Model and method for computing performance bounds in multi-hop wireless networks
First Claim
1. A method of modeling wireless interference among wireless links between a plurality of wireless nodes in a wireless network, the method comprising:
- accepting connectivity information for the network;
identifying wireless links between nodes of the network from the connectivity information;
representing each identified link as a vertex; and
creating an edge between a first vertex and a second vertex if the corresponding wireless links interfere with one another.
5 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a general model and method for computing performance bounds in multi-hop wireless networks. Rather than focusing on computing asymptotic performance bounds under assumptions of homogeneity or randomness in the network topology and/or workload, the present invention accommodates any given network, technology, interference model, routing paradigm, and workload. Using a conflict graph to formally characterize the impact of wireless interference on the performance of multi-hop wireless networks, methods for computing upper and lower bounds on the capacity of a given wireless network are detailed. Besides computing network capacity, the model and method disclosed can also enable or benefit other applications including maximizing fairness and minimizing maximum link utilization.
-
Citations
89 Claims
-
1. A method of modeling wireless interference among wireless links between a plurality of wireless nodes in a wireless network, the method comprising:
-
accepting connectivity information for the network;
identifying wireless links between nodes of the network from the connectivity information;
representing each identified link as a vertex; and
creating an edge between a first vertex and a second vertex if the corresponding wireless links interfere with one another. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-readable medium containing instructions for performing a method of modeling wireless interference among wireless links between a plurality of wireless nodes in a wireless network, the method comprising:
-
accepting connectivity information for the network;
identifying wireless links between nodes of the network from the connectivity information;
representing each identified link as a vertex; and
creating an edge between a first vertex and a second vertex if the corresponding wireless links interfere with one another.
-
-
19. A computer-readable medium having stored thereon a conflict graph data structure, the data structure comprising:
-
a first data field containing data representing a first wireless link;
a second data field containing data representing a second wireless link; and
a third data field containing data representing whether the first and second wireless links are in conflict. - View Dependent Claims (20, 21)
-
-
22. A method for computing an upper bound on throughput that a wireless network can support using a protocol interference model, the method comprising:
-
accepting connectivity information for the network;
identifying wireless links between nodes of the network from the connectivity information;
representing each identified link as a vertex;
creating a non-directional edge between a first vertex and a second vertex if the corresponding wireless links interfere with one another;
assigning to the edge a weight of zero (0) if the links are not in conflict with each other;
assigning to the edge a weight of one (1) if the links are in conflict with each other;
formulating a linear program corresponding to a max-flow problem;
identifying at least one clique among the vertices;
formulating a constraint for each identified clique;
incorporating the constraint in the linear program; and
solving the linear program. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A computer-readable medium containing instructions for performing a method for computing an upper bound on throughput that a wireless network can support using a protocol interference model, the method comprising:
-
accepting connectivity information for the network;
identifying wireless links between nodes of the network from the connectivity information;
representing each identified link as a vertex;
creating a non-directional edge between a first vertex and a second vertex if the corresponding wireless links interfere with one another;
assigning to the edge a weight of zero (0) if the links are not in conflict with each other;
assigning to the edge a weight of one (1) if the links are in conflict with each other;
formulating a linear program corresponding to a max-flow problem;
identifying at least one clique among the vertices;
formulating a constraint for each identified clique;
incorporating the constraint in the linear program; and
solving the linear program.
-
-
37. A method for computing a lower bound on throughput that a wireless network can support using a protocol interference model, the method comprising:
-
accepting connectivity information for the network;
identifying wireless links between nodes of the network from the connectivity information;
representing each identified link as a vertex;
creating a non-directional edge between a first vertex and a second vertex if the corresponding wireless links interfere with one another;
assigning to the edge a weight of zero (0) if the links are not in conflict with each other;
assigning to the edge a weight of one (1) if the links are in conflict with each other;
formulating a linear program corresponding to a max-flow problem;
identifying at least one independent set among the vertices;
formulating a constraint for each identified independent set;
incorporating the constraint in the linear program; and
solving the linear program. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
-
-
51. A computer-readable medium containing instructions for performing a method for computing a lower bound on throughput that a wireless network can support using a protocol interference model, the method comprising:
-
accepting connectivity information for the network;
identifying wireless links between nodes of the network from the connectivity information;
representing each identified link as a vertex;
creating a non-directional edge between a first vertex and a second vertex if the corresponding wireless links interfere with one another;
assigning to the edge a weight of zero (0) if the links are not in conflict with each other;
assigning to the edge a weight of one (1) if the links are in conflict with each other;
formulating a linear program corresponding to a max-flow problem;
identifying at least one independent set among the vertices;
formulating a constraint for each identified independent set;
incorporating the constraint in the linear program; and
solving the linear program.
