This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

On some distributed scheduling algorithms for wireless networks with hypergraph interference models

Ashwin Ganesan A. Ganesan is an Associate Professor at the International School of Engineering (INSOFE), INSOFE Education Private Limited, Mumbai, Maharashtra, India. ashwin.ganesan@gmail.com.
Abstract

It is shown that the performance of the maximal scheduling algorithm in wireless ad hoc networks under the hypergraph interference model can be further away from optimal than previously known. The exact worst-case performance of this distributed, greedy scheduling algorithm is analyzed.


Index terms — hypergraph interference models, wireless networks, admission control, fractional chromatic number, upper bounds, maximal scheduling, distributed algorithms

1 Introduction

A long-standing open problem is to develop simple, distributed scheduling algorithms for wireless networks that are provably efficient. Distributed mechanisms for admission control and scheduling have lower communication overhead and lesser complexity than optimal, centralized algorithms. A distributed, greedy scheduling algorithm for wireless networks which has been well-studied in the literature is maximal scheduling; it is suboptimal, and it is known that its worst-case performance is characterized by the interference degree of the conflict graph [2], [4], [5].

Modeling interference using hypergraphs instead of graphs helps capture certain complexities and increase system capacity (cf. [13], [12], [15]). In the present work, we extend the previous results in the literature on performance analysis of the maximal scheduling algorithm to the more general case of hypergraphs. We define the so-called interference degree of a hypergraph, which characterizes the worst-case performance of maximal scheduling.

2 System Model

A hypergraph HH (on LL) is a pair (L,)(L,\mathcal{E}), where LL is a set and \mathcal{E} is a collection of subsets of LL. The set LL is called the ground set of the hypergraph, and each element of \mathcal{E} is called an edge (or a hyperedge). A graph is a special case of a hypergraph where each hyperedge contains exactly two elements. A subset of vertices is an independent set in the hypergraph if it does not contain any hyperedge.

Let G=(V,L)G=(V,L) be a wireless network, where VV is a set of nodes and L={1,,N}L=\{\ell_{1},\ldots,\ell_{N}\} (iV×V)(\ell_{i}\in V\times V) is a set of wireless links. Due to wireless interference, links in the same vicinity cannot be simultaneously active. The interference is modeled using a (conflict) hypergraph H=(L,)H=(L,\mathcal{E}), where LL is the ground set of the hypergraph and \mathcal{E} consists of the set of all subsets ELE\subseteq L such that EE is a minimal subset of links that cannot be simultaneously active due to interference. For example, consider a wireless network G=(V,L)G=(V,L) consisting of three nodes and three links L={1,2,3}L=\{\ell_{1},\ell_{2},\ell_{3}\} that form a triangle. It is possible for the interference to be such that any two of these three links can be simultaneously active, but if all three links are simultaneously active the interference is intolerable. In that case, F={1,2,3}F=\{\ell_{1},\ell_{2},\ell_{3}\} is a minimal forbidden set of links and therefore is a hyperedge. The subset FF is “minimal” in the sense that no proper subset of FF is forbidden. The maximal independent sets of this hypergraph H=(L,{F})H=(L,\{F\}) are exactly {1,2}\{\ell_{1},\ell_{2}\}, {2,3}\{\ell_{2},\ell_{3}\}, and {1,3}\{\ell_{1},\ell_{3}\}. To understand how this hypergraph model HH achieves better throughput than any conflict graph model on the same vertex set LL, observe that there does not exist a conflict graph on vertex set LL which has the same set of independent sets as HH. For example, consider the conflict graph Gc=(L,L)G_{c}=(L,L^{\prime}) where L={12}L^{\prime}=\{\ell_{1}\ell_{2}\} contains a single edge. Then, all independent sets of this conflict graph are also independent sets in the hypergraph and hence can be simultaneously active; however, there exist subsets of links such as {1,2}\{\ell_{1},\ell_{2}\} which can be simultaneously active but which are not independent sets of the conflict graph. Hence, there exist independent sets of the hypergraph which are not independent sets of the conflict graph. The conflict graph cannot be taken to be the empty graph, because all three links form an independent set in the empty graph but cannot be simultaneously active. Conflict graph models are conservative and underutilize the network resources because they have fewer sets of independent sets [13], [11].

The admission control problem is now formally stated. Let τ=(τ():L)\tau=(\tau(\ell):\ell\in L) be a link demand vector, where the quality-of-service requirement for each link is specified by the fraction τ()\tau(\ell) of each unit of time that link \ell demands to be active. An independent set of the hypergraph H=(L,)H=(L,\mathcal{E}) is a subset JLJ\subseteq L that does not contain any hyperedge [1]. Let (H)\mathcal{I}(H) denote the set of all independent sets of HH. A schedule is a map t:(H)0t:\mathcal{I}(H)\rightarrow\mathbb{R}_{\geq 0} that assigns a time duration t(J)t(J) to each independent set JJ of the hypergraph. The total duration of the schedule tt is J(H)t(J)\sum_{J\in\mathcal{I}(H)}t(J). The schedule tt satisfies demand τ\tau if J:iJt(J)τ(i)\sum_{J:\ell_{i}\in J}t(J)\geq\tau(\ell_{i}), for all iL\ell_{i}\in L. A link demand vector τ\tau is said to be feasible if there exists a schedule of duration at most 11 satisfying demand τ\tau. Given a conflict hypergraph HH and link demand vector τ\tau, the admission control problem is to determine whether τ\tau is feasible. The present focus is on distributed mechanisms for admission control, wherein feasibility is determined using only localized information. Also, the admission control and scheduling problems have been well-studied for the conflict graph model (cf. [8], [9], [2], [6]), and the present work extends these results to hypergraph models.

