Res Alloc Qos
Res Alloc Qos
Abstract- For wireless ad hoc networks with mul- P 1 As a special case of resource allocation, the power con-
tihop transmissions and Rayleigh fading, this paper trol of user nodes are optimized to maximize the overall
maximizes the overall system throughput subject to system throughput.
QoS constraints on power, probability of outage, and P 2 Turning to the general cases, feasibility of service level
data rates. Formulations are also given which mini- agreement (SLA) terms are determined under network
mize delay and optimize network resources in a wire- resource constraints.
less ad hoc network, where each link is shared by mul-
tiple streams of traffic from different QoS classes, and P 3 Taking delay into consideration, the total delay for the
each traffic traverses many links. Although these opti- most time sensitive class of traffic is minimized by opti-
mal resource allocation problems are non-linear, they mizing over powers, capacities, and SLA terms.
can be posed as geometric programs, which are trans- P 4 Optimizing over powers, capacities, and SLA terms; the
formed into convex optimizations, and can be solved unused capacity of the network is maximized.
globally and efficiently through interior-point meth-
ods. Because the mobile radio channel is fast varying and the
number of user nodes is large, a fast and robust decision mak-
ing algorithm is needed that accommodates a large number of
I. Introduction variables for dynamic resource allocation to be feasible. Sev-
eral ad hoc heuristics have been proposed to tackle the above
Quality of service (QoS) has become an important issue in problem, but they cannot meet all of the following criteria:
various kinds of data networks as some users are no longer sat- optimality, speed, and the ability to accommodate a variety
isfied with resource allocation based on service provisioning. of constraints and a large number of variables. Solutions for
Three major considerations of QoS support are bandwidth, wireless cellular networks have been proposed in [1]. This pa-
delay and delivery guarantee. Voice, data, image, and video per tackles the more difficult problems of resource allocation
have different bandwidth requirements. Some classes of traf- for wireless ad hoc networks.
fic, such as voice, are also much more sensitive to delay than
background classes, such as data. QoS provisioning in a wire- A global solution to non-linear problems P 1 to P 4 is found
by transforming the problems into convex optimization prob-
less network is a particularly difficult issue because physical
layer problems; such as path loss, fading, and multipath; can lems. Solution methods for these problems not only produce
make the communication links unreliable. This makes delivery globally optimal solutions as efficiently as for linear program-
s, but also unambiguously determine feasibility. This second
guarantee a necessary feature in wireless ad hoc network QoS
provisioning. property is used to determine the feasibility and pricing scheme
of admitting a new user with a defined QoS requirement.
The challenge is to first prescribe a feasible QoS scheme for
different classes of traffic, and then to optimize the use of net-
work resources, mainly link capacities and transmitter powers,
II. Convex optimization and geometric
to satisfy QoS requirements for all classes while maximizing
programming
either the total network performance, or the QoS for the pre- An efficient algorithm is needed in order to find the opti-
mier class. Within the wireless arena, ad hoc wireless networks mal solution to the above nonlinear problems in a high speed
pose additional technical challenges for QoS support. Unlike dynamic network with a large number of links and nodes. For-
cellular wireless networks, ad hoc networks have no fixed in- mulations for P 1 to P 4 are provided that can be turned into
frastructure, and long range communications require multihop convex optimizations, which have fast algorithms, such as the
transmissions where a packet is routed through the network interior point method and the primal dual method, that make
by other transceivers that act as relay nodes. them as easy to solve as linear programs.
In sections 3 and 4, the following resource allocation prob- Convex optimization refers to minimizing a convex objec-
lems for QoS provisioning in wireless ad hoc networks are tive function over convex constraint sets. The particular type
solved: of convex optimization used in this paper is in the form of geo-
metric programming [2]. First consider the following definition
1 This work was supported by Hertz Foundation Fellowship and
Stanford Graduate Fellowship.
2 This work was supported by NSF Grant CCR-9973134 and the Definition 1 A monomial is a function h : Rn R, where
Stanford Network Research Center. the domain contains all real vectors with positive components:
OpathS = Prob(outage
Q along the path S)
III. Power control for throughput
= 1 QsS (1
Q Oi ) (9)
optimization 1
= 1 sS k6=s SIRth Gik Pk .
(1+ Gii Pi
)
First a special case of resource allocation optimization is
formulated and solved in this section. The variables are us- The constellation size M used by a hop can be closely ap-
er node powers and the objective is to maximize the overall proximated for MQAM modulation as follows
system throughput in bps. The method in this paper explic-
itly takes into account the statistical variation of the received 1.5
M =1+ SIR (10)
signal and the interference power. ln(5BER)
1.5
where BER is the bit error rate. Defining K = ln(5BER)
leads
A. Multi-hop network model and Rayleigh fading th
to a monotonic expression for the data rate of the i hop as
Consider a wireless ad hoc network with n transmit- a function of the received SIR:
ter/receiver pairs, labeled 1, . . . , n, which transmit at powers
Ri = (1/T ) log2 (1 + KSIRi ) (11)
P1 . . . , Pn . The power received from transmitter j, at receiver
i is given by
The aggregate data rate for the system can then be written
simply as the sum of terms of this form.
Gij Fij Pj (4) P Q
Rsystem = i
Ri = (1/T ) log 2 i
(1 + KSIRi ) (12)
The nonnegative number Gij represents the path gain in
the absence of fading from the j th transmitter to the ith re- Overall system throughput is defined as the maximum aggre-
ceiver. Gij can encompass path loss, shadowing, antenna gain, gate data rate supportable by the system given a set of users
coding gain, and other factors. with defined QoS.
