Distributed power control in wireless ad hoc networks using message passing: Throughput optimality and network utility maximization

Aneesh Reddy, Sanjay Shakkottai, Lei Ying

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Abstract

This paper presents an algorithm for distributed power control and scheduling over wireless ad hoc-networks, where the data rate on each link depends on the transmission power levels at interfering links (non-convex coupling between link data rates). In this paper, we first consider a K-hop interference model. We describe a message passing algorithm that finds an optimal power allocation (schedule) in the case of line networks with a time complexity (in number of nodes N) that grows as N for line networks. Further, we show that this algorithm, when combined with appropriate congestion-control and routing algorithms results in throughput-optimality and utility maximization over wireless networks. We further study a complete physical interference model, where our algorithms provide e-optimal solutions. Our results can also be extended to grid networks.

Original languageEnglish (US)
Title of host publicationCISS 2008, The 42nd Annual Conference on Information Sciences and Systems
Pages770-775
Number of pages6
DOIs
StatePublished - 2008
Externally publishedYes
EventCISS 2008, 42nd Annual Conference on Information Sciences and Systems - Princeton, NJ, United States
Duration: Mar 19 2008Mar 21 2008

Publication series

NameCISS 2008, The 42nd Annual Conference on Information Sciences and Systems

Other

OtherCISS 2008, 42nd Annual Conference on Information Sciences and Systems
Country/TerritoryUnited States
CityPrinceton, NJ
Period3/19/083/21/08

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Distributed power control in wireless ad hoc networks using message passing: Throughput optimality and network utility maximization'. Together they form a unique fingerprint.

Cite this