An equivalent formulation of the admission control problem is as follows. Given the conflict hypergraph H=(L,)H=(L,\mathcal{E}), with L={1,,N}L=\{\ell_{1},\ldots,\ell_{N}\}, let (H)={I1,I2,,IK}\mathcal{I}(H)=\{I_{1},I_{2},\ldots,I_{K}\} be the set of all independent sets of HH. Define the N×KN\times K 0,10,1 link-independent set incidence matrix M=[mij]M=[m_{ij}] by mij=1m_{ij}=1 if and only if liIjl_{i}\in I_{j}. Let τ\tau by a link demand vector. The fractional chromatic number of the weighted hypergraph (H,τ)(H,\tau), denoted by χf(H,τ)\chi_{f}(H,\tau), is defined to be the optimal value of the linear program: minimize 1Tt1^{T}t subject to Mtτ,t0Mt\geq\tau,t\geq 0. A link demand vector τ\tau is said to be feasible if χf(H,τ)1\chi_{f}(H,\tau)\leq 1. Let PI=PI(H)P_{I}=P_{I}(H) denote the convex hull of the characteristic vectors of the independent sets of HH. Then, PIP_{I} is exactly the set of all link demand vectors that are feasible.

The notation used is standard. In the sequel, [i][i] denotes the set {1,2,,i}\{1,2,\ldots,i\}. Given a conflict hypergraph H=(L,)H=(L,\mathcal{E}), NiN_{i} denotes the set of neighbors of link i\ell_{i} and is defined as the set of other links j\ell_{j} such that i\ell_{i} and j\ell_{j} belong to the same hyperedge:

Ni={jL:{i,j}E, for some E}.N_{i}=\{\ell_{j}\in L:\{\ell_{i},\ell_{j}\}\subseteq E,\mbox{ for some }E\in\mathcal{E}\}.

The set of edges of HH that contain i\ell_{i} is denoted H(i)H(\ell_{i}).

3 Distributed scheduling algorithms

In this section, sufficient conditions for a link demand vector to be feasible are given. The sufficient conditions for admission control given in this section can be extended to provide a feasible schedule when the demand vector is feasible. Thus, the results below give distributed algorithms for both admission control and scheduling. The first sufficient condition is an extension of the greedy coloring algorithm for graphs to the case of hypergraphs. A special case of this sufficient condition, obtained when the hypergraph is a graph, is the row constraints of [10], [7].

There are two parallel sequences of papers in the literature – one is [10], [7], [4], [5] and another is [2], [11]. More specifically, distributed, greedy (maximal) scheduling algorithms have been studied in [10], [7], [4], [5], and the purpose of the present paper is to generalize these results to the case of hypergraphs. The other parallel sequence of [2], [11] formulates the problem using the framework of arrival processes and fluid limits. It should be possible to abstract the essential details from their proofs, but by giving a more complete treatment as has been done in the present section, the following objectives are achieved: (a) The results and their proofs are more accessible to the reader – only techniques such as induction and combinatorics are required, (b) The results that are essentially new can often be stated in the simpler model, and so it makes sense to give an accessible version of the statement of the theorem and its proof (with just these essential details). The results and proofs recalled in the present section would be of interest to many researchers whose interest is in such techniques. There are many directions in which these results can be extended. Theorem 3 and Corollary 4 are essentially from [11], but the proofs given here are based on our system model.

Lemma 1.

Let H=(L,)H=(L,\mathcal{E}) by a conflict hypergraph and let τ\tau be a link demand vector. A sufficient condition for τ\tau to be feasible is that

τ(i)+EH(i)minjE{i}τ(j)1,iL.\tau(\ell_{i})+\sum_{E\in H(\ell_{i})}\min_{\ell_{j}\in E-\{\ell_{i}\}}\tau(\ell_{j})\leq 1,\forall\ell_{i}\in L.

Proof: By the given inequality for 1\ell_{1}, it is possible to schedule 1\ell_{1}, i.e. it is possible to assign to link 1\ell_{1} a subset J1=[0,τ(1)][0,1]J_{1}=[0,\tau(\ell_{1})]\subseteq[0,1] of total length |J1|=τ(1)|J_{1}|=\tau(\ell_{1}). Suppose 1,,i\ell_{1},\ldots,\ell_{i} have already been scheduled. It will be shown that i+1\ell_{i+1} can also be assigned a subset of [0,1][0,1] such that not all links in a hyperedge are simultaneously active (except possibly at endpoints of subintervals).

Let \mathcal{F} denote the set of hyperedges EE\in\mathcal{E} such that EE contains i+1\ell_{i+1} and all other links in EE have previously been scheduled, i.e. EE satisfies i+1E\ell_{i+1}\in E and E{1,,i+1}E\subseteq\{\ell_{1},\ldots,\ell_{i+1}\}. For EE\in\mathcal{F}, define the common time slots of all links in EE that have already been scheduled:

δ(E)=j:jE,jiJj.\delta(E)=\bigcap_{j:\ell_{j}\in E,j\leq i}J_{j}.

