In
The construction of factor graph in step 201 can be implemented with the following three steps.
(a) An agent node is used to represent each network node. Each agent node is marked with the corresponding constrain function fi, which defines an interference-avoiding local constrain rule.
(b) A variable node is used to represent a network link. Each variable node is marked with a variable vj.
(c) Each variable node is linked to two agent nodes, where the network nodes corresponding to the two agent nodes can communicate through the network link corresponding to the variable node.
To improve the utilization of the network resource, the present invention uses the link communication to repeatedly exchange the soft-information of the probability mass function (pmf) of each variable node between the neighboring network nodes and variable nodes.
Taking
To meet the basic multi-hop wireless network and the interference-avoiding local constrain rules, each network node must obey the following rules during each packet slot.
(a) A network node can only transmit to one network node during transmission.
(b) A relay cannot transmit and receive packets simultaneously.
(c) A network node cannot receive packets from multiple sources simultaneously.
In other words, when executing the interference-avoiding local constrain rule and sum-product convergence, each agent node in the example in
f
1
: v
1
+v
2
+v
3
+v
4≦1; and
f
2
: v
1
+v
5
+v
6
+v
8≦1; f3: v3+v7+v9+v10≦1; and
f
4
: v
5≦1; f5: v6≦v7; and
f
6
: v
2
+v
8
+v
9≦1; f7: v4+v10≦1.
That is, the variables surrounding each agent node form a valid local 10 transmission pattern. In the example in
It is worth noticing that the interference-avoiding local constrain rules can be applied to both single cell and multi-cell multihop wireless network.
The following describes how to compute and transport the soft-information that can improve the network resource utilization. The soft-information shows the probability that each network link will be utilized in each packet slot.
First, the probability Pb(vj) of each variable node vj (vj=b, b is 0 or 1) is initialized. Then, the soft-information SIst(x, y, b) of each agent node (marked by the corresponding constrain function fi) linking to each variable node vj, where P1(vj) is uniformly distributed between (0,1), and P0(vj)+P1(vj)=1. SIst(x, y, b) represents the soft-information transported from node x to node y, and indicates the probability when the corresponding variable node vj is b. The subscript s is the packet slot index, t is the iteration index. The initialized probability Pb(vj) is the probability randomly assigned to each variable node vj.
It is worth noticing that the initialized Pb(vj) can be added through the network link corresponding to the variable node vj to one of the two agent nodes linking the variable node.
Then, according to the standard sum-product algorithm, the soft-information SIst(x, y, b) transported from variable node vj to agent node (mark by the corresponding constrain function fi) can be computed. Taking variable node v1 and agent node f2 as an example, the soft-information is computed as SIst(v1, f2, b)=c1,2 Pb (v1)·SI(s-1)t (f1, v1, b), where c1, 2 is a normalizing factor to make SIst(v1, f2, 0)+SIst(v1, f2, 1)=1.
Furthermore, in addition to weighting each valid local transmission pattern, the same sum-product algorithm is used to compute the soft-information transported from agent node (mark by the corresponding constrain function fi) to variable node vj. The agent node (mark by the corresponding constrain function fi) collects all the incoming soft-information from its neighboring variable nodes {Vh}, and computes the soft-information SIst(fi, vj, b) to be transported to variable node vj. Taking BS as an example, the soft-information is computed as SIst(f1, v1, 1)=d1,1 {ωt(f1, 1000))·SIst(v2, f1, 0) SIst(v3, f1, 0) SIst(v4, f1, 0)}, where d1,1 is a normalizing factor.
The total soft-information SIst(vj, b) of variable node vj can be computed as the product of all the soft-information SIst(fi, vj, b), where fi belongs to the set of all the agent nodes linking to variable node vj.
It is worth noticing that the above soft-information computation of variable node vj can be applied to both single cell and multi-cell multihop wireless network. After the second iteration, if SIst(vj, 1)≧SIst(vj, 0), variable node vj is determined to be active; that is vj=1; otherwise, vj=0. When all the variable nodes vj follow the interference-avoiding local constrain rule, the standard sum-product algorithm terminates and outputs a valid global schedule. Otherwise, the agent nodes not following the interference-avoiding local constrain rule must repeat the above sum-product computation.
A multihop wireless network may prefer a certain interference-avoiding or collision-free packet scheduling method to others because the former can maximize the reuse of the network resources. For example, in a single cell multihop wireless network, the service provider can prefer the global schedule {vj}={0,1,0,0,1,0,0,0,0,1}, instead of the global schedule {vj}={0,1,0,0,0,0,0,0,0,0} because the former can reuse the network resource more effectively, even though both are valid interference-avoiding or collision-free scheduling techniques.
Therefore, to improve the network resource utilization, the present invention based on the network condition at the time, such as urgency and transmission rate of each network link, weights each valid local transmission pattern. Without the loss of generality, the present invention uses a single cell multihop wireless network as an embodiment for explanation. However, the weighting scheme is also applicable to a multi-cell multi-hop wireless network.
For agent node fi, the information on the packet queue length of the neighboring agent nodes are collected, and the weigh of local transmission pattern of the k-th local link of each agent node fi is computed as follows:
where max is the maximum function, ε is a positive number, h is not equal to k, fh belongs to the set of all the variable nodes linking to the agent node fi, and xT,t(k) and xR,t(k) are the total number of packets that can reach the destination queue through the k-th local ink of agent node fi, where subscripts T and R are the transmitting end and the receiving end of the local link, and t is the concerned packet slot index.
The weighting of relay is the same as the weighting of BS, except that the weigh of the link that is in use and is the only link to the BS is set to be 1. Therefore, the weight of local transmission pattern {v1,v5,v6,v8} corresponding to agent node f2 is computed as follows: ωt(f2, {1,0,0,0})=1; ωt(f2, {0,1,0,0})=5/6+5/3=2.5; ωt(f2, {0,0,1,0})=6/5+6/3=3.2; and ωt(f2, {0,0,0,1})=3/5+3/6=1.1.
The weighting of the uplinks is the same as the weighting of the downlinks, except that the transmission direction is reverse, and the packet destination is BS.
ωt(f1, {1,0,0,0})=7/8+7/6+7/7=3.0;
ωt(f1, {0,1,0,0})=8/7+8/6+8/7=3.6;
ωt(f1, {0,0,1,0})=6/7+6/8+6/7=2.5;
ωt(f1, {0,0,0,1})=7/7+7/8+7/6=3.0.
The weight of non-zero local transmission pattern {v1, v5, v6, v8} of agent node f2 is computed as follows: ωt(f2, {1,0,0,0})=1; ωt(f2, {0,1,0,0})=(9−7)/ε+(9−7)/(8−7)=2(ε+1); ωt(f2, {0,0,1,0})=0/(9−7)=0; and ωt(f2, {0,0,0,1})=(8−7)/(9−7)+(8−7)/ε=ε+0.5.
The weight of non-zero local transmission pattern {v2, v8, v9} of agent node f2 is computed as follows: ωt(f6, {1,0,0})=ωt(f6, {1,0,0})=ωt(f6, {1,0,0})=1.
As shown in the above description, the present invention does not need to estimate the SNR. It is only necessary for the neighboring wireless APs to reach a consensus. The weighting scheme of the present invention is natural-competition-based. When the packet queue length of the transmitting end is longer than the packet queue length of the receiving end, the corresponding network link is more likely to be activated for use because the weigh of transmission pattern activating the network link is increased. This characteristic allows the urgent packets having a higher priority, and prevents the packet queue from overflowing on any network node. On the other hand, when the packet queue length of the receiving end is longer than the packet queue length of the transmitting end, the corresponding network link is more likely to be deactivated because the weight of transmission pattern activating the network link is set to 0. Stopping the network link prevents the packet queue from overflowing on any network node, and gives more time for the relay to consume the packets.
It is worth noticing that weighting scheme of the present invention is also applicable to a multi-cell multihop wireless network.
In accordance with the above fully-distributed packet scheduling method for a wireless network,
The correspondence between the factor graph and the wireless network is described earlier in the construction of factor graph, and therefore, is omitted here.
The present invention is also compared with two conventional packet scheduling techniques, namely, round-robin (RR) and individual-polling (IP). RR and IP are both central-unit-processing-based packet scheduling methods. In RR, all the links of the network are activated in turn with a pre-determined order, while the local link between BS and relay is activated in an order that is determined individually in IP.
As shown in
When the traffic load in the network is gradually greater than the capacity of the system (i.e., λ≧0.5), the present invention releases the network resource of M1 to help other mobile stations to survive under the heavier traffic load.
Therefore, the average transmission rate in each packet slot and the difference among the users are far better than the two conventional packet scheduling methods.
As shown in
Although the present invention has been described with reference to the preferred embodiments, it will be understood that the invention is not limited to the details described thereof. Various substitutions and modifications have been suggested in the foregoing description, and others will occur to those of ordinary skill in the art. Therefore, all such substitutions and modifications are intended to be embraced within the scope of the invention as defined in the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
095126189 | Jul 2006 | TW | national |