakly stable when the input load λγ Ω (0 < γ < 1), the scheduling policy is then considered to be throughput-guaranteed and its efficiency ratio is γ. In fact, the efficiency ratio γ determines the throughput performance of a MAC scheduling policy.

4. Throughput and Delay Analysis of Typical MAC Scheduling Policies

This section uses Criterion 1 and Criterion 2 to evaluate the throughput and delay performances of several typical scheduling policies.

4.1. Performance Analysis of Scheduling Policies for Single-Channel Networks

For centralized scheduling in single-channel networks, the performance of the MWS [9] algorithm is analyzed. For distributed scheduling, we evaluate the performances of the MS [16] and the Q-SCHED strategies [18], respectively.

4.1.1. Performance Evaluation of MWS

Algorithm implementation: In each time-slot n, the central control node in the network determines the schedule φ MWS according to the following formula:
φ MWS = arg max φ S l = 1 L q l ( n ) c l φ l ( n )
where S represents the set of all possible schedules under a particular interference model and the schedule vector φ = [φ1(n), …, φL(n)]. Obviously, the realization of MWS requires a central node to execute the scheduling process on the premise of knowing all the queue length information in the network and to determine the schedule in each time-slot through Equation (10). Hence, the implementation complexity of MWS is high.
Performance evaluation of MWS: Assume that the input load vector λ locates strictly inside the maximum capacity region. That is, there exists an L-dimensional vector ε with all elements equal to ε such that λ + ε ∈ Ω holds. For time-slot n, the following Lyapunov function is constructed as
V ( n ) = l = 1 L [ q l ( n ) ] 2 .
Then, one-step Lyapunov drift Δ ( q ( n ) ) = E [ V ( n + 1 ) V ( n ) q ( n ) ] can be upper bounded by
Δ ( q ( n ) ) E A l ( n ) φ l ( n ) 2 2 ε l = 1 L E q l ( n )
Thus, one can refer to Theorem 1 in reference [34] and obtain that
lim sup n 1 n τ = 0 n 1 l = 1 L E [ q l ( τ ) ] lim sup n 1 n τ = 0 n 1 l = 1 L E A l ( τ ) φ l ( τ ) 2 2 ε < .
Therefore, the network is strongly stable according to Theorem 2. Under the stability condition, we have lim sup n 1 n τ = 0 n 1 l = 1 L E [ φ l ( τ ) ] = λ l and (13) can be rewritten as
lim sup n 1 n τ = 0 n 1 l = 1 L E [ q l ( τ ) ] l = 1 L λ l + l = 1 L E A l ( n ) 2 2 l = 1 L λ l 2 2 ε .
Using Little’s Law, the upper bound of the average delay D ¯ is given by
D ¯ l = 1 L λ l + l = 1 L E A l ( n ) 2 2 l = 1 L λ l 2 2 ε l = 1 L λ l .
It can be seen from the analysis above that MWS can achieve the maximum capacity region and can ensure the strong stability of the network when the input load locates inside the capacity region. The upper bound of average end-to-end delay is given by (15), which depends on the arrival rates and the parameter ε.

4.1.2. Performance Evaluation of MS

Algorithm implementation: MS is a typical distributed scheduling strategy. Under MS, any queue that meets ql(n) > cl is scheduled in time-slot n unless another queue in its interference set I(l) has already been scheduled. Hence, employing MS can ensure
k I ( l ) q k ( n ) c k 1 .
holds for each link l. MS does not require the centralized control node and each link decides whether to participate in the data transmission at the current time-slot. The implementation complexity of MS is much lower than that of the MWS policy.
Performance evaluation of MS: Assume that k I ( l ) λ k < 1 holds for each link l, we use the following Lyapunov function:
V ( n ) = l = 1 L q l ( n ) k I ( l ) q k ( n ) .
Then the one-step Lyapunov drift Δ ( q ( n ) ) satisfies
Δ ( q ( n ) ) = E [ V ( n + 1 ) V ( n ) q ( n ) ] = 2 ω l = 1 L q l ( n ) + B .
where ω and B are positive numbers and ω = 1 max l k I ( l ) λ k . Thus, according to Criterion 2, the entire network system is strongly stable, and the end-to-end average delay has an upper bound given by
D ¯ = lim sup n 1 n τ = 0 n 1 l = 1 L E [ q l ( τ ) ] l = 1 L λ l B 2 ω l = 1 L λ l .
Satisfying k I ( l ) λ k < 1 implies that MS is throughput-guaranteed and the efficiency ratio of MS is 1/K, where K is the interference degree [17].