Because the set of links in a hyperedge cannot be simultaneously active, it is necessary that Ji+1J_{i+1} be disjoint from δ(E)\delta(E), for each EE\in\mathcal{F}. Also, |δ(E)|minjE:jiτ(j)|\delta(E)|\leq\min_{\ell_{j}\in E:j\leq i}\tau(\ell_{j}). It follows from the given inequality for i+1\ell_{i+1} that τ(i+1)+E|δ(E)|1\tau(\ell_{i+1})+\sum_{E\in\mathcal{F}}|\delta(E)|\leq 1. Hence, i+1\ell_{i+1} can also be assigned a subset Ji+1[0,1]J_{i+1}\subseteq[0,1] such that |Ji+1|=τ(i+1)|J_{i+1}|=\tau(\ell_{i+1}).   

Given a hypergraph H=(L,)H=(L,\mathcal{E}) with link set L={1,,N}L=\{\ell_{1},\ldots,\ell_{N}\}, let 𝒲\mathcal{W} denote the set of all N×NN\times N real, symmetric matrices WW such that (1) Wij[0,1],i,j[N]W_{ij}\in[0,1],\forall i,j\in[N], (2) Wii=0W_{ii}=0 for all i[N]i\in[N], Wij=0W_{ij}=0 if jNij\notin N_{i}, and (3) jEWij1\sum_{j\in E}W_{ij}\geq 1 for all iEi\in E and EE\in\mathcal{E}.

Lemma 2.

Let H=(L,)H=(L,\mathcal{E}) be a conflict hypergraph, let W𝒲W\in\mathcal{W}, and let τ\tau be a link demand vector. Fix i1i\geq 1. Suppose Jj[0,1]J_{j}\subseteq[0,1] satisfies |Jj|=τ(j)|J_{j}|=\tau(\ell_{j}), for all jij\leq i. Let \mathcal{F} be the collection of hyperedges EE of HH which contain i+1\ell_{i+1} and such that every link in EE has index at most i+1i+1. For EE\in\mathcal{F}, define δ(E)=j:jE,jiJj\delta(E)=\cap_{j:\ell_{j}\in E,j\leq i}J_{j}. Then,

|Eδ(E)|ji+1{Wi+1,jτ(j)}.\left|\bigcup_{E\in\mathcal{F}}\delta(E)\right|\leq\sum_{j\neq i+1}\{W_{i+1,j}\tau(\ell_{j})\}.

Proof: The proof is by induction on |||\mathcal{F}|. If ||=1|\mathcal{F}|=1, then

|δ(E1)|=|j:ji,jE1Jj|minj:ji,jE1τ(j)j:ji,jE1{Wi+1,jτ(j)}\begin{split}|\delta(E_{1})|&=\left|\bigcap_{j:j\leq i,\ell_{j}\in E_{1}}J_{j}\right|\\ &\leq\min_{j:j\leq i,\ell_{j}\in E_{1}}\tau(\ell_{j})\\ &\leq\sum_{j:j\leq i,\ell_{j}\in E_{1}}\{W_{i+1,j}\tau(\ell_{j})\}\end{split}

where we have used the facts |Jj|=τ(j)|J_{j}|=\tau(\ell_{j}) for jij\leq i, and j:ji,jE1Wi+1,j1\sum_{j:j\leq i,\ell_{j}\in E_{1}}W_{i+1,j}\geq 1 for W𝒲W\in\mathcal{W}. Now fix ||=k2|\mathcal{F}|=k\geq 2, where ={E1,,Ek}\mathcal{F}=\{E_{1},\ldots,E_{k}\}, and assume the assertion holds for all smaller values of |||\mathcal{F}|. It suffices to prove

|δ(E1)δ(Ek)|ji+1{Wi+1,jτ(j)}.|\delta(E_{1})\cup\cdots\cup\delta(E_{k})|\leq\sum_{j\neq i+1}\{W_{i+1,j}\tau(\ell_{j})\}.

Define the modified time intervals and demands

Jj:=Jjδ(Ek),j[N]J^{\prime}_{j}:=J_{j}-\delta(E_{k}),\forall j\in[N]
δ(Er):=j:ji,jErJj,r[k1]\delta^{\prime}(E_{r}):=\bigcap_{j:j\leq i,\ell_{j}\in E_{r}}J^{\prime}_{j},\forall r\in[k-1]
τ(j):=τ(j)|δ(Ek)Jj|,j[N].\tau^{\prime}(\ell_{j}):=\tau(\ell_{j})-|\delta(E_{k})\cap J_{j}|,\forall j\in[N].

Then, the left-hand side can be rewritten as

|δ(E1)δ(Ek)|=|δ(E1)δ(Ek1)|+|δ(Ek)|.|\delta(E_{1})\cup\cdots\cup\delta(E_{k})|=|\delta^{\prime}(E_{1})\cup\cdots\cup\delta^{\prime}(E_{k-1})|+|\delta(E_{k})|.

Also, |Jj|=τ(j),j[i]|J^{\prime}_{j}|=\tau^{\prime}(\ell_{j}),\forall j\in[i]. The right-hand side can be rewritten as

ji+1{Wi+1,jτ(j)}=ji+1{Wi+1,jτ(j)}+ji+1{Wi+1,j|δ(Ek)Jj|}.\sum_{j\neq i+1}\{W_{i+1,j}\tau(\ell_{j})\}=\sum_{j\neq i+1}\{W_{i+1,j}\tau^{\prime}(\ell_{j})\}+\sum_{j\neq i+1}\{W_{i+1,j}|\delta(E_{k})\cap J_{j}|\}.

By the inductive hypothesis,

|δ(E1)δ(Ek1)|ji+1{Wi+1,jτ(j)}.|\delta^{\prime}(E_{1})\cup\cdots\cup\delta^{\prime}(E_{k-1})|\leq\sum_{j\neq i+1}\{W_{i+1,j}\tau^{\prime}(\ell_{j})\}.

