12
1 Joint Scheduling and Transmission Power Control in Wireless Ad Hoc Networks Kamal Rahimi Malekshan, Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract—In this paper, we study how to determine concurrent transmissions and the transmission power level of each link to maximize spectrum efficiency and minimize energy consumption in a wireless ad hoc network. The optimal joint transmission packet scheduling and power control strategy are determined when the node density goes to infinity and the network area is unbounded. Based on the asymptotic analysis, we determine the fundamental capacity limits of a wireless network, subject to an energy consumption constraint. We propose a scheduling and transmission power control mechanism to approach the optimal solution to maximize spectrum and energy efficiencies in a practical network. The distributed implementation of the proposed scheduling and transmission power control scheme is presented based on our MAC framework proposed in [1]. Sim- ulation results demonstrate that the proposed scheme achieves 40% higher throughput than existing schemes. Also, the energy consumption using the proposed scheme is about 20% of the energy consumed using existing power saving MAC protocols. Index Terms—Ad hoc networks, radio spectrum efficiency, energy efficiency, spatial reuse, transmission power control, medium access control (MAC). I. I NTRODUCTION The increasing number of mobile devices and volume of mobile Internet traffic necessitate dense deployment of Internet access points (APs) in an ad hoc manner to increase network capacity via shorter communication links [2]. Also, diverse peer-to-peer communications [3], [4] are emerging to increase spectrum and energy efficiencies via shorter communication links and to interconnect several billion physical objects and integrate them into the existing networks. Such a dense and dynamic network of mobile nodes and APs and diverse peer- to-peer communications require to establish an effective ad hoc network to efficiently utilize radio spectrum and to minimize energy consumption. In a wireless network, the data rate and energy consumption of a link depend on the transmission power level of the source node, the distance between source and destination, and the amount of interference at the destination node. The amount of interference at a destination depends on the distance to interfering source nodes and their transmission power level. Thus, the achievable data rate and energy consumption of transmitting links are interrelated. The set of concurrent trans- missions and the transmission power level of each source should be properly determined to efficiently utilize radio spectrum and reduce energy consumption. In addition, a radio interface consumes a significant amount of energy in the This work was supported by a research grant from the Natural Sciences and Engineering Research Council (NSERC) of Canada. K. Rahimi Malekshan is with the Research and Development Department of Siemens, Toronto, Canda (e-mail: [email protected]). W. Zhuang is with the Department of Electrical and Computer Engineering, University of Waterloo, Canada (e-mail: [email protected]). idle mode in which it is not transmitting/receving a packet. The energy consumption can be reduced by putting the radio interface in a sleep mode, however, the awake and active times of the radio interface should be properly scheduled to avoid missing incoming packets [1], [5]–[8]. Although increasing spatial reuse allows more concur- rent transmissions, it also decreases the signal-to-noise-plus interference-ratio (SINR) at the receivers. Therefore, the data rate of each transmission decreases as a result of a lower SINR. The trade-off between the increased spatial reuse and the decreased data rate has been studied in [9], [10] when using a CSMA/CA MAC. It is shown that the network capacity depends only on the ratio of the transmission power level to the carrier sensing threshold (i.e., carrier sensing range). It is proposed that all nodes use a same carrier sensing threshold and each source node adjusts its transmission power level based on its distance from the destination. However, when only carrier sensing is used, the transmission rates must be adjusted for the worst case interference to ensure successful reception of packets at the receiver. As a result, the transmission power control schemes (in which nodes independently choose their transmission power levels) cannot fully utilize the network capacity. Also, the CSMA based MAC protocols provide poor spatial spectrum reuse due to the hidden and exposed node problems [1], [11]. Centralized scheduling and transmission power control for wireless ad hoc networks are proposed in [12], [13]. The optimal scheduling and transmission power control to maximize total throughput in a two-cell two-link wireless net- work have been studied in [14]. In the network with two links, maximizing total throughput leads to binary power control. That is, each link should transmit at either the maximum power level or the minimum power level [14]. Motivated by the optimality of binary power control, the binary power control is also proposed for multi-cell networks with more than two links in [15]. The effect of transmission power level on total energy consumption depends on the energy consumption pattern of the radio interface [16]–[19]. The energy consumption has two components: the energy consumed in the radio interface circuit, and the energy consumed in the amplifier. When the energy consumption in the amplifier dominates the energy consumed at the radio interface circuit, the energy consump- tion per transmitted data bit in a two-link network can be reduced by decreasing the transmission power level [16]. However, when the energy consumption in the radio interface circuit is much larger than the energy consumption in the amplifier, minimizing the energy consumption per transmitted data bit in a two-link network is equivalent to maximizing network throughput [16]. Generally, the transmission power

Joint Scheduling and Transmission Power Control in ...bbcr.uwaterloo.ca/~wzhuang/papers/Paper_06.17.2017.pdf · Joint Scheduling and Transmission Power Control in Wireless Ad Hoc

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Joint Scheduling and Transmission Power Control in ...bbcr.uwaterloo.ca/~wzhuang/papers/Paper_06.17.2017.pdf · Joint Scheduling and Transmission Power Control in Wireless Ad Hoc

1

Joint Scheduling and Transmission Power Controlin Wireless Ad Hoc Networks

Kamal Rahimi Malekshan, Member, IEEE, and Weihua Zhuang, Fellow, IEEE

Abstract—In this paper, we study how to determine concurrenttransmissions and the transmission power level of each link tomaximize spectrum efficiency and minimize energy consumptionin a wireless ad hoc network. The optimal joint transmissionpacket scheduling and power control strategy are determinedwhen the node density goes to infinity and the network areais unbounded. Based on the asymptotic analysis, we determinethe fundamental capacity limits of a wireless network, subjectto an energy consumption constraint. We propose a schedulingand transmission power control mechanism to approach theoptimal solution to maximize spectrum and energy efficienciesin a practical network. The distributed implementation of theproposed scheduling and transmission power control scheme ispresented based on our MAC framework proposed in [1]. Sim-ulation results demonstrate that the proposed scheme achieves40% higher throughput than existing schemes. Also, the energyconsumption using the proposed scheme is about 20% of theenergy consumed using existing power saving MAC protocols.

Index Terms—Ad hoc networks, radio spectrum efficiency,energy efficiency, spatial reuse, transmission power control,medium access control (MAC).

I. INTRODUCTION

The increasing number of mobile devices and volume ofmobile Internet traffic necessitate dense deployment of Internetaccess points (APs) in an ad hoc manner to increase networkcapacity via shorter communication links [2]. Also, diversepeer-to-peer communications [3], [4] are emerging to increasespectrum and energy efficiencies via shorter communicationlinks and to interconnect several billion physical objects andintegrate them into the existing networks. Such a dense anddynamic network of mobile nodes and APs and diverse peer-to-peer communications require to establish an effective ad hocnetwork to efficiently utilize radio spectrum and to minimizeenergy consumption.

In a wireless network, the data rate and energy consumptionof a link depend on the transmission power level of the sourcenode, the distance between source and destination, and theamount of interference at the destination node. The amountof interference at a destination depends on the distance tointerfering source nodes and their transmission power level.Thus, the achievable data rate and energy consumption oftransmitting links are interrelated. The set of concurrent trans-missions and the transmission power level of each sourceshould be properly determined to efficiently utilize radiospectrum and reduce energy consumption. In addition, a radiointerface consumes a significant amount of energy in the

This work was supported by a research grant from the Natural Sciencesand Engineering Research Council (NSERC) of Canada.

K. Rahimi Malekshan is with the Research and Development Departmentof Siemens, Toronto, Canda (e-mail: [email protected]).

W. Zhuang is with the Department of Electrical and Computer Engineering,University of Waterloo, Canada (e-mail: [email protected]).

idle mode in which it is not transmitting/receving a packet.The energy consumption can be reduced by putting the radiointerface in a sleep mode, however, the awake and active timesof the radio interface should be properly scheduled to avoidmissing incoming packets [1], [5]–[8].

