Skip to main content

Throughput-optimal scheduling for cooperative relaying in wireless access networks

Abstract

This article considers the cooperation between base station and relay stations to increase system throughput in time-slotted relaying wireless networks, such as dynamic time division multiple access systems. We focus on optimal throughput scheduling policies for the cooperative relaying at the network layer level. It is shown that the resulting policy for this cooperative protocol obtains the optimal throughput region. Random packet queueing at the relay stations may cause a packet-reordering effect, which may be an obstacle for real-time applications. We alter the design for throughput-optimal scheduling to remove this effect and guarantee a near optimal throughput region.

1 Introduction

Cooperative communications that take advantage of the broadcasting nature of wireless environments have shown excellent performance in both theoretical aspects and implementations, e.g., per-node throughput of the cooperative network is a constant factor while per-node throughput of the conventional wireless network decreases when increasing node density [1]. Cooperative communication at the physical layer requires extra computation and synchronization capabilities. This is usually applicable for base station (BS) and relay station (RS) but not for mobile devices due to their limited computational capacity and power resources [2]. However, the cooperation at the network level can provide performance gain, as shown in [3], even without the aforementioned capabilities.

We consider cooperation at network layer between BS and RS in slotted-time wireless access networks, e.g., dynamic time division multiple access or orthogonal frequency-division multiple access. An example of this network is multi-hop relaying IEEE 802.16 WiMax. In this scenario, the RS overhears all packets transmitted from the BS to the subordinate mobile station (MS) and retransmits only the packets that could not be decoded at the MS. This cooperative protocol does not require any extra capability at the physical layer and is applicable for both downlink and uplink transmission. We refer to it as the cooperative packet relaying (CPR) protocol. We also refer to the direct transmission from the BS to the MS as single-hop protocol and the conventional relaying [2] through the RS as multi-hop protocol. This slotted-time system requires a scheduling policy that dynamically determines a set of active users at a given time regarding available resources and interference constraints between links.

Throughput-optimal scheduling policy that provides the largest region of feasible arrival rates is desirable in wireless networks. It has been shown that the Backpressure policy [4], which makes scheduling decision basing on difference of queue length between source and destination on each link, is throughput-optimal in multi-hop wireless networks. However, in the scenario of the CPR protocol, since the BS sends packets to the RS and MS at the same time, on contract to a single destination in conventional relaying, queue length updating at each time slot are thus different: the queues are updated according to the transmission state of the BS. Furthermore, since the transmission states are known only by acknowledgments from receivers, the scheduling decision must consider random packet loss and packet re-transmission. This necessitates a new design for throughput-optimal scheduling in the CPR protocol.

The packet queueing at the RS is important to achieve the throughput-optimal scheduling. This is because the queueing capability allows a higher degree of freedom in choosing the active links at every time slot. For example, if the channel quality is not good enough to directly forward the received packet, the RS temporarily buffers the packet and uses the available time slot for the waiting users that have better channel quality [5]. However, the packets queuing at the RS introduce a packet re-ordering problem at the MS due to the fact that packets are randomly queued at the RS. A scheduling policy that allows only one packet of a flow to be queued at the RS is necessary to remove this effect.

We focus on designing a throughput-optimal scheduling policy for the CPR protocol and addressing the above challenges. This scheduling policy minimizes sum square of the queue lengths at every time slot so as to equalize and keep the queues stable, thus maximizing the achievable throughput region. The throughput region under the proposed policy for CPR is significantly larger than the throughput region of the conventional relaying protocol and depends less on the link qualities. This is because the CPR protocol takes advantage of every single transmission from the BS. Even a failed transmission from the BS can contribute to the delivery of packets by pushing the packets to the RS. From a practical perspective, this approach is ideally suited for the scheduling in multi-hop relaying system, e.g., IEEE 802.16j WiMax. The primary contributions of this study are as follows.

  • We characterize the throughput region of the wireless network under the CPR protocol with packet queueing at the RS. We show that this region is larger than that obtained by the conventional multi-hop relaying protocol and single-hop protocol in wireless networks in Section 3.

  • We consider the queueing network as a dynamic system and formulate an optimal control problem for the throughput-optimal scheduling policy. The scheduling policy determines a set of active links at each time slot based only on the current queue length information and channel quality. A theoretical analysis using Lyapunov functions shows that this online policy obtains the maximum throughput region in Section 4.

  • We design a scheduling policy that allows only one packet for each flow queue at the RS. This scheme eliminates the packet-reordering effect caused by opportunistic packet queueing. The achievable throughput region of this policy is analytically proved to be near optimal while the simulation results show it outperforms the conventional multi-hop relaying protocol and single-hop protocol in Section 5.

2 Related works

In the cooperative transmission at physical layer, source nodes and relay nodes cooperatively deliver signal to the destination node. It requires additional capabilities to synchronize between source nodes and relay nodes and to combine signals at the destination [6]. The relay nodes may have different strategies when forwarding the signal from the source node: the relay nodes amplify then forward (amplify-and-forward) [7]; the relay nodes decode then forward (decode-and-forward) [7]; or the relay nodes retransmit the signal that they receive from the sources to the destination only when the destination fails to decode the information packet (incremental relaying) [6]. In particular, the research in [6] showed that the incremental relaying protocol provides the best outage behavior among these cooperation protocols as there are occasions that the information packets need to send only once. The behavior of the CPR protocol is similar to that of the incremental relaying protocol except that CPR protocol is performed at network layer. However, the CPR protocol is more flexible than the incremental relaying protocol since it does not require extra capabilities at physical layer.