It remains to show

|δ(Ek)ji+1{Wi+1,j|δ(Ek)Jj|}.|\delta(E_{k})\leq\sum_{j\neq i+1}\{W_{i+1,j}|\delta(E_{k})\cap J_{j}|\}.

Because δ(Ek)Jj\delta(E_{k})\subseteq J_{j} for jEk{i+1}\ell_{j}\in E_{k}-\{\ell_{i+1}\}, one obtains

ji+1{Wi+1,j|δ(Ek)Jj|}j:ji,jEk{Wi+1,j|δ(Ek)Jj|}j:ji,jEk{Wi+1,j|δ(Ek)|}|δ(Ek)|.\begin{split}\sum_{j\neq i+1}\{W_{i+1,j}|\delta(E_{k})\cap J_{j}|\}&\geq\sum_{j:j\leq i,\ell_{j}\in E_{k}}\{W_{i+1,j}|\delta(E_{k})\cap J_{j}|\}\\ &\geq\sum_{j:j\leq i,\ell_{j}\in E_{k}}\{W_{i+1,j}|\delta(E_{k})|\}\\ &\geq|\delta(E_{k})|.\end{split}

 

Theorem 3.

[11, Theorem 1] Let H=(L,)H=(L,\mathcal{E}) be a conflict hypergraph and let τ\tau be a link demand vector. A sufficient condition for τ\tau to be feasible is that there exists some W𝒲W\in\mathcal{W} such that (I+W)τ1(I+W)\tau\leq 1.

Proof: Let τ\tau be a link demand vector and suppose there exists W𝒲W\in\mathcal{W} satisfying

τ(i)+ji{Wijτ(j)}1,i[N].\tau(\ell_{i})+\sum_{j\neq i}\{W_{ij}\tau(\ell_{j})\}\leq 1,\forall i\in[N].

It needs to be shown that τ\tau is feasible, i.e. that each link i\ell_{i} can be assigned a subset Ji[0,1]J_{i}\subseteq[0,1] of total length τ(i)\tau(\ell_{i}) such that not all links in any hyperedge are assigned the same subinterval (except possibly for endpoints of subintervals). Initially, when none of the links have been scheduled, Ji=ϕJ_{i}=\phi, for all i[N]i\in[N]. By the inequality for 1\ell_{1} given in the assertion, τ(1)1\tau(\ell_{1})\leq 1, whence link 1\ell_{1} can be assigned the time interval J1=[0,τ(1)]J_{1}=[0,\tau(\ell_{1})]. Suppose links 1,i\ell_{1},\ldots\ell_{i} have already been assigned time intervals J1,,JiJ_{1},\ldots,J_{i}, respectively. It suffices to show that i+1\ell_{i+1} can also be scheduled.

In order to ensure that the time interval assigned to link i+1\ell_{i+1} does not conflict with those assigned already to its neighbors, consider the set of hyperedges :={E:i+1E, and ji+1,jE}\mathcal{F}:=\{E\in\mathcal{E}:\ell_{i+1}\in E,\mbox{ and }j\leq i+1,\forall\ell_{j}\in E\}. In other words, it suffices to consider those hyperedges which contain the current link i+1\ell_{i+1} of interest and whose remaining links have already been scheduled; time intervals assigned to links j\ell_{j} with j>i+1j>i+1 can be ignored at this time because Jj=ϕJ_{j}=\phi for j>i+1j>i+1.

Define the common time slots δ(E):=j:ji,jEJj\delta(E):=\cap_{j:j\leq i,\ell_{j}\in E}J_{j}, for EE\in\mathcal{F}. To ensure that not all links in a hyperedge are simultaneously active, it is necessary and sufficient that Ji+1J_{i+1} be disjoint from δ(E)\delta(E) (except at endpoints of subintervals) for all EE\in\mathcal{F}. Hence, to show that the demand τ(i+1)\tau(\ell_{i+1}) can be satisfied, it suffices to show that τ(i+1)+|Eδ(E)|1\tau(\ell_{i+1})+|\cup_{E\in\mathcal{F}}\delta(E)|\leq 1. By the inequality for i+1\ell_{i+1} given in the assertion, it suffices to prove

|Eδ(E)|ji+1{Wi+1,jτ(j)}.\left|\bigcup_{E\in\mathcal{F}}\delta(E)\right|\leq\sum_{j\neq i+1}\{W_{i+1,j}\tau(\ell_{j})\}.

But this follows from Lemma 2.   

A special case of an element of 𝒲\mathcal{W} is the matrix {Δij}\{\Delta_{ij}\} defined as follows. For i[N]i\in[N], define

Δij={max{1|E|1:E,{i,j}E}, if jNi0, if jNi\Delta_{ij}=\begin{cases}\max\left\{\frac{1}{|E|-1}:E\in\mathcal{E},\{\ell_{i},\ell_{j}\}\subseteq E\right\},&\mbox{ if }j\in N_{i}\\ 0,&\mbox{ if }j\notin N_{i}\end{cases}
Corollary 4.

[11] Let H=(L,)H=(L,\mathcal{E}) be a conflict hypergraph and let τ\tau be a link demand vector. Define Δij=Δij(H)\Delta_{ij}=\Delta_{ij}(H) as above. Then, a sufficient condition for τ\tau to be feasible is

τ(i)+ji{Δijτ(j)}1,i[N].\tau(\ell_{i})+\sum_{j\neq i}\{\Delta_{ij}\tau(\ell_{j})\}\leq 1,\forall i\in[N].

Proof: It can be verified that the matrix D=[Δij]D=[\Delta_{ij}] belongs to 𝒲\mathcal{W}. By Theorem 3, τ\tau is feasible.   

4 Worst-case Performance

Corollary 4 gave a sufficient condition for admission control. This is equivalent to giving an upper bound on the fractional chromatic number χf(H,τ)\chi_{f}(H,\tau). Define

B(H,τ)=maxi[N]{τ(i)+ji{Δijτ(j)}}.B(H,\tau)=\max_{i\in[N]}\left\{\tau(\ell_{i})+\sum_{j\neq i}\left\{\Delta_{ij}\tau(\ell_{j})\right\}\right\}.

It follows from Corollary 4 that χf(H,τ)B(H,τ)\chi_{f}(H,\tau)\leq B(H,\tau). The worst-case performance of a sufficient condition is defined to be the largest factor by which the upper bound is away from optimal, and is defined by the hypergraph invariant

β(H):=supτ0B(H,τ)χf(H,τ).\beta(H):=\sup_{\tau\neq 0}\frac{B(H,\tau)}{\chi_{f}(H,\tau)}.

Thus, β(H)=supτPIB(H,τ)\beta(H)=\sup_{\tau\in P_{I}}B(H,\tau). In this section, an analysis of the worst-case performance is carried out for the above sufficient condition.

Definition 5.

Given a hypergraph H=(L,)H=(L,\mathcal{E}), define the following quantities for i[N]i\in[N]:

Δi=maxJNi:J(H)jJΔij\Delta_{i}^{\prime}=\max_{J\subseteq N_{i}:J\in\mathcal{I}(H)}\sum_{j\in J}\Delta_{ij}
Δi′′=maxJNi:J{i}(H)1+jJΔij\Delta_{i}^{\prime\prime}=\max_{J\subseteq N_{i}:J\cup\{i\}\in\mathcal{I}(H)}1+\sum_{j\in J}\Delta_{ij}
Δ=maxi[N]Δi\Delta^{\prime}=\max_{i\in[N]}\Delta_{i}^{\prime}
Δ′′=maxi[N]Δi′′\Delta^{\prime\prime}=\max_{i\in[N]}\Delta_{i}^{\prime\prime}

Define the interference degree of a hypergraph to be

σ(H)=max{Δ,Δ′′}.\sigma(H)=\max\{\Delta^{\prime},\Delta^{\prime\prime}\}.

Remarks: In [11, Theorem 2], it is claimed that the worst-case performance of Corollary 4 is essentially characterized by Δ=maxi[N]max{1,Δi}\Delta=\max_{i\in[N]}\max\{1,\Delta_{i}^{\prime}\}. It is claimed in [11, Theorem 2] that if a link demand vector τ\tau is feasible, then τ/Δ\tau/\Delta will satisfy the sufficient condition of Corollary 4; however, there seems to be an error in their proof, and a counterexample is given below to show that the worst-case performance can be a factor of more than Δ\Delta away from optimal.

In the special case where the conflict hypergraph is a conflict graph, when a link ii is scheduled, none of its neighbors can be scheduled during the same time slot. In this special case, Δij=1\Delta_{ij}=1 if jNij\in N_{i}, and so Δi\Delta_{i}^{\prime} is the largest size of an independent set in NiN_{i}. The graph invariant Δ\Delta^{\prime} is the interference degree or induced star number of the conflict graph (cf. [2], [4], [5]). Also, in the graph case, Δi′′=1\Delta_{i}^{\prime\prime}=1, for all i[N]i\in[N]. Thus, σ(H)\sigma(H) reduces to the induced star number σ(Gc)\sigma(G_{c}) of the conflict graph GcG_{c} in this special case.

However, when generalizing this analysis to hypergraphs, a crucial difference needs to be taken into account. In a hypergraph, when focusing on a particular link i\ell_{i} and maximizing the resource estimate τ(i)+jiΔijτ(j)\tau(\ell_{i})+\sum_{j\neq i}\Delta_{ij}\tau(\ell_{j}), two different cases can arise for a particular time slot. In the first case, a link i\ell_{i} is not scheduled because all of its neighbors in some hyperedge containing it are already scheduled. In this case, the resource estimate is at most Δi\Delta_{i}^{\prime}. In the second case, a link i\ell_{i} can be scheduled at the same time as some of its neighbors - for example, in the example hypergraph below, link 11 can be scheduled at the same time as links 2,3,5,62,3,5,6 because {1,2,3,5,6}\{1,2,3,5,6\} is an independent set of the hypergraph. In such cases, the maximum contribution to the resource estimate during one unit of time can be as large as Δi′′\Delta_{i}^{\prime\prime}. Thus, Δi′′\Delta_{i}^{\prime\prime} can’t be ignored for hypergraph models; it appears that the proof of [11, Theorem 2] has overlooked the term Δi′′\Delta_{i}^{\prime\prime} in the formula for the worst-case performance.

Theorem 6.

There exist conflict hypergraphs H=(L,)H=(L,\mathcal{E}) and link demand vectors τ\tau such that the sufficient condition of Corollary 4 can be away from optimal by a factor larger than Δ\Delta.

Proof: Let H=(L,)H=(L,\mathcal{E}) be the conflict hypergraph ={E1,E2}\mathcal{E}=\{E_{1},E_{2}\}, where E1={1,2,3,4}E_{1}=\{1,2,3,4\}, E2={1,5,6,7}E_{2}=\{1,5,6,7\}. Here, links are labeled as ii instead of i\ell_{i} for simplicity of exposition. It needs to be proved that the worst-case performance β(H)=supτPIB(H,τ)\beta(H)=\sup_{\tau\in P_{I}}B(H,\tau) is larger than Δ\Delta. Consider the link demand vector τ=(12,1,1,\tau=(\frac{1}{2},1,1, 12,1,1,12)\frac{1}{2},1,1,\frac{1}{2}). Then τ\tau is feasible because there exists a schedule of duration at most 11 satisfying τ\tau: the two independent sets {1,2,3,5,6}\{1,2,3,5,6\} and {2,3,4,5,6,7}\{2,3,4,5,6,7\} can each be active for duration 12\frac{1}{2} units, and this gives a schedule satisfying τ\tau. It will be proved that B(H,τ)>ΔB(H,\tau)>\Delta. It suffices to show that B(H,τ)136B(H,\tau)\geq\frac{13}{6} and Δ=2\Delta=2. Observe that B(H,τ):=maxi[N]{τ(i)+ji{Δijτ(j)}}B(H,\tau):=\max_{i\in[N]}\left\{\tau(\ell_{i})+\sum_{j\neq i}\left\{\Delta_{ij}\tau(\ell_{j})\right\}\right\} is at least τ(1)+j1{Δ1jτ(j)}\tau(\ell_{1})+\sum_{j\neq 1}\left\{\Delta_{1j}\tau(\ell_{j})\right\} =12+13(1+1+12+1+1+12)=136=\frac{1}{2}+\frac{1}{3}(1+1+\frac{1}{2}+1+1+\frac{1}{2})=\frac{13}{6}. Also, Δ1=max{jJΔ1j:JN1,J(H)}\Delta_{1}^{\prime}=\max\{\sum_{j\in J}\Delta_{1j}:J\subseteq N_{1},J\in\mathcal{I}(H)\} =j{2,3,4,5,6,7}Δ1j=13×6=2=\sum_{j\in\{2,3,4,5,6,7\}}\Delta_{1j}=\frac{1}{3}\times 6=2, and Δi=1\Delta_{i}^{\prime}=1 for i=2,3,4i=2,3,4. Thus, Δ=maximax{1,Δi}=2\Delta=\max_{i}\max\{1,\Delta_{i}^{\prime}\}=2, as required.   

The demand vector given in the previous example is not uniform on the subset {2,3,,7}\{2,3,\ldots,7\}. However, it appears that the hypergraph HH has some kind of symmetry whereby the links in {2,3,4}\{2,3,4\} can be scheduled in a round-robin manner, and similarly for the links in {5,6,7}\{5,6,7\}, so that the demand vector satisfied by such a schedule has a uniform demand pattern on the subset {2,3,,7}\{2,3,\ldots,7\} and still attains the same value for the upper bound B(H,τ)B(H,\tau). Indeed, the automorphism group of the hypergraph HH can be used to show that the worst-case performance is attained by a uniform demand pattern.

An automorphism of a hypergraph H=(L,)H=(L,\mathcal{E}) is a permutation π\pi of LL that maps the set of hyperedges to itself. The automorphism group of the hypergraph, denoted by Aut(H)Aut(H), is the set of all automorphisms of HH. In other words, Aut(H):={πSym(L):π()=}Aut(H):=\{\pi\in Sym(L):\pi(\mathcal{E})=\mathcal{E}\}, where Sym(L)Sym(L) is the full symmetric group acting on LL. Thus, if ={E1,E2}\mathcal{E}=\{E_{1},E_{2}\}, where E1={1,2,3,4}E_{1}=\{1,2,3,4\}, E2={1,5,6,7}E_{2}=\{1,5,6,7\}, then Aut(H)Aut(H) fixes the point 11 and is the automorphism group of the partition of a 66-element set into two 33-subsets, and hence is isomorphic to (S3×S3)2(S_{3}\times S_{3})\rtimes\mathbb{Z}_{2} (cf. [3, p. 46]). Also, Aut(H)Aut(H) acts transitively on the set {2,3,,7}\{2,3,\ldots,7\}.

The exact value of the worst-case performance β(H)\beta(H) is computed next (see also Corollary 9 for another proof).

Lemma 7.

Let H=(L,)H=(L,\mathcal{E}) be the conflict hypergraph defined by ={{1,2,3,4}\mathcal{E}=\{\{1,2,3,4\}, {1,5,6,7}}\{1,5,6,7\}\}. Then, the worst-case performance β(H)\beta(H) of the sufficient condition of Corollary 4 is exactly 73\frac{7}{3}.

Proof: Let B(H,τ,i)=τ(i)+ji{Δijτ(j)}B(H,\tau,i)=\tau(\ell_{i})+\sum_{j\neq i}\{\Delta_{ij}\tau(\ell_{j})\}. Then, B(H,τ)=maxiNB(H,τ,i)B(H,\tau)=\max_{i\in N}B(H,\tau,i), and the objective is to compute β(H)=supτPIB(H,τ)\beta(H)=\sup_{\tau\in P_{I}}B(H,\tau). If i2i\geq 2 and link jj belongs to a different hyperedge than link ii, then Δij=0\Delta_{ij}=0, and so the value B(H,τ,i)B(H,\tau,i) can also be attained for some i=1i=1 and a suitable τ\tau. Thus, β(H)=supτPIB(H,τ,1)\beta(H)=\sup_{\tau\in P_{I}}B(H,\tau,1).