Although increasing spatial reuse allows more concur-rent transmissions, it also decreases the signal-to-noise-plusinterference-ratio (SINR) at the receivers. Therefore, the datarate of each transmission decreases as a result of a lowerSINR. The trade-off between the increased spatial reuse andthe decreased data rate has been studied in [9], [10] whenusing a CSMA/CA MAC. It is shown that the network capacitydepends only on the ratio of the transmission power level tothe carrier sensing threshold (i.e., carrier sensing range). It isproposed that all nodes use a same carrier sensing thresholdand each source node adjusts its transmission power levelbased on its distance from the destination. However, when onlycarrier sensing is used, the transmission rates must be adjustedfor the worst case interference to ensure successful receptionof packets at the receiver. As a result, the transmission powercontrol schemes (in which nodes independently choose theirtransmission power levels) cannot fully utilize the networkcapacity. Also, the CSMA based MAC protocols provide poorspatial spectrum reuse due to the hidden and exposed nodeproblems [1], [11]. Centralized scheduling and transmissionpower control for wireless ad hoc networks are proposed in[12], [13].

The optimal scheduling and transmission power control tomaximize total throughput in a two-cell two-link wireless net-work have been studied in [14]. In the network with two links,maximizing total throughput leads to binary power control.That is, each link should transmit at either the maximumpower level or the minimum power level [14]. Motivated by theoptimality of binary power control, the binary power controlis also proposed for multi-cell networks with more than twolinks in [15].

The effect of transmission power level on total energyconsumption depends on the energy consumption pattern ofthe radio interface [16]–[19]. The energy consumption hastwo components: the energy consumed in the radio interfacecircuit, and the energy consumed in the amplifier. When theenergy consumption in the amplifier dominates the energyconsumed at the radio interface circuit, the energy consump-tion per transmitted data bit in a two-link network can bereduced by decreasing the transmission power level [16].However, when the energy consumption in the radio interfacecircuit is much larger than the energy consumption in theamplifier, minimizing the energy consumption per transmitteddata bit in a two-link network is equivalent to maximizingnetwork throughput [16]. Generally, the transmission power

Page 2: Joint Scheduling and Transmission Power Control in ...bbcr.uwaterloo.ca/~wzhuang/papers/Paper_06.17.2017.pdf · Joint Scheduling and Transmission Power Control in Wireless Ad Hoc

2

level for minimal energy consumption depends on the energyconsumption pattern of the radio interface and the networkcondition. Thus, transmission at the minimum power level (asin [20]–[23]) does not always reduce the energy consumption.

In [1], we present a novel MAC scheme for a wirelessad hoc network. All node transmissions are dynamicallyscheduled by a set of coordinator nodes that are distributedover the network coverage area. A coordinator node monitorssource nodes’ transmission requests in its proximity, activelyexchanges scheduling information with its adjacent coordi-nators, and periodically determines contention-free transmis-sion/reception times for nodes in its vicinity. For each sched-uled transmission a proper space area around the receivernode is reserved to guarantee the required link SINR andenhance spatial spectrum reuse. Moreover, the deterministicdata transmission time allows nodes to stay awake only whenthey are transmitting/receiving a packet to minimize idle-listening energy consumption.

In this paper, we study efficient joint transmission schedul-ing and power control in a wireless ad hoc network. Weshow that the asymptotic optimal scheduling and transmissionpower control can be determined when node density in thenetwork goes to infinity and the network area is unbounded.By analyzing the asymptotic optimal solution, we determinethe fundamental limits of maximum spectrum and energyefficiencies in a wireless network. To approach the maximumspectrum and energy efficiencies in a practical network, weassign a transmission power level and a target interferencepower level to each link, which are determined based on theasymptotic optimal values. The concurrent transmissions ateach time slot are scheduled such that the actual power ofinterference at the scheduled destination nodes are close tothe target interference levels for efficient spectrum and energyutilization. We present a distributed implementation of theproposed scheduling and transmission power control schemebased on our MAC framework proposed in [1].

The main contributions of this paper can be summarized asfollows:

1) We analyze asymptotic joint optimal scheduling andtransmission power control, and determine the fundamentallimits of network capacity, subject to an energy efficiencyconstraint;

2) Based on the asymptotic optimal solution, we propose anovel scheduling and transmission power control framework toapproach maximum spectrum and energy efficiencies in a prac-tical network. Also, we present a distributed implementationof the proposed scheme using only local network information;

3) The throughput and energy consumption of our pro-posed scheduling and transmission power control frameworkare evaluated in comparison with existing schemes. A newscheduling efficiency metric is introduced to compare theefficiency of different schemes with the asymptotic optimalsolution.

The rest of this paper is organized as follows: The systemmodel is presented in Section II. In Section III, we analyzeasymptotic joint optimal scheduling and transmission powercontrol and determine the maximum spectrum and energyefficiencies in the wireless network. We propose a scheduling

and transmission power control framework to approach theoptimal solution in a practical network in Section IV. Simu-lation results are presented in Section V. Finally, Section VIconcludes this paper.

II. SYSTEM MODEL

Consider a wireless ad hoc network where all network nodesuse a shared radio channel for transmissions. We focus onsingle-hop transmissions as, at the MAC layer, each node com-municates with one or more of its one-hop neighboring nodes1.Nodes are randomly distributed in the network area and thedestination of each source node is randomly selected from therest nodes within maximum data transmission distance dmax.Let L denote the number of links and l ∈ {1, 2, ..., L} denote alink; The source and destination nodes of link l are denoted bySl and Dl, respectively. Network links are considered to bedirectional (i.e., transmission from a source to a destinationnode). Bidirectional communications (such as a TCP link)between two nodes are handled by scheduling two differentdirectional links. We denote the distance from the source nodeof link l to the destination node of link k by dlk, and theassociated channel gain is hlk = cdlk

−α, where c is a constantand α is the path-loss exponent2.

Time is partitioned into slots of constant durations. Considera scheduling interval of T slots, and let t ∈ {1, 2, ..., T} denotetime slot index3. We assume that dlk, with l, k ∈ {1, 2, ..., L},is constant over T time slots. Let γ = [γlt]L×T denote thetransmission power matrix, where γlt denotes the transmissionpower level of source node of link l at time slot t. Let u =[ult]L×T denote the scheduling matrix, where ult = 1 if linkl is scheduled for transmission at time slot t and ult = 0otherwise. A scheduled link transmits a data packet during atime slot that is scheduled. The SINR at the destination oflink l at slot t is given by ηlt = ultγlthll

N0+∑k 6=l uktγkthkl

, where

N0 is background noise power and∑k 6=l uktγkthkl , Ilt is

the power of interference at the destination. The achievablechannel rate in bit/s/Hz over link l at slot t, using Shannonformula, is Rlt = log2(1 + ηlt) and the average data rate atlink l can be written as Rl = 1

T

∑Tt=1Rlt.

A radio interface can be in transmit, receive, idle and sleepmodes. The power consumption of a radio interface in thetransmit mode to transmit at power level γ is Γc+gaγ, whereΓc is the circuit power consumption and ga > 1 is the inverseof the power efficiency of radio interface amplifier. The powerconsumption in the receive and idle modes is Γc and in thesleep mode is Γ0. Each node puts its radio interface in sleepmode when it is not transmitting/receiving data to save energy.Thus, the sum of power consumption (in Joule/s) at the sourceand destination nodes of link l at slot t is Plt = ult × (2Γc +

1Note that the end-to-end communication link between two nodes maycompose of one or several hops whose path/relays can be decided in thenetwork layer (using a routing algorithm). That is, a link at the MAC layercan be a single-hop of an end-to-end multi-hop transmission path.

2We assume that physical-layer channel coding deals with channel fading.3The scheduling interval should be determined based on data traffic and

network dynamics. A very large scheduling interval causes slow adaptation todata traffic and network changes, while a small scheduling interval leads tohigher scheduling overhead due to more frequent scheduling/signaling slots.