A number of studies have also exploited broadcast nature of wireless channels at the network layer level. In [8, 9], authors investigated the opportunistic routing problems in ad hoc wireless networks. Each transmission from source nodes is broadcast and the routing decision to the destination, or decision of next hop, is decided opportunistically basing on the result of the local broadcast. While the algorithm in [8] bases on queue lengths between nodes to make routing decision, the algorithm in [9] is derived from a finite-state Markovian decision problem. Analysis of throughput region and delay in cooperation at network level is studied in [3, 10] under TDMA-based scheduling. To fully exploit the available resource, the unutilized time slots in TDMA scheduling are used by the relay nodes to retransmit the packets to the destination [3]. Although these works use a similar protocol with CPR for cooperation at network layer, the objectives of these studies are different from our research. The studies in [8, 9] target the opportunistic routing. The studies in [3, 10] focus on analysis of stability region and delay for network-level cooperation protocol under TDMA-based scheduling. The objective of our research is to find a throughput-optimal scheduling on relaying networks.

Research on throughput-optimal scheduling for single-hop and multi-hop wireless networks is addressed in [4, 11]. This is to find scheduling policies that support the largest throughput region on a specific network topology. The seminal studies in [4] have shown that Backpressure scheduling policy, which bases on the difference of queue length between source and destination nodes of links, can achieve the maximum throughput region. The studies in [11] extend the scheduling policy to a general framework for scheduling and flow control in multi-hop wireless networks. Recently, these results have been extended to cooperative networks. In [12], two-hop relaying networks with cooperation at physical layer are studied with an optimal scheduling policy and its stability region. The authors focus on throughput-optimal scheduling in relaying network under decode-and-forward protocol at physical layer. On the contrary, this article focuses on finding an optimal scheduling policy for cooperation at network layer.

3 CPR in wireless networks

3.1 CPR protocol

We consider a single macro cell that is equipped with a single BS, N R fixed RS, and N M MS. The RS are installed to increase throughput and coverage. They receive and forward packets in both downlinks and uplinks. Due to the capacity of RS, error probability on links between the BS and the RS are low. For simplicity, we assume that there is no error on this link. In practice, this assumption may not be true; however, it can be remedied using acknowledgements without any difficulty. We also assume that the nearby stations cannot interfere with each other. This is because the RS use low power and their interference are considered in deployment and resource allocation, e.g., using orthogonal sub-carrier assignment in OFDMA [13].

We focus on a typical scenario where all MS associate with BS and another RS so that they can receive packets from both stations. This scenario is practical since current standards usually consider MS associating with only one RS to reduce the control information for cooperation between the RS [2]. The case where one MS associates with more than one RS is outside the scope of this article. Let r N R and c N M represent the index of the RS and MS, respectively. We also use c to refer to the flow associated with the MS c. Let N r be the set of MS that associate with the RS r.

We assume a slotted time frame structure that is widely used in implementation of practical systems, e.g., WiMAX, and theoretic analyses, e.g., in [11, 12]. The packet has a fixed length and the transmission time of one packet is one time slot. The time is divided into equal units t = {0, 1, 2, ... } called time slots. The time slot in the CPR protocol is divided into three subslots: control subslot, data subslot, and ACK subslot (Figure 1a).

Figure 1
figure 1

Network system model. (a) Network node model. (b) Time slot structure.

In the downlink mode, at the control subslot, the stations send the pilot signal to measure channels. This channel state information is used in the scheduling algorithm to compute the link activation vectors μ(t). This computation of scheduling follows the policies explained in the subsequent sections. At the data subslot, the selected links are activated to transmit data packets. In the case where BS is active, the packet is transmitted to the corresponding MS. The associated RS of the receiving MS overhears the transmitting packet. Note that we assume there is no error at the RS. At the ACK subslot, the receiving MS sends an acknowledgment to the BS and RS to inform the state of the packet. If it is successful, the RS and BS remove the packet from the queue. If it fails, the BS removes the packet from the queue; however, the RS keeps the received packet in the queue and waits to transmit it in the next time slots. In the case where the RS are activated, they transmit the queueing packet to the corresponding MS. Note that this protocol does not drop packets when transmission fails.

At every time slot, scheduling policy decides links to be activated. Depending on the network state, e.g., link qualities, activated links can be the links between BS and RS or the links between RS and MS. In the case where the links between a BS and an MS are activated and there are packet of activated MS queued at the RS, packets transmitted from the BS may successfully arrive the MS before the queueing packets at the RS. Packet re-ordering happens in this situation. To remedy this problem, the scheduling algorithm must allow to transmit packets of the MS, which are queueing at the RS, before initiating a new packet transmission to that MS.

In the uplink mode, the scenario is similar with the one of downlink mode. In the data subslot, when MS is active to send data packets to BS, associated RS overhears the packet and transmits the packet to the BS when the BS fails to receive the packet directly from the MS. The error probabilities of re-transmissions are low because links between the RS and the BS are more reliable than links between the MS and the BS. Due to the symmetry of the downlink and uplink mode, we consider only the downlink model in our analysis. The uplink model can be extended without major changes.

3.2 Network model

The proposed system shown in Figure lb is modeled by two layers: a network layer and a link layer. A summary of frequently used notations is provided in Table 1.

