IEEE INFOCOM 2008 - The 27th Conference on Computer Communications 2008
DOI: 10.1109/infocom.2008.165
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-Hop Wireless Networks

Abstract: Abstract-In this paper, we characterize the performance of an important class of scheduling schemes, called Greedy Maximal Scheduling (GMS), for multi-hop wireless networks. While a lower bound on the throughput performance of GMS is relatively well-known in the simple node-exclusive interference model, it has not been thoroughly explored in the more general K-hop interference model. Moreover, empirical observations suggest that the known bounds are quite loose, and that the performance of GMS is often close t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
150
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 128 publications
(151 citation statements)
references
References 21 publications
1
150
0
Order By: Relevance
“…In other words, in our high-order Markov-chain-based approach, while the stationary distribution of the schedule itself remains untouched and it provides better queueing performance in the steady state, it may take roughly times longer to reach the steady state. 2 This tradeoff between a bit slower convergence but to a "better" stationary regime also implies that the performance during the transient phase can be worse than that of the conventional CSMA algorithm (albeit our algorithm will eventually pay off in the end) and necessitates a careful choice of depending upon how long the system is meant to be running.…”
Section: B Impact On Transient Behaviormentioning
confidence: 99%
See 1 more Smart Citation
“…In other words, in our high-order Markov-chain-based approach, while the stationary distribution of the schedule itself remains untouched and it provides better queueing performance in the steady state, it may take roughly times longer to reach the steady state. 2 This tradeoff between a bit slower convergence but to a "better" stationary regime also implies that the performance during the transient phase can be worse than that of the conventional CSMA algorithm (albeit our algorithm will eventually pay off in the end) and necessitates a careful choice of depending upon how long the system is meant to be running.…”
Section: B Impact On Transient Behaviormentioning
confidence: 99%
“…The MWS, however, is not deemed practical since it requires global information to solve a complicated combinatorial optimization problem in each time instance. Many heuristics such as greedy-maximal scheduling (GMS) or maximal-matching algorithms are considered as alternatives to MWS, but they may achieve only a fraction of the capacity region [2], [3], or are throughput-optimal only on certain types of network topology [4]- [6]. There are also several methodologies for achieving the throughput optimality in a general network [7]- [9], but they have turned out to incur excessive message passing in many cases.…”
Section: Introductionmentioning
confidence: 99%
“…They prove that their algorithm achieves k k+2 of the capacity region, for every k ≥ 1. In [9], Joo developed a simple distributed scheduling policy that achieves O(log |V |) complexity by relaxing the global ordering requirement of Greedy Maximal Scheduling (GMS) [10]. It deterministically schedules only links that have the largest queue lengths among their local neighbors.…”
Section: B Using Bounded Growth Propertymentioning
confidence: 99%
“…Hence, in multi-hop wireless networks, it may be impractical to find its solution in every time slot due to limited computation capability, and the need for distributed operation. As an alternative, distributed greedy scheduling has been proposed and analyzed [7], [17], [19], [20], [21]. However, most of the existing works in this context adopt the graph-based interference models, where transmissions on any two links in the network are assumed to be either in conflict or conflict-free.…”
Section: Introductionmentioning
confidence: 99%