Page 3: Joint Scheduling and Transmission Power Control in ...bbcr.uwaterloo.ca/~wzhuang/papers/Paper_06.17.2017.pdf · Joint Scheduling and Transmission Power Control in Wireless Ad Hoc

3

S0 D0

d

d d

d

ddS1

S6

S5

S2

S3

D2

D3

D1

d10

d20

d60

d50

S4 D4D5

D6

d d

d

d

d

ddd

d

d

d

d

d30

d40

rg

rg rg

rg

3

Fig. 1. Illustration of symmetric scheduling

gaγlt)+(1−ult)× (2Γ0) and the average power consumptionat link l is Pl = 1

T

∑Tt=1 Plt. The average energy consumed

per transmitted bit (in Joule/(bit/Hz)) at link l can be writtenas El = Pl/Rl.

Joint optimal scheduling and transmission power control areto find a scheduling matrix and a transmission power matrixthat maximize the network objective function, given by

maxu,γ

∑Ll=1 wlRl

s. t. Rl ≤ Rl, El ≤ El, l ∈ {1, 2, ..., L}(1)

where wl ∈ [0,∞) is the weighting factor of data rate of linkl, Rl denotes the maximum required data rate at link l, and Eldenotes the maximum energy consumption per bit constraintat link l. To find an optimal solution in (1), we need to solve anon-convex mixed integer non-linear problem, which is knownto be NP-hard [24], [25].

III. ASYMPTOTIC JOINT OPTIMAL SCHEDULING ANDTRANSMISSION POWER CONTROL

In this section, we study scheduling and transmission powercontrol in the wireless network as the node density goesto infinity and the network area is unbounded. Consider asymmetric link scheduling in an unbounded network area asillustrated in Figure 1. The network area is partitioned intoequal size hexagonal cells and a link is scheduled inside eachcell. The source and destination distance is the same for alllinks and the position of every scheduled link with respect toall other scheduled links is identical. Due to the symmetry ofscheduled links, the optimal transmission power should be thesame for every scheduled link. Thus, the asymptotic optimaljoint scheduling and transmission power control are to finda cell size and a transmission power level that maximize thenetwork objective function. In the following, we analyze thespectrum and energy efficiencies in the network as the cellsize and transmission power level vary, in order to determinethe optimal scheduling and transmission power control.

1 1.5 2 2.5 3 3.5 4

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

r′g

G(r

′ g)

α=2α=2.5α=3α=3.5α=4

Fig. 2. Plot of function G(·) for different path-loss exponent values

Let d denote the distance between the source and destinationof a link, rg the distance between the center and a vertex of acell, and γ the transmission power of every scheduled sourcenode. The signal power at a destination node is γ(r) = cγd−α.Let di0, i ∈ {1, 2, ...}, denote the distance from the sourcenode of an interfering link to the destination node of a targetlink. Using unity vectors ~v and ~w, we have

di0 =∣∣∣∣(m√3rg − d)~v + n

√3rg ~w

∣∣∣∣ (2)

for some (m,n) ∈ {...,−2,−1, 0, 1, 2, ...}2, (m,n) 6= (0, 0),where || · || denotes the Euclidian distance. By changingcoordinates in (2), we have

di0 =∣∣∣∣(m√3rg + n

√3rg/2− d)~x+ (3nrg/2)~y

∣∣∣∣=[(m√

3rg + n√

3rg/2− d)2

+(3nrg/2

)2]1/2. (3)

The interference power at a destination node can be calculatedas I =

∑∞i=1 cγdi0

−α. With the assumption that I � N0, theSINR at a destination node can be calculated as

η =γ(r)

N0 + I≈ γ(r)

I=

cγd−α∑∞i=1 cγdi0

−α

=1∑

(m,n)6=(0,0)

[(m√3rgd +

n√

3rg2d − 1

)2+( 3nrg

2d

)2]−α/2, F (

rgd ). (4)

Also, with frequency reuse, the network space occupied byeach scheduled link is given by

S = 3√

3/2× r2g . (5)

Using (4) and (5), the total data rate (bit/s/Hz) per unit networkarea can be written as

R =log2(1 + η)

S=

1

d2× log2 (1 + F (rg/d))

3√

3/2×(rg/d

)2 . (6)

According to (6), the total data rate depends on the ratiorg/d , r′g , and can be maximized by choosing r′g to maximizelog2(1+F (r′g))

3√

3/2×r′g2, G(r′g). Function G(·) is plotted in Figure 2

for different path-loss exponent values. Also, the maximumachievable data rate is inversely proportional to the square of

Page 4: Joint Scheduling and Transmission Power Control in ...bbcr.uwaterloo.ca/~wzhuang/papers/Paper_06.17.2017.pdf · Joint Scheduling and Transmission Power Control in Wireless Ad Hoc

4

0.05

0.1

0.15

0.2

0.25

0.3R

(bit/

s/H

z)

E (normalized to Emin)

1 1.5 2 2.5 3 3.5 4 4.50.2

0.4

0.6

0.8

1

1.2

E (J

oule

/(bit/

Hz)

)

Data rateEnergy consumption

Fig. 3. Data rate per unit of network area versus energy consumption pertransmitted bit as E in the network objective function varies (Γc = 1.25 mW,γ ∈ [1, 100] mW, ga = 10, α = 3.5, d = 1, rg ∈ [d, 4d].)

the link distance, 1/d2. On the other hand, energy consumptionper transmitted data bit (Joule/(bit/Hz)) is

E =(2Γc + gaγ)/S

R=

2Γc + gaγ

log2 (1 + F (rg/d))(7)

where 2Γc + gaγ denotes the sum of power consumption inthe source and destination nodes of a scheduled link (withthe assumption that power consumption in a source node isΓc + gaγ, in a destination node is Γc and in a non-schedulednode is negligible. According to (7), the energy consumptionper transmitted data bit decreases as the distance betweenscheduled links increases (i.e., as rg increases).

We set the objective of joint scheduling and transmissionpower control to maximize the total data rate per unit networkarea, while keeping the amount of consumed energy per trans-mitted data bit below a threshold, E, as an energy efficiencyconstraint. That is,

maxγ,rg

1

d2×

log2

(1 + F (

rgd ))

3√

32 ×

( rgd

)2s. t.

2Γc + gaγ

log2

(1 + F (

rgd )) ≤ E, F (

rgd

) ≥ ηmin

(8)

where ηmin is the minimum required SINR at a destinationnode for successful signal detection. The objective functionin (8) is consistent with (1) in which wl = 1, Rl = ∞, andEl = E, for every link l. We numerically solve (8) using abrute-force search over discrete values of γ and rg . Also, analternative way to solve (8) based on the Lagrangian multi-pliers method and Karush-Kuhn-Tucker (KKT) conditions isdiscussed in the Appendix. Figure 3 shows spectrum efficiencyand energy consumption per bit with optimized transmissionpower and cell size, as the the energy consumption constraintE varies.

IV. SCHEDULING AND TRANSMISSION POWER CONTROL

In a practical wireless network, scheduled links likely cannot be placed in a symmetric manner, because the nodedensity is finite and the link distances are not identical. Also,scheduling and transmission power control should be adaptive,as node location and traffic load vary over time. As discussed

in Section II, the optimal scheduling and transmission powercontrol are in general solutions of an NP-hard problem. Thus,we develop a heuristic scheduling and transmission powercontrol framework based on the asymptotic optimal solution.

The data rate and energy consumption of a link dependon the transmission power of the source and the power ofinterference at the destination node. We schedule links fortransmissions such that the transmission power of source nodesand the power of interference at destination nodes followthe asymptotic optimal values. For this purpose, we assign atransmission power level to the source and a target interferencepower level to the destination of each link, which follow thevalues that maximize asymptotic spectrum efficiency whilesatisfying the energy consumption per bit constraint of thelink. Then, we schedule concurrent links for transmissionssuch that the actual power of interference at the destination ofeach scheduled link is not larger than but as close as possibleto the determined target interference power of the link. If theactual interference at a destination node is more than the targetinterference power, the data will not be successfully decodedat receiver (because the actual SINR at the destination nodewill be lower than the targeted SINR value used to adjusttransmission data rate at the source node). However, it isdesired to schedule links such that the actual interference atdestinations are close to the target interference of the schedulelinks in order to allow more concurrent transmissions.