4.1.3. Performance Evaluation of Q-SCHED

Algorithm implementation: Different from MS, the distributed Q-SCHED strategy divides each time-slot into scheduling-slot and transmission-slot, and further divides the scheduling-slot into M mini-slots, as shown in Figure 3.
In each time-slot, link l picks the backoff time from the set {1, 2, …, M + 1} according to the following probability:
Pr I = M + 1 = e p l Pr I = m = e p l m 1 M e p l m M m = 1 , 2 , , M .
where I represents the backoff time selected by l and the parameter pl is calculated by
p l = log M q l ( n ) c l max j I ( l ) k I ( j ) q k ( n ) c k .
Picking M + 1 means that the link is not scheduled in this time-slot. Once the backoff time expires, the link starts transmitting unless there have been other links in its interference set that are sending data.
Performance evaluation of Q-SCHED: We introduce the following Lyapunov function:
V ( n ) = max l L j I ( l ) q j ( n ) r j .
For some μ > 0, if the input load of the network satisfies
j I ( l ) λ j r j < 1 log M + 1 M 4 μ
then there exists a positive constant Φ and a positive integer H such that [18]
E V ( n + H ) V ( n ) q ( n ) < 0
holds for V(n) ≥ Φ. Since {q(n): V(n) < Φ} is a set with finite states, we can obtain that the Markov chain {q(n)} is positive recurrent using Criterion 1. Hence, the network is weakly stable. It should be noted that ensuring weak stability under the condition (23) implies that the Q-SCHED policy is throughput-guaranteed. However, strong stability is not achieved, and Q-SCHED cannot provide a bounded end-to-end average delay. On the other hand, based on the random access technology as shown in Figure 3, the implementation complexity of Q-SCHED does not increase with the number of network links and nodes. In contrast, the MS strategy adopts the maximum matching mechanism that requires O(logL) number of iterations [18].

4.2. Performance Analysis of Scheduling Policies for Multi-Channel Networks

For scheduling in multi-channel networks, performances of the straightforward extension of MWS [22], distributed Tuple-based MS [27] and DA-LC [28] are evaluated, respectively.

4.2.1. Performance Evaluation of the Straightforward Extension of MWS

Algorithm implementation: MWS in single-channel networks can be directly extended to multi-channel networks. Similar to MWS, the scheduling indicator vector φ MWS is calculated by the central control node in each time-slot n according to
φ MWS = arg max φ S l , c q l ( n ) r l c φ l c ( n )
where r l c indicates the transmission rate of link l operating on channel c and φ l c ( n ) denotes the scheduling indicator variable by taking 1 when link l is scheduled on channel c, and 0 otherwise.
Performance evaluation: Literature [22] has proved that when the input load locates within the maximum capacity region, the positive recurrence of the Markov chain {q(n)} can be achieved. That is, the network system remains weakly stable when λ ∈ Ω. In fact, if we construct the following Lyapunov function
V ( n ) = l = 1 L [ q l ( n ) ] 2
it is not difficult to prove by referring to [35] that MWS can also guarantee
lim sup n 1 n τ = 0 n 1 l = 1 L E [ q l ( τ ) ] <
holds in multi-channel environment. Using Little’s Law, the network is strongly stable and can ensure a bounded end-to-end delay.