Let τ\tau be a demand vector and let πAut(H)\pi\in Aut(H). Let π(τ)\pi(\tau) denote the demand vector obtained by permuting the components of τ\tau according to permutation π\pi. Then, Δ1j=Δ1π(j)\Delta_{1j}=\Delta_{1\pi(j)} because an automorphism preserves the sizes of hyperedges. It follows that B(H,τ,1)=B(H,π(τ),1)B(H,\tau,1)=B(H,\pi(\tau),1). The convex combination

τ=1|Aut(H)|πAut(H)π(τ)\tau^{\prime}=\frac{1}{|Aut(H)|}\sum_{\pi\in Aut(H)}\pi(\tau)

has a uniform demand pattern on N1={2,3,,7}N_{1}=\{2,3,\ldots,7\} because Aut(H)Aut(H) acts transitively on this subset (cf. [14, p. 5]). Also, τ\tau^{\prime} is feasible if τ\tau is and B(H,τ,1)=B(H,τ,1)B(H,\tau^{\prime},1)=B(H,\tau,1). It follows that β(H)\beta(H) is achieved for some τ\tau that is uniform on {j:j1}\{j:j\neq 1\}.

The hypergraph HH has 1010 maximal independent sets: J1,,J9J_{1},\ldots,J_{9} are subsets of the form {1}(E1{j1})(E2{j2})\{1\}\cup(E_{1}-\{j_{1}\})\cup(E_{2}-\{j_{2}\}) and J10=(E1E2){1}J_{10}=(E_{1}\cup E_{2})-\{1\}. Consider a schedule that assigns a duration aa to each independent set JkJ_{k} (k[9]k\in[9]) and duration bb to J10J_{10}. Every demand vector uniform on N1N_{1} is satisfied by a schedule of this form. The demand pattern τ\tau^{\prime} satisfied by this schedule is τ(1)=9a\tau^{\prime}(1)=9a and τ(j)=6a+b\tau^{\prime}(j)=6a+b (j2j\geq 2). Thus, B(H,τ,1)=τ(1)+jiΔijτ(j)=21a+2bB(H,\tau^{\prime},1)=\tau^{\prime}(1)+\sum_{j\neq i}\Delta_{ij}\tau(j)=21a+2b. The duration of this schedule is 9a+2b9a+2b. Thus, β(H)\beta(H) is the optimal value of the linear program: maximize 21a+2b21a+2b subject to 9a+b19a+b\leq 1, a,b0a,b\geq 0. Evaluating the objection function at the three vertices of the feasibility polytope, one obtains β(H)=7/3\beta(H)=7/3.   

Theorem 8.

Let H=(L,)H=(L,\mathcal{E}) be a conflict hypergraph. The worst-case performance of the sufficient condition of Corollary 4 is given by the interference degree of the hypergraph, i.e.

β(H)=σ(H)\beta(H)=\sigma(H)

Proof: First, it will be shown that β(H)σ(H)\beta(H)\leq\sigma(H). Let B(H,τ,i)=τ(i)+ji{Δijτ(j)}B(H,\tau,i)=\tau(\ell_{i})+\sum_{j\neq i}\{\Delta_{ij}\tau(\ell_{j})\}. Let τ\tau and ii be such that τ\tau is a feasible demand vector and β(H)=B(H,τ,i)\beta(H)=B(H,\tau,i). Let tt be a schedule satisfying τ\tau, and suppose tt assigns duration t(Ik)t(I_{k}) to independent set Ik(H)I_{k}\in\mathcal{I}(H). The contribution to B(H,τ,i)B(H,\tau,i) due to demands satisfied during this kk-th time slot is at most t(Ik)σ(H)t(I_{k})\sigma(H) because the contribution is at most t(Ik)Δit(I_{k})\Delta_{i}^{\prime} if link ii is not active during this time slot, and the contribution is at most t(Ik)Δi′′t(I_{k})\Delta_{i}^{\prime\prime} if link ii is active during this time slot. Summing over the contributions to B(H,τ,i)B(H,\tau,i) during the entire duration [0,1][0,1], one obtains that B(H,τ,i)kt(Ik)σ(H)σ(H)B(H,\tau,i)\leq\sum_{k}t(I_{k})\sigma(H)\leq\sigma(H). This proves that β(H)σ(H)\beta(H)\leq\sigma(H).

To prove the opposite inequality, suppose that the values of ii and JJ attaining σ(H)\sigma(H) are known; denote these values by ii and JJ, respectively. Choose the demand pattern τ\tau to be the characteristic vector of JJ or J{i}J\cup\{i\}, according as whether Δi\Delta_{i}^{\prime} or Δi′′\Delta_{i}^{\prime\prime} is larger. For this demand vector τ\tau, B(H,τ,i)=σ(H)B(H,\tau,i)=\sigma(H). Hence, β(H)σ(H)\beta(H)\geq\sigma(H).   

Theorem 8 is tight because it characterizes the exact worst case performance of every network, i.e. it states that β(H)\beta(H) equals σ(H)\sigma(H) for every HH; so σ(H)\sigma(H) is not an upper or lower bound for β(H)\beta(H) but the exact value. The proof of Theorem 8 implies that a 0,10,1-valued (characteristic vector) τ\tau always achieves the supremum, and the proof of Lemma 7 shows there can also be other demand patterns that achieve the supremum. The demand pattern τ=(1,1,1,0,1,1,0)\tau=(1,1,1,0,1,1,0) isn’t the only 0,10,1-valued worst-case demand pattern – the 0’s can occur in other positions by symmetry. A convex combination of these 0,10,1-valued worst-case demand patterns is the worst-case demand pattern given in Lemma 7.

A β\beta-star of a hypergraph H=(L,)H=(L,\mathcal{E}) is a collection of edges \mathcal{F}\subseteq\mathcal{E} satisfying the following condition: there exists some xLx\in L such that EF={x}E\cap F=\{x\} for all E,F,EFE,F\in\mathcal{F},E\neq F. A β\beta-star is a generalization of the star K1,rK_{1,r} subgraph found in graphs and satisfies the property that any two edges have exactly one vertex in common, and this vertex which is common to all the edges is the center of the star.

Corollary 9.

Let HH be a β\beta-star containing exactly nkn_{k} edges of size kk (k2)(k\geq 2). Then, the worst-case performance β(H)\beta(H) of the sufficient condition of Corollary 4 is given by

β(H)=max{||,1+knkk2k1}.\beta(H)=\max\left\{|\mathcal{E}|,1+\sum_{k}n_{k}\frac{k-2}{k-1}\right\}.

Proof: By Theorem 8, β(H)=max{Δ,Δ′′}\beta(H)=\max\{\Delta^{\prime},\Delta^{\prime\prime}\}. If HH is a β\beta-star, then it can be verified that the value of Δ\Delta^{\prime} is the number of edges in the hypergraph, and the value of Δ′′\Delta^{\prime\prime} is the second parameter in the assertion.   

The proofs of Lemma 7 and Corollary 9 both imply that for the specific hypergraph ={{1,2,3,4}\mathcal{E}=\{\{1,2,3,4\}, {1,5,6,7}}\{1,5,6,7\}\}, the worst-case performance is β(H)=73\beta(H)=\frac{7}{3}. However, the two proof techniques give different demand patterns τ\tau that achieve this worst-case performance. In the first proof, the worst-case demand pattern is the convex combination of 99 independent sets, giving τ=(1,23,,23)\tau=(1,\frac{2}{3},\ldots,\frac{2}{3}), and so the support of τ\tau is the set LL of all links. In the second proof, the worst-case demand pattern is of the form τ=(1,1,1,0,1,1,0)\tau=(1,1,1,0,1,1,0) and is the characteristic vector of an independent set.

5 Concluding Remarks

It is important to characterize the worst-case performance of distributed admission control and scheduling algorithms because they can overestimate the network resources required to satisfy a given set of demands by up to this factor. The interference degree of a hypergraph was defined and it was shown that in the worst case, the performance of the maximal scheduling algorithm is away from that of an optimal, centralized algorithm by a factor equal to the interference degree of the hypergraph.

6 Acknowledgements

Thanks are due to the anonymous reviewers for helpful suggestions.

References

  • [1] C. Berge. Hypergraphs: Combinatorics of Finite Sets. Elsevier Science Publishers B.V., 1989.
  • [2] P. Chaporkar, K. Kar, X. Luo, and S. Sarkar. Throughput and fairness guarantees through maximal scheduling in wireless networks. IEEE Transactions on Information Theory, 54(2):572–594, 2008.
  • [3] J. D. Dixon and B. Mortimer. Permutation Groups. Graduate Texts in Mathematics vol. 163, Springer, 1996.
  • [4] A. Ganesan. The performance of an upper bound on the fractional chromatic number of weighted graphs. Applied Mathematics Letters, 23:597–599, 2010.
  • [5] A. Ganesan. Performance of sufficient conditions for distributed Quality-of-Service support in wireless networks. Wireless Networks, 20(6):1321–1334, 2014.
  • [6] A. Ganesan. Performance guarantees of distributed algorithms for QoS in wireless ad hoc networks. IEEE/ACM Transactions on Networking, 28:182–195, 2020.
  • [7] R. Gupta, J. Musacchio, and J. Walrand. Sufficient rate constraints for QoS flows in ad-hoc networks. AD HOC NETWORKS, 5:429–443, 2007.
  • [8] B. Hajek. Link schedules, flows, and the multichromatic index of graphs. In Proc. Conf. Information Sciences and Systems, 1984.
  • [9] B. Hajek and G. Sasaki. Link scheduling in polynomial time. IEEE Transactions on Information Theory, 34(5):910–917, 1988.
  • [10] B. Hamdaoui and P. Ramanathan. Sufficient conditions for flow admission control in wireless ad-hoc networks. ACM Mobile Computing and Communication Review (Special issue on Medium Access and Call Admission Control Algorithms for Next Generation Wireless Networks), 9:15–24, 2005.
  • [11] Q. Li and R. Negi. Maximal scheduling in wireless ad hoc networks with hypergraph interference models. IEEE Transactions on Vehicular Technology, 61:297–310, 2012.
  • [12] R. J. McEliece and K. N. Sivarajan. Performance limits for channelized cellular telephone systems. IEEE Transactions on Information Theory, 40(1):21–34, 1994.
  • [13] S. Sarkar and K. N. Sivarajan. Hypergraph models for cellular mobile communication systems. IEEE Transactions on Vehicular Technology, 47:460–471, 1998.
  • [14] E. Scheinerman and D. Ullman. Fractional Graph Theory. Wiley, 1992.
  • [15] H. Zhang, L. Song, and Z. Han. Radio resource allocation for device-to-device underlay communication using hypergraph theory. IEEE Transactions on Wireless Communications, 15(7):4852–4861, 2016.