A. Transmission power and target interference power

We determine the transmission power and target interferencepower for a link based on the levels that maximize theasymptotic spectrum efficiency (data rate per unit area) whilemaintaining the energy consumption per bit of the link belowa threshold. Using (4), we have

rgd

= F−1(γ

I). (9)

By substituting (9) in (6) and (7), for transmission between apair of source and destination nodes with distance dll, settingthe transmission power to γl and the target interference powerto Il provides the asymptotic spectrum efficiency

Rl =1

dll2 ×

log2

(1 + cγldll

−α

Il

)3√

32 ×

[F−1

(cγldll−α

Il

)]2 (10)

and energy consumption per transmitted bit

El =2Γc + gaγ

log2

(1 + cγldll−α

Il

) . (11)

According to (10), the asymptotic spectrum efficiency isinversely proportional to the link distance square, dll2, anddepends on the ratio of transmission power to target interfer-ence power, γl/Il. Also, the optimal ratio γl/Il depends onthe link distance, dll.

In a practical wireless network, the distances between thesource and destination nodes of different links are differentin general. Thus, the desired ratios of transmission power tointerference power for links with different distances are differ-ent. Given the different desired ratios of transmission power to

Page 5: Joint Scheduling and Transmission Power Control in ...bbcr.uwaterloo.ca/~wzhuang/papers/Paper_06.17.2017.pdf · Joint Scheduling and Transmission Power Control in Wireless Ad Hoc

5

d11 d22

r

β1 β2

d12 d21y1

x1

y2

x2

D1 D2

S2S1

Fig. 4. A two-link network

interference power for the links, the transmission power andtarget interference power values should be prudently chosensuch that links can be scheduled with actual interference powerclose to the target interference level at every scheduled link forefficient spatial spectrum reuse. The transmission power of alink determines the minimum distance between its source nodeand the destination of rest scheduled links, however, its targetinterference level determines the minimum distance betweenits destination node and the source node of rest scheduledlinks. To illustrate, consider a two-link network depicted inFigure 4. As transmission power of S1 increases, the amountof interference imposed by S1 on D2 also increases. Thus,to maintain a target interference level, d12 must be increased.Similarly, decreasing the target interference in D1 requireslarger distance d21 to reduce the imposed interference fromS2 on D1. Therefore, it is desired that a link with highertransmission power to also have lower target interference levelfor efficient spatial spectrum reuse. To study how to choose thetransmission power and target interference value of differentlinks, we consider a two-link network as illustrated in Figure4. We assume that β1 and β2 are independent and uniformlydistributed in [0, 2π]. We also assume that the distancesbetween the source and destination of the links, d11 and d22,in different two-link network realizations, are independent andhave an identical distribution. Let E(d11) = E(d22) = m1 andE(d11

2) = E(d222) = m2. We consider the distance between

the two source nodes (r in Figure 4) as a measure of thespace occupied by the two scheduled links. Thus, it is desiredto minimize the expected distance r (over random realizationof β1, d11, β2 and d22) to minimize the average occupiedspace for the scheduled links and, as a result, maximize spatialspectrum reuse. Both links can be scheduled concurrently onlyif the actual interference power at each link is not greater thanits target level. That is

Ij = cγidij−α ≤ Ij ⇒ dij ≥

(cγiIj

) 1α

, (i, j) ∈{

(1, 2), (2, 1)}

(12)According to Figure 4, we have

dij =

√(r − xj)2

+ yj2 =

√r2 − 2rdjj cos(βj) + djj

2.(13)

By substituting (13) in (12), the required conditions to sched-ule both links concurrently can be written as

r2 − 2rdjj cos(βj) + djj2 ≥

(cγiIj

) 2α

, (i, j) ∈{

(1, 2), (2, 1)}.

(14)

65

1 32

4

65

1 32

4

65

1 32

4

65

1 32

4 65

1 32

4

65

1 32

4

To be scheduled links Weak scheduling Good scheduling

Fig. 5. Weak link scheduling plan versus good link scheduling plan

Taking expectation (with respect to βj and djj , j ∈ {1, 2}) fromboth sides of (14), we obtain

E(r2) ≥ max[(cγ1

I2

) 2α −m2,

(cγ2

I1

) 2α −m2

]. (15)

According to (15), the expected square of distance, E(r2),increases as the transmission power levels increase and tar-get interference power levels decrease. Also, E(r2) can bedecreased by setting(cγ1

I2

) 2α −m2 =

(cγ2

I1

) 2α −m2 ⇒ γ1× I1 = γ2× I2. (16)

Thus, the average occupied space for scheduling links isdecreased (i.e., actual interference power levels are close tothe target interference power levels in both links) when theproduct of transmission power and target interference poweris identical for every link. This constraint ensures that a linkwith greater transmission power to target interference levelratio is optimally assigned both a higher transmission powerand a lower target interference for efficient spatial spectrumreuse. Motivated by the analysis for the two-link network,we maintain the product of transmission power and targetinterference power at a fixed value for all links in the network.

Therefore, we determine the transmission power γ∗l andtarget interference power I∗l for link l, such that asymptoticspectrum efficiency (10) is maximized subject to energyconsumption per bit (11) smaller than a threshold, whilemaintaining the product of transmission power and targetinterference power at a fixed value. Thus, transmission powerγ∗l and target interference power I∗l are calculated as follows.

[γ∗l , I∗l ] = arg max

γl,Il

1

dll2 ×

log2

(1 + cγldll

−α

Il

)3√

32 ×

[F−1

( cγld−αllIl

)]2s. t.

2Γc + gaγl

log2

(1 +

cγld−αll

Il

) ≤ El, γl × Il = λ,

F (rgd

) ≥ ηmin

(17)

where El is the maximum energy consumption per bit thresh-old at link l, and constant λ should be chosen based on thefeasible range of transmission power and interference boundof the links. We numerically solve (17) using a brute-forcesearch over discrete values of γl and Il.

Page 6: Joint Scheduling and Transmission Power Control in ...bbcr.uwaterloo.ca/~wzhuang/papers/Paper_06.17.2017.pdf · Joint Scheduling and Transmission Power Control in Wireless Ad Hoc

6

B. Link scheduling

Given the transmission power and target interference ofdifferent links, concurrent links for transmissions should beproperly determined such that the actual power of interferenceat the destination of scheduled links are close to their targetinterference power levels. For instance, consider the schedul-ing scenario illustrated in Figure 5. The first column shows sixlinks to be scheduled. For simplicity of illustration, we use thecircular areas to show link areas based on their transmissionpower and target interference power levels. Any two linkscan be scheduled simultaneously only if their circular areasdo not overlap. The scheduled links are indicated by shadedcircular areas in the second and third columns. The secondcolumn shows a weak scheduling plan in which only twolinks can be scheduled. A better scheduling plan is representedin the third column in which three links are scheduled byproperly selecting the set of concurrent scheduled links. Thebetter scheduling plan that schedules more concurrent linkscorresponds to the situation where the actual interferencepower levels are closer to the target interference power levelsin the scheduled links, in comparison to the weak schedulingplan.

We consider a sequential link scheduling scheme to avoidhigh complexity. At each step, one link is scheduled fortransmission at a time slot, which are opportunistically de-termined to have the interference power as close as possibleto the target interference level at the scheduled destinations.Let ui = [uilt]L×T denote the scheduling matrix after step i,with u0 = [0]L×T . The data rate of link l up to sequentialscheduling step i is Ril = 1

T

∑Tt=1 log2

(1 + uiltγ

∗l hll/I

∗l

).