4.2.2. Performance Evaluation of Tuple-Based MS

Algorithm implementation: Authors of [27] proposed a mathematic model in which each node, channel, and interface are modeled as a Tuple. At the same time, the original links are transformed into Tuple links. Thus, the multi-channel environment can be virtualized into a single-channel network, as shown in Figure 4.
After the Tuple-based model is established, the MS algorithm is implemented based on Tuple links. Suppose I(ζ), qζ(n) and cζ represent the interference set, queue length and capacity of Tuple link ζ respectively. According to MS, we have
γ I ( ζ ) q γ ( n ) c γ 1 .
holds for any Tuple link ζ.
Performance evaluation: To evaluate the performance of Tuple-based MS, the following Lyapunov function is constructed:
V ( n ) = ζ q ζ ( n ) γ I ( ζ ) q γ ( n ) .
If γ I ( ζ ) λ γ < 1 holds for each Tuple link ζ, one can achieve the one-step Lyapunov drift Δ ( q ( n ) ) as
Δ ( q ( n ) ) = E [ V ( n + 1 ) V ( n ) q ( n ) ]   = 2 κ ζ q ζ ( n ) + B 1 .
where κ and B1 are positive numbers and κ = 1 max ζ γ I ( ζ ) λ γ . Thus, according to Criterion 2, the entire network system is strongly stable. Satisfying k I ( l ) λ k < 1 implies that the Tuple-based MS is throughput-guaranteed and the efficiency ratio of is 1/Y, where Y denotes the interference degree under the Tuple-based model.

4.2.3. Performance Evaluation of DA-LC

DA-LC algorithm is a combination of the Tuple-based model and the Q-SCHED strategy in a single-channel network. Specifically, the multi-channel environment is first virtualized into a single-channel network using the transformation process shown in Figure 4. Then, the random-access-based Q-SCHED policy is implemented for the Tuple-based networks. To evaluate the performance of DA-LC, the following Lyapunov function is introduced:
V ( n ) = max ζ γ I ( ζ ) q γ ( n ) r γ .
Then there exists a positive constant Φ and a positive integer H such that
E V ( n + H ) V ( n ) q ( n ) < 0
holds for V(n) ≥ Φ. Hence, the network should be weakly stable by using Criterion 1 under DA-LC. The efficiency ratio of DA-LC can be arbitrarily close to that of Tuple-based MS. Therefore, compared with Tuple-based MS strategy, DA-LC cannot guarantee a bounded end-to-end average delay. However, the implementation complexity of DA-LC is much lower and does not increase with the number of Tuple links since it adopts the random access technology.