2912
C. Throughput optimization B
maximize Rsystem 3 4
C
subject to
20m
Ri Q Ri,LB , i
1
1 k6=i SIRth Gik Pk P routi i Fig. 1: Network Topology for Simulation
1+
Q Q Gii Pi
1
1 sS k6=s (1+ SIRth Gik Pk )
P rout path s S
G P ii i
Pi Pmax The maximum aggregate data rate, found using the geo-
(13) metric programming optimization method, is R = 216.8kbps,
The objective function is the overall system throughput. It with M = 42.8QAM modulation for each link, Ri = 54.2kbps
is optimized over the set of all feasible powers Pi . The first set for each link, and P1 = P3 = 0.709W and P2 = P4 = 1W
of constraints are the data rates demanded by existing system link transmit powers. The resulting SIR = 21.7dB on each
users. The second set of constraints are the outage probability link. The symmetry in modulation levels and SIR is due to
limitations demanded by users using single hops. The third set the symmetries in the network topology, and not due to any
of constraints are the outage probability limitations for users explicit optimization constraint.
using a multi-hop path. Lastly, the forth set of constraints are
regulatory or system limitations on transmitter powers. E. Admission control and pricing
2913
Consider a network with J links with capacity of Cj pack- constraint, the second one is the delay guarantee constraint
ets per second for each link j. There are K classes of traffic and the third one the delivery probability constraint. The
with different QoS requirements to be transported over the fourth constraint delivers a guaranteed data rate to each class
network. For each QoS class k, the bandwidth required is bk of traffic. The fifth constraint makes room for SLA terms that
Hz, and the delay guarantee in the service level agreement give a class of traffic the sole right to traverse a link j . This
(SLA) is dk,U B seconds. Also, a minimum probability of de- could be for bandwidth requirements or for security reasons.
livering the packet across the unreliable network is required in The sixth constraint allows for SLA terms that specify not just
the SLA, denoted by pk,LB . In this problem formulation the an end to end total delay guarantee, but also an exact delay
delay is the delay due to transmission time; propagation delay requirement for a particular traffic class k on a link j . The
is ignored because it is constant for the optimization parame- other constraints are positivity constraints on the variables,
ters. The more refined model with queueing delay is treated and upper bound constraints on pj .
in the extension. The following parameters are all potential optimization
Similar to the last section, each stream of traffic from variables: bk , nk , pj , Cj , dk,U B and pk,LB . Variables bk , dk,U B
source s to destination d will traverse certain specific links as and pk,LB are terms in the SLA. The link capacities Cj and
dictated by the particular routing protocol used for the net- probability of maintaining a link pj are network resources to
work. Denote by Kj the set of traffic using link j and by Jk be optimized over. Admission control is reflected in nk .
the set of links traversed by QoS class k. Denote by nk the The formulation is a non-linear optimization problem be-
number of packets dynamically admitted in the kth class of cause optimization variables are multiplied together, such as
traffic. bk nk in the first constraint or the product of pj in the third
In an ad hoc network each link may fail due to either pow- constraint, and appear in the denominator, such as Cj in the
er shut down of a user or deep fading that causes an outage. second and sixth constraints. However, all the inequality con-
Therefore pj , a real number between 0 and 1, is attached to straints are in posynomial form and all the equality constraints
each link as the probability that this link will be maintained are in monomial form.
during the transmission. By increasing transmitter power over In the second formulation, the unused capacity of a partic-
a link j while keeping other parameters of the network con- ular link j0 is maximized. The link may be a bottleneck link,
stant, SIR of link j and therefore pj can be increased. or the most often traversed link in the network. [5].
As will be shown in the following problem formulations,
with the above constraints on link capacity, bandwidth require-
ment, delay, and delivery probability guarantees, the problem Theorem 3 (Unused capacity maximization) The following
is not a linear programming problem. However, these non- problem of maximizing the unused capacity under SLA and
linear optimizations can be turned into geometric program- network constraints is a convex optimization problem.
ming problems and solved as efficiently as linear programs.
The first formulation is the following.
jJk Cj
dk,U B , k
Q
minimize No pj pk,LB , k
PObjective Function jJk
bk nk Rk , k
subject to bk nk Cj , j
kK j P ! bk nk = Cj
P iKj
ni nk
= dk,j
jJk Cj
dk,U B , k Cj
Q pj pj,U B
jJk
pj pk,LB , k bk , Cj , pj , dk,U B , pk,LB 0
bk nk Rk , k (16)
bk nk = Cj The objective function is to maximize unused capacity of a
dk,j
nk
Cj
= link j0 by keeping the used capacity to the minimum under all
pj pj,U B network and QoS constraints. The constraints are the same as
bk , Cj , pj , dk,U B , pk,LB 0 in Theorem 2.
(15) In the third formulation, the total delay for a particular
No objective function is necessary since in this formulation class of traffic is minimized.
only the feasibility of the SLA terms pj , dk,U B and pk,LB is
being tested. Alternatively, a cost function as the objective
function could be used for relative pricing during admission Theorem 4 (Delay Minimization) Delay minimization under
control. Note that the first constraint is the link capacity SLA and network constraints is a convex optimization problem.
2914
2
B C
P
P ni P 1 3
iKj
8
minimize + Cj 7
P jJk0 Cj j
subject to bk nk Cj , j A D
kKj
P !
P iKj
ni
6
jJk Cj
dk,U B , k 4
Q E F
jJk
pj pk,LB , k 5
bk nk Rk , k
bk nk = Cj Fig. 2: Network Topology for Simulation
dk,j
nk
Cj
=
pj pj,U B 1.4
(17)
1
the most time sensitive QoS class can be decreased. Therefore, 0.4
V. Summary
2915