Let γilt denote the maximum transmission power at the sourcenode of link l at slot t, which does not increase the interferencepower at any already scheduled link before step i to more thanits target interference power level. We have

γilt = mink

( I∗k −∑j 6=k ui−1jt γ∗j hjk

hlk

), k 6= l, ui−1

kt = 1. (18)

Similarly, let Iilt denote the minimum possible target inter-ference power for link l at slot t in the presence of alreadyscheduled links before step i. We have

Iilt =∑k

ui−1kt γ

∗khkl, k 6= l. (19)

Thus, at step i, link l can be scheduled at time slot t if γilt ≥ γ∗land Iilt ≤ I∗l . The ratio Iilt/I

∗l indicates how close the target

interference power and the actual interference power are atlink l at slot t in ith step, while γ∗l /γ

ilt is the indication for

the link closet to link l, after scheduling link l at slot t at ith

step. Thus, at step i, we schedule link li for time slot ti forhighest product Iilt/I

∗l × γ∗l /γilt, given by

[li, ti] = arg maxl,t

( γ∗lγilt× IiltI∗l

), l ∈

{1, 2, ..., L

}, t ∈

{1, 2, ..., T

}s. t. γilt ≥ γ∗l , Iilt ≤ I∗l , Ril ≤ Rl.

(20)In each step, the solution of (20) can be calculated using abrute-force search over all links and time slots. For fairness,

Starti=1

L=Set of links that have trafficT=Set of data time slots

V1=LxT, V2={}

Already scheduled links at time slot t violate target interference power of link l?

Scheduling link l at time slot t violates target interference power of any already 

scheduled link?

V1=V1­(l,t)

V2=V2 U (l,t)

No Yes

Yes

End

V1 empty?

Pick a link l and time slot t in V1

No

Yes

YesYes 

No

V2 empty?

No

V2 empty? No 

Fig. 6. Flowchart operations of proposed link scheduling scheme.

scheduling is performed in several rounds and in each round alink is scheduled at most once. The sequential scheduling stepsin each round continue until every link is either scheduled onceor cannot be scheduled. The scheduling rounds continue untilno new link can be scheduled. Figure 6 illustrates operationsof the proposed link scheduling scheme.

C. Distributed scheduling

It is desired to have a distributed implementation of theproposed scheduling and transmission power control scheme,based on only local network information. According to (17),the transmission power and target interference power can bedetermined independently at each link. In Subsection IV-B,links are scheduled sequentially based on the information ofalready scheduled links using (20). However, the informationof local scheduled links is the most relevant informationto schedule links for transmission, because the power ofinterference decreases exponentially with distance. The powerof interference at the destination node of link l at time slott caused by source nodes of the scheduled links at distancefarther than d0 (> 0) is∑

k 6= l, dkl > d0

uktγkthkl ≤ c0γmaxd0−α , I0 (21)

where c0 is a constant and γmax denotes the maximumtransmission power level. Thus, using only the informationof scheduled local links within distance d0 and I0, we canestimate the power of interference at a link to calculate (18)and (19) that are required for the link scheduling schemein (20). As an example, consider scheduling of link l attime slot t when two other links are already scheduled at

Page 7: Joint Scheduling and Transmission Power Control in ...bbcr.uwaterloo.ca/~wzhuang/papers/Paper_06.17.2017.pdf · Joint Scheduling and Transmission Power Control in Wireless Ad Hoc

7

C5

C4

C3

C2

C0

C6C1

rgra

rn

Fig. 7. Partitioning the network area into hexagonal cells, where Ci, i ∈{0, 1, 2, ...}, denotes the coordinator of cell i. A circular area centred ateach coordinator denotes the location area of the nodes that their schedulinginformation is broadcasted by the coordinator (ra = 1.5rg).

Fig. 8. Structure of one frame of the proposed MAC framework.

time slot t within distance d0 with transmission power andtarget interference levels γ∗1 , I∗1 and γ∗2 , I∗2 , respectively.We have γilt = min

(I∗1−γ

∗2h21−I0hl1

,I∗2−γ

∗1h12−I0hl2

)and Iilt =

γ∗1h1l + γ∗1h1l + I0.To coordinate distributed link scheduling, we employ a

set of coordinator nodes distributed over the network areato collect and exchange local network information and toperiodically schedule links in a distributed manner. In thefollowing, we describe the proposed MAC framework (whichis based on our scheme proposed in [1]) to coordinate linkscheduling based on source node transmission requests. Thenetwork coverage area is partitioned into hexagonal cells asshown in Figure 7. The distance rg between the center anda vertex of a cell is chosen such that rg ≥ dmax. Therefore,the destination node of each source node is either in the samecell or an adjacent cell. A coordinator node is placed at thecenter of each cell to coordinate all transmissions for nodesinside the cell. Figure 8 shows the frame structure. Each frameconsists of three types of time slots:

1) Contention slots: During contention slots, the sourcenodes that want to initiate a transmission contend witheach other using a truncated CSMA MAC scheme tosend a request packet to the cell coordinators. If thenumber of contention slots is too small, nodes may nothave enough time to transmit requests to initiate trans-missions. On the other hand, assigning a large numberof slots as contention slots decreases the number of datatransmission slots which reduces network throughput.We have presented a mathematical model in [1] todetermine the number contention slots in coordinators

based on traffic load condition;2) Scheduling slots: Each coordinator node has a schedul-

ing time slot in every frame, in which it broadcasts ascheduling packet to coordinate all transmissions in itsvicinity;

3) Data slots: Data packet transmissions are performedduring contention-free data slots as scheduled by thecoordinators. A link transmits one data packet during adata slot that is scheduled for transmission.

A coordinator node maintains the following information abouteach link in its vicinity:

1) The source and destination locations;2) The transmission power and target interference level;3) The set of future data slots that it is scheduled;4) The amount of data that it has for transmission.

A coordinator receives transmission requests from sourcenodes during contention slots. Also, a coordinator receivesthe information of scheduled links for the future data slotsby overhearing scheduling packets of adjacent coordinatorsduring scheduling slots. The scheduling packets of a co-ordinator contains the information of all future scheduleddata transmissions for every node within distance ra (≥ rg)from the coordinator4. Figure 7 shows the area centred at acoordinator where the coordinator obtains the information ofscheduled transmissions by overhearing scheduling packets ofadjacent coordinators. According to Figure 7, a coordinatornode acquires the information of scheduled transmissionswithin distance rn = 1.5rg +

√ra2 − 0.75rg2 and for each

link, depending on the destination node’s location in thecell, we have d0 ∈ [rn − rg, rn]. Based on the sourcenode requests for transmission and the information of alreadyscheduled links, each coordinator periodically schedules datatransmissions for every link with the destination inside its cellin the future data slots before its own subsequent schedulingslot. A coordinator node schedules links for transmission ac-cording to the proposed link scheduling scheme in SubsectionIV-B (with the consideration of already scheduled links byadjacent coordinators) and broadcasts a scheduling packet inits scheduling slot to announce the scheduling informationto nodes inside its cell and to its adjacent coordinators. Thescheduled links perform data transmissions during data timeslots as scheduled by cell coordinators and announced duringscheduling slots. Every node puts its radio interface in thesleep mode when it is not transmiting/receiving a scheduling,data or request packet to save energy.

V. NUMERICAL RESULTS

Consider area of 19 hexagonal cells as illustrated in Figure7. There are N nodes randomly distributed over the area. Thedestination node of each link is randomly selected from thenodes within distance dmax from the source node. The rangesof feasible transmission power level, target interference power

4An interesting future work is to consider increasing ra to enlarge the areathat each coordinator acquires the information of scheduled transmissions,and thus to enable scheduling single-hop transmission between two nodeswith distance larger than rg (i.e., when single-hop source and destinationnodes are not in a cell or adjacent cells).