5. Simulation

In this section, we use NS-2.31 software to simulate actual network scenarios and compare the throughput and delay performances of several existing wireless scheduling strategies. We use the topology shown in Figure 5, which has 36 nodes and 60 links. There are 16 data flows (represented by arrows) in the topology, and each data flow goes through a one-hop transmission. Assume that all data flows have the same data transmission rate (input load) of λ. In a single-channel environment, all links share one available channel to transmit data. In a multi-channel environment, the interface (network card) of a node can switch between four different channels with the channel capacity of 1, 1, 2, 2 respectively. The simulation parameters adopted in our experiments are shown in Table 2.
Figure 6 shows the throughput performance comparison of the centralized MWS, the distributed MS and the Q-SCHED strategies in single-channel environment. As we can see from the simulation data, the value of the average backlog increases sharply when the input load increases gradually to a certain threshold, which means that the input load has reached the boundary of the throughput capacity region that can be ensured by the scheduling policy. Compared with MS and Q-SCHED, MWS can guarantee a larger capacity region because MWS is a centralized throughput-optimal algorithm. At the same time, the throughput performances of MS and Q-SHCED are very close because the right-hand side of the inequality sign of (9) can arbitrarily approach to 1. In terms of implementation complexity, Q-SCHED has the lowest complexity due to the random access technology whereas the centralized implementation brings a high complexity to MWS.
Figure 7 gives the delay performance comparison of the MWS, MS and Q-SCHED algorithms. It can be seen from the figure that when the input load is small, the average end-to-end delay remains at a low level. When the input load increases further, the average delay increases significantly, indicating that congestion has occurred among the network queues. By comparison, it is found that MWS has the best delay performance, because it always selects the links with a larger queue length for sending data in each time-slot. The delay performance of Q-SCHED is the worst, and the average delay increases rapidly before the input load reaches the capacity boundary. The reason for this phenomenon is that Q-SCHED can only guarantee the weak stability of the network without ensuring strong stability, as analyzed in the previous section.
For a multi-channel network environment, Figure 8 shows the throughput performances of the multi-channel MWS, the Tuple-based MS and the DA-LC scheduling strategies. As we can see from the figure, the maximum throughput capacity region is significantly larger than that of the single-channel network due to the use of multiple channels. At the same time, the centralized MWS still has the best throughput performance of the three algorithms. The Tuple-based MS and the DA-LC both adopt the Tuple-based model and the distributed implementation method, and their throughput performances are close. In addition, the implementation complexity of the DA-LC is much lower than that of the MWS and Tuple-based MS.
Figure 9 shows the end-to-end average delay performance of the MWS, Tuple-based MS and DA-LC algorithms. According to the analysis in the previous section, the MWS and Tuple-based MS can guarantee the strong stability of the network, whereas the DA-LC can only ensure the weak stability. Therefore, the delay performance of the MWS and Tuple-based MS is much better than that of the DA-LC, which can be clearly reflected in the figure. It can be obtained from the simulation experiments that the delay performance of the single-channel Q-SCHED or the multi-channel DA-LC scheduling policy is worse than that of other comparable scheduling algorithms. However, the implementation complexity of Q-SCHED or DA-LC does not increase with the network size. Hence, one can understand that they sacrifice delay for the reduction of complexity.

6. Conclusions

In the next-generation wireless networks, MAC scheduling is becoming the preferred technology of MAC layer. In order to better design the scheduling algorithms and verify their performances in different scenarios, this paper summarizes a complete set of methods, including the concepts of strong/weak stability and their judgment methods. By using these methods, this paper analyzes the performances of typical MAC scheduling policies, including throughput performance and delay performance. Through theoretical analysis and simulation experiments, we verify that strong stability can provide lower end-to-end delay than weak stability in both single-channel and multi-channel networks. The research work of this paper provides a theoretical basis for the design and evaluation of MAC scheduling policies.

Author Contributions

Conceptualization, F.Z. and G.Y.; methodology, G.Y.; software, B.L.; validation, F.Z., G.Y. and B.L.; formal analysis, F.Z.; investigation, G.Y.; resources, B.L.; writing—original draft preparation, F.Z.; writing—review and editing, G.Y.; supervision, B.L.; project administration, F.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

This work was jointly supported by the Major Basic Research Program of the Shandong Provincial Natural Science Foundation (ZR2020ZD01), the Doctoral Research Funds of Shandong Management University (Grant No. SDMUD201906), QiHang Research Project Funds of Shandong Management University (Grant No. QH2020Z01), the National Natural Science Foundation of China (Grant No. 61901191), the Shandong Provincial Natural Science Foundation (Grant No. ZR2020LZH005) and the China Postdoctoral Science Foundation (Grant No. 2022M713668).

Conflicts of Interest

Fan Zhang, Baozhu Li and Gangqiang Yang contributed equally to this work and the authors declare no conflict of interest.