-
-
52. A method for computing an upper bound on throughput that a wireless network can support using a physical interference model, the method comprising:
-
accepting connectivity information for the network;
identifying wireless links between nodes of the network from the connectivity information;
representing each identified link as a vertex;
creating a directional edge between a first vertex and a second vertex if the corresponding wireless links interfere with one another;
assigning to the edge a weight equal to a fraction of a maximum permissible noise at a link corresponding to the second vertex contributed by activity on the link corresponding to the first vertex;
formulating a linear program corresponding to a max-flow problem;
identifying at least one non-schedulable set among the vertices;
formulating a constraint for each identified non-schedulable set;
incorporating the constraint in the linear program; and
solving the linear program. - View Dependent Claims (53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65)
-
-
66. A computer-readable medium containing instructions for performing a method for computing an upper bound on throughput that a wireless network can support using a physical interference model, the method comprising:
-
accepting connectivity information for the network;
identifying wireless links between nodes of the network from the connectivity information;
representing each identified link as a vertex;
creating a directional edge between a first vertex and a second vertex if the corresponding wireless links interfere with one another;
assigning to the edge a weight equal to a fraction of a maximum permissible noise at a link corresponding to the second vertex contributed by activity on the link corresponding to the first vertex;
formulating a linear program corresponding to a max-flow problem;
identifying at least one non-schedulable set among the vertices;
formulating a constraint for each identified non-schedulable set;
incorporating the constraint in the linear program; and
solving the linear program.
-
-
67. A method for computing a lower bound on throughput that a wireless network can support using a physical interference model, the method comprising:
-
accepting connectivity information for the network;
identifying wireless links between nodes of the network from the connectivity information;
representing each identified link as a vertex;
creating a directional edge between a first vertex and a second vertex if the corresponding wireless links interfere with one another;
assigning to the edge a weight equal to a fraction of a maximum permissible noise at a link corresponding to the second vertex contributed by activity on the link corresponding to the first vertex;
formulating a linear program corresponding to a max-flow problem;
identifying at least one schedulable set among the vertices;
formulating a constraint for each identified schedulable set;
incorporating the constraint in the linear program; and
solving the linear program. - View Dependent Claims (68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80)
-
-
81. A computer-readable medium containing instructions for performing a method for computing a lower bound on throughput that a wireless network can support using a physical interference model, the method comprising:
-
accepting connectivity information for the network;
identifying wireless links between nodes of the network from the connectivity information;
representing each identified link as a vertex;
creating a directional edge between a first vertex and a second vertex if the corresponding wireless links interfere with one another;
assigning to the edge a weight equal to a fraction of a maximum permissible noise at a link corresponding to the second vertex contributed by activity on the link corresponding to the first vertex;
formulating a linear program corresponding to a max-flow problem;
identifying at least one schedulable set among the vertices;
formulating a constraint for each identified schedulable set;
incorporating the constraint in the linear program; and
solving the linear program.
-
-
82. A method for improving throughput in a wireless network, the method comprising:
-
accepting connectivity information for the network;
identifying wireless links between nodes of the network from the connectivity information;
representing each identified link as a vertex;
creating a directional edge between a first vertex and a second vertex if the corresponding wireless links interfere with one another;
assigning to the edge a weight equal to a fraction of a maximum permissible noise at a link corresponding to the second vertex contributed by activity on the link corresponding to the first vertex;
collecting the edge and weight information at a centralized location; and
using the edge and weight information to determining routing paths. - View Dependent Claims (83)
-
-
84. A computer-readable medium containing instructions for performing a method for improving throughput in a wireless network, the method comprising:
-
accepting connectivity information for the network;
identifying wireless links between nodes of the network from the connectivity information;
representing each identified link as a vertex;
creating a directional edge between a first vertex and a second vertex if the corresponding wireless links interfere with one another;
assigning to the edge a weight equal to a fraction of a maximum permissible noise at a link corresponding to the second vertex contributed by activity on the link corresponding to the first vertex;
collecting the edge and weight information at a centralized location; and
using the edge and weight information to determining routing paths.
-
-
85. A method for computing a throughput that a wireless network can support, the method comprising:
-
accepting connectivity information for the network;
identifying at each node of the connectivity information for the network an exclusive outgoing edge having non-zero flow;
formulating a mixed-integer program corresponding to a max-flow problem;
formulating a constraint corresponding to the exclusive outgoing edge having non-zero flow;
incorporating the constraint in the mixed-integer program; and
solving the mixed-integer program. - View Dependent Claims (86, 87, 88)
-
-
89. A computer-readable medium containing instructions for performing a method for computing a throughput that a wireless network can support, the method comprising:
-
accepting connectivity information for the network;
identifying at each node of the connectivity information for the network an exclusive outgoing edge having non-zero flow;
formulating a mixed-integer program corresponding to a max-flow problem;
formulating a constraint corresponding to the exclusive outgoing edge having non-zero flow;
incorporating the constraint in the mixed-integer program; and
solving the mixed-integer program.
-
Specification