Page 8: Joint Scheduling and Transmission Power Control in ...bbcr.uwaterloo.ca/~wzhuang/papers/Paper_06.17.2017.pdf · Joint Scheduling and Transmission Power Control in Wireless Ad Hoc

8

1 1.5 2 2.5 3 3.5 40

20

40

60

80

100

θ

Opt

imal

tran

smis

sion

pow

er (

mW

)

dll=2

dll=5

dll=10

dll=15

dll=20

(a)

1 1.5 2 2.5 3 3.5 4−80

−75

−70

−65

−60

−55

θ

Opt

imal

targ

et in

terf

renc

e (d

Bm

)

dll=15

dll=20

dll=2

dll=5

dll=10

(b)

1 1.5 2 2.5 3 3.5 45

10

15

20

25

30

θ

Opt

imal

SIN

R (d

B)

dll=2

dll=5

dll=10

dll=15

dll=20

(c)

Fig. 9. Optimal transmission power, target interference level and SINR versus θ as link distance dll (m) varies.

1 1.5 2 2.5 3 3.5 410−4

10−3

10−2

10−1

θ

Spe

ctru

m e

ffici

ncy

(bit/

s/H

z/m

2 )

dll=2

dll=5

dll=10

dll=15

dll=20

(a)

1 1.5 2 2.5 3 3.5 40.2

0.4

0.6

0.8

1

1.2

1.4

θ

Ene

rgy

cons

ump.

per

bit

(Jou

le/(b

it/H

z))

dll=2dll=5dll=10dll=15dll=20

(b)

Fig. 10. Asymptotic spectrum efficiency and energy consumption per bit versus θ as link distancedll (m) varies.

1 1.5 2 2.5 3 3.5 4120

140

160

180

200

220

240

θ

Thr

ough

put (

bit−

m/s

/Hz)

0.5

0.7

0.9

1.1

1.31.3

Ene

rgy

cons

umpt

ion

(Jou

le/(

bit/H

z))

ThroughputEnergy consumptionEnergy consumption only during data slots

Fig. 11. Throughput and energy consumption ofproposed scheme as θ varies with saturated datatraffic at all nodes (N = 400).

TABLE ISIMULATION PARAMETERS

Parameter Value Parameter ValueFrame length 100 ms c 0.0001Data time slot 1 ms α 3.4Scheduling time slot 1 ms dmax 20 mContention time slot 1 ms Bandwidth 2 MHzNumber of data slots 90 γmax 100 mWNumber of scheduling slots 7 γmin 1 mWNumber of contention slots 3 Imax -45 dBData packet length 1 ms Imin -80 dBScheduling packet length 1 ms ηmax 30 dBBeacon interval 100 ms ηmin 6 dBATIM size 224 bits Rs 6 MbpsATIM-ACK size 112 bits Γc 1.25 WMini-slot 20 µs ga 10SIFS 10 µs Γ0 0 WPHY preamble 72 µs CWmin 15Scheduling size for a transmission 200 bits CWmax 1023Request packet size 160 bits

level and SINR value for a link are provided in Table I basedon IEEE 802.11 standard [26]. We set the energy consumptionper bit constraint, El = θ × minEl for every link l, whereθ ≥ 1. Thus, θ = 1 corresponds to setting transmission powerand target interference power for lowest energy consumptionper bit in each link, while as θ increases, the energy con-sumption constraint is relaxed and the transmission power andtarget interference of a link are determined based on the valuesthat provide highest asymptotic spectrum efficiency. Figure 9shows the optimal transmission power, target interference leveland SINR of a link versus θ as the link distance varies. The

corresponding asymptotic spectrum efficiency and the energyconsumption per bit are depicted in Figures 10(a) and 10(b)respectively. Figure 9(b) shows that the calculated optimaltarget inference level is always much larger than the thermalnoise power level5, which conforms with the assumption ofinterference dominated network used in Section III. Accordingto Figure 9(c), the SINR is set to the highest value for alink when the objective is to minimize energy consumptionper bit (i.e., θ = 1). However, the optimal SINR value tomaximize the asymptotic spectrum efficiency when the energyconsumption constraint is weakened is always about 8 dB,independent of the link distance.

We evaluate the performance of our proposed schedulingand transmission power control scheme via simulation. Thefollowing metrics are used as performance measure to comparedifferent schemes:

1) Throughput: Throughput is defined as the summationof all transmitted data bits per second, weighted by thetransmitted distance [27];

2) Energy consumption: Energy consumption is defined asthe ratio of total energy consumed in the nodes to thetotal number of transmitted data bits. Similar metrics arealso used in [1], [5]–[8];

3) Scheduling efficiency: According to (6), the spectrumefficiency for transmission distance d is bounded by R =1/d2×maxG(·). Thus, the summation of all transmitteddata bits per second, weighted by the second power ofthe transmitted distance,

∑lRld

2ll ≤ maxG(·) × A,

where A denotes the area size and the equality holds

5Thermal noise power is about -101 dBm per 20 MHz.

Page 9: Joint Scheduling and Transmission Power Control in ...bbcr.uwaterloo.ca/~wzhuang/papers/Paper_06.17.2017.pdf · Joint Scheduling and Transmission Power Control in Wireless Ad Hoc

9

20 40 60 80 100 120 140 160 180 200 Inf0

50

100

150

200

250

Total load (bit/s/Hz)

Thr

ough

put (

bit−

m/s

/Hz)

P − ran. sch. best−DCFbest−PSM

ProposedP − γ

max

P − Imin

P − arb. γ, I

(a) N = 400, θ =∞

100 200 300 400 500 600 700 8000

50

100

150

200

250

Thro

ughp

ut (b

it−m

/s/H

z)

N

Proposedbest−DCFbest−PSM

(b) Saturated traffic load, θ =∞

Fig. 12. Throughput of different schemes as network traffic load and number of nodes vary.

1 20 40 60 80 100 120 1340

0.05

0.1

0.15

0.2

0.25

0.3

0.35

Node index

Dat

a ra

te (b

it/s/

Hz)

Proposedbest−DCFbest−PSM

Fig. 13. Data transmission rate of the nodes usingdifferent schemes (Saturated data traffic, N = 400,θ =∞).

20 40 60 80 100 120 140 160 180 200 Inf0

5

10

15

20

25

Total load (bit/s/Hz)

Ene

rgy

cons

umpt

ion

(Jou

le/(b

it/H

z))

Proposedbest−DCFbest−PSM

(a) N = 400, θ =∞

100 200 300 400 500 600 700 8000

10

20

30

40

50

Ene

rgy

cons

umpt

ion

(Jou

le/(b

it/H

z))

N

Proposedbest−DCFbest−PSM

(b) Saturated traffic load, θ =∞

Fig. 14. Energy consumption of different schemes as network traffic load and number of nodes vary.

100 200 300 400 500 600 700 8000

0.2

0.4

0.6

0.8

1

Sch

edul

ing

effic

ienc

y (b

it−m

2 /s/H

z/m

2 )

N

Proposedbest−DCFbest−PSM

Fig. 15. Scheduling efficiency of different schemesas number of nodes varies (Saturated data traffic,θ =∞).

under asymptotic optimal scheduling and transmissionpower control. Therefore, we define scheduling effi-ciency as the ratio

∑lRld

2ll/(maxG(·)×A).

The performance metrics are evaluated based on the transmit-ted data and energy consumption of the nodes in an innerregion of the network area to eliminate edge effects. Linkswith source nodes located inside the 7 central hexagonal cells(of the 19 hexagonal cells) in Figure 7 and all coordinatornodes inside this area are considered in evaluating the perfor-mance metrics6. We compare the performance of our proposedscheme with IEEE 802.11 DCF MAC with and without powersaving and with optimized transmission power levels andcarrier sensing threshold based on the analysis provided in[9], [10]. Also, we examine the effectiveness of each strategythat we use for determining transmission power and targetinterference power levels and for link scheduling by evaluatingthe throughput without the strategy. The compared schemes areas follows:

1) The proposed scheme, denoted by “Proposed”;2) “P - γmax”, “P - Imin” and “P - arb. γ, I”, representing

proposed scheme when the product of transmissionpower and target interference power is not maintained ata fixed value, but respectively the transmission power isset to the maximum value, the target interference levelis set to the minimum value and the transmission powerand target interference level are chosen arbitrary;

6This is because nodes at the edge of simulated network area experienceless interference from their adjacent nodes, as the simulated area is bounded.Therefore, performance of nodes in the inner part of the simulated area shouldbe considered to evaluate the actual network performance.