References

  1. Igor, K.; Abhishek, S.; Eytan, M. Scheduling Algorithms for Optimizing Age of Information in Wireless Networks With Throughput Constraints. IEEE/ACM Trans. Netw. 2019, 27, 1359–1372. [Google Scholar]
  2. Meng, Q.; Qinghai, Y.; Jian, Y.; Kyung, S.K.; Ramesh, R.R. Throughput of QoS Guaranteed Wireless Systems With/Without Channel State Information. IEEE Trans. Veh. Technol. 2017, 66, 5839–5852. [Google Scholar]
  3. McKeown, N.; Mekkittikul, A.; Anantharam, V.; Walrand, J. Achieving 100% throughput in an input-queued switch. IEEE Trans. Commun. 1999, 47, 1260–1267. [Google Scholar] [CrossRef]
  4. Leonardi, E.; Mellia, M.; Neri, F.; Marsan, M.A. On the stability of input-queued switches with speed-up. IEEE/ACM Trans. Netw. 2001, 9, 104–118. [Google Scholar] [CrossRef]
  5. Capone, A.; Li, Y.; Pióro, M.; Yuan, D. Minimizing end-to-end delay in multi-hop wireless networks with optimized transmission scheduling. Ad Hoc Netw. 2019, 89, 236–248. [Google Scholar] [CrossRef]
  6. Chuchu, D.; Shengzhong, F.; Fengqi, Y. Performance optimisation of multichannel MAC in large-scale wireless sensor network. Int. J. Sens. Netw. 2022, 38, 12–24. [Google Scholar]
  7. Omid, A.; Amin, P. Prioritized multi-channel MAC protocol in ad hoc networks using a TDMA/CSMA approach. Wirel. Netw. 2021, 27, 2629–2640. [Google Scholar]
  8. Nadhem, S.E.; Mohammad, T.Q. EMCSS: Efficient multi-channel and time-slot scheduling. Wirel. Netw. 2021, 27, 2879–2890. [Google Scholar]
  9. Tassiulas, L.; Ephremides, A. Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks. IEEE Trans. Autom. Control. 1992, 37, 1936–1948. [Google Scholar] [CrossRef]
  10. Tassiulas, L. Scheduling and performance limits of networks with constantly changing topology. IEEE Trans. Inf. Theory 1997, 43, 1067–1073. [Google Scholar] [CrossRef]
  11. Lin, X.; Shroff, N.B. The Impact of Imperfect Scheduling on Cross-Layer Congestion Control in Wireless Networks. IEEE/ACM Trans. Netw. 2006, 14, 302–315. [Google Scholar]
  12. Ghiasian, A.; Saidi, H.; Omoomi, B.; Amiri, S. The impact of network topology on delay bound in wireless Ad hoc networks. Wirel. Netw. 2013, 19, 237–246. [Google Scholar] [CrossRef]
  13. Kar, K.; Sarkar, S.; Ghavami, A.; Luo, X. Delay guarantees for throughput-optimal wireless link scheduling. IEEE Trans. Autom. Control. 2012, 57, 2906–2911. [Google Scholar] [CrossRef]
  14. Fan, Z.; Yewen, C. Throughput-optimal scheduler with tight delay upper bound for wireless networks. IEICE Commun. Express 2014, 3, 92–97. [Google Scholar]
  15. Alper, K.; Hakan, G.; Noyan, E.; Kaan, G.; Muriel, M. A Novel Method for Scheduling of Wireless Ad Hoc Networks in Polynomial Time. IEEE Trans. Wirel. Commun. 2021, 20, 468–480. [Google Scholar]
  16. Wu, X.; Srikant, R.; Perkins, J.R. Scheduling Efficiency of Distributed Greedy Scheduling Algorithms in Wireless Networks. IEEE Trans. Mob. Comput. 2007, 6, 595–605. [Google Scholar] [CrossRef]
  17. Joo, C.; Lin, X.; Shroff, N. Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm. IEEE/ACM Trans. Netw. 2009, 17, 1132–1145. [Google Scholar]
  18. Gupta, A.; Lin, X.; Srikant, R. Low-Complexity Distributed Scheduling Algorithms for Wireless Networks. IEEE/ACM Trans. Netw. 2009, 17, 1846–1859. [Google Scholar] [CrossRef]