Table 1 Frequently used notations

At the link layer, let μ b, c (t) and μ r, c (t) indicate the activations of the commodity flow c on link (b, c) and (r, c) at time slot t. If the flow c on the link (b, c) is scheduled, then μ b, c (t) = 1; otherwise μ b, c (t) = 0. Note that due to the broadcast nature, the link (b, r) is identical to the link (b, c) and hence their activations and data rates are identical. The success probabilities depend on the channel conditions, modulation, coding type, and power level, as shown in [14]. Using the pilot signal, these probabilities can be estimated at the beginning of each time slot. They are denoted by p b, c (t) and p r, c (t). We assume that these probabilities evolve over slots according to a finite-state Markov chain and thus the steady state is measurable and is denoted by p b, c and p r, c . The interference between links imposes a feasible region to activation vector μ ( t ) = { μ b , c ( t ) , μ r , c ( t ) } c N M . This feasible region specifies a set of links that can be activated at the same time slot. For example, since the BS covers all the RS and MS, when the BS is active, other stations must be inactive. An element of the feasible set thus should include only one active link from BS and all other inactive links in the system. Let the feasible region of μ(t) be Ω; then μ(t) Ω.

At the network layer, let a ( t ) = { a c ( t ) } c N M represents the exogenous traffic arriving at the time slot t with the mean λ c = E{a c (t)} and a c (t) ≤ am ax. The arrival processes are i.i.d over slots and the second moment E { a c 2 ( t ) } of the arrival process is finite. The network layer uses a queue separation scheme where every flow has a separate queue at each node. Let q b, c (t) and q r, c (t) be the queue of flow c at the BS and RS. Let s b, c (t) and s r, c (t) indicate the transmission state of a packet on the corresponding links at the end of the time slot t. For example, s b, c (t) = 1 if the transmission is successful; otherwise s b, c (t) = 0. Thus we have the success probabilities Pr [s b, c (t) = 1] = p b, c (t) and Pr [s r, c (t) = 1] = p r, c (t).

Queue length q b, c (t + 1) depends on the queue length q b, c (t), input packet a c (t), and output packet μ b, c (t) at time t as shown in (1). In (2), a packet is added to the queue at RS only when (1 - s b, c (t)) μ b, c (t) = 1 that means the packet is transmitted, or μ b, c (t) = 1, and the MS fails to receive it, or 1 - s b, c (t) = 1. Similarly, packet is removed from the queue only when it is successfully delivered to the MS, that means s r, c (t) μ r, c (t) = 1.

q b , c ( t + 1 ) = q b , c ( t ) - μ b , c ( t ) + a c ( t )
(1)
q r , c ( t + 1 ) = q r , c ( t ) - s r , c ( t ) μ r , c ( t ) + ( 1 - s b , c ( t ) ) μ b , c ( t ) .
(2)

3.3 Throughput region of the CPR protocol

We first recall definitions of stability and the throughput region of wireless networks.

Definition 1 (Network stability): A queue q is stable if lim  sup T - > 1 T t = 0 T - 1 E { q ( t ) } <. A network is stable if all queues are stable.

Definition 2 (Stability region): The stability region of a scheduling policy is the set of arrival rates {λ m }m{1, ..., M}that stabilizes the system under the policy. The union of stability regions of all scheduling policies is the network stability region.

Definition 3 (Throughput region): The throughput region, denoted by Λ, is a set of all arrival rate vectors that can be stably supported by the network under the assumption that network queues are always saturated.

It is clear that on the boundary of the network stability region, the queues are always saturated, and thus the network stability region and throughput region are identical. Definitions of stability region and throughput region are important to show the throughput-optimal property of a policy. A policy is throughput-optimal if it can be shown that it stabilizes all arrival rates that belong to the throughput region.

The establishment of the throughput region in the conventional wireless network has been comprehensively studied in a number of researches through the flow conservation constraints and the link capacity constraints, e.g., [11, 15]. We establish the throughput region basing on flow conservation and link activation time constraints. Let l b, c (t) and l r, c (t) are the average data rate over links (b, c) and (r, c), respectively. The total portion of time for each link must be smaller than one. The rate vector λ Λ if there exists a vector β= { β 1 , , β N R , β R } such that:

β c l b , c = λ c c N M
(3)
γ r , c p r , c l r , c = ( 1 - p b , c ) λ c
(4)
β r = c M r γ r , c r N R
(5)
β R = max r = N R β r
(6)
1 c N M β c + β R
(7)

The flow conservation constraints specify that input flow and output flow at each node, BS and RS, must be equal. Equations (3) and (4) follow from the link conservation constraints at the BS and RS. The vector γ r = γ 1 , , γ M r represents the portion of activation time of users associated to r and β r represents the total portion of activation time on each RS. Since RS do not interfere with each other, links in different RS can activate at the same time. Thus, the total portion of activation time for RS is the most congested station. This is represented in equations (5) and (6). Finally, total portion of activation time is not greater than 1. This constraint is formulated in equation (7).

The CPR protocol provides better throughput region than that of the conventional protocols while it does not require extra complexity at the physical layer as compared to the conventional cooperative protocol. This can be explained intuitively as follows. In CPR protocol, packets are re-transmitted from the RS meanwhile packets are re-transmitted from the BS in single-hop protocol. Due to the higher quality of the link between RS and MS, CPR protocol is thus more efficient than the single-hop protocol. In addition, in CPR protocol, once packets are failed to be delivered using direct transmission from BS, which takes only one time slot, they are forwarded throughput the RS. This forwarding actually is the multi-hop relay protocol which costs two time slots to forward one packet. In other words, multi-hop relay protocol is less efficient than CPR protocol. The advantage of the CPR protocol is formally shown in Theorem 1.

Theorem 1. The throughput region of the CPR protocol is larger than the throughput region of the multi-hop relay protocol and single-hop protocol.

