Abstract
This paper explains recent results on distributed algorithms for networks of conflicting queues. At any given time, only specific subsets of queues can be served simultaneously. The challenge is to select the subsets in a distributed way to stabilize the queues whenever the arrival rates are feasible.
One key idea is to formulate the subset selection as an optimization problem where the objective function includes the entropy of the distribution of the selected subsets. The dual algorithm for solving this optimization problem provides a distributed scheduling algorithm that requires only local queue-length information. The algorithm is based on the CSMA (Carrier Sense Multiple Access) protocol in wireless networks.
We also explain recent results, some of them unpublished so far, on the delay properties of these algorithms. In particular, we present a framework for queuing stability under bounded CSMA parameters, and show how the expected queue lengths depend on the throughput region to be supported. When the arrival rates are within a fraction of the capacity region, queue lengths that are polynomial (or even logarithmic) in the number of queues can be achieved.





Notes
\(\tilde{\mathbf{r}}\) is an “attraction point” of r in Algorithm 1, as shown later.
In the case of continuous-time CSMA, condition (16) should be changed to
$$\frac{1}{T}\int_{0}^{T}\bigl\|\mu_{\sigma_{0},\tau}(\mathbf{r})-\pi(\mathbf{r})\bigr\|_{TV}\le \delta/(4K\cdot D),\quad \forall\sigma_{0}\in\varOmega.$$Strictly speaking, if the state space of r[j] is uncountable (e.g., if we use continuous-time CSMA), extra steps are needed. We omit the details here since a similar situation has been addressed in [25].
References
Tassiulas, L., Ephremides, A.: Stability properties of constrained queuing systems and scheduling policies for maximum throughput in multihop radio networks. IEEE Trans. Autom. Control 37(12), 1936–1948 (1992)
Neely, M.J.: Stochastic Network Optimization with Application to Communication and Queueing Systems. Synthesis Lectures on Communication Networks. Morgan & Claypool Publishers, San Rafael (2010)
Chaporkar, P., Kar, K., Sarkar, S.: Throughput guarantees in maximal scheduling in wireless networks. In: The 43rd Annual Allerton Conference on Communication, Control and Computing, Sept. (2005)
Wu, X., Srikant, R.: Scheduling efficiency of distributed greedy scheduling algorithms in wireless networks. In: IEEE INFOCOM 2006, Barcelona, Spain, Apr. (2006)
Dimakis, A., Walrand, J.: Sufficient conditions for stability of longest-queue-first scheduling: second-order properties using fluid limits. Adv. Appl. Probab. 38(2), 505–521 (2006)
Joo, C., Lin, X., Shroff, N.: Understanding the capacity region of the greedy maximal scheduling algorithm in multi-hop wireless networks. In: IEEE INFOCOM 2008, Phoenix, Arizona, Apr. (2008)
Zussman, G., Brzezinski, A., Modiano, E.: Multihop local pooling for distributed throughput maximization in wireless networks. In: IEEE INFOCOM 2008, Phoenix, Arizona, Apr. (2008)
Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman, New York (1979)
Jiang, L., Walrand, J.: A distributed CSMA algorithm for throughput and utility maximization in wireless networks. In: the 46th Annual Allerton Conference on Communication, Control, and Computing, Sep. 23–26 (2008)
Ni, J., Tan, B., Srikant, R.: Q-CSMA: queue-length based CSMA/CA algorithms for achieving maximum throughput and low delay in wireless networks. In: IEEE INFOCOM, San Diego, CA, Mar. (2010)
Jiang, L., Walrand, J.: Approaching throughput-optimality in a distributed CSMA algorithm: collisions and stability. In: ACM Mobihoc’09 S3 Workshop, May (2009)
Rajagopalan, S., Shah, D., Shin, J.: Network adiabatic theorem: an efficient randomized protocol for contention resolution. In: Proceedings of ACM Sigmetrics, June (2009)
Liu, J., Yi, Y., Proutiere, A., Chiang, M., Poor, H.V.: Towards utility optimal random access without message passing. J. Wirel. Commun. Mob. Comput. 10(1), 115–128 (2010). Special Issue on Advances in Wireless Communications and Networking
Proutiere, A., Yi, Y., Lan, T., Chiang, M.: Resource allocation over network dynamics without timescale separation. In: IEEE INFOCOM, San Diego, CA, Mar. (2010)
Marbach, P., Eryilmaz, A., Ozdaglar, A.: Asynchronous CSMA policies in multihop wireless networks with primary interference constraints. IEEE Trans. Inf. Theory 57(6), 3644–3676 (2011)
Durvy, M., Dousse, O., Thiran, P.: On the fairness of CSMA networks. IEEE J. Sel. Areas Commun. 27(7), 1093–1104 (2009)
Boorstyn, R.R., Kershenbaum, A., Maglaris, B., Sahin, V.: Throughput analysis in multihop CSMA packet radio networks. IEEE Trans. Commun. 35(3), 267–274 (1987)
Wang, X., Kar, K.: Throughput modelling and fairness issues in CSMA/CA based ad-hoc networks. In: IEEE INFOCOM 2005, Miami, Florida, Mar. (2005)
Liew, S.C., Kai, C., Leung, J., Wong, B.: Back-of-the-envelope computation of throughput distributions in CSMA wireless networks. In: IEEE ICC (2009)
Chen, M., Liew, S.C., Shao, Z., Kai, C.: Markov approximation for combinatorial network optimization. In: IEEE INFOCOM, San Diego, CA, Mar. (2010)
Kelly, F.P.: Reversibility and Stochastic Networks. Wiley, New York (1979)
Kushner, H., Yin, G.: Stochastic Approximation and Recursive Algorithms and Applications. Springer, New York (2003)
Borkar, V.: Stochastic Approximation: A Dynamical Systems Viewpoint. Cambridge University Press, Cambridge (2008)
Jiang, L., Walrand, J.: Convergence and stability of a distributed CSMA algorithm for maximal network throughput. In: IEEE Conference on Decision and Control, Shanghai, China, Dec. (2009)
Jiang, L., Shah, D., Shin, J., Walrand, J.: Distributed random access algorithm: scheduling and congestion control. IEEE Trans. Inf. Theory 56(12), 6182–6207 (2010)
Jiang, L., Ni, J., Srikant, R., Walrand, J.: Performance bounds of distributed CSMA scheduling. In: Information Theory and Application Workshop, UCSD, Feb. (2010)
Jiang, L., Leconte, M., Ni, J., Srikant, R., Walrand, J.: Fast mixing of parallel Glauber dynamics and low-delay CSMA scheduling. In: IEEE INFOCOM, Shanghai, China, Apr. (2011). Available online: http://arxiv.org/abs/1008.0227
Shah, D., Tse, D.N.C., Tsitsiklis, J.N.: Hardness of low delay network scheduling. IEEE Trans. Inform. Theory (2009), submitted
Jiang, L., Walrand, J.: Scheduling and Congestion Control for Wireless and Processing Networks. Synthesis Lectures on Communication Networks. Morgan & Claypool Publishers, San Rafael (2010)
Shah, D., Shin, J.: Delay optimal queue-based CSMA. In: ACM Sigmetrics (Poster), June (2010)
Lotfinezhad, M., Marbach, P.: Throughput-optimal random access with order-optimal delay. In: IEEE INFOCOM, Shanghai, China, Apr. (2010)
Levin, D.A., Peres, Y., Wilmer, E.L.: Markov Chains and Mixing Times. American Mathematical Society, Providence (2009)
Acknowledgements
This work is supported by MURI Grant BAA 07-036.18.
Author information
Authors and Affiliations
Corresponding author
Appendices
Appendix A: Proof of Theorem 2
Proof
The dynamics of r[j], by (12) and (11), is
Define \(d[j]:=\frac{1}{2}\|\mathbf{r}[j]-\mathbf{r}^{*}\|^{2}\ge0\). Note that r ∗≥0 element-wise. Then

where the last step follows from the fact that \(\hat{\lambda }_{k}[j]\le1,\ \forall k,j\) since the arrivals are assumed Bernoulli. Therefore,
where we have used the assumptions of Theorem 2.
Since the dual function g(r) is convex and s(r[j])−λ is a subgradient at the point r[j], we have
Define the region
We will show later that \(\mathcal{A}_{\alpha K}\) is bounded.
Then, if \(\mathbf{r}[j]\notin\mathcal{A}_{\alpha K}\), we have g(r[j])>g(r ∗)+αK, and therefore

Also,

By (21) and (22), we conclude that the set \(\mathcal{A}_{\alpha K}\) is recurrent for r[j]. This establish the stability of r[j].Footnote 3 Finally, since r[j] and the queue lengths X(t) are proportional by (12), the queues are also stable.
It remains to be shown that the set \(\mathcal{A}_{\alpha K}\) is bounded. Since λ is strictly feasible, there exist δ>0 and a distribution \(\tilde{\mathbf{u}}\) such that \(\sum_{\sigma }\tilde{u}_{\sigma}\sigma_{k}=\lambda_{k}+\delta,\ \forall k\). So, \(\mathcal{L}(\tilde{\mathbf{u}};\mathbf{r})=-\sum_{\sigma\in \varOmega}[\tilde{u}_{\sigma}\log(\tilde{u}_{\sigma})]+\sum _{k}[r_{k}(\sum_{\sigma}\tilde{u}_{\sigma}\sigma_{k}-\lambda _{k})]=-\sum_{\sigma\in\varOmega}[\tilde{u}_{\sigma}\log(\tilde {u}_{\sigma})]+\delta\sum_{k}r_{k}\ge\delta\sum_{k}r_{k}\). By (9), we have \(g(\mathbf{r})\ge\mathcal {L}(\tilde{\mathbf{u}};\mathbf{r})\ge\delta\sum_{k}r_{k}\). Therefore, any \(\mathbf{r}\in\mathcal{A}_{\alpha K}\) must satisfy that \(\sum_{k}r_{k}\le\frac{\alpha K+g(\mathbf{r}^{*})}{\delta}\) and r k ≥0, ∀k. This proves that \(\mathcal{A}_{\alpha K}\) is bounded. □
Appendix B: Proof of Lemma 2
Proof
In view of the queue dynamics (11), at time instance (j+1)T, \(\bar{\mathbf{r}}\) is updated as
We use E j [⋅] to denote the conditional expectation E[⋅|X[j],σ[j]] where σ[j]:=σ(jT) is the transmission schedule just before time instance jT. And Pr j [⋅] denotes the conditional probability Pr{⋅|X[j],σ[j]}.
Now we compute \(E_{j}[\hat{s}_{k}[j]]\) for every link k:

where μ σ[j],τ is the distribution of the CSMA Markov chain after τ slots if the Markov chain starts with schedule σ[j]. Remember that \(s_{k}(\mathbf{r}) =\sum_{\sigma\in\varOmega:\sigma_{k}=1}\pi(\sigma;\mathbf{r})\), so

Therefore, by (16), we have
Next we show that \(\bar{\mathbf{r}}[j]\) is stable. Define the Lyapunov function
where

Note that the minimal value of \(L(\bar{\mathbf{r}})\) is achieved at the point \(\tilde{\mathbf{r}}\). (So \(\tilde{\mathbf{r}}\) serves as the “attraction point” of our algorithm.) Unlike the usual quadratic Lyapunov function used in Sects. 2.2 and 2.3, this Lyapunov function is partially quadratic and partially linear.
We have

where \(r_{k}=\min\{\bar{r}_{k},r_{\max}\}\) as defined.
Next we prove the following useful inequality:
For this purpose, first note that \(L_{k}(\bar{r}_{k}[j+1])\le L_{k}(\hat{\bar{r}}_{k}[j+1])\) where \(\hat{\bar{r}}_{k}[j+1]:=\bar{r}_{k}[j]+\alpha\cdot[\hat {\lambda}_{k}[j]-\hat{s}_{k}[j]]\). (This is clearly true if \(\hat{\bar{r}}_{k}[j+1]\ge r_{\min}\). If \(\hat{\bar{r}}_{k}[j+1]<r_{\min}\), then \(L_{k}(\bar {r}_{k}[j+1])=L_{k}(r_{\min})\le L_{k}(\hat{\bar{r}}_{k}[j+1])\).) Therefore, we only need to prove
Consider several cases:
-
(i)
If \(\hat{\bar{r}}_{k}[j+1]\), \(\bar {r}_{k}[j]\ge r_{\max}\), (27) is true.
-
(ii)
If \(\hat{\bar {r}}_{k}[j+1]\), \(\bar{r}_{k}[j]<r_{\max}\), then \(L_{k}(\hat{\bar{r}}_{k}[j+1])-L_{k}(\bar{r}_{k}[j])=\frac {1}{2}(\hat{\bar{r}}_{k}[j+1]-\tilde{r}_{k})^{2}-\frac{1}{2}(\bar {r}_{k}[j]-\tilde{r}_{k})^{2}=\alpha\cdot(\hat{\lambda }_{k}[j]-\hat{s}_{k}[j])(\bar{r}_{k}[j]-\tilde{r}_{k})+\frac {1}{2}\alpha^{2}(\hat{\lambda}_{k}[j]-\hat{s}_{k}[j])^{2}\). Due to the assumption of Bernoulli arrivals, we have \(|\hat{\lambda }_{k}[j]-\hat{s}_{k}[j]|\le1\). Then (27) follows.
-
(iii)
Assume that \(\bar {r}_{k}[j]\ge r_{\max}\) and \(\hat{\bar{r}}_{k}[j+1]<r_{\max}\). Then \(L_{k}(r_{\max })-L_{k}(\bar{r}_{k}[j])=(r_{\max}-\tilde{r}_{k})(r_{\max}-\bar {r}_{k}[j])\), and similar to case (ii), \(L_{k}(\hat{\bar {r}}_{k}[j+1])-L_{k}(r_{\max})\le(r_{\max}-\tilde{r}_{k})(\hat {\bar{r}}_{k}[j+1]-r_{\max})+\frac{1}{2}\alpha^{2}\). Therefore, \(L_{k}(\hat{\bar{r}}_{k}[j+1])-L_{k}(\bar{r}_{k}[j])\le (r_{\max}-\tilde{r}_{k})(\hat{\bar{r}}_{k}[j+1]-\bar {r}_{k}[j])+\frac{1}{2}\alpha^{2}\), proving (27).
-
(iv)
Assume that \(\bar {r}_{k}[j]<r_{\max}\) and \(\hat{\bar{r}}_{k}[j+1]\ge r_{\max}\). Note that \(L_{k}(\hat {\bar{r}}_{k}[j+1])\le\frac{1}{2}[(\hat{\bar{r}}_{k}[j+1]-\tilde {r}_{k})^{2}+(r_{\max}-\tilde{r}_{k})^{2}]\). So \(L_{k}(\hat{\bar{r}}_{k}[j+1])-L_{k}(\bar{r}_{k}[j])\le\frac {1}{2}(\hat{\bar{r}}_{k}[j+\nobreak 1]-\tilde{r}_{k})^{2}-\frac{1}{2}(\bar {r}_{k}[j]-\tilde{r}_{k})^{2}\le\alpha(\hat{\lambda}_{k}[j]-\hat {s}_{k}[j])L_{k}^{\prime}(\bar{r}_{k}[j])+\alpha^{2}/2\) similar to case (ii). This completes the proof of (26).
Given a \(\bar{\mathbf{r}}[j]\notin\mathcal{D}\), at least one element of r[j] is equal to r max (i.e., r k′[j]=r max for some k′). Using (26), (25), (24), and (15), we obtain the following:

which establishes the negative drift of \(L(\bar{\mathbf{r}}[j])\) if \(\bar{\mathbf{r}}[j]\notin\mathcal{D}\). Also, it is clear that for any \(\bar{\mathbf{r}}[j]\in\mathcal{D}\), we have Δ[j]<∞ (since \(\bar{\mathbf{r}}[j+1]-\bar{\mathbf{r}}[j]\) is bounded). By the Foster–Lyapunov criteria, \(\bar{\mathbf{r}}[j]\) is stable. By (14), X[j] is also stable.
The proof of (18) is similar to that of Theorem 8 in [27]. For completeness, we present the proof in the following.
Denote \(\bar{L}:=\max_{\bar{\mathbf{r}}\in\mathcal{D}}L(\bar {\mathbf{r}})\). Then if \(L(\bar{\mathbf{r}})>\bar{L}\), we have \(\bar{\mathbf {r}}\notin\mathcal{D}\). Define
Note that \(|\bar{r}_{k}[j+1]-\bar{r}_{k}[j]|\le\alpha,\ \forall k,j\). Also, (25) implies that \(|\frac{\partial L_{k}(\bar{r}_{k})}{\partial\bar{r}_{k}}|\le D\), \(\forall\bar {r}_{k}\ge r_{\min}\). Therefore,

Consider the following two cases.
Case 1: If \(L(\bar{\mathbf{r}}[j])-\bar{L}>0\), then \(G(\bar{\mathbf {r}}[j])=L(\bar{\mathbf{r}}[j])-\bar{L}>0\), and \(\bar{\mathbf{r}}[j]\notin\mathcal{D}\). Therefore,

Therefore,

Case 2: If \(G(\bar{\mathbf{r}}[j])=0\), then \(0\le G(\bar{\mathbf {r}}[j+1])\le c\). Therefore,
Combining Cases 1 and 2, we have
Taking expectations on both sides yields
Summing the above inequality from j=0 to j=J−1, and dividing both sides by J, we have
Therefore,
Note that
So
In view of (14), we then have

Since \(r_{\max}-\tilde{r}_{k}\ge\epsilon_{0},\ \forall k\), we have
Since in a slot each queue is increased at most by 1, we have
So,
□
Rights and permissions
About this article
Cite this article
Jiang, L., Walrand, J. Stability and delay of distributed scheduling algorithms for networks of conflicting queues. Queueing Syst 72, 161–187 (2012). https://doi.org/10.1007/s11134-012-9286-x
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11134-012-9286-x