  19. Zhang, F.; Cao, Y.; Wang, D. A Note on “Low-Complexity Distributed Scheduling Algorithms for Wireless Networks”. IEEE/ACM Trans. Netw. 2015, 23, 1367–1369. [Google Scholar]
  20. Bermond, J.C.; Mazauric, D.; Misra, V.; Nain, P. Distributed Link Scheduling in Wireless Networks. Discret. Math. Algorithms Appl. 2020, 12, 2050058. [Google Scholar] [CrossRef]
  21. Lin, X.; Rasool, S. A Distributed Joint Channel-Assignment, Scheduling and Routing Algorithm for Multi-Channel Ad-hoc Wireless Networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Barcelona, Spain, 6–12 May 2007. [Google Scholar]
  22. Choi, J.; Choi, G. Optimal Scheduler with Simplified Queue Structure for Multi-Channel Wireless Networks. IEEE Commun. Lett. 2011, 15, 962–964. [Google Scholar] [CrossRef]
  23. Ozge, U.; Ibrahim, K. Multi-channel TDMA Scheduling in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Netw. 2019, 43, 109–138. [Google Scholar]
  24. Lin, X.; Rasool, S. Distributed and Provably-Efficient Algorithms for Joint Channel-Assignment, Scheduling and Routing in Multi-Channel Ad Hoc Wireless Networks. IEEE/ACM Trans. Netw. 2009, 17, 1874–1887. [Google Scholar]
  25. Zhang, F.; Cao, Y. Feasible routing selection mechanism in multichannel wireless networks. Electron. Lett. 2014, 50, 402–403. [Google Scholar] [CrossRef]
  26. Bhandari, V.; Vaidya, N. Scheduling in multichannel wireless networks. Springer Distrib. Comput. Netw. 2010, 5935, 6–17. [Google Scholar]
  27. Cheng, Y.; Li, H.; Shila, D.; Cao, X. A Systematic Study of Maximal Scheduling Algorithms in Multiradio Multichannel Wireless Networks. IEEE/ACM Trans. Netw. 2015, 23, 1342–1355. [Google Scholar] [CrossRef]
  28. Zhang, F.; Xu, X.; Xie, L.; Liu, J. Distributed channel-assignment and scheduling algorithm for multi-channel networks. IEICE Communications Express 2019, 8, 43–48. [Google Scholar] [CrossRef]
  29. Xu, X.; Zhang, F.; Yang, G.; Xie, L.; Liu, Q.; Li, B. Throughput-Guaranteed Distributed Channel Assignment and Scheduling Algorithms with Low Complexity for Multichannel Wireless Sensor Networks. J. Sens. 2019, 2019, 6171625. [Google Scholar] [CrossRef]
  30. Sanyam, M. Performance Analysis and Optimization with Little’s Law. In Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), Singapore, 22–24 May 2022. [Google Scholar]
  31. Wassim, M.H.; Junsoo, L. Lyapunov theorems for stability and semistability of discrete-time stochastic systems. Automatica 2022, 142, 110393. [Google Scholar]
  32. Izabella, V.; Lokshina, C.; Lanting, J.M. Analysis of Queueing Networks in Equilibrium: Numerical Steady-State Solutions of Markov Chains. Int. J. Interdiscip. Telecommun. Netw. 2020, 12, 1–17. [Google Scholar]
  33. Neely, M.; Modiano, E.; Rohrs, E. Dynamic power allocation and routing for time varying wireless networks. IEEE J. Sel. Areas Commun. Spec. Issue Wirel. Ad-Hoc Netw. 2005, 23, 89–103. [Google Scholar] [CrossRef]
  34. Neely, M. Delay analysis for maximal scheduling in wireless networks with bursty traffic. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Phoenix, AZ, USA, 13–18 April 2008. [Google Scholar]