3) “P - ran. sch.”, representing the proposed scheme whenthe link scheduling by coordinators at each schedulingstep is not according to the link scheduling algorithmdescribed by (20), instead a link and a data slot arerandomly selected from the set of links and slots thatcan be scheduled;

4) “best-DCF” and “best-PSM”, representing the DCFMAC of IEEE 802.11 in ad hoc mode without andwith power saving mode respectively, with optimizedtransmission power levels and carrier sensing thresholdbased on the analysis provided in [9] and with optimizedATIM window size7.

In each scheme, all control and signaling packets are transmit-ted using signaling rate Rs, which requires minimum SINRηmin during entire packet transmission time for successfulreception at the destination. Data packets are transmitted usingvariable bit rate which is optimized for each link based onthe statistics of SINR at destination during past transmittedpackets to obtain highest average link data rate. A data packetis successfully received if the SINR at the destination nodeduring the entire packet transmission time is not less thanthe required SINR for the used data transmission rate. Thedata packet duration is 1 ms in each scheme and the datapacket header and ACK packet overheads are neglected inevery scheme. Data packets are generated according to aPoisson process in each source node. The network load isdefined as the aggregate bit generation rate in all nodes inthe entire network area and is equally distributed among all

7The ATIM window size in power saving mode is optimized for highesttotal network throughput using a brute force simulation of IEEE 802.11 DCFMAC with different ATIM window sizes.

Page 10: Joint Scheduling and Transmission Power Control in ...bbcr.uwaterloo.ca/~wzhuang/papers/Paper_06.17.2017.pdf · Joint Scheduling and Transmission Power Control in Wireless Ad Hoc

10

20 40 60 80 100 120 140 160 180 200 Inf0

50

100

150

200

250

Total load (bit/s/Hz)

Thr

ough

put (

bit−

m/s

/Hz)

Proposedbest−DCFbest−PSM

(a)

20 40 60 80 100 120 140 160 180 200 Inf0

5

10

15

20

25

Total load (bit/s/Hz)

Ene

rgy

cons

umpt

ion

(Jou

le/(

bit/H

z))

Proposedbest−DCFbest−PSM

(b)

20 40 60 80 100 120 140 160 180 200 Inf0

0.2

0.4

0.6

0.8

1

Sch

edul

ing

effic

ienc

y (b

it−m

2 /s/H

z/m

2 )

Total load (bit/s/Hz)

Proposedbest−DCFbest−PSM

(c)

Fig. 16. Performance of different schemes in a mobile network scenario as network traffic load varies (N = 400, θ =∞).

nodes. Nodes are randomly distributed over the network areaand the destination of each node is randomly selected fromone of neighboring nodes within distance dm. We evaluatethe performance of different schemes using our developedsimulations in MATLAB for the following scenarios:

1) Static network – Nodes do not move over the simulationtime. The simulations are performed for five secondsof the channel time and the performance metrics areaveraged over five different random realization of thenetwork;

2) Mobile network – Nodes move and network topologyvaries over the simulation time. Node i ∈ {1, 2, ..., N}moves with speed vi ∈ [0, 2] m/s and along directionφi ∈ [−π, π], which are randomly selected for each nodewith uniform distributions. When the distance between asource and a destination increases to larger than dm, thesource node will randomly chooses another destinationnode. Each node periodically (every one second) reportsits current location to the coordinator by transmitting acontrol packet during contention slots. The simulationsare performed for 50 seconds of channel time.

Other simulation parameters are given in Table I.Figures 11-15 show the performance of different schemes

in a static network. Figure 11 shows throughput versus energyconsumption of the proposed scheme as the energy con-sumption per bit constraint varies. The energy consumptionincluding only consumed energy during data slots (withoutconsidering energy consumed during scheduling slots andcontention slots) is also plotted in the figure. According toFigure 11, as the energy consumption constraints vary fromno constrains to the minimum energy consumption per bitconstraints in every link, the network throughput is decreasedby 38% and energy consumption is reduced by 18%, while theenergy consumption for data transmissions/receptions only isreduced by 37%.

Figure 12 shows the throughput using different schemes,as network traffic load and number of nodes change. Thedata transmission rate of the nodes using different schemesare depicted in figure 13. The proposed scheme providesabout 40% higher throughput than best-DCF and best-PSM.Figure 12(a) shows the effectiveness of the strategies used forchoosing transmission power and target interference power ofthe links and for link scheduling in our proposed scheme.

Figure 13 compares the data transmission rate of the nodes

using different schemes. In each scheme, nodes are sortedbased on data transmission rate and the horizonal line showsnode index. It is observed that the proposed scheme pro-vides better fairness compared to best-DCF and best-PSM,as the link scheduling algorithm in the proposed schemeis to maintain fairness while efficiently choosing concurrenttransmissions in each data slot.

The energy consumption using different schemes, as net-work traffic load and number of nodes change are shown inFigure 14. The energy consumption of the proposed schemeis less than 10% of best-DCF and about 20% of best-PSM.

Figure 15 compares the scheduling efficiency using differentschemes. The scheduling efficiency of the proposed scheme isabout 35% higher than best-DCF and best-PSM. Indeed, thescheduling efficiency of our proposed scheme is about 70%of the asymptotic optimal scheduling and transmission powercontrol. The achieved scheduling efficiency is about 78% indata slots, as 90% of slots are data slots and the rest arescheduling and contention slots in the proposed scheme.

The performance of different schemes in a mobile scenariois evaluated in Figure 16. The proposed scheme providesabout 30% higher throughput compared to best-DCF and best-PSM. The energy consumption per transmitted data bit usingproposed scheme is less than 20% of the existing schemes.Also, the scheduling efficiency using the proposed scheme isabout 30% higher than the existing schemes.

VI. CONCLUSION

In this paper, we study joint scheduling and transmissionpower control for spectrum and energy efficient communica-tion in a wireless ad hoc network. We analyze the asymptoticoptimal joint scheduling and transmission power control, anddetermine the maximum spectrum efficiency, subject to anenergy efficiency constraint. Based on the asymptotic analysis,we propose a scheduling and transmission power controlscheme to maximize spectrum and energy efficiencies in apractical network. A transmission power level and a targetinterference power level are determined for each link based onthe asymptotic optimal values. Concurrent links are scheduledfor transmission such that the actual level of interferenceat each destination node is close to its target interferencelevel. We present a distributed MAC framework to implementthe proposed scheme based on local network information.Simulation results show that the proposed scheme provides

Page 11: Joint Scheduling and Transmission Power Control in ...bbcr.uwaterloo.ca/~wzhuang/papers/Paper_06.17.2017.pdf · Joint Scheduling and Transmission Power Control in Wireless Ad Hoc

11

about 40% higher throughput than existing schemes. Theenergy consumption of the proposed scheme is less than20% of existing schemes. Also, the scheduling efficiency ofproposed scheme is 70% of the asymptotic optimal solution,which is about 35% higher than existing schemes.

APPENDIX

In this section, we discuss solving (8) using the method ofLagrangian multipliers. The Lagrangian of (8) can be writtenas

L(rg, γ, µ1, µ2) =1

d2×

log2

(1 + F (

rgd ))

3√

32 ×

( rgd

)2+µ1× (

2Γc + gaγ

log2

(1 + F (

rgd )) − E) +µ2× (−F (

rgd

) + ηmin).

(22)

Thus, the KKT conditions can be written as

∂L

∂rg=

3√

32 ×( rgd )

2

loge 2×(1+F (rgd )× ∂F (

rgd )

∂rg− 3√

3rgd2 log2

(1 + F (

rgd ))

27rg4

4d2

−µ1×(2Γc + gaγ)× loge 2× ∂F (

rgd )

∂rg(log2

(1 + F (

rgd )) )2

×(1 + F (

rgd ))−µ2×

∂F (rgd )

∂rg

= 0;

∂L

∂γ= µ1 ×

ga

log2

(1 + F (

rgd )) = 0 ;

µ1 × (2Γc + gaγ

log2

(1 + F (

rgd )) − E) = 0;

µ2 × (−F (rgd

) + ηmin);

µ1, µ2 ≥ 0. (23)

The partial derivative ∂F (rg/d)/∂rg in (23) can be calculatedusing (4). Finally, the optimal solution can be calculated byexamining stationary points in (23).

REFERENCES

[1] K. Rahimi Malekshan, W. Zhuang, and Y. Lostanlen, “Coordination-based medium access control with space-reservation for wireless ad hocnetworks,” IEEE Trans. Wireless Communications, vol. 15, no. 2, pp.1617–1628, Feb. 2016.

[2] I. Hwang, B. Song, and S. S. Soliman, “A holistic view on hyper-dense heterogeneous and small cell networks,” IEEE CommunicationsMagazine, vol. 51, no. 6, pp. 20–27, June 2013.

[3] A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-device com-munication in cellular networks,” IEEE Commun. Surv. Tuts., vol. 16,no. 4, pp. 1801–1819, Nov. 2014.

[4] J. Kim, J. Lee, J. Kim, and J. Yun, “M2M service platforms: Survey,issues, and enabling technologies,” IEEE Commun. Surv. Tuts., vol. 16,no. 1, pp. 61–76, Feb. 2014.

[5] E.-S. Jung and N. H. Vaidya, “An energy efficient MAC protocol forwireless LANs,” in Proc. IEEE INFOCOM’02, Jan. 2002.

[6] K. Rahimi Malekshan, W. Zhuang, and Y. Lostanlen, “An energyefficient MAC protocol for fully connected wireless ad hoc networks,”IEEE Trans. Wireless Communications, vol. 13, no. 10, pp. 5729–5740,Oct. 2014.

[7] J. Zhang, G. Zhou, C. Huang, S. Son, and J. A. Stankovic, “TMMAC:An energy efficient multi-channel MAC protocol for ad hoc networks,”in Proc. IEEE ICC’07, June 2007.

[8] K. Rahimi Malekshan and W. Zhuang, “An energy efficient MACprotocol for fully-connected wireless networks,” in Proc. IEEE ICC’13,June 2013.

[9] T.-S. Kim, H. Lim, and J. C. Hou, “Improving spatial reuse throughtuning transmit power, carrier sense threshold, and data rate in multihopwireless networks,” in Proc. MobiCom’06, Sept. 2006.

[10] T. S. Kim, H. Lim, and J. C. Hou, “Understanding and improvingthe spatial reuse in multihop wireless networks,” IEEE Trans. MobileComputing, vol. 7, no. 10, pp. 1200–1212, 2008.

[11] L. B. Jiang and S. C. Liew, “Improving throughput and fairness by reduc-ing exposed and hidden nodes in 802.11 networks,” IEEE Transactionson Mobile Computing, vol. 7, no. 1, pp. 34–49, Jan. 2008.

[12] T. ElBatt and A. Ephremides, “Joint scheduling and power controlfor wireless ad hoc networks,” IEEE Trans. Wireless Communications,vol. 3, no. 1, pp. 74–85, Jan. 2004.

[13] Y. Li and A. Ephremides, “A joint scheduling, power control, and routingalgorithm for ad hoc wireless networks,” Ad Hoc Networks, vol. 5, no. 7,pp. 959 – 973, Sept. 2007.

[14] A. Gjendemsjo, D. Gesbert, G. E. Oien, and S. G. Kiani, “Optimal powerallocation and scheduling for two-cell capacity maximization,” in Proc.WIOPT’06, Apr. 2006.

[15] A. Gjendemsj, D. Gesbert, G. E. Oien, and S. G. Kiani, “Binary powercontrol for sum rate maximization over multiple interfering links,” IEEETrans. Wireless Communications, vol. 7, no. 8, pp. 3164–3173, August2008.

[16] G. Miao, N. Himayat, G. Li, A. T. Koc, and S. Talwar, “Interference-aware energy-efficient power optimization,” in Proc. IEEE ICC’09, June2009.

[17] G. Miao, N. Himayat, Y. Li, and A. Swami, “Cross-layer optimizationfor energy-efficient wireless communications: a survey,” Wirel. Commun.Mob. Comput., vol. 9, no. 4, pp. 529–542, Apr. 2009.

[18] V. Kawadia and P. R. Kumar, “Principles and protocols for power controlin wireless ad hoc networks,” IEEE J. Selected Areas in Communica-tions, vol. 23, no. 1, pp. 76–88, Jan. 2005.

[19] S. Narayanaswamy, V. Kawadia, R. S. Sreenivas, and P. R. Kumar,“Power control in ad-hoc networks: Theory, architecture, algorithmand implementation of the COMPOW protocol,” in European WirelessConference, Feb. 2002.

[20] E.-S. Jung and N. H. Vaidya, “A power control MAC protocol for ad hocnetworks,” ACM Tran. Wireless Networks, vol. 11, no. 1-2, pp. 55–66,Jan. 2005.

[21] J. P. Monks, V. Bharghavan, and W.-M. W. Hwu, “A power controlledmultiple access protocol for wireless packet networks,” in Proc. IEEEINFOCOM’01, June 2001.

[22] S.-L. Wu, Y.-C. Tseng, and J.-P. Sheu, “Intelligent medium access formobile ad hoc networks with busy tones and power control,” IEEE J.Selected Areas in Communications, vol. 18, no. 9, pp. 1647–1657, Sept.2000.

[23] A. Muqattash and M. Krunz, “Power controlled dual channel (PCDC)medium access protocol for wireless ad hoc networks,” in Proc. IEEEINFOCOM’03, Apr. 2003.

[24] S. Ramanathan, “A unified framework and algorithm for (T/F/C)DMAchannel assignment in wireless networks,” in Proc. IEEE INFOCOM’97,Apr. 1997.

[25] A. Ephremides and T. Truong, “Scheduling broadcasts in multihop radionetworks,” IEEE Trans. Communications, vol. 38, no. 4, pp. 456–460,Apr. 1990.

[26] IEEE 802.11 WG, Part 11: Wireless LAN Medium Access Control (MAC)and Physical Layer (PHY) Specification, Standard, Aug. 1999.

[27] P. Gupta and P. R. Kumar, “The capacity of wireless networks,” IEEETransactions on Information Theory, vol. 46, no. 2, pp. 388–404, March2000.

Page 12: Joint Scheduling and Transmission Power Control in ...bbcr.uwaterloo.ca/~wzhuang/papers/Paper_06.17.2017.pdf · Joint Scheduling and Transmission Power Control in Wireless Ad Hoc

12

Kamal Rahimi Malekshan (S’11-M’17) receivedthe Ph.D. degree in Electrical and Computer En-gineering from the University of Waterloo, ON,Canada, in 2016. During May 2016 to Dec. 2016,he was a Postdoctoral Fellow with the David R.Cheriton School of Computer Science University ofWaterloo, ON, Canada. Since 2017, he has beenwith the Research and Development Departmentof Siemens, Toronto, ON, Canada. His researchinterest include radio resource allocation in wirelessnetworks, energy efficient wireless networks, and

software defined radio and networking.

Weihua Zhuang (M’93-SM’01-F’08) has been withthe Department of Electrical and Computer Engi-neering, University of Waterloo, Canada, since 1993,where she is a Professor and a Tier I Canada Re-search Chair in Wireless Communication Networks.Her current research focuses on resource allocationand QoS provisioning in wireless networks, and onsmart grid. She is a co-recipient of several best paperawards from IEEE conferences. Dr. Zhuang was theEditor-in-Chief of IEEE Transactions on VehicularTechnology (2007-2013), and the Technical Program

Chair/Co-Chair of the IEEE VTC Fall 2017/2016. She is a Fellow of theIEEE, a Fellow of the Canadian Academy of Engineering, a Fellow of theEngineering Institute of Canada, and an elected member in the Board ofGovernors and VP Publications of the IEEE Vehicular Technology Society.