Proof. See Appendix A.

4 Throughput-optimal scheduling for the CPR protocol (TOSC)

4.1 TOSC modeling

In order to find a policy that stabilizes the queueing system whenever the arrival rates are within the throughput region, we find a policy that minimizes the total queue length average. To do this, we construct the scheduling problem as an optimal control problem. This framework can be applied to construct the scheduling policies in general cases where there are no constraints on the policy, e.g., queue length constraints.

We consider a discrete-time linear time-invariant system with dynamics in equations (1) and (2), where Φ t = q b , c t , q r , c t c N M 0 are the states and μ(t) Ω is the control input. Note that only μ(t) is variable here, since the scheduling decision is considered in this design. The design goal is to serve as much as possible the arrival traffic to MS. Since these traffic loads directly affect physical queue lengths, minimizing queue lengths helps to support as much as traffic load. We define the cost function as sum square of queue lengths. The cost function in form of sum square of queue lengths pushes the scheduling decision to equalize the queue length and to prevent queue lengths from infinity. Thus it stabilizes the network. The optimal control problem minimize the cost function defined as follows:

J = lim T 1 T t = 0 T E c N M ( q b , c ( t ) 2 + q r , c ( t ) 2 )

4.2 TOSC policy

In general, the linear stochastic optimal control problem can be solved effectively using the optimal policy for only few special cases [16, 17]. However, there exist different methods to find suboptimal control policy [16]. Regarding the computational complexity and its compliance to the objective function, we consider Control-Lyapunov feedback method. The suboptimal control policy of Control-Lyapunov feedback method is given by:

μ ( t ) = arg min μ Ω m = 1 M ( q b , c ( t + 1 ) 2 + q r , c ( t + 1 ) 2 )
(8)

Proposition 1: The following inequality holds at every time slot t

c N M ( q b , c ( t + 1 ) 2 + q r , c ( t + 1 ) 2 ) c N M ( q b , c ( t ) 2 + q r , c ( t ) 2 ) + B + 2 c N M q b , c ( t ) a c ( t ) - 2 c N M ( μ b , c ( t ) ( q b , c ( t ) - ( 1 - s b , c ( t ) ) q r , c ( t ) ) - μ r , c ( t ) s r , c ( t ) q r , c ( t ) ) S c h e d u l i n g
(9)

where

B = c N M ( s r , c ( t ) 2 μ b , c ( t ) 2 + ( 1 - s b , c ( t ) ) 2 μ r , c ( t ) 2 ) + μ b , r ( t ) 2 + a c ( t ) 2 .

Proof. Squaring both sides of equations (1) and (2), summing over all c entries, and re-arranging yields (9).     □

A suboptimal policy can be derived from equation (8) by minimizing the expectation of the right side of (9). Note that E {s b, c (t)} = p b, c (t) and E {s r, c (t)} = p r, c (t). Thus, the scheduling policy, namely TOSC, is defined as follows.

The TOSC policy: At each time slot, TOSC selects an activation vector μ(t) such that:

μ ( t ) = arg  max μ Ω c N M ( μ b , c ( t ) w b , c ( t ) + μ r , c ( t ) w r , c ( t ) )
(10)

where

w b , c ( t ) = q b , c ( t ) - ( 1 - p b , c ( t ) ) q r , c ( t ) w r , c ( t ) = p r , c ( t ) q r , c ( t ) .

The TOSC policy has a similar form with the well-known Backpressure algorithm [11] however, the weight of links, w b, c (t) and w r, c (t), are calculated differently. In the TOSC, the weights take into account the success probability on each link and the cooperation on re-transmission of the failed packet (1 - p b, c (t)). The decision of the TOSC depends only on the current queue length state q(t) and success probability of links. Theorem 2 shows that the TOSC is throughput-optimal since it achieves the throughput region Λ defined in Section 3. For any arrival rate λ Λ, the TOSC policy performs better than the stationary randomized policy, as shown in [11], in stabilizing the queueing system q(t).

Theorem 2. If λ Λ then the queueing system is stable under TOSC.

Proof. See Appendix B.

4.3 Complexity analysis

According to special structure of interference between links, TOSC policy must choose activation vectors from only the following two possibilities: BS is activated and other RS are muted; or BS is muted and RS are activated. Furthermore, in a RS, only one mobile state is activated at a time slot. TOSC policy thus selects a MS with maximum weight w r, c (t) in each RS, and compare the sum of the weights from the RS with weights w b, c (t) at the BS to activate BS or RS. Scheduling decision (11) can be written as follows:

μ ( t ) = arg μ Ω max { μ b , c ( t ) w b , c ( t ) } c N M , r N r max c N r { μ r , c ( t ) w r , c ( t ) }
(11)

Implementation of TOSC policy requires two steps: gathering network state information, which includes queue length and channel condition; and computing the optimal activation vector. Messages incurred when gathering network state information are called messages passing overhead. The complexity to calculate the activation vector at the BS and the RS is complexity of TOSC.

Messages passing overhead

Link states p b, c (t) and p r, c (t) can be estimated from the previous transmissions. However, since the channel state varies rapidly over time slots, this method cannot provide a good estimation. In order to obtain a better measurement, the BS and the RS send a short pilot signal and the other stations send back acknowledgments that contain the link state. The total messages required to finish this measurement are: N M messages from the MS to BS, N M messages to the RS, and N R messages from RS to BS. Note that for simplicity, we use name of set to refer to the size of the set, e.g., N M is also used as the number of the MS. Thus the total number of message is 2N M + N R and the message passing overhead is O(N M ).

The overhead of the scheduling policy for the single-hop protocol, e.g., In the modified largest queue length first [18], to accomplish the acknowledgement of all MS, requires O(N M ) messages. This overhead has the same order with the overhead in TOSC. In addition, it is important to note that since these messages are sent to the BS through control channel, they does not directly affect the throughput performance of the networks.

Computational complexity

According to (11), under the assumption of using a binary search, O(log (N M + 1)) is required to compute the maximum link weights w b, c (t) at the BS and O(N R log(N rmax )) to find the largest link weight w r, c (t) at N R RS. Since N rmax N M and N R is a small constant, computational complexity of the TOSC is thus O(log (N M )). In single-hop protocol, to select one MS out of N M MS, it requires O(log (N M )) using binary search. Thus complexity of TOSC is the same with complexity of single-hop protocol.

5 Throughput-optimal scheduling for CPR without packet re-ordering (TOSC-wo)

With the TOSC, in order to obtain the optimal throughput region, the scheduling decision maximizes the weighted sum of queue lengths and continues to transmit new packets regardless of whether there are old packets queueing at the RS. Multiple packets queueing at the RS causes a packet re-ordering problem and may introduce a significant instant delay at the MS. This effect may be harmful for the real-time applications, e.g., video streaming. We design a scheduling policy that allows only one packet of each flow to be buffered at the RS. This policy guarantees that there is no effect of packet re-ordering. The complexity of the policy is identical to that of TOSC due to the similarity in computation of the link weights. We refer to this policy as TOSC-wo.

Since the scheduling decision is based on the weights corresponding to the links (b, c) and (r, c), we construct the weights such that the scheduling policy declines to activate the link on which the destination queue is already occupied. Specifically, the weights w b, c (t) ≤ 0 if the queue q r, c (t) ≥ 1. This property of the policy is proved in Lemma 1.

The TOSC-wo Policy: At each time slot, the policy selects an activation vector μ(t) such that:

μ ( t ) = arg  max μ Ω c N M ( μ b , c ( t ) w b , c ( t ) + μ r , c ( t ) w r , c ( t ) )

where p max = max{p b, c (t)}t = 1, 2, ...and

w b , c ( t ) = q b , c ( t ) ( ( 1 - p m a x ) - ( 1 - p b , c ( t ) ) q r , c ( t ) ) w r , c ( t ) = q b , c ( t ) p r , c ( t ) q r , c ( t ) .

Lemma 1. The TOSC-wo allows no more than one packet of each flow to be buffered at the RS.

Proof. Consider the case where q r, c (t) = 1, and we have w b, c (t) = q b, c (t) (p b, c (t) - p max ) ≤ 0. In this case, the link (b, c) is eliminated from the activation and links at the RS are chosen to activate since w r, c (t) ≥ 0 for every time slot. Thus, there are no more input packets to the queue q r, c if q r, c (t) = 1. Or, in other words, q r, c (t) ≤ 1 for all t.     □

By limiting the queue length q r, c (t) ≤ 1, there is no effect of packet-reordering and the incurred instant delay can be reduced. However, since the queue length conditions do not allow the scheduling decision to take fully the advantage of the link condition, the feasible region of the activation vector μ(t) is reduced. Consequently, the throughput region is also reduced. We show in Theorem 3 that the TOSC wo guarantee a specific region on the throughput region Λ.

Theorem 3. The TOSC-wo guarantees the throughput region for arrival rate λ such that λ + ε Λ, where ε> 1 ( 1 - p m a x ) c N M ( 1 - p b , c ) ( λ c - λ c 2 ) .

Proof. See Appendix C.

6 Performance evaluation

In this section, we present our simulations to illustrate the theoretical results and compare the proposed policies with the aforementioned well-known protocols.

We set up a wireless access point that includes a BS, RS located on the border of the cell, and randomly placed MS. We consider only the MS that can connect to the RS and omit the others. The link qualities and the arrival rates are stationary processes. At each time slot, the simulation runs three steps that correspond to the three subslots in a time slot. At the first step, the link success probabilities are generated using a stationary random process with a given mean. The extemal packet arrival rate at each node is i.i.d. with mean λ c . At the second step, we find the activation vector according to the scheduling policy based on the interference model, the physical queue q(t), and the instant success probability p b, c (t) and p r, c (t). At the last step, the queueing evolution is updated according to the generated transmission states s b, c (t) and s r, c (t) using the probabilities p b, c (t) and p r, c (t), respectively. We use the modified largest queue length first [18] as the scheduling policy for the multi-hop relaying protocol (MH) and single-hop protocol (SH). No packet is discarded during the physical queueing update.

In the first scenario, we show the average queue lengths and throughput regions in random topologies. In order to make the average queue lengths comparable between protocols, we adjust the queue length in the TOSC and TOSC-wo using the principles of Little's theorem. Since only a portion of (1 - p b, c ) of flow c traverses through the RS, the total queue length is q= c N M q b , c + q r , c 1 - p b , c . Figure 2a shows the throughput region under the scenario where the link quality between BS and MS have very poor quality, p b, c = 0.4, and the links between the RS and MS have very good quality, p b, c = 0.9. Although the multi-hop relaying protocol provides better performance than the single-hop protocol in this case, since it does not use the Bs-to-MS link, its performance is far below that of the TOSC and TOSC-wo. Similar results are shown in Figure 2b in the case where link qualities between BS and MS are higher at p b, c = 0.7: TOSC and TOSC-wo obtain the throughput region more than 0.8 (packets/time slot) while the multi-hop relay protocol remains below 0.5 (packets/time slot) and the single-hop protocol is 0.7 (packets/time slot). In particular, the queue lengths are very similar between the protocols, and thus this gain of the throughput region does not sacrifice any delay performance. The reason behind this result is that the TOSC and TOSC-wo have wider degrees of freedom in choosing active links at every time slot.

Figure 2
figure 2

Average queue length and arrival rate under different success probability of the BS-MS link. (a) Average queue length and arrival rate when average p bc = 0.4, p r, c = 0.9. (b) Average queue length and arrival rate when average p bc 0.7, p r, c = 0.9.

Since the performance of protocols largely depends on the link quality, in the second scenario, we investigate the throughput region of the protocols under variance of the link qualities. We vary the average success probabilities and evaluate the throughput region of each protocol. We measure the throughput region by measuring the maximum average arrival rate of the protocol such that the average queue length is smaller than 100. Figure 3a shows the throughput regions under variance of the average p b, c and p r, c = 0.9. Figure 3b shows the throughput regions under the variance of average p r, c and p b, c = 0.5. These results confirm the typical scenarios in wireless networks: the performance of the multi-hop and single-hop protocol depends on the link qualities. When the BS-MS link quality p b, c is low, the multi-hop relaying protocol performs better than the single-hop protocol. When the BS-MS link quality is high, the single-hop protocol performs better. However, in all cases, we observe again that the TOSC and TOSC-wo support a significantly larger throughput region in comparison with the two conventional protocols.

Figure 3
figure 3

Throughput region under varying link qualities. Throughput region under variance of the (a) BS-MS link quality (p b, c ) and (b) RS-MS link quality (p r, c ).

It is important to note that the performance of the TOSC and TOSC-wo slightly depends on the link qualities p b, c and p r, c . This reflects the nature of the CPR protocol: the failed transmission can contribute to the delivery of packets. These results also confirm the computation of the activation time of the CPR protocol (see Appendix A, (12)): the success probability impacts only part of the throughput region.

Finally, we evaluate the operation of the TOSC-wo by running a simulation on a network of two RS and two MS and investigate the queue length. This investigation shows the queue length property of TOSC-wo policy, which is specified in Lemma 1, and verifies that packet-reordering problem is removed in TOSC-wo. The evolution of the queue lengths at one RS is shown in Figure 4. Queue length of the RS is deterministically less than or equal to 1, as shown in Lemma 1. This property confirms that no packet is transmitted from the BS when there is packet queueing at the RS. The packet-reordering problem thus does not appear in TOSC-wo.

Figure 4
figure 4

Evolution of the queues under the TOSC-wo policy.

7 Conclusion

In this article, we investigate the CPR protocol on relaying networks. The analytical results and performance evaluation show that this protocol outperforms the conventional protocol without requiring extra capability in contrast with the cooperative relaying at physical layer. The results of this research can be easily extended to uplink models, network utility maximization, and power control without difficulties.

A Proof of Theorem 1

To compare the throughput region among the CPR protocol, multi-hop relaying protocol, and single-hop protocol, we first make the following assumptions, which is derived from the network model in Section 3.1, for links between stations: l b, r = l0 r N R ; p b, r = 1, links between MR and MS: l r, c = l0 r N R , c N M ; p r, c = p0, the link between BS and MS: l b, c = l0c N M ; p b, c = p1.

The total portion of activation time required for the arrival rate λ, in the single-hop protocol, multi-hop relaying protocol, and the CPR protocol, which are denoted as τ sh , τ mh , and τ CPR , respectively, is given by:

τ s h = c N M λ c p 1 l 0 τ m h = c N M λ c l 0 + λ c p 0 l 0 τ C P R = c N M λ c l 0 + max r N r c N r ( 1 - p 1 ) λ c p 0 l 0
(12)

Considering the most congested RS r max and its associated MSs, we have

max r = 1 , . . . , N r c N r ( 1 - p 1 ) λ c p 0 l 0 = c N r max ( 1 - p 1 ) λ c p 0 l 0
(13)

Using (13) and noting that p1 ≤ 1 and p1p0 since the MS is closer the MR than the BS, we have:

τ C P R - τ s h = c N M ; c N r max λ c l 0 ( p 1 - 1 ) p 1 + c N r max λ c l 0 p 1 - 1 p 1 + 1 - p 1 p 0 = c N M ; c N r max λ c l 0 ( p 1 - 1 ) p 1 + c N r max λ c p 1 - 1 l 0 1 p 1 - 1 p 0 0 .

and

τ C P R - τ m s h = c N r max ( 1 - p 1 ) λ c p 0 l 0 - c N M λ c p 0 l 0 c N r max λ c p 0 l 0 c N M λ c p 0 l 0 0

Thus, we have τ C P R τ sh and τ C P R τ mh . This means that the total portion of activation time required to support λ is smallest among the three protocols. In other words, CPR has the largest throughput region among the three protocols. The theorem is proven.

B Proof of Theorem 2

In order to show that TOSC stabilizes all the queues when λ Λ, we develop the proof in following steps. First, we define a Lyapunov function, which is sum quadratic of the queue lengths. Second, we show that the drift of the Lyaponov function at every time slot is bounded and the TOSC policy does better than a randomized algorithm in minimizing this drift in every time slot. Consequently, this bound thus holds for the TOSC policy. Finally, we prove that TOSC policy guarantees sum of queue length bounded. Details of the proof are as follows:

Consider a Lyapunov function of the system with dynamic evolution (1) and (2):

L ( q ( t ) )= c N M ( q b , c ( t ) 2 + q r , c ( t ) 2 ) .

Value of this Lyaponov function generally can be understood as an index to represent the queue lengths. A drift is defined as a change of the Lyapunov function over each time slots. The drift of the Lyapunov function is calculated as ΔL ( q ( t ) ) = c N M ( ( q b , c ( t + 1 ) 2 + q r , c ( t + 1 ) 2 ) - ( q b , c ( t ) 2 + q r , c ( t ) 2 ) ) . From (9) we have:

Δ L ( q ( t ) ) B + 2 c N M q b , c ( t ) a c ( t ) - 2 c N M μ b , c ( t ) ( q b , c ( t ) - ( 1 - s b , c ( t ) ) q r , c ( t ) ) - 2 c N M μ r , c ( t ) s r , c ( t ) q r , c ( t ) .
(14)

Rearranging and taking the expectation yields

E { Δ L ( q ( t ) ) | q ( t ) } B - - 2 c N M q b , c ( t ) ( E { μ b , c ( t ) | q ( t ) } - λ c ( t ) ) - 2 c N M q r , c ( t ) ( E { s r , c ( t ) μ r , c ( t ) - ( 1 - s b , c ( t ) ) μ b , c ( t ) | q ( t ) } )
(15)

where B - =E { B } . Since terms in B are bounded, B - is bounded.

It is known in [11] that there exists a stationary randomized algorithm that makes decision on μ(t) at every time slot, so that for ε > 0 and λ + ε Λ, we have E {s r, c (t) μ r, c (t) - (1 - s b, c (t)) μ b, c (t) | q(t)} = ε and E { μ b, c (t) - λ c | q(t)} = ε for all c N M . Using the above results in (15) yields

E { Δ L ( q ( t ) ) | q ( t ) } B - - 2 ε c N M ( q b , c ( t ) + q r , c ( t ) )
(16)

Note that TOSC minimizes the left side of (9) over all possible choices of μ(t) Ω at every time slot that includes the scheduling of the randomized scheduling algorithm. Thus, (16) also holds for the TOSC policy.

Consider the system over a given period, let it be M time slots. Summing (9) over M time slots with t = 0, 1, 2, ..., M - 1 and note that E {L (q (0))} = 0 and E {L (q (M))} ≥ 0 we obtain

1 M t = 1 , , M - 1 c N M ( q b , c ( t ) + q r , c ( t ) ) B - ε .
(17)

Taking the limit M → ∞ and due to the fact that B - is bounded, the queueing system is bounded under TOSC. Theorem 2 holds.

C Proof of Theorem 3

Consider the following Lyaponov function

L ( q ( t + 1 ) ) = c N M ( 1 - p m a x ) q b , c ( t + 1 ) 2 + c N M q b , c ( t + 1 ) q r , c ( t + 1 ) 2 .
(18)

Squaring both side of (1) and (2) yields

q b , c ( t + 1 ) 2 q b , c ( t ) 2 + μ b , c ( t ) 2 + a c ( t ) 2 - 2 q b , c ( t ) ( μ b , c ( t ) - a c ( t ) )
q r , c ( t + 1 ) 2 q r , c ( t ) 2 + s r , c ( t ) 2 μ r , c ( t ) 2 + ( 1 - s b , c ( t ) ) 2 μ b , c ( t ) 2 - 2 s r , c ( t ) μ r , c ( t ) ( 1 - s b , c ( t ) ) μ b , c ( t ) - 2 q r , c ( t ) ( s r , c ( t ) μ r , c ( t ) - ( 1 - s b , c ( t ) ) μ b , c ( t ) )

and

q b , c ( t + 1 ) q b , c ( t ) + a max .

Thus, summing over all the flows c and using the fact that q r, c (t + 1)2 1 yields

L ( q ( t + 1 ) ) L ( q ( t ) ) + B 1 + B 2 c N M q b , c ( t ) - 2 c N M ( 1 - p m a x ) q b , c ( t ) ( μ b , c ( t ) - a c ( t ) ) - 2 c N M q b , c ( t ) q r , c ( t ) ( s r , c ( t ) μ r , c ( t ) - ( 1 - s b , c ( t ) ) μ b , c ( t ) )
(19)

where

B 1 = c N M ( 1 - p m a x ) ( μ b , c ( t ) 2 + a c ( t ) 2 ) + N M a max B 2 = c N M s r , c ( t ) 2 μ r , c ( t ) 2 + ( 1 - s b , c ( t ) ) 2 μ b , c ( t ) 2 - 2 c N M s r , c ( t ) μ r , c ( t ) ( 1 - s b , c ( t ) ) μ b , c ( t ) .

This is equivalent to

L ( q ( t + 1 ) ) L ( q ( t ) ) + B 1 + B 2 c N M q b , c ( t ) + 2 ( 1 - p max ) c N M q b , c ( t ) a c ( t ) - 2 c N M μ b , c ( t ) q b , c ( t ) ( ( 1 - p max ) - ( 1 - s b , c ( t ) ) q r , c ( t ) ) - 2 c N M μ r , c ( t ) q b , c ( t ) q r , c ( t )
(20)

Assuming that λ Λ, thus there is ε > 0 such that λ + ε Λ. Using the randomized stationary algorithm, as in the proof of Theorem 2, and taking the expectation of (20) yields

E ( Δ L ( q ( t + 1 ) ) ) B - 1 - β q b , c ( t )
(21)

where β= B - 2 -2ε ( 1 - p m a x ) - q r , c ( t ) ,E { B 1 } = B - 1 and E { B 2 } = B - 2 . Note that the TOSC-wo minimizes the left side of (20) over all possible μ(t) including the solution of the randomized algorithm. Thus, (21) holds for TOSC-wo.

Besides, since s r, c (t) = {0, 1} and μ r, c (t) = {0, 1}, we have E {s r, c (t)2 μ r, c (t)2} = E{s r, c (t) μ r, c (t)}. Furthermore, due to q r, c (t) ≤ 1, the queue q r, c (t) is always stable, we have E {s r, c (t) μ r, c (t)} = E{(1 - p b, c (t)) μ b, c (t)} = (1 - p b, c ) λ c . Plugging these equations into B - 2 yields

B - 2 = 2 c N M ( 1 - p b , c ) ( λ c - λ c 2 ) .
(22)

As shown in (16), the sufficient condition to stabilize the queuing system is β > 0 for all q r, c (t) ≥ 0. Thus, the sufficient condition for ε is B - 2 -2ε ( 1 - p m a x ) >0. Using (22), the sufficient condition for the stability of the queueing system under TOSC-wo is ε> 1 ( 1 - p m a x ) c N M ( 1 - p b , c ) ( λ c - λ c 2 ) . This proves Theorem 3.

References

  1. Ozgur A, Leveque O, Tse DL: Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks. IEEE Trans Inf Theory 2007, 53(10):3549-3572.

    Article  MathSciNet  Google Scholar 

  2. Peters SW, Heath RW: The future of WiMAX: multihop relaying with IEEE 802.16j. Commun Mag 2009, 47: 104-111.

    Article  Google Scholar 

  3. Sadek A, Liu K, Ephremides A: Cognitive multiple access via cooperation: protocol design and performance analysis. IEEE Trans Inf Theory 2007, 53(10):3677-3696.

    Article  MathSciNet  Google Scholar 

  4. Tassiulas L, Ephremides A: Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks. IEEE Trans Automat Control 1992, 37(12):1936-1948. 10.1109/9.182479

    Article  MATH  MathSciNet  Google Scholar 

  5. Muller A, Yang HC: Dual-hop adaptive packet transmission systems with regenerative relaying. IEEE Trans Wirel Commun 2010, 9: 234-244.

    Article  Google Scholar 

  6. Laneman J, Tse D, Wornell G: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans Inf Theory 2004, 50(12):3062-3080. 10.1109/TIT.2004.838089

    Article  MATH  MathSciNet  Google Scholar 

  7. Kramer G, Gastpar M, Gupta P: Cooperative strategies and capacity theorems for relay networks. IEEE Trans Inf Theory 2005, 51(9):3037-3063. 10.1109/TIT.2005.853304

    Article  MATH  MathSciNet  Google Scholar 

  8. Neely MJ, Urgaonkar R: Optimal backpressure routing for wireless networks with multi-receiver diversity. Ad Hoc Netw 2009, 7: 862-881. 10.1016/j.adhoc.2008.07.009

    Article  Google Scholar 

  9. Lott C, Teneketzis D: Stochastic routing in ad-hoc networks. IEEE Trans Automat Control 2006, 51: 52-70. 10.1109/TAC.2005.860280

    Article  MathSciNet  Google Scholar 

  10. Rong B, Ephremides A: Protocol-level cooperation in wireless networks: stable throughput and delay analysis. Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOPT'09), Seoul, Korea 2009, 151-160.

    Google Scholar 

  11. Georgiadis L, Neely MJ, Tassiulas L: Resource allocation and cross-layer control in wireless networks. Found. Trends Netw 2006, 1: 1-144.

    Article  Google Scholar 

  12. Yeh E, Berry R: Throughput optimal control of cooperative relay networks. IEEE Trans Inf Theory 2007, 53(10):3827-3833.

    Article  MathSciNet  Google Scholar 

  13. Shi Y, Sharma S, Hou YT, Kompella S: Optimal relay assignment for cooperative communications. Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc '08), Hong Kong, China 2008, 3-12.

    Chapter  Google Scholar 

  14. Daniels RC, Heath RW: An online learning framework for link adaptation in wireless networks. In Proceedings of the Information Theory and Applications Workshop. San Diego, CA, USA; 2009:138-140.

    Google Scholar 

  15. Kodialam M, Nandagopal T: Characterizing the capacity region in multi-radio multi-channel wireless mesh networks. In Proceedings of the 11th annual international conference on Mobile computing and networking (MobiCom '05). Cologne, Germany; 2005:73-87.

    Google Scholar 

  16. Wang Y, Boyd S: Performance bounds for linear stochastic control. Syst Control Lett 2009, 58(3):178-182. 10.1016/j.sysconle.2008.10.004

    Article  MATH  MathSciNet  Google Scholar 

  17. Sargent RW: Optimal control. Comput Appl Math 2000, 124: 361-371. 10.1016/S0377-0427(00)00418-0

    Article  MATH  MathSciNet  Google Scholar 

  18. Andrews M, Kumaran K, Ramanan K, Stolyar A, Whiting P, Vijayakumar R: Providing quality of service over a shared wireless link. IEEE Commun Mag 2001, 39(2):150-154. 10.1109/35.900644

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology (2011-0024888).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Won-Joo Hwang.

Additional information

Competing interests

The authors declare that they have no competing interests

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://creativecommons.org/licenses/by/2.0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Pham, NT., Huynh, T. & Hwang, WJ. Throughput-optimal scheduling for cooperative relaying in wireless access networks. J Wireless Com Network 2012, 70 (2012). https://doi.org/10.1186/1687-1499-2012-70

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2012-70

Keywords