  35. Gupta, G.; Shroff, N. Delay Analysis for Wireless Networks With Single Hop Traffic and General Interference Constraints. IEEE/ACM Trans. Netw. 2010, 18, 393–405. [Google Scholar] [CrossRef]
Figure 1. Multi-channel data transmission.
Figure 1. Multi-channel data transmission.
Entropy 24 01246 g001
Figure 2. Queue Update Process in Wireless Networks.
Figure 2. Queue Update Process in Wireless Networks.
Entropy 24 01246 g002
Figure 3. Time-slot Division under Random Access Mechanism.
Figure 3. Time-slot Division under Random Access Mechanism.
Entropy 24 01246 g003
Figure 4. Transformation Process of Tuple-based Model.
Figure 4. Transformation Process of Tuple-based Model.
Entropy 24 01246 g004
Figure 5. Network Topology for Experiments.
Figure 5. Network Topology for Experiments.
Entropy 24 01246 g005
Figure 6. Throughput Performance Comparison of MWS, MS and Q-SCHED.
Figure 6. Throughput Performance Comparison of MWS, MS and Q-SCHED.
Entropy 24 01246 g006
Figure 7. Delay Performance Comparison of MWS, MS and Q-SCHED.
Figure 7. Delay Performance Comparison of MWS, MS and Q-SCHED.
Entropy 24 01246 g007
Figure 8. Throughput Performance Comparison of MWS, Tuple-based MS and DA-LC.
Figure 8. Throughput Performance Comparison of MWS, Tuple-based MS and DA-LC.
Entropy 24 01246 g008
Figure 9. Throughput Performance Comparison of MWS, Tuple-based MS and DA-LC.
Figure 9. Throughput Performance Comparison of MWS, Tuple-based MS and DA-LC.
Entropy 24 01246 g009
Table 1. List of acronyms used in this paper.
Table 1. List of acronyms used in this paper.
AcronymExplanation
STDMASpace Time Division Multiple Access
CNcellular networks
MANETmobile ad hoc networks
WSNwireless sensor networks
WMNwireless mesh networks
MIMOMultiple Input and Multiple Output
CRCognitive Radio
MWSMaximum Weighted Scheduler
BPSBack-Pressure Scheduler
GMMGreedy Maximal Matching
MSMaximal Scheduler
Q-SCHEDQueue-Length Scheduler
SPSingle-path scheduler in multichannel networks
MPMulti-path scheduler in multichannel networks
DA-LCDistributed Algorithm with Low Complexity
Tuple-based MSTuple-based Maximal Scheduler
DTMCDiscrete Time Markov Chain
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParameterValue
SoftwareNS-2.31
Simulation time300 s
Number of nodes36
Radio frequency2.4 GHz
Number of links60
Number of channels4
Simulation terrain500 m × 500 m
Path-loss modelTwo-ray
Bandwidth100 MHz
Number of flows16
Data sessionsCBR
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, F.; Li, B.; Yang, G. Research on Throughput-Guaranteed MAC Scheduling Policies in Wireless Networks. Entropy 2022, 24, 1246. https://doi.org/10.3390/e24091246

AMA Style

Zhang F, Li B, Yang G. Research on Throughput-Guaranteed MAC Scheduling Policies in Wireless Networks. Entropy. 2022; 24(9):1246. https://doi.org/10.3390/e24091246

Chicago/Turabian Style

Zhang, Fan, Baozhu Li, and Gangqiang Yang. 2022. "Research on Throughput-Guaranteed MAC Scheduling Policies in Wireless Networks" Entropy 24, no. 9: 1246. https://doi.org/10.3390/e24091246

APA Style

Zhang, F., Li, B., & Yang, G. (2022). Research on Throughput-Guaranteed MAC Scheduling Policies in Wireless Networks. Entropy, 24(9), 1246. https://doi.org/10.3390